default search action
Nikolay Ivanov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j7]Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo:
Security Threat Mitigation for Smart Contracts: A Comprehensive Survey. ACM Comput. Surv. 55(14s): 326:1-326:37 (2023) - [j6]Guangjing Wang, Nikolay Ivanov, Bocheng Chen, Qi Wang, ThanhVu Nguyen, Qiben Yan:
Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data. Proc. ACM Manag. Data 1(1): 102:1-102:27 (2023) - [j5]Nikolay Ivanov, Qiben Yan, Anurag Kompalli:
TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts. IEEE Trans. Inf. Forensics Secur. 18: 1141-1155 (2023) - [j4]Nikolay Ivanov, Qiben Yan:
AutoThing: A Secure Transaction Framework for Self-Service Things. IEEE Trans. Serv. Comput. 16(2): 983-995 (2023) - 2019
- [j3]Robert Krüger, Qi Han, Nikolay Ivanov, Sanae Mahtal, Dennis Thom, Hanspeter Pfister, Thomas Ertl:
Bird's-Eye - Large-Scale Visual Analytics of City Dynamics using Social Location Data. Comput. Graph. Forum 38(3): 595-607 (2019) - 2012
- [j2]Nikolay Ivanov, Dimiter Vakarelov:
A System of Relational Syllogistic Incorporating Full Boolean Reasoning. J. Log. Lang. Inf. 21(4): 433-459 (2012) - [j1]Simone Kühn, Alexander Romanowski, Christina Schilling, Tobias Banaschewski, Alexis Barbot, Gareth J. Barker, Rüdiger Brühl, Christian Büchel, Patricia J. Conrod, Katharina Czech, Jeff W. Dalley, Herta Flor, Hugh Garavan, Ines Häke, Bernd Ittermann, Nikolay Ivanov, Karl Mann, Mark Lathrop, Eva Loth, Katharina Lüdemann, Catherine Mallik, Jean-Luc Martinot, Carla Palafox, Jean-Baptiste Poline, Jan Reuter, Marcella Rietschel, Trevor W. Robbins, Michael N. Smolka, Frauke Nees, Bernadeta Walaszek, Gunter Schumann, Andreas Heinz, Jürgen Gallinat:
Manual dexterity correlating with right lobule VI volume in right-handed 14-year-olds. NeuroImage 59(2): 1615-1621 (2012)
Conference and Workshop Papers
- 2024
- [c12]Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan:
Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot Models. AsiaCCS 2024 - [c11]Pavel Blinov, Konstantin Egorov, Ivan Sviridov, Nikolay Ivanov, Stepan Botman, Evgeniy Tagin, Stepan Kudin, Galina Zubkova, Andrey V. Savchenko:
GigaPevt: Multimodal Medical Assistant. IJCAI 2024: 8614-8618 - 2023
- [c10]Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan:
DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning. SECON 2023: 312-320 - 2022
- [c9]Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter:
SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech. AsiaCCS 2022: 1019-1033 - [c8]Hanqing Guo, Yuanda Wang, Nikolay Ivanov, Li Xiao, Qiben Yan:
SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition. CCS 2022: 1353-1366 - 2021
- [c7]Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan:
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. AsiaCCS 2021: 787-801 - [c6]Nikolay Ivanov, Qiben Yan:
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion. CNS 2021: 191-199 - [c5]Nikolay Ivanov, Qiben Yan, Qingyang Wang:
Blockumulus: A Scalable Framework for Smart Contracts on the Cloud. ICDCS 2021: 607-617 - [c4]Nikolay Ivanov, Hanqing Guo, Qiben Yan:
Rectifying Administrated ERC20 Tokens. ICICS (1) 2021: 22-37 - [c3]Nikolay Ivanov, Qiben Yan:
System-Wide Security for Offline Payment Terminals. SecureComm (2) 2021: 99-119 - 2020
- [c2]Nikolay Ivanov, Jianzhi Lou, Qiben Yan:
SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot. SecureComm (1) 2020: 425-445 - 1993
- [c1]Brian A. Rudolph, William Poucher, Nikolay Ivanov, Sven Neirynck, Raewyn Boersen, C. J. Hwang:
The Globalized Growth of the ACM Scholastic Programming Contest (abstract). ACM Conference on Computer Science 1993: 521
Informal and Other Publications
- 2024
- [i16]Pavel Blinov, Konstantin Egorov, Ivan Sviridov, Nikolay Ivanov, Stepan Botman, Evgeniy Tagin, Stepan Kudin, Galina Zubkova, Andrey V. Savchenko:
GigaPevt: Multimodal Medical Assistant. CoRR abs/2402.16654 (2024) - 2023
- [i15]Nikolay Ivanov, Qiben Yan, Anurag Kompalli:
TxT: Real-time Transaction Encapsulation for Ethereum Smart Contracts. CoRR abs/2301.08806 (2023) - [i14]Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo:
Security Threat Mitigation For Smart Contracts: A Survey. CoRR abs/2302.07347 (2023) - [i13]Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan:
DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning. CoRR abs/2308.06267 (2023) - [i12]Yuanda Wang, Qiben Yan, Nikolay Ivanov, Xun Chen:
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems? CoRR abs/2312.06010 (2023) - 2022
- [i11]Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter:
SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech. CoRR abs/2205.14496 (2022) - [i10]Nikolay Ivanov, Qiben Yan:
Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering. CoRR abs/2209.08356 (2022) - [i9]Nikolay Ivanov, Qiben Yan:
Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens. CoRR abs/2209.08370 (2022) - [i8]Nikolay Ivanov:
Is Rust C++-fast? Benchmarking System Languages on Everyday Routines. CoRR abs/2209.09127 (2022) - 2021
- [i7]Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan:
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. CoRR abs/2105.00132 (2021) - [i6]Nikolay Ivanov, Qiben Yan:
Constraint-Based Inference of Heuristics for Foreign Exchange Trade Model Optimization. CoRR abs/2105.14194 (2021) - [i5]Nikolay Ivanov, Qiben Yan, Qingyang Wang:
Blockumulus: A Scalable Framework for Smart Contracts on the Cloud. CoRR abs/2107.04904 (2021) - [i4]Nikolay Ivanov, Qiben Yan:
System-Wide Security for Offline Payment Terminals. CoRR abs/2107.08490 (2021) - [i3]Nikolay Ivanov, Hanqing Guo, Qiben Yan:
Rectifying Administrated ERC20 Tokens. CoRR abs/2107.10979 (2021) - [i2]Nikolay Ivanov, Qiben Yan:
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion. CoRR abs/2108.14004 (2021) - 2011
- [i1]Nikolay Ivanov, Dimiter Vakarelov:
Relational Syllogistics. CoRR abs/1102.4496 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint