Xiaoqi Li

Orcid: 0000-0002-6012-9178

Affiliations:
  • Hainan University, China
  • Hong Kong Polytechnic University, Department of Computing, Hong Kong (PhD)


According to our database1, Xiaoqi Li authored at least 62 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Security Analysis of ChatGPT: Threats and Privacy Risks.
CoRR, August, 2025

NATLM: Detecting Defects in NFT Smart Contracts Leveraging LLM.
CoRR, August, 2025

MultiCFV: Detecting Control Flow Vulnerabilities in Smart Contracts Leveraging Multimodal Deep Learning.
CoRR, August, 2025

UEChecker: Detecting Unchecked External Call Vulnerabilities in DApps via Graph Analysis.
CoRR, August, 2025

Blockchain security based on cryptography: a review.
CoRR, August, 2025

DoS Attacks and Defense Technologies in Blockchain Systems: A Hierarchical Analysis.
CoRR, July, 2025

Information Security Based on LLM Approaches: A Review.
CoRR, July, 2025

Construction of Urban Greenland Resources Collaborative Management Platform.
CoRR, June, 2025

When Blockchain Meets Crawlers: Real-time Market Analytics in Solana NFT Markets.
CoRR, June, 2025

Decentralized COVID-19 Health System Leveraging Blockchain.
CoRR, June, 2025

Penetration Testing for System Security: Methods and Practical Approaches.
CoRR, May, 2025

Password Strength Detection via Machine Learning: Analysis, Modeling, and Evaluation.
CoRR, May, 2025

An Empirical Analysis of EOS Blockchain: Architecture, Contract, and Security.
CoRR, May, 2025

Facial Recognition Leveraging Generative Adversarial Networks.
CoRR, May, 2025

Towards Understanding Deep Learning Model in Image Recognition via Coverage Test.
CoRR, May, 2025

Comparative Analysis of Blockchain Systems.
CoRR, May, 2025

Hybrid Wi-Fi/PDR Indoor Localization with Fingerprint Matching.
CoRR, May, 2025

A Comprehensive Study of Exploitable Patterns in Smart Contracts: From Vulnerability to Defense.
CoRR, April, 2025

Security Analysis and Implementation of Cryptocurrency Systems on Blockchain 2.0.
CoRR, April, 2025

AI-Based Vulnerability Analysis of NFT Smart Contracts.
CoRR, April, 2025

Malicious Code Detection in Smart Contracts via Opcode Vectorization.
CoRR, April, 2025

From Data Behavior to Code Analysis: A Multimodal Study on Security and Privacy Challenges in Blockchain-Based DApp.
CoRR, April, 2025

Blockchain Application in Metaverse: A Review.
CoRR, April, 2025

A Multi-Layered Security Analysis of Blockchain Systems: From Attack Vectors to Defense and System Hardening.
CoRR, April, 2025

Exploring Vulnerabilities and Concerns in Solana Smart Contracts.
CoRR, April, 2025

Security Vulnerabilities in Ethereum Smart Contracts: A Systematic Analysis.
CoRR, April, 2025

Enhancing Smart Contract Vulnerability Detection in DApps Leveraging Fine-Tuned LLM.
CoRR, April, 2025

SmartBugBert: BERT-Enhanced Vulnerability Detection for Smart Contract Bytecode.
CoRR, April, 2025

SoK: Security Analysis of Blockchain-based Cryptocurrency.
CoRR, March, 2025

Mining Characteristics of Vulnerable Smart Contracts across Lifecycle Stages.
IET Blockchain, 2025

SCALM: Detecting Bad Practices in Smart Contracts Through LLMs.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles.
Sensors, April, 2024

Guardians of the Ledger: Protecting Decentralized Exchanges from State Derailment Defects.
CoRR, 2024

Smart Contracts in the Real World: A Statistical Exploration of External Data Dependencies.
CoRR, 2024

Automated Smart Contract Summarization via LLMs.
CoRR, 2024

Unveiling Wash Trading in Popular NFT Markets.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

StateGuard: Detecting State Derailment Defects in Decentralized Exchange Smart Contract.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

DeFiTail: DeFi Protocol Inspection through Cross-Contract Execution Analysis.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Characterizing the Solana NFT Ecosystem.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Detecting Malicious Accounts in Web3 through Transaction Graph.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

GasTrace: Detecting Sandwich Attack Malicious Accounts in Ethereum.
Proceedings of the IEEE International Conference on Web Services, 2024

2023
Set pair three-way overlapping community discovery algorithm for weighted social internet of things.
Digit. Commun. Networks, February, 2023

An Overview of AI and Blockchain Integration for Privacy-Preserving.
CoRR, 2023

2022
A survey of DeFi security: Challenges and opportunities.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

A Secure Data Sharing Framework for Robot Operating Systems Leveraging Ethereum.
CoRR, 2022

A Survey of DeFi Security: Challenges and Opportunities.
CoRR, 2022

AuthROS: Secure Data Sharing Among Robot Operating Systems based on Ethereum.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Security Analysis of DeFi: Vulnerabilities, Attacks and Advances.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts.
IEEE Trans. Emerg. Top. Comput., 2021

CLUE: towards discovering locked cryptocurrencies in ethereum.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
A survey on the security of blockchain systems.
Future Gener. Comput. Syst., 2020

STAN: Towards Describing Bytecodes of Smart Contract.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Characterizing Erasable Accounts in Ethereum.
Proceedings of the Information Security - 23rd International Conference, 2020

2018
System-level attacks against android by exploiting asynchronous programming.
Softw. Qual. J., 2018

Understanding Ethereum via Graph Analysis.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards saving money in using smart contracts.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

2017
Under-optimized smart contracts devour your money.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

An Android Vulnerability Detection System.
Proceedings of the Network and System Security - 11th International Conference, 2017

An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Proceedings of the Information Security Practice and Experience, 2017

On Discovering Vulnerabilities in Android Applications.
Proceedings of the Mobile Security and Privacy, 2017

2015
An Intelligent Media Delivery Prototype System with Low Response Time.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015


  Loading...