Pengcheng Xia

Orcid: 0000-0001-9034-0639

According to our database1, Pengcheng Xia authored at least 24 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets.
Autom. Softw. Eng., June, 2024

The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024

2023
A digital twin-enhanced semi-supervised framework for motor fault diagnosis based on phase-contrastive current dot pattern.
Reliab. Eng. Syst. Saf., July, 2023

AutoKary2022: A Large-Scale Densely Annotated Dateset for Chromosome Instance Segmentation.
CoRR, 2023

AutoKary2022: A Large-Scale Densely Annotated Dataset for Chromosome Instance Segmentation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Speech4Mesh: Speech-Assisted Monocular 3D Facial Reconstruction for Speech-Driven 3D Facial Animation.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Edge Computing Sleep Mode Task Scheduling Based on Deep Reinforcement Learning.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023

2022
Fault Knowledge Transfer Assisted Ensemble Method for Remaining Useful Life Prediction.
IEEE Trans. Ind. Informatics, 2022

Self-attention-based adaptive remaining useful life prediction for IGBT with Monte Carlo dropout.
Knowl. Based Syst., 2022

Challenges in decentralized name management: the case of ENS.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

CluFL: Cluster-driven Weighted FL Model Aggregation Strategy.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Competition Strategies for Location-Based Mobile Coupon Promotion.
J. Theor. Appl. Electron. Commer. Res., 2021

Beyond the virus: a first look at coronavirus-themed Android malware.
Empir. Softw. Eng., 2021

Demystifying Scam Tokens on Uniswap Decentralized Exchange.
CoRR, 2021

Ethereum Name Service: the Good, the Bad, and the Ugly.
CoRR, 2021

Tool Wear Prediction Under Varying Milling Conditions via Temporal Convolutional Network and Auxiliary Learning.
Proceedings of the International IEEE Conference on Prognostics and Health Management, 2021

Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Tracking Counterfeit Cryptocurrency End-to-end.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware.
CoRR, 2020

Characterizing cryptocurrency exchange scams.
Comput. Secur., 2020

Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

Crowd Counting with Spatial Normalization Network.
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020

2016
Design and Implementation of Employment Management System Based on B / S.
Int. J. Adv. Pervasive Ubiquitous Comput., 2016


  Loading...