Author of the publication

EOSAFE: Security Analysis of EOSIO Smart Contracts.

, , , , , , , and . USENIX Security Symposium, page 1271-1288. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Runtime Biased Pointer Reuse Analysis and Its Application to Energy Efficiency., , and . PACS, volume 3164 of Lecture Notes in Computer Science, page 1-12. Springer, (2003)On double-level kernel self-similarities for 3D motion trajectory description and recognition., , and . RCAR, page 657-662. IEEE, (2017)Energy-aware Fixed-Priority Multi-core Scheduling for Real-time Systems., and . CoRR, (2015)Understanding Application-Battery Interactions on Smartphones: A Large-Scale Empirical Study., , and . IEEE Access, (2017)Cumulative Diversity Pattern Entropy (CDEn): A High-Performance, Almost-Parameter-Free Complexity Estimator for Nonstationary Time Series., , , , , and . IEEE Trans. Ind. Informatics, 19 (9): 9642-9653 (2023)MadDroid: Characterising and Detecting Devious Ad Content for Android Apps., , , , , , , , and . CoRR, (2020)BREWasm: A General Static Binary Rewriting Framework for WebAssembly., , , and . SAS, volume 14284 of Lecture Notes in Computer Science, page 139-163. Springer, (2023)Simultaneous Precision Assembly of Multiple Objects through Coordinated Micro-robot Manipulation., , , , and . ICRA, page 6280-6286. IEEE, (2021)Human-Robot Shared Control for Surgical Robot Based on Context-Aware Sim-to-Real Adaptation., , , , , , , , , and 3 other author(s). ICRA, page 7694-7700. IEEE, (2022)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools., , , , , , , , , and 1 other author(s). CCS, page 2396-2410. ACM, (2023)