default search action
Ningyu He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Pengcheng Xia, Yanhui Guo, Zhaowen Lin, Jun Wu, Pengbo Duan, Ningyu He, Kailong Wang, Tianming Liu, Yinliang Yue, Guoai Xu, Haoyu Wang:
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets. Autom. Softw. Eng. 31(1): 32 (2024) - [c19]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
WASMixer: Binary Obfuscation for WebAssembly. ESORICS (3) 2024: 88-109 - [c18]Shangtong Cao, Ningyu He, Xinyu She, Yixuan Zhang, Mu Zhang, Haoyu Wang:
WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation. ISSTA 2024: 1262-1273 - [c17]Ningyu He, Zhehao Zhao, Hanqin Guan, Jikai Wang, Shuo Peng, Ding Li, Haoyu Wang, Xiangqun Chen, Yao Guo:
SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries. ISSTA 2024: 1816-1820 - [c16]Levi Taiji Li, Ningyu He, Haoyu Wang, Mu Zhang:
VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" Vulnerabilities. NDSS 2024 - [c15]Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo:
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. NDSS 2024 - [c14]Jintao Huang, Ningyu He, Kai Ma, Jiang Xiao, Haoyu Wang:
Miracle or Mirage? A Measurement Study of NFT Rug Pulls. SIGMETRICS/Performance (Abstracts) 2024: 87-88 - [c13]Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang:
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts. USENIX Security Symposium 2024 - [i17]Pengcheng Xia, Yanhui Guo, Zhaowen Lin, Jun Wu, Pengbo Duan, Ningyu He, Kailong Wang, Tianming Liu, Yinliang Yue, Guoai Xu, Haoyu Wang:
WALLETRADAR: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets. CoRR abs/2405.04332 (2024) - [i16]Tianyang Chi, Ningyu He, Xiaohui Hu, Haoyu Wang:
Remeasuring the Arbitrage and Sandwich Attacks of Maximal Extractable Value in Ethereum. CoRR abs/2405.17944 (2024) - [i15]Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang:
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts. CoRR abs/2405.20561 (2024) - [i14]Ningyu He, Zhehao Zhao, Hanqin Guan, Jikai Wang, Shuo Peng, Ding Li, Haoyu Wang, Xiangqun Chen, Yao Guo:
SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries. CoRR abs/2408.08537 (2024) - 2023
- [j6]Jintao Huang, Ningyu He, Kai Ma, Jiang Xiao, Haoyu Wang:
Miracle or Mirage? A Measurement Study of NFT Rug Pulls. Proc. ACM Meas. Anal. Comput. Syst. 7(3): 51:1-51:25 (2023) - [c12]Hanwen Lei, Ziqi Zhang, Shaokun Zhang, Peng Jiang, Zhineng Zhong, Ningyu He, Ding Li, Yao Guo, Xiangqun Chen:
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications. CCS 2023: 904-918 - [c11]Yuanpeng Wang, Ziqi Zhang, Ningyu He, Zhineng Zhong, Shengjian Guo, Qinkun Bao, Ding Li, Yao Guo, Xiangqun Chen:
SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution. CCS 2023: 2710-2724 - [c10]Yuhang Zhong, Yangxiu Hu, Yang Chen, Ningyu He, Guangtong Xu, Chao Xu, Fei Gao:
Efficient Trajectory Planning for Coordinated Arrival of Fixed-Wing UAV Swarm. ICIRA (7) 2023: 414-426 - [c9]Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. ISSTA 2023: 385-397 - [c8]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
BREWasm: A General Static Binary Rewriting Framework for WebAssembly. SAS 2023: 139-163 - [c7]Edward Lo, Ningyu He, Yuejie Shi, Jiajia Xu, Chiachih Wu, Ding Li, Yao Guo:
Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study. SP (Workshops) 2023: 326-336 - [i13]Edward Lo, Ningyu He, Yuejie Shi, Jiajia Xu, Chiachih Wu, Ding Li, Yao Guo:
Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study. CoRR abs/2304.07166 (2023) - [i12]Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. CoRR abs/2304.07204 (2023) - [i11]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
A General Static Binary Rewriting Framework for WebAssembly. CoRR abs/2305.01454 (2023) - [i10]Jintao Huang, Ningyu He, Kai Ma, Jiang Xiao, Haoyu Wang:
A Deep Dive into NFT Rug Pulls. CoRR abs/2305.06108 (2023) - [i9]Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo:
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. CoRR abs/2307.00549 (2023) - [i8]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
WASMixer: Binary Obfuscation for WebAssembly. CoRR abs/2308.03123 (2023) - [i7]Kai Ma, Jintao Huang, Ningyu He, Zhuo Wang, Haoyu Wang:
SoK: On the Security of Non-Fungible Tokens. CoRR abs/2312.08000 (2023) - [i6]Shangtong Cao, Ningyu He, Xinyu She, Yixuan Zhang, Mu Zhang, Haoyu Wang:
WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation. CoRR abs/2312.10456 (2023) - 2022
- [i5]Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Xiangqun Chen:
A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation. CoRR abs/2207.09227 (2022) - 2021
- [j5]Ningyu He, Jie Zhu:
A Weighted Partial Domain Adaptation for Acoustic Scene Classification and Its Application in Fiber Optic Security System. IEEE Access 9: 2244-2250 (2021) - [j4]Ningyu He, Jie Zhu:
Adversarial Networks With Circular Attention Mechanism for Fine-Grained Domain Adaptation. IEEE Access 9: 138352-138358 (2021) - [j3]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. Proc. ACM Meas. Anal. Comput. Syst. 5(2): 26:1-26:30 (2021) - [c6]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. SIGMETRICS (Abstracts) 2021: 35-36 - [c5]Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
EOSAFE: Security Analysis of EOSIO Smart Contracts. USENIX Security Symposium 2021: 1271-1288 - [i4]Ningyu He, Weihang Su, Zhou Yu, Xinyu Liu, Fengyi Zhao, Haoyu Wang, Xiapu Luo, Gareth Tyson, Lei Wu, Yao Guo:
Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO. CoRR abs/2110.07534 (2021) - 2020
- [j2]Wei Zhang, Ruixue An, Ningyu He, Zishu He, Huiyong Li:
Reduced Dimension STAP Based on Sparse Recovery in Heterogeneous Clutter Environments. IEEE Trans. Aerosp. Electron. Syst. 56(1): 785-795 (2020) - [j1]Wei Zhang, Ping Wang, Ningyu He, Zishu He:
Super Resolution DOA Based on Relative Motion for FMCW Automotive Radar. IEEE Trans. Veh. Technol. 69(8): 8698-8709 (2020) - [c4]Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. Financial Cryptography 2020: 654-675 - [c3]Kangbo Sun, Lin Li, Lianqiang Li, Ningyu He, Jie Zhu:
Spatial Attentional Bilinear 3D Convolutional Network for Video-Based Autism Spectrum Disorder Detection. ICASSP 2020: 3387-3391 - [c2]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. ICECCS 2020: 125-134 - [i3]Ningyu He, Ruiyi Zhang, Lei Wu, Haoyu Wang, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
Security Analysis of EOSIO Smart Contracts. CoRR abs/2003.06568 (2020) - [i2]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. CoRR abs/2006.06419 (2020)
2010 – 2019
- 2019
- [i1]Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. CoRR abs/1905.00272 (2019) - 2018
- [c1]Ningyu He, Jie Zhu, Lianqiang Li:
An optic-fiber fence intrusion recognition system using the optimized curve fitting model based on the SVM method. IJCNN 2018: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint