The impact of vendor customizations on android security L Wu, M Grace, Y Zhou, C Wu, X Jiang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 206 | 2013 |
A systematic study on peer-to-peer botnets P Wang, L Wu, B Aslam, CC Zou 2009 Proceedings of 18th International Conference on Computer Communications …, 2009 | 124 | 2009 |
Honeypot detection in advanced botnet attacks P Wang, L Wu, R Cunningham, CC Zou International Journal of Information and Computer Security 4 (1), 30-51, 2010 | 122 | 2010 |
Harvesting developer credentials in android apps Y Zhou, L Wu, Z Wang, X Jiang Proceedings of the 8th ACM conference on security & privacy in wireless and …, 2015 | 37 | 2015 |
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem N He, L Wu, H Wang, Y Guo, X Jiang The 24th International Conference on Financial Cryptography and Data …, 2020 | 31 | 2020 |
Hybrid user-level sandboxing of third-party android apps Y Zhou, K Patel, L Wu, Z Wang, X Jiang Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 31 | 2015 |
Analysis of Peer-to-Peer botnet attacks and defenses P Wang, L Wu, B Aslam, CC Zou Propagation phenomena in real world networks, 183-214, 2015 | 17 | 2015 |
Learning classifier system ensemble and compact rule set Y Gao, JZ Huang, L Wu Connection Science 19 (4), 321-337, 2007 | 17 | 2007 |
Characterizing eosio blockchain Y Huang, H Wang, L Wu, G Tyson, X Luo, R Zhang, X Liu, G Huang, ... arXiv preprint arXiv:2002.05369, 2020 | 14 | 2020 |
PwdIP-hash: A lightweight solution to phishing and pharming attacks B Aslam, L Wu, CC Zou 2010 Ninth IEEE International Symposium on Network Computing and …, 2010 | 11 | 2010 |
EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level L Quan, L Wu, H Wang arXiv preprint arXiv:1906.10362, 2019 | 10 | 2019 |
Mobile App Squatting Y Hu, H Wang, R He, L Li, G Tyson, I Castro, Y Guo, L Wu, G Xu The Web Conference 2020 (WWW'20), 2020 | 9 | 2020 |
Beyond the virus: A first look at coronavirus-themed mobile malware R He, H Wang, P Xia, L Wang, Y Li, L Wu, Y Zhou, X Luo, Y Guo, G Xu arXiv preprint arXiv:2005.14619, 2020 | 8 | 2020 |
Synergistic toughening of polypropylene with ultra-high molecular weight polyethylene and elastomer-olefin block copolymers L Qi, L Wu, R He, H Cheng, B Liu, X He RSC advances 9 (41), 23994-24002, 2019 | 8 | 2019 |
Characterizing cryptocurrency exchange scams P Xia, H Wang, B Zhang, R Ji, B Gao, L Wu, X Luo, G Xu Computers & Security 98, 101993, 2020 | 7 | 2020 |
Security analysis of EOSIO smart contracts N He, R Zhang, L Wu, H Wang, X Luo, Y Guo, T Yu, X Jiang arXiv preprint arXiv:2003.06568, 2020 | 7 | 2020 |
Clustering with xcs on complex structure dataset L Shi, Y Gao, L Wu, L Shang Australasian Joint Conference on Artificial Intelligence, 489-499, 2008 | 6 | 2008 |
Towards understanding flash loan and its applications in defi ecosystem D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren arXiv preprint arXiv:2010.12252, 2020 | 5 | 2020 |
Understanding (mis) behavior on the eosio blockchain Y Huang, H Wang, L Wu, G Tyson, X Luo, R Zhang, X Liu, G Huang, ... Proceedings of the ACM on Measurement and Analysis of Computing Systems 4 (2 …, 2020 | 5 | 2020 |
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams P Xia, H Wang, X Luo, L Wu, Y Zhou, G Bai, G Xu, G Huang, X Liu arXiv preprint arXiv:2007.13639, 2020 | 4 | 2020 |