Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Zhang, Wuqi"'
Data contamination presents a critical barrier preventing widespread industrial adoption of advanced software engineering techniques that leverage code language models (CLMs). This phenomenon occurs when evaluation data inadvertently overlaps with th
Externí odkaz:
http://arxiv.org/abs/2411.10842
Publikováno v:
ISSTA 2024
Solidity compiler plays a key role in enabling the development of smart contract applications on Ethereum by governing the syntax of a domain-specific language called Solidity and performing compilation and optimization of Solidity code. The correctn
Externí odkaz:
http://arxiv.org/abs/2407.05981
Various techniques have been proposed to leverage the capabilities of code language models (CLMs) for SE tasks. While these techniques typically evaluate their effectiveness using publicly available datasets, the evaluation can be subject to data con
Externí odkaz:
http://arxiv.org/abs/2403.16898
Dataflow analysis is a powerful code analysis technique that reasons dependencies between program values, offering support for code optimization, program comprehension, and bug detection. Existing approaches require the successful compilation of the
Externí odkaz:
http://arxiv.org/abs/2402.10754
Autor:
Zhang, Wuqi, Wei, Lili, Cheung, Shing-Chi, Liu, Yepang, Li, Shuqing, Liu, Lu, Lyu, Michael R.
Front-running attacks have been a major concern on the blockchain. Attackers launch front-running attacks by inserting additional transactions before upcoming victim transactions to manipulate victim transaction executions and make profits. Recent st
Externí odkaz:
http://arxiv.org/abs/2212.12110
Autor:
Tian, Yongqiang, Zhang, Wuqi, Wen, Ming, Cheung, Shing-Chi, Sun, Chengnian, Ma, Shiqing, Jiang, Yu
Publikováno v:
ACM Transactions on Software Engineering and Methodology, 2023
Model compression can significantly reduce the sizes of deep neural network (DNN) models, and thus facilitates the dissemination of sophisticated, sizable DNN models, especially for their deployment on mobile or embedded devices. However, the predict
Externí odkaz:
http://arxiv.org/abs/2112.02819
Tor, an onion-routing anonymity network, has been shown to be vulnerable to Website Fingerprinting (WF), which de-anonymizes web browsing by analyzing the unique characteristics of the encrypted network traffic. Although many defenses have been propo
Externí odkaz:
http://arxiv.org/abs/2111.12629
Smart contracts are programs running on blockchain to execute transactions. When input constraints or security properties are violated at runtime, the transaction being executed by a smart contract needs to be reverted to avoid undesirable consequenc
Externí odkaz:
http://arxiv.org/abs/2108.10799
Since the emergence of Ethereum, blockchain-based decentralized applications (DApps) have become increasingly popular and important. To balance the security, performance, and costs, a DApp typically consists of two layers: an on-chain layer to execut
Externí odkaz:
http://arxiv.org/abs/2106.09440
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.