Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2024
Overview of the NLPCC 2024 Shared Task on Chinese Metaphor Generation
Natural Language Processing and Chinese ComputingPages 181–192https://doi.org/10.1007/978-981-97-9443-0_15AbstractThis paper presents the results of the shared task on Chinese metaphor generation, hosted at the 13th CCF Conference on Natural Language Processing and Chinese Computing (NLPCC 2024). The goal of this shared task is to generate Chinese metaphors ...
- research-articleDecember 2023
DeFiRanger: Detecting DeFi Price Manipulation Attacks
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 4Pages 4147–4161https://doi.org/10.1109/TDSC.2023.3346888The rapid growth of Decentralized Finance (DeFi) boosts the blockchain ecosystem. At the same time, attacks on DeFi applications (apps) are increasing. However, to the best of our knowledge, existing smart contract vulnerability detection tools cannot ...
- research-articleJuly 2023
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 7Pages 3793–3810https://doi.org/10.1109/TSE.2023.3271417Recent years have witnessed explosive growth in blockchain smart contract applications. As smart contracts become increasingly popular and carry trillion dollars worth of digital assets, they become more of an appealing target for attackers, who have ...
- ArticleDecember 2022
BSB: Bringing Safe Browsing to Blockchain Platform
AbstractProgrammable Blockchain brings a new type of decentralized applications (Dapps) that facilitate transfer of assets across users without a third party. The popularity of Ethereum Dapps brings themselves great security risks: they have been under ...
- research-articleOctober 2022
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum
RAID '22: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and DefensesPages 99–114https://doi.org/10.1145/3545948.3545963The prosperity of decentralized finance motivates many investors to profit via trading their crypto assets on decentralized applications (DApps for short) of the Ethereum ecosystem. Apart from Ether (the native cryptocurrency of Ethereum), many ERC20 (...
- research-articleApril 2022
- abstractJune 2021
Tracking Counterfeit Cryptocurrency End-to-end
SIGMETRICS '21: Abstract Proceedings of the 2021 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer SystemsPages 33–34https://doi.org/10.1145/3410220.3456282With the growth of the cryptocurrency ecosystem, there is expanding evidence that counterfeit cryptocurrency has also appeared. In this paper, we empirically explore the presence of counterfeit cryptocurrencies on Ethereum and measure their impact. By ...
Also Published in:
ACM SIGMETRICS Performance Evaluation Review: Volume 49 Issue 1 - research-articleMay 2021
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem
SBC '21: Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud ComputingPages 23–28https://doi.org/10.1145/3457977.3460301Flash Loan, as an emerging service in the decentralized finance ecosystem, allows users to request a non-collateral loan. While providing convenience, it also enables attackers to launch malicious operations with a large amount of asset that they do not ...
- research-articleJanuary 2021
3D Face Modeling Algorithm for Film and Television Animation Based on Lightweight Convolutional Neural Network
Through the analysis of facial feature extraction technology, this paper designs a lightweight convolutional neural network (LW-CNN). The LW-CNN model adopts a separable convolution structure, which can propose more accurate features with fewer parameters ...
- research-articleJanuary 2021
3D Film Animation Image Acquisition and Feature Processing Based on the Latest Virtual Reconstruction Technology
In this paper, the latest virtual reconstruction technology is used to conduct in-depth research on 3D movie animation image acquisition and feature processing. This paper firstly proposes a time-division multiplexing method based on subpixel multiplexing ...
- research-articleNovember 2020
Tracking Counterfeit Cryptocurrency End-to-end
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 4, Issue 3Article No.: 50, Pages 1–28https://doi.org/10.1145/3428335The production of counterfeit money has a long history. It refers to the creation of imitation currency that is produced without the legal sanction of government. With the growth of the cryptocurrency ecosystem, there is expanding evidence that ...
- ArticleAugust 2010
On the results of the first mobile biometry (MOBIO) face and speaker verification evaluation
- Sébastien Marcel,
- Chris McCool,
- Pavel Matějka,
- Timo Ahonen,
- Jan Černocký,
- Shayok Chakraborty,
- Vineeth Balasubramanian,
- Sethuraman Panchanathan,
- Chi Ho Chan,
- Josef Kittler,
- Norman Poh,
- Benoît Fauve,
- Ondřej Glembek,
- Oldřich Plchot,
- Zdeněk Jančík,
- Anthony Larcher,
- Christophe Lévy,
- Driss Matrouf,
- Jean-François Bonastre,
- Ping-Han Lee,
- Jui-Yu Hung,
- Si-Wei Wu,
- Yi-Ping Hung,
- Lukáš Machlica,
- John Mason,
- Sandra Mau,
- Conrad Sanderson,
- David Monzo,
- Antonio Albiol,
- Hieu V. Nguyen,
- Li Bai,
- Yan Wang,
- Matti Niskanen,
- Markus Turtinen,
- Juan Arturo Nolazco-Flores,
- Leibny Paola Garcia-Perera,
- Roberto Aceves-Lopez,
- Mauricio Villegas,
- Roberto Paredes
This paper evaluates the performance of face and speaker verification techniques in the context of a mobile environment. The mobile environment was chosen as it provides a realistic and challenging test-bed for biometric person verification techniques ...