Yebo Feng

Orcid: 0000-0002-7235-2377

According to our database1, Yebo Feng authored at least 27 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic.
IEEE Trans. Dependable Secur. Comput., 2024

Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning.
CoRR, 2024

Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains.
CoRR, 2024

Eliminating Backdoors in Neural Code Models via Trigger Inversion.
CoRR, 2024

How and Why LLMs Use Deprecated APIs in Code Completion? An Empirical Study.
CoRR, 2024

EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR, 2024

MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones.
CoRR, 2024

On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder.
CoRR, 2024

Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation.
CoRR, 2024

CToMP: a cycle-task-oriented memory protection scheme for unmanned systems.
Sci. China Inf. Sci., 2024

DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols.
ACM Comput. Surv., November, 2023

Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols.
IEEE Trans. Netw. Serv. Manag., March, 2023

Automated Market Maker on the XRP Ledger.
CoRR, 2023

SoK: Design, Vulnerabilities and Defense of Cryptocurrency Wallets.
CoRR, 2023

Adaptive Distributed Filtering of DDoS Traffic on the Internet.
CoRR, 2023

Auto.gov: Learning-based On-chain Governance for Decentralized Finance (DeFi).
CoRR, 2023

Toward Adaptive DDoS-Filtering Rule Generation.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases.
IEEE J. Sel. Areas Commun., 2022

Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures.
CoRR, 2022

CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Application-Layer DDoS Defense with Reinforcement Learning.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019


  Loading...