Ningyu He

Orcid: 0000-0002-9980-7298

According to our database1, Ningyu He authored at least 27 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets.
Autom. Softw. Eng., June, 2024

2023
Miracle or Mirage? A Measurement Study of NFT Rug Pulls.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023

WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation.
CoRR, 2023

SoK: On the Security of Non-Fungible Tokens.
CoRR, 2023

WASMixer: Binary Obfuscation for WebAssembly.
CoRR, 2023

Abusing the Ethereum Smart Contract Verification Services for Fun and Profit.
CoRR, 2023

A Deep Dive into NFT Rug Pulls.
CoRR, 2023

A General Static Binary Rewriting Framework for WebAssembly.
CoRR, 2023

Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

BREWasm: A General Static Binary Rewriting Framework for WebAssembly.
Proceedings of the Static Analysis - 30th International Symposium, 2023

Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Efficient Trajectory Planning for Coordinated Arrival of Fixed-Wing UAV Swarm.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation.
CoRR, 2022

2021
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO.
CoRR, 2021

Adversarial Networks With Circular Attention Mechanism for Fine-Grained Domain Adaptation.
IEEE Access, 2021

A Weighted Partial Domain Adaptation for Acoustic Scene Classification and Its Application in Fiber Optic Security System.
IEEE Access, 2021

EOSAFE: Security Analysis of EOSIO Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Super Resolution DOA Based on Relative Motion for FMCW Automotive Radar.
IEEE Trans. Veh. Technol., 2020

Reduced Dimension STAP Based on Sparse Recovery in Heterogeneous Clutter Environments.
IEEE Trans. Aerosp. Electron. Syst., 2020

Security Analysis of EOSIO Smart Contracts.
CoRR, 2020

DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

Spatial Attentional Bilinear 3D Convolutional Network for Video-Based Autism Spectrum Disorder Detection.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Characterizing Code Clones in the Ethereum Smart Contract Ecosystem.
Proceedings of the Financial Cryptography and Data Security, 2020

2018
An optic-fiber fence intrusion recognition system using the optimized curve fitting model based on the SVM method.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018


  Loading...