default search action
Lei Wu 0012
Person information
- affiliation: Zhejiang University, Hangzhou, Zhejiang, China
Other persons with the same name
- Lei Wu (aka: Wu Lei) — disambiguation page
- Lei Wu 0001 — Rochester Institute of Technology, Software Engineering Department, College of Computing and Information Science, NY, USA
- Lei Wu 0002 — Shandong University, School of Computer Science and Technology, Jinan, China
- Lei Wu 0003 — University of Strathclyde, Department of Mechanical and Aerospace Engineering, James Weir Fluids Laboratory, Glasgow, UK
- Lei Wu 0004 — Stevens Institute of Technology, Hoboken, NJ, USA (and 2 more)
- Lei Wu 0005 — University of Picardie Jules Verne, Amiens, France
- Lei Wu 0006 — University of Alberta, Department of Physics, Edmonton, AB, Canada
- Lei Wu 0007 — Southeast University, School of Instrument Science and Engineering, Nanjing, China (and 1 more)
- Lei Wu 0008 — University of Stuttgart, Germany
- Lei Wu 0009 — Texas A&M University, College Station, USA
- Lei Wu 0010 — Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China
- Lei Wu 0011 — Shandong Normal University, School of Information Science and Engineering, Jinan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Zhuo Chen, Lei Wu, Yubo Hu, Jing Cheng, Yufeng Hu, Yajin Zhou, Zhushou Tang, Yexuan Chen, Jinku Li, Kui Ren:
Lifting the Grey Curtain: Analyzing the Ecosystem of Android Scam Apps. IEEE Trans. Dependable Secur. Comput. 21(4): 3406-3421 (2024) - [j11]Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Hexiang Wang, Baolei Hou, Lei Wu, Xiapu Luo:
An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices. IEEE Trans. Dependable Secur. Comput. 21(4): 3501-3514 (2024) - [j10]Siwei Wu, Zhou Yu, Dabao Wang, Yajin Zhou, Lei Wu, Haoyu Wang, Xingliang Yuan:
DeFiRanger: Detecting DeFi Price Manipulation Attacks. IEEE Trans. Dependable Secur. Comput. 21(4): 4147-4161 (2024) - [j9]Yixuan Zhang, Shuyu Zheng, Haoyu Wang, Lei Wu, Gang Huang, Xuanzhe Liu:
VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts. ACM Trans. Model. Perform. Evaluation Comput. Syst. 9(2): 5:1-5:24 (2024) - [c25]Hang Feng, Yufeng Hu, Yinghan Kou, Runhuai Li, Jianfeng Zhu, Lei Wu, Yajin Zhou:
SlimArchive: A Lightweight Architecture for Ethereum Archive Nodes. USENIX ATC 2024: 1257-1272 - [c24]Jintao Huang, Pengcheng Xia, Jiefeng Li, Kai Ma, Gareth Tyson, Xiapu Luo, Lei Wu, Yajin Zhou, Wei Cai, Haoyu Wang:
Unveiling the Paradox of NFT Prosperity. WWW 2024: 167-177 - [i29]Pengcheng Xia, Zhou Yu, Kailong Wang, Kai Ma, Shuo Chen, Xiapu Luo, Yajin Zhou, Lei Wu, Guangdong Bai, Haoyu Wang:
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web. CoRR abs/2401.04662 (2024) - [i28]Dabao Wang, Bang Wu, Xingliang Yuan, Lei Wu, Yajin Zhou, Helei Cui:
DeFiGuard: A Price Manipulation Detection Service in DeFi using Graph Neural Networks. CoRR abs/2406.11157 (2024) - [i27]Zhuo Chen, Yufeng Hu, Bowen He, Dong Luo, Lei Wu, Yajin Zhou:
Dissecting Payload-based Transaction Phishing on Ethereum. CoRR abs/2409.02386 (2024) - 2023
- [j8]Jian Lin, Dingding Wang, Rui Chang, Lei Wu, Yajin Zhou, Kui Ren:
EnBinDiff: Identifying Data-Only Patches for Binaries. IEEE Trans. Dependable Secur. Comput. 20(1): 343-359 (2023) - [j7]Yiling He, Yiping Li, Lei Wu, Ziqi Yang, Kui Ren, Zhan Qin:
MsDroid: Identifying Malicious Snippets for Android Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(3): 2025-2039 (2023) - [j6]Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu, Yajin Zhou, Qinming He:
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. IEEE Trans. Software Eng. 49(7): 3793-3810 (2023) - [c23]Bowen He, Yuan Chen, Zhuo Chen, Xiaohui Hu, Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou:
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum. CCS 2023: 120-134 - [c22]Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
