Ting Chen

Orcid: 0000-0001-9165-8331

Affiliations:
  • University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China


According to our database1, Ting Chen authored at least 115 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
REC-Fed: A Robust and Efficient Clustered Federated System for Dynamic Edge Networks.
IEEE Trans. Mob. Comput., December, 2024

Security Management Method of Public Sentiment Analysis Based on Blockchain and Edge Computing.
IEEE Trans. Cybern., November, 2024

Secure Ultra-Reliable and Low Latency Communication in UAV-Enabled NOMA Wireless Networks.
IEEE Trans. Veh. Technol., October, 2024

Dynamic Charging Strategy Optimization for UAV-Assisted Wireless Rechargeable Sensor Networks Based on Deep Q-Network.
IEEE Internet Things J., June, 2024

Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists.
IEEE Trans. Inf. Forensics Secur., 2024

RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code.
CoRR, 2024

Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts.
CoRR, 2024

An Empirical Study on Low Code Programming using Traditional vs Large Language Model Support.
CoRR, 2024

Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

CoSec: On-the-Fly Security Hardening of Code LLMs via Supervised Co-decoding.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Identifying Smart Contract Security Issues in Code Snippets from Stack Overflow.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Bubble or Not: An Analysis of Ethereum ERC721 and ERC1155 Non-fungible Token Ecosystem.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2024

When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

AccMoS: Accelerating Model Simulation for Simulink via Code Generation.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
A License Management and Fine-Grained Verifiable Data Access Control System for Online Catering.
IEEE Trans. Comput. Soc. Syst., December, 2023

WASMOD: Detecting vulnerabilities in Wasm smart contracts.
IET Blockchain, December, 2023

BlockExplorer: Exploring Blockchain Big Data Via Parallel Processing.
IEEE Trans. Computers, August, 2023

Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts.
ACM Trans. Softw. Eng. Methodol., May, 2023

Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations.
IEEE Trans. Software Eng., April, 2023

Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts.
IEEE Trans. Software Eng., February, 2023

TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts.
ACM Trans. Softw. Eng. Methodol., January, 2023

TRacer: Scalable Graph-Based Transaction Tracing for Account-Based Blockchain Trading Systems.
IEEE Trans. Inf. Forensics Secur., 2023

Blockchain-Based Access and Timeliness Control for Administrative Punishment Market Supervision.
IEEE Internet Things J., 2023

Demystifying DeFi MEV Activities in Flashbots Bundle.
IACR Cryptol. ePrint Arch., 2023

When ChatGPT Meets Smart Contract Vulnerability Detection: How Far Are We?
CoRR, 2023

Bubble or Not: Measurements, Analyses, and Findings on the Ethereum ERC721 and ERC1155 Non-fungible Token Ecosystem.
CoRR, 2023

RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation.
CoRR, 2023

Know Your Transactions: Real-time and Generic Transaction Semantic Representation on Blockchain & Web3 Ecosystem.
Proceedings of the ACM Web Conference 2023, 2023

Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations.
Proceedings of the 32nd USENIX Security Symposium, 2023

Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

DeepInfer: Deep Type Inference from Smart Contract Bytecode.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Secure URLLC Empowered by UAV in 6G: An Interference Engineering Perspective.
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023

Blockchain-based Transaction Group Key Management Scheme For Edge Devices.
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023

Paper Indexing Method and System Based on Blockchain.
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023

FeatureSpy: Detecting Learning-Content Attacks via Feature Inspection in Secure Deduplicated Storage.
Proceedings of the IEEE INFOCOM 2023, 2023

DAppHunter: Identifying Inconsistent Behaviors of Blockchain-based Decentralized Applications.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

Sequence-Oriented DBMS Fuzzing.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Cooperative Completing Tasks of Charging WRSNs with Multiple MUVs and Laser-charged UAVs.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

ContraPonzi: Smart Ponzi Scheme Detection for Ethereum via Contrastive Learning.
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023

2022
XDebloat: Towards Automated Feature-Oriented App Debloating.
IEEE Trans. Software Eng., 2022

DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode.
IEEE Trans. Software Eng., 2022

Defining Smart Contract Defects on Ethereum.
IEEE Trans. Software Eng., 2022

SigRec: Automatic Recovery of Function Signatures in Smart Contracts.
IEEE Trans. Software Eng., 2022

SNPSFuzzer: A Fast Greybox Fuzzer for Stateful Network Protocols Using Snapshots.
IEEE Trans. Inf. Forensics Secur., 2022

Vulnerability Detection of ICS Protocols via Cross-State Fuzzing.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

