Smart contracts vulnerability detection model based on adversarial multi-task learning[J] JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2023(77) Zhou, Kuo Huang, Jing Han, Honggui Gong, Bei Xiong, Ao Wang, Wei Wu, Qihui
Block-Chain Abnormal Transaction Detection Method Based on Dynamic Graph Representation[C] GAME THEORY FOR NETWORKS, GAMENETS 2022 2022(457) Qiao, Chenbin Tong, Yuanzheng Xiong, Ao Huang, Jing Wang, Wei
Raft-PLUS: Improving Raft by Multi-Policy Based Leader Election with Unprejudiced Sorting[J] SYMMETRY-BASEL 2022(14) Xu, Jinjie Wang, Wei Zeng, Yu Yan, Zhiwei Li, Hongtao
The Disruptions of 5G on Data-Driven Technologies and Applications[J] IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2020(32) Loghin, Dumitrel Cai, Shaofeng Chen, Gang Tien Tuan Anh Dinh Fan, Feiyi Lin, Qian Ng, Janice Ooi, Beng Chin Sun, Xutao Quang-Trung Ta Wang, Wei Xiao, Xiaokui Yang, Yang Zhang, Meihui Zhang, Zhonghua
Evolutionary V2X Technologies Toward the Internet of Vehicles: Challenges and Opportunities[J] PROCEEDINGS OF THE IEEE 2020(108) Zhou, Haibo Xu, Wenchao Chen, Jiacheng Wang, Wei
DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain[J] IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS Wang, Bin Yuan, Xiaohan Duan, Li Ma, Hongliang Su, Chunhua Wang, Wei