Poster: Uncovering Vulnerabilities in Wasm Smart Contracts. ICDCS 2023: 1073-1074 - [c21]Zhuo Chen, Jie Liu, Yubo Hu, Lei Wu, Yajin Zhou, Yiling He, Xianhao Liao, Ke Wang, Jinku Li, Zhan Qin:
DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity. ISSTA 2023: 223-235 - [c20]Lin Ma, Duoming Zhou, Hanjie Wu, Yajin Zhou, Rui Chang, Hao Xiong, Lei Wu, Kui Ren:
When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel. SP 2023: 2138-2154 - [i26]Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu, Yajin Zhou, Qinming He:
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. CoRR abs/2304.12645 (2023) - [i25]Jiaqi Li, Ke Wang, Yaoguang Chen, Yajin Zhou, Lei Wu, Jiashui Wang:
Detecting DBMS Bugs with Context-Sensitive Instantiation and Multi-Plan Execution. CoRR abs/2312.04941 (2023) - 2022
- [j5]Siwei Wu, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum. ACM Trans. Softw. Eng. Methodol. 31(3): 54:1-54:33 (2022) - [c19]Muhui Jiang, Tianyi Xu, Yajin Zhou, Yufeng Hu, Ming Zhong, Lei Wu, Xiapu Luo, Kui Ren:
EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM. ASPLOS 2022: 846-858 - [c18]Jinyan Xu, Haoran Lin, Ziqi Yuan, Wenbo Shen, Yajin Zhou, Rui Chang, Lei Wu, Kui Ren:
RegVault: hardware assisted selective data randomization for operating system kernels. DAC 2022: 715-720 - [c17]Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
WASAI: uncovering vulnerabilities in Wasm smart contracts. ISSTA 2022: 703-715 - [c16]Dabao Wang, Hang Feng, Siwei Wu, Yajin Zhou, Lei Wu, Xingliang Yuan:
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum. RAID 2022: 99-114 - [i24]Dabao Wang, Hang Feng, Siwei Wu, Yajin Zhou, Lei Wu, Xingliang Yuan:
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum. CoRR abs/2207.01790 (2022) - [i23]Jingyi Guo, Min Zheng, Yajin Zhou, Haoyu Wang, Lei Wu, Xiapu Luo, Kui Ren:
iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps. CoRR abs/2207.01837 (2022) - [i22]Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Xiangqun Chen:
A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation. CoRR abs/2207.09227 (2022) - [i21]Zhuo Chen, Jie Liu, Yubo Hu, Lei Wu, Yajin Zhou, Xianhao Liao, Ke Wang:
Illegal But Not Malware: An Underground Economy App Detection System Based on Usage Scenario. CoRR abs/2209.01317 (2022) - [i20]Haoran Lin, Yajin Zhou, Lei Wu:
Operation-level Concurrent Transaction Execution for Blockchains. CoRR abs/2211.07911 (2022) - 2021
- [j4]Liu Wang, Ren He, Haoyu Wang, Pengcheng Xia, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo, Guoai Xu:
Beyond the virus: a first look at coronavirus-themed Android malware. Empir. Softw. Eng. 26(4): 82 (2021) - [j3]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. Proc. ACM Meas. Anal. Comput. Syst. 5(2): 26:1-26:30 (2021) - [c15]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem. SBC@AsiaCCS 2021: 23-28 - [c14]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CCS 2021: 734-748 - [c13]Qiang Liu, Cen Zhang, Lin Ma, Muhui Jiang, Yajin Zhou, Lei Wu, Wenbo Shen, Xiapu Luo, Yang Liu, Kui Ren:
FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution. ASE 2021: 792-804 - [c12]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. SIGMETRICS (Abstracts) 2021: 35-36 - [c11]Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
EOSAFE: Security Analysis of EOSIO Smart Contracts. USENIX Security Symposium 2021: 1271-1288 - [c10]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. WWW 2021: 33-44 - [i19]Siwei Wu, Dabao Wang, Jianting He, Yajin Zhou, Lei Wu, Xingliang Yuan, Qinming He, Kui Ren:
DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications. CoRR abs/2104.15068 (2021) - [i18]Muhui Jiang, Tianyi Xu, Yajin Zhou, Yufeng Hu, Ming Zhong, Lei Wu, Xiapu Luo, Kui Ren:
