Zobrazeno 1 - 10
of 422
pro vyhledávání: '"Luo, Xiapu"'
Zero-knowledge layer 2 protocols emerge as a compelling approach to overcoming blockchain scalability issues by processing transactions through the transaction finalization process. During this process, transactions are efficiently processed off the
Externí odkaz:
http://arxiv.org/abs/2410.12210
Autor:
Hiesgen, Raphael, Nawrocki, Marcin, Barcellos, Marinho, Kopp, Daniel, Hohlfeld, Oliver, Chan, Echo, Dobbins, Roland, Doerr, Christian, Rossow, Christian, Thomas, Daniel R., Jonker, Mattijs, Mok, Ricky, Luo, Xiapu, Kristoff, John, Schmidt, Thomas C., Wählisch, Matthias, claffy, kc
Publikováno v:
Proceedings of ACM Internet Measurement Conference (IMC), 2024
Motivated by the impressive but diffuse scope of DDoS research and reporting, we undertake a multistakeholder (joint industry-academic) analysis to seek convergence across the best available macroscopic views of the relative trends in two dominant cl
Externí odkaz:
http://arxiv.org/abs/2410.11708
Autor:
Zhang, Youqian, Cheung, Michael, Yang, Chunxi, Zhai, Xinwei, Shen, Zitong, Ji, Xinyu, Fu, Eugene Y., Chau, Sze-Yiu, Luo, Xiapu
Numerous safety- or security-critical systems depend on cameras to perceive their surroundings, further allowing artificial intelligence (AI) to analyze the captured images to make important decisions. However, a concerning attack vector has emerged,
Externí odkaz:
http://arxiv.org/abs/2408.05124
Neural code generation systems have recently attracted increasing attention to improve developer productivity and speed up software development. Typically, these systems maintain a pre-trained neural model and make it available to general users as a
Externí odkaz:
http://arxiv.org/abs/2408.04194
Autor:
Zhang, Youqian, Yang, Chunxi, Fu, Eugene Y., Jiang, Qinhong, Yan, Chen, Chau, Sze-Yiu, Ngai, Grace, Leong, Hong-Va, Luo, Xiapu, Xu, Wenyuan
Object detection can localize and identify objects in images, and it is extensively employed in critical multimedia applications such as security surveillance and autonomous driving. Despite the success of existing object detection models, they are o
Externí odkaz:
http://arxiv.org/abs/2407.16327
In this paper, we test the hypothesis that although OpenAI's GPT-4 performs well generally, we can fine-tune open-source models to outperform GPT-4 in smart contract vulnerability detection. We fine-tune two models from Meta's Code Llama and a datase
Externí odkaz:
http://arxiv.org/abs/2407.08969
Autor:
He, Zheyuan, Li, Zihao, Qiao, Ao, Luo, Xiapu, Zhang, Xiaosong, Chen, Ting, Song, Shuwei, Liu, Dijun, Niu, Weina
Blockchains, with intricate architectures, encompass various components, e.g., consensus network, smart contracts, decentralized applications, and auxiliary services. While offering numerous advantages, these components expose various attack surfaces
Externí odkaz:
http://arxiv.org/abs/2406.10687
In Ethereum, the practice of verifying the validity of the passed addresses is a common practice, which is a crucial step to ensure the secure execution of smart contracts. Vulnerabilities in the process of address verification can lead to great secu
Externí odkaz:
http://arxiv.org/abs/2405.20561
Large Language Models (LLMs) have emerged as powerful tools across various domains within cyber security. Notably, recent studies are increasingly exploring LLMs applied to the context of blockchain security (BS). However, there remains a gap in a co
Externí odkaz:
http://arxiv.org/abs/2403.14280
Autor:
Ma, Junjie, Jiang, Muhui, Jiang, Jinan, Luo, Xiapu, Hu, Yufeng, Zhou, Yajin, Wang, Qi, Zhang, Fengwei
Decentralized Autonomous Organization (DAO) becomes a popular governance solution for decentralized applications (dApps) to achieve decentralized governance. In the DAO, no single entity can arbitrarily control the dApps without approval from the maj
Externí odkaz:
http://arxiv.org/abs/2403.11758