Daoyuan Wu
Orcid: 0000-0002-3752-0718
According to our database1,
Daoyuan Wu
authored at least 49 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
ACM Comput. Surv., February, 2025
2024
CoRR, 2024
PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation.
CoRR, 2024
Testing and Understanding Erroneous Planning in LLM Agents through Synthesized User Inputs.
CoRR, 2024
How do LLMs Support Deep Learning Testing? A Comprehensive Study Through the Lens of Image Mutation.
CoRR, 2024
Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract Auditing with Justifications.
CoRR, 2024
ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts.
CoRR, 2024
CoRR, 2024
LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper.
CoRR, 2024
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning.
CoRR, 2024
Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts.
Proceedings of the 33rd USENIX Security Symposium, 2024
On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
2023
CoRR, 2023
CoRR, 2023
When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan.
CoRR, 2023
CoRR, 2023
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
CoRR, 2022
iExam: A Novel Online Exam Monitoring and Analysis System Based on Face Detection and Recognition.
CoRR, 2022
An empirical study of blockchain system vulnerabilities: modules, types, and patterns.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
2021
Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021
Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls.
Empir. Softw. Eng., 2021
Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities.
CoRR, 2021
AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets.
CoRR, 2021
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2020
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
2019
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
An empirical study of mobile network behavior and application performance in the wild.
Proceedings of the International Symposium on Quality of Service, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Mob. Comput., 2018
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
2016
CoRR, 2016
SecComp: Towards Practically Defending Against Component Hijacking in Android Applications.
CoRR, 2016
Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016
2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
2014
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps.
CoRR, 2014
Proceedings of the Information Security - 17th International Conference, 2014