Examiner: Automatically Locating Inconsistent Instructions Between Real Devices and CPU Emulators for ARM. CoRR abs/2105.14273 (2021) - [i17]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CoRR abs/2105.14295 (2021) - [i16]Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Baolei Hou, Xiapu Luo, Lei Wu, Kui Ren:
A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices. CoRR abs/2105.14298 (2021) - [i15]Zhuo Chen, Lei Wu, Jing Cheng, Yubo Hu, Yajin Zhou, Zhushou Tang, Yexuan Chen, Jinku Li, Kui Ren:
Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE. CoRR abs/2106.05756 (2021) - [i14]Ningyu He, Weihang Su, Zhou Yu, Xinyu Liu, Fengyi Zhao, Haoyu Wang, Xiapu Luo, Gareth Tyson, Lei Wu, Yao Guo:
Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO. CoRR abs/2110.07534 (2021) - 2020
- [j2]Pengcheng Xia, Haoyu Wang, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Guoai Xu:
Characterizing cryptocurrency exchange scams. Comput. Secur. 98: 101993 (2020) - [j1]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. Proc. ACM Meas. Anal. Comput. Syst. 4(2): 37:1-37:28 (2020) - [c9]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. eCrime 2020: 1-14 - [c8]Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. Financial Cryptography 2020: 654-675 - [c7]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. ICECCS 2020: 125-134 - [c6]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. SIGMETRICS (Abstracts) 2020: 83-84 - [c5]Yangyu Hu, Haoyu Wang, Ren He, Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu, Guoai Xu:
Mobile App Squatting. WWW 2020: 1727-1738 - [i13]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Characterizing EOSIO Blockchain. CoRR abs/2002.05369 (2020) - [i12]Ningyu He, Ruiyi Zhang, Lei Wu, Haoyu Wang, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
Security Analysis of EOSIO Smart Contracts. CoRR abs/2003.06568 (2020) - [i11]Pengcheng Xia, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Haoyu Wang, Guoai Xu:
Characterizing Cryptocurrency Exchange Scams. CoRR abs/2003.07314 (2020) - [i10]Lei Wu, Siwei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum. CoRR abs/2005.08278 (2020) - [i9]Ren He, Haoyu Wang, Pengcheng Xia, Liu Wang, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yao Guo, Guoai Xu:
Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware. CoRR abs/2005.14619 (2020) - [i8]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. CoRR abs/2006.06419 (2020) - [i7]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. CoRR abs/2007.13639 (2020) - [i6]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards understanding flash loan and its applications in defi ecosystem. CoRR abs/2010.12252 (2020) - [i5]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. CoRR abs/2010.16274 (2020) - [i4]Shuyu Zheng, Haoyu Wang, Lei Wu, Gang Huang, Xuanzhe Liu:
VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts. CoRR abs/2012.01032 (2020)
2010 – 2019
- 2019
- [c4]Zeliang Kan, Haoyu Wang, Lei Wu, Yao Guo, Guoai Xu:
Deobfuscating Android native binary code. ICSE (Companion Volume) 2019: 322-323 - [i3]Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. CoRR abs/1905.00272 (2019) - [i2]Lijin Quan, Lei Wu, Haoyu Wang:
EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level. CoRR abs/1906.10362 (2019) - [i1]Zeliang Kan, Haoyu Wang, Lei Wu, Yao Guo, Daniel Xiapu Luo:
Automated Deobfuscation of Android Native Binary Code. CoRR abs/1907.06828 (2019) - 2015
- [c3]Yajin Zhou, Kunal Patel, Lei Wu, Zhi Wang, Xuxian Jiang:
Hybrid User-level Sandboxing of Third-party Android Apps. AsiaCCS 2015: 19-30 - [c2]Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang:
Harvesting developer credentials in Android apps. WISEC 2015: 23:1-23:12 - 2013
- [c1]Lei Wu, Michael C. Grace, Yajin Zhou, Chiachih Wu, Xuxian Jiang:
The impact of vendor customizations on android security. CCS 2013: 623-634
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint