A survey on the security of blockchain systems X Li, P Jiang, T Chen, X Luo, Q Wen Future Generation Computer Systems 107, 841-853, 2020 | 1953 | 2020 |
QDASH: a QoE-aware DASH system RKP Mok, X Luo, EWW Chan, RKC Chang Proceedings of the 3rd Multimedia Systems Conference, 11-22, 2012 | 484 | 2012 |
Under-optimized smart contracts devour your money T Chen, X Li, X Luo, X Zhang 2017 IEEE 24th International Conference on Software Analysis, Evolution and …, 2017 | 445 | 2017 |
Understanding Ethereum via Graph Analysis T Chen, Y Zhu, Z Li, J Chen, X Li, X Luo, X Lin, X Zhange IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1484-1492, 2018 | 379 | 2018 |
On a New Class of Pulsing Denial-of-Service Attacks and the Defense. X Luo, RKC Chang NDSS, 2005 | 268 | 2005 |
Android malware familial classification and representative sample selection via frequent subgraph analysis M Fan, J Liu, X Luo, K Chen, Z Tian, Q Zheng, T Liu IEEE Transactions on Information Forensics and Security 13 (8), 1890-1905, 2018 | 240 | 2018 |
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci NDSS 11, 2011 | 219 | 2011 |
Inferring the QoE of HTTP video streaming from user-viewing activities RKP Mok, EWW Chan, X Luo, RKC Chang Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack …, 2011 | 203 | 2011 |
Model-Reuse Attacks on Deep Learning Systems Y Ji, X Zhang, S Ji, X Luo, T Wang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 186 | 2018 |
A detailed and real-time performance monitoring framework for blockchain systems P Zheng, Z Zheng, X Luo, X Chen, X Liu 2018 IEEE/ACM 40th International Conference on Software Engineering …, 2018 | 184 | 2018 |
Interpretable deep learning under fire X Zhang, N Wang, H Shen, S Ji, X Luo, T Wang 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020 | 183 | 2020 |
Software defect prediction based on kernel PCA and weighted extreme learning machine Z Xu, J Liu, X Luo, Z Yang, Y Zhang, P Yuan, Y Tang, T Zhang Information and Software Technology 106, 182-200, 2019 | 176 | 2019 |
Detecting stealthy P2P botnets using statistical traffic fingerprints J Zhang, R Perdisci, W Lee, U Sarfraz, X Luo 2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011 | 175 | 2011 |
Towards more accurate severity prediction and fixer recommendation of software bugs T Zhang, J Chen, G Yang, B Lee, X Luo Journal of Systems and Software 117, 166-184, 2016 | 166 | 2016 |
Dexhunter: toward extracting hidden code from packed android applications Y Zhang, X Luo, H Yin Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 160 | 2015 |
Flow level detection and filtering of low-rate DDoS C Zhang, Z Cai, W Chen, X Luo, J Yin Computer Networks 56 (15), 3417-3431, 2012 | 158 | 2012 |
Defining smart contract defects on ethereum J Chen, X Xia, D Lo, J Grundy, X Luo, T Chen IEEE Transactions on Software Engineering 48 (1), 327-345, 2020 | 150 | 2020 |
An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks T Chen, X Li, Y Wang, J Chen, Z Li, X Luo, MH Au, X Zhang Information Security Practice and Experience: 13th International Conference …, 2017 | 145 | 2017 |
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks C Wang, TTN Miu, X Luo, J Wang IEEE Transactions on Information Forensics and Security 13 (3), 559-573, 2018 | 144 | 2018 |
Towards a scalable resource-driven approach for detecting repackaged Android applications Y Shao, X Luo, C Qian, P Zhu, L Zhang Proceedings of the 30th Annual Computer Security Applications Conference, 56-65, 2014 | 144 | 2014 |