Zobrazeno 1 - 10
of 194
pro vyhledávání: '"Xu, Guoai"'
The Android ecosystem faces a notable challenge known as fragmentation, which denotes the extensive diversity within the system. This issue is mainly related to differences in system versions, device hardware specifications, and customizations introd
Externí odkaz:
http://arxiv.org/abs/2406.09807
Autor:
Xia, Pengcheng, Guo, Yanhui, Lin, Zhaowen, Wu, Jun, Duan, Pengbo, He, Ningyu, Wang, Kailong, Liu, Tianming, Yue, Yinliang, Xu, Guoai, Wang, Haoyu
Cryptocurrency wallets, acting as fundamental infrastructure to the blockchain ecosystem, have seen significant user growth, particularly among browser-based wallets (i.e., browser extensions). However, this expansion accompanies security challenges,
Externí odkaz:
http://arxiv.org/abs/2405.04332
Automatic API method recommendation is an essential task of code intelligence, which aims to suggest suitable APIs for programming queries. Existing approaches can be categorized into two primary groups: retrieval-based and learning-based approaches.
Externí odkaz:
http://arxiv.org/abs/2401.15843
Autor:
Li, Haodong, Deng, Gelei, Liu, Yi, Wang, Kailong, Li, Yuekang, Zhang, Tianwei, Liu, Yang, Xu, Guoai, Xu, Guosheng, Wang, Haoyu
Pre-training, which utilizes extensive and varied datasets, is a critical factor in the success of Large Language Models (LLMs) across numerous applications. However, the detailed makeup of these datasets is often not disclosed, leading to concerns a
Externí odkaz:
http://arxiv.org/abs/2401.00676
Researchers have proposed kinds of malware detection methods to solve the explosive mobile security threats. We argue that the experiment results are inflated due to the research bias introduced by the variability of malware dataset. We explore the i
Externí odkaz:
http://arxiv.org/abs/2205.15532
Autor:
Xia, Pengcheng, wang, Haoyu, Gao, Bingyu, Su, Weihang, Yu, Zhou, Luo, Xiapu, Zhang, Chao, Xiao, Xusheng, Xu, Guoai
The prosperity of the cryptocurrency ecosystem drives the need for digital asset trading platforms. Beyond centralized exchanges (CEXs), decentralized exchanges (DEXs) are introduced to allow users to trade cryptocurrency without transferring the cus
Externí odkaz:
http://arxiv.org/abs/2109.00229
Autor:
Zou, Shihong, Cao, Qiang, Lu, Ruichao, Wang, Chenyu, Xu, Guoai, Ma, Huanhuan, Cheng, Yingyi, Xi, Jinwen
Publikováno v:
In Computer Communications 15 April 2024 220:81-93
DNS has always been criticized for its inherent design flaws, making the system vulnerable to kinds of attacks. Besides, DNS domain names are not fully controlled by the users, which can be easily taken down by the authorities and registrars. Since b
Externí odkaz:
http://arxiv.org/abs/2104.05185
Autor:
Xia, Pengcheng, Wang, Haoyu, Luo, Xiapu, Wu, Lei, Zhou, Yajin, Bai, Guangdong, Xu, Guoai, Huang, Gang, Liu, Xuanzhe
As COVID-19 has been spreading across the world since early 2020, a growing number of malicious campaigns are capitalizing the topic of COVID-19. COVID-19 themed cryptocurrency scams are increasingly popular during the pandemic. However, these newly
Externí odkaz:
http://arxiv.org/abs/2007.13639
Autor:
Wang, Liu, He, Ren, Wang, Haoyu, Xia, Pengcheng, Li, Yuanchun, Wu, Lei, Zhou, Yajin, Luo, Xiapu, Sui, Yulei, Guo, Yao, Xu, Guoai
As the COVID-19 pandemic emerged in early 2020, a number of malicious actors have started capitalizing the topic. Although a few media reports mentioned the existence of coronavirus-themed mobile malware, the research community lacks the understandin
Externí odkaz:
http://arxiv.org/abs/2005.14619