Unit testing is critical to the software development process, ensuring t...
Large Language Models (LLMs) have significantly impacted numerous domain...
Large language models (LLMs) have demonstrated impressive capabilities a...
Graph anomaly detection (GAD) has achieved success and has been widely
a...
Encrypted traffic classification is receiving widespread attention from
...
The goal of 3D mesh watermarking is to embed the message in 3D meshes th...
Provenance-Based Endpoint Detection and Response (P-EDR) systems are dee...
Recent advancements in large language models (LLMs) have demonstrated
ex...
Smart contracts play a vital role in the Ethereum ecosystem. Due to the
...
Millions of smart contracts have been deployed onto Ethereum for providi...
Knowledge graph reasoning (KGR) – answering complex logical queries over...
The function call graph (FCG) based Android malware detection methods ha...
The blockchain technology has been used for recording state transitions ...
The privacy of personal information has received significant attention i...
WebAssembly (abbreviated WASM) has emerged as a promising language of th...
Privacy protection raises great attention on both legal levels and user
...
EOSIO, as one of the most representative blockchain 3.0 platforms, invol...
Vetting security impacts introduced by third-party libraries in iOS apps...
Signed graphs are widely used to model the trust relationships among use...
Graph-based anomaly detection is becoming prevalent due to the powerful
...
The Android platform introduces the runtime permission model in version ...
Answering complex logical queries over large-scale knowledge graphs (KGs...
The continuing expansion of the blockchain ecosystems has attracted much...
Neural Architecture Search (NAS) represents an emerging machine learning...
The prosperity of the cryptocurrency ecosystem drives the needs for digi...
Graph-based Anomaly Detection (GAD) is becoming prevalent due to the pow...
This paper presents iBatch, a middleware system running on top of an
ope...
Embedded devices are becoming popular. Meanwhile, researchers are active...
Dynamic analysis based on the full-system emulator QEMU is widely used f...
Emulator is widely used to build dynamic analysis frameworks due to its
...
DNS has always been criticized for its inherent design flaws, making the...
Being able to automatically detect the performance issues in apps can
si...
Millions of mobile apps have been available through various app markets....
Smart contracts have been plagued by security incidents, which resulted ...
As the most popular blockchain that supports smart contracts, there are
...
The production of counterfeit money has a long history. It refers to the...
Smart contracts are Turing-complete programs running on the blockchain. ...
Ethereum is the largest blockchain platform that supports smart contract...
Being the most popular permissionless blockchain that supports smart
con...
The purpose of the General Data Protection Regulation (GDPR) is to provi...
As COVID-19 has been spreading across the world since early 2020, a grow...
More than eight million smart contracts have been deployed into Ethereum...
Deep neural networks (DNNs) are inherently susceptible to adversarial at...
As the COVID-19 pandemic emerges in early 2020, a number of campaigns ha...
As one of the representative blockchain platforms, Ethereum has attracte...
Software reuse enables developers to reuse architecture, programs and ot...
While Proof-of-Work (PoW) is the most widely used consensus mechanism fo...
As the indispensable trading platforms of the ecosystem, hundreds of
cry...
The EOSIO blockchain, one of the representative Delegated Proof-of-Stake...
EOSIO has become one of the most popular blockchain platforms since its
...