Yebo Feng

Orcid: 0000-0002-7235-2377

According to our database1, Yebo Feng authored at least 45 papers between 2019 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
CANDICE: An explainable and intelligent framework for network intrusion detection.
Future Gener. Comput. Syst., 2026

2025
Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation.
ACM Trans. Softw. Eng. Methodol., September, 2025

ProvX: Generating Counterfactual-Driven Attack Explanations for Provenance-Based Detection.
CoRR, August, 2025

Hedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense Measures in Blockchain Bridges.
CoRR, July, 2025

A Vision for Auto Research with LLM Agents.
CoRR, April, 2025

DynaShard: Secure and Adaptive Blockchain Sharding Protocol With Hybrid Consensus and Dynamic Shard Management.
IEEE Internet Things J., March, 2025

Commenting Higher-level Code Unit: Full Code, Reduced Code, or Hierarchical Code Summarization.
CoRR, March, 2025

Perseus: Tracing the Masterminds Behind Cryptocurrency Pump-and-Dump Schemes.
CoRR, March, 2025

LLM-Powered Multi-Agent System for Automated Crypto Portfolio Management.
CoRR, January, 2025

Auto.gov: Learning-Based Governance for Decentralized Finance (DeFi).
IEEE Trans. Serv. Comput., 2025

Profit or Deceit? Mitigating Pump and Dump in DeFi via Graph and Contrastive Learning.
IEEE Trans. Inf. Forensics Secur., 2025

SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes.
IEEE Trans. Inf. Forensics Secur., 2025

Eliminating Backdoors in Neural Code Models for Secure Code Understanding.
Proc. ACM Softw. Eng., 2025

HeteroSample: Meta-Path Guided Sampling for Heterogeneous Graph Representation Learning.
IEEE Internet Things J., 2025

LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-Based Code Completion.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025

AMM-based DEX on the XRP Ledger.
Proceedings of the 2025 IEEE International Conference on Blockchain and Cryptocurrency, 2025

Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

2024
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic.
IEEE Trans. Dependable Secur. Comput., 2024

Shared-Custodial Wallet for Multi-Party Crypto-Asset Management.
Future Internet, 2024

Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning.
CoRR, 2024

Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains.
CoRR, 2024

Eliminating Backdoors in Neural Code Models via Trigger Inversion.
CoRR, 2024

How and Why LLMs Use Deprecated APIs in Code Completion? An Empirical Study.
CoRR, 2024

EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR, 2024

MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones.
CoRR, 2024

On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder.
CoRR, 2024

CToMP: a cycle-task-oriented memory protection scheme for unmanned systems.
Sci. China Inf. Sci., 2024

DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Heuristic-based Parsing System for Big Data Log.
Proceedings of the 2024 IEEE Global Communications Conference, 2024

SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols.
ACM Comput. Surv., November, 2023

Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols.
IEEE Trans. Netw. Serv. Manag., March, 2023

Automated Market Maker on the XRP Ledger.
CoRR, 2023

SoK: Design, Vulnerabilities and Defense of Cryptocurrency Wallets.
CoRR, 2023

Adaptive Distributed Filtering of DDoS Traffic on the Internet.
CoRR, 2023

Auto.gov: Learning-based On-chain Governance for Decentralized Finance (DeFi).
CoRR, 2023

Toward Adaptive DDoS-Filtering Rule Generation.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases.
IEEE J. Sel. Areas Commun., 2022

Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures.
CoRR, 2022

CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Application-Layer DDoS Defense with Reinforcement Learning.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019


  Loading...