Ting Chen
Orcid: 0000-0001-9165-8331Affiliations:
- University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
According to our database1,
Ting Chen
authored at least 115 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
REC-Fed: A Robust and Efficient Clustered Federated System for Dynamic Edge Networks.
IEEE Trans. Mob. Comput., December, 2024
Security Management Method of Public Sentiment Analysis Based on Blockchain and Edge Computing.
IEEE Trans. Cybern., November, 2024
Secure Ultra-Reliable and Low Latency Communication in UAV-Enabled NOMA Wireless Networks.
IEEE Trans. Veh. Technol., October, 2024
Dynamic Charging Strategy Optimization for UAV-Assisted Wireless Rechargeable Sensor Networks Based on Deep Q-Network.
IEEE Internet Things J., June, 2024
Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists.
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
CoRR, 2024
An Empirical Study on Low Code Programming using Traditional vs Large Language Model Support.
CoRR, 2024
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Bubble or Not: An Analysis of Ethereum ERC721 and ERC1155 Non-fungible Token Ecosystem.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2024
When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
A License Management and Fine-Grained Verifiable Data Access Control System for Online Catering.
IEEE Trans. Comput. Soc. Syst., December, 2023
IET Blockchain, December, 2023
IEEE Trans. Computers, August, 2023
ACM Trans. Softw. Eng. Methodol., May, 2023
Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations.
IEEE Trans. Software Eng., April, 2023
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts.
IEEE Trans. Software Eng., February, 2023
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts.
ACM Trans. Softw. Eng. Methodol., January, 2023
TRacer: Scalable Graph-Based Transaction Tracing for Account-Based Blockchain Trading Systems.
IEEE Trans. Inf. Forensics Secur., 2023
Blockchain-Based Access and Timeliness Control for Administrative Punishment Market Supervision.
IEEE Internet Things J., 2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
Bubble or Not: Measurements, Analyses, and Findings on the Ethereum ERC721 and ERC1155 Non-fungible Token Ecosystem.
CoRR, 2023
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation.
CoRR, 2023
Know Your Transactions: Real-time and Generic Transaction Semantic Representation on Blockchain & Web3 Ecosystem.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023
FeatureSpy: Detecting Learning-Content Attacks via Feature Inspection in Secure Deduplicated Storage.
Proceedings of the IEEE INFOCOM 2023, 2023
DAppHunter: Identifying Inconsistent Behaviors of Blockchain-based Decentralized Applications.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Cooperative Completing Tasks of Charging WRSNs with Multiple MUVs and Laser-charged UAVs.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023
2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the International Conference on Big Data, IoT, and Cloud Computing, 2022
2021
IEEE Trans. Emerg. Top. Comput., 2021
Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example.
IEEE Netw., 2021
Inf. Process. Manag., 2021
iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations.
CoRR, 2021
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021
iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocations.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
SCStudio: a secure and efficient integrated development environment for smart contracts.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
2020
Sensors, 2020
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
2019
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface.
Secur. Commun. Networks, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Wirel. Commun. Mob. Comput., 2018
Softw. Qual. J., 2018
Digit. Investig., 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018
PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Proceedings of the Information Security Practice and Experience, 2017
Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
2016
A multi-granularity heuristic-combining approach for censorship circumvention activity identification.
Secur. Commun. Networks, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
Test Generation for Embedded Executables via Concolic Execution in a Real Environment.
IEEE Trans. Reliab., 2015
Secur. Commun. Networks, 2015
2014
Constructing a Boolean implication network to study the interactions between environmental factors and OTUs.
Quant. Biol., 2014
Future Gener. Comput. Syst., 2014
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014
2013
Design and implementation of a dynamic symbolic execution tool for windows executables.
J. Softw. Evol. Process., 2013
J. Netw. Comput. Appl., 2013
Future Gener. Comput. Syst., 2013
2011
J. Networks, 2011
J. Netw. Comput. Appl., 2011
2010
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks.
J. Zhejiang Univ. Sci. C, 2010
2009
Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2006
Proceedings of the 19th International Conference on VLSI Design (VLSI Design 2006), 2006
Efficient detection and exploitation of infeasible paths for software timing analysis.
Proceedings of the 43rd Design Automation Conference, 2006
2005
Proceedings of the 5th Intl. Workshop on Worst-Case Execution Time (WCET) Analysis, 2005
Proceedings of the 26th IEEE Real-Time Systems Symposium (RTSS 2005), 2005