Zexu Wang

Orcid: 0009-0004-1439-2989

According to our database1, Zexu Wang authored at least 12 papers between 2020 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Defining and Detecting the Defects of Large Language Model-Based Autonomous Agents.
IEEE Trans. Software Eng., March, 2026

2025
One Signature, Multiple Payments: Demystifying and Detecting Signature Replay Vulnerabilities in Smart Contracts.
CoRR, November, 2025

Flow Matching-Based Autonomous Driving Planning with Advanced Interactive Behavior Modeling.
CoRR, October, 2025

Unity is Strength: Enhancing Precision in Reentrancy Vulnerability Detection of Smart Contract Analysis Tools.
IEEE Trans. Software Eng., January, 2025

Copy-and-Paste? Identifying EVM-Inequivalent Code Smells in Multi-chain Reuse Contracts.
Proc. ACM Softw. Eng., 2025

SSR: Safeguarding Staking Rewards by Defining and Detecting Logical Defects in DeFi Staking.
Proceedings of the 40th IEEE/ACM International Conference on Automated Software Engineering, 2025

2024
Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts.
Proc. ACM Softw. Eng., 2024

A Collaborative Navigation System Based On Automated Ground Vehicle With Dual Micro-Inertial-Navigation System.
Proceedings of the 6th International Conference on Internet of Things, 2024

2023
Topology Optimization of Turbulent Flow Cooling Structures Based on the k-ε Model.
Entropy, September, 2023

2021
M-A-R: A Dynamic Symbol Execution Detection Method for Smart Contract Reentry Vulnerability.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Exploiting the Medical Data Storage Implementation and Privacy Protection with Consortium Blockchain and IPFS.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

2020
Towards on Blockchain Data Privacy Protection with Cryptography and Software Architecture Approach.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020


  Loading...