Follow
Wuqi Zhang
Title
Cited by
Cited by
Year
Surakav: Generating realistic traces for a strong website fingerprinting defense
J Gong, W Zhang, C Zhang, T Wang
2022 IEEE Symposium on Security and Privacy (SP), 1558-1573, 2022
222022
Characterizing transaction-reverting statements in ethereum smart contracts
L Liu, L Wei, W Zhang, M Wen, Y Liu, SC Cheung
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
182021
Ðarcher: Detecting on-chain-off-chain synchronization bugs in decentralized applications
W Zhang, L Wei, S Li, Y Liu, SC Cheung
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
142021
WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting Defenses
J Gong, W Zhang, C Zhang, T Wang
IEEE Transactions on Information Forensics and Security, 2023
10*2023
Finding Deviated Behaviors of the Compressed DNN Models for Image Classifications
Y Tian, W Zhang, M Wen, SC Cheung, C Sun, S Ma, Y Jiang
ACM Transactions on Software Engineering and Methodology 32 (5), 1-32, 2023
5*2023
Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation
W Zhang, L Wei, SC Cheung, Y Liu, S Li, L Liu, MR Lyu
IEEE Transactions on Software Engineering, 2023
5*2023
When Dataflow Analysis Meets Large Language Models
C Wang, W Zhang, Z Su, X Xu, X Xie, X Zhang
arXiv preprint arXiv:2402.10754, 2024
2024
Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts
W Zhang, Z Zhang, Q Shi, L Liu, L Wei, Y Liu, X Zhang, SC Cheung
2024 IEEE Symposium on Security and Privacy (SP), 146-146, 2024
2024
Consolidating Smart Contracts with Behavioral Contracts
G WEI, D XIE, W ZHANG, Y YUAN, Z ZHANG
2024
The system can't perform the operation now. Try again later.
Articles 1–9