Yebo Feng
Orcid: 0000-0002-7235-2377
According to our database1,
Yebo Feng
authored at least 45 papers
between 2019 and 2026.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2026
Future Gener. Comput. Syst., 2026
2025
ACM Trans. Softw. Eng. Methodol., September, 2025
ProvX: Generating Counterfactual-Driven Attack Explanations for Provenance-Based Detection.
CoRR, August, 2025
Hedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense Measures in Blockchain Bridges.
CoRR, July, 2025
DynaShard: Secure and Adaptive Blockchain Sharding Protocol With Hybrid Consensus and Dynamic Shard Management.
IEEE Internet Things J., March, 2025
Commenting Higher-level Code Unit: Full Code, Reduced Code, or Hierarchical Code Summarization.
CoRR, March, 2025
CoRR, March, 2025
CoRR, January, 2025
IEEE Trans. Serv. Comput., 2025
Profit or Deceit? Mitigating Pump and Dump in DeFi via Graph and Contrastive Learning.
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
Proc. ACM Softw. Eng., 2025
HeteroSample: Meta-Path Guided Sampling for Heterogeneous Graph Representation Learning.
IEEE Internet Things J., 2025
LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-Based Code Completion.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025
Proceedings of the 2025 IEEE International Conference on Blockchain and Cryptocurrency, 2025
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025
2024
IEEE Trans. Dependable Secur. Comput., 2024
Future Internet, 2024
CoRR, 2024
Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains.
CoRR, 2024
CoRR, 2024
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Sci. China Inf. Sci., 2024
DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 2024 IEEE Global Communications Conference, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
ACM Comput. Surv., November, 2023
IEEE Trans. Netw. Serv. Manag., March, 2023
CoRR, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
IEEE J. Sel. Areas Commun., 2022
CoRR, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network.
Proceedings of the IEEE Global Communications Conference, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
2020
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019