AntFuzzer: A Grey-Box Fuzzing Framework for EOSIO Smart Contracts.
CoRR, 2022

Uncovering Cross-Context Inconsistent Access Control Enforcement in Android.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Enabling Privacy-Preserving Off-chain Payment via Hybrid Multi-hop Mechanism.
Proceedings of the IEEE International Conference on Communications, 2022

TokenCat: Detect Flaw of Authentication on ERC20 Tokens.
Proceedings of the IEEE International Conference on Communications, 2022

Smart contract vulnerability detection based on variant LSTM.
Proceedings of the International Conference on Big Data, IoT, and Cloud Computing, 2022

2021
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts.
IEEE Trans. Emerg. Top. Comput., 2021

Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example.
IEEE Netw., 2021

Transaction-based classification and detection approach for Ethereum smart contract.
Inf. Process. Manag., 2021

iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations.
CoRR, 2021

HEALER: Relation Learning Guided Kernel Fuzzing.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021

iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocations.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

CLUE: towards discovering locked cryptocurrencies in ethereum.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Finding the Missing Piece: Permission Specification Analysis for Android NDK.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

SCStudio: a secure and efficient integrated development environment for smart contracts.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

GANMIA: GAN-based Black-box Membership Inference Attack.
Proceedings of the ICC 2021, 2021

Invited: Hardware/Software Co-Synthesis and Co-Optimization for Autonomous Systems.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

2020
Understanding Ethereum via Graph Analysis.
ACM Trans. Internet Techn., 2020

Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats.
Sensors, 2020

A survey on the security of blockchain systems.
Future Gener. Comput. Syst., 2020

STAN: Towards Describing Bytecodes of Smart Contract.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

SODA: A Generic Online Detection Framework for Smart Contracts.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Characterizing Erasable Accounts in Ethereum.
Proceedings of the Information Security - 23rd International Conference, 2020

2019
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface.
Secur. Commun. Networks, 2019

Domain Specific Code Smells in Smart Contracts.
CoRR, 2019

DataEther: Data Exploration Framework For Ethereum.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts.
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019

TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Wirel. Commun. Mob. Comput., 2018

System-level attacks against android by exploiting asynchronous programming.
Softw. Qual. J., 2018

Automated forensic analysis of mobile applications on Android devices.
Digit. Investig., 2018

DBAF: Dynamic Binary Analysis Framework and Its Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Understanding Ethereum via Graph Analysis.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards saving money in using smart contracts.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Under-optimized smart contracts devour your money.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Cloud-based parallel concolic execution.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART.
Proceedings of the 26th USENIX Security Symposium, 2017

A Program Manipulation Middleware and Its Applications on System Security.
Proceedings of the Security and Privacy in Communication Networks, 2017

An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Proceedings of the Information Security Practice and Experience, 2017

Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Characterizing the Impacts of Application Layer DDoS Attacks.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

2016
A multi-granularity heuristic-combining approach for censorship circumvention activity identification.
Secur. Commun. Networks, 2016

Silent Battery Draining Attack against Android Systems by Subverting Doze Mode.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Test Generation for Embedded Executables via Concolic Execution in a Real Environment.
IEEE Trans. Reliab., 2015

An empirical investigation into path divergences for concolic execution using CREST.
Secur. Commun. Networks, 2015

2014
Constructing a Boolean implication network to study the interactions between environmental factors and OTUs.
Quant. Biol., 2014

FPM: Four-factors Propagation Model for passive P2P worms.
Future Gener. Comput. Syst., 2014

Conpy: Concolic Execution Engine for Python Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Design and implementation of a dynamic symbolic execution tool for windows executables.
J. Softw. Evol. Process., 2013

Propagation modeling of active P2P worms based on ternary matrix.
J. Netw. Comput. Appl., 2013

State of the art: Dynamic symbolic execution for automated test generation.
Future Gener. Comput. Syst., 2013

2011
CRBA: A Capacity Restricted Model Evolved from BA Model for Complex Network.
J. Networks, 2011

Fast quarantining of proactive worms in unstructured P2P networks.
J. Netw. Comput. Appl., 2011

2010
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks.
J. Zhejiang Univ. Sci. C, 2010

2009
Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2006
Handling Constraints in Multi-Objective GA for Embedded System Design.
Proceedings of the 19th International Conference on VLSI Design (VLSI Design 2006), 2006

Efficient detection and exploitation of infeasible paths for software timing analysis.
Proceedings of the 43rd Design Automation Conference, 2006

2005
Exploiting Branch Constraints without Exhaustive Path Enumeration.
Proceedings of the 5th Intl. Workshop on Worst-Case Execution Time (WCET) Analysis, 2005

WCET Centric Data Allocation to Scratchpad Memory.
Proceedings of the 26th IEEE Real-Time Systems Symposium (RTSS 2005), 2005


  Loading...