default search action
Yibo Wang 0006
Person information
- unicode name: 王一博
- affiliation: Syracuse University, FullStack Security Lab, Syracuse, NY, USA
Other persons with the same name
- Yibo Wang (aka: Yi-Bo Wang) — disambiguation page
- Yibo Wang 0001 — University of Illinois Chicago (UIC), Department of Computer Science, Chicago, IL, USA
- Yibo Wang 0002 — Chinese Academy of Sciences, Institute of Geology and Geophysics, Beijing, China (and 1 more)
- Yibo Wang 0003 — Pohang University of Science and Technology (POSTECH), Gyeongbuk, Republic of Korea (and 1 more)
- Yibo Wang 0004 — Nanjing University, School of Electronic Sciene and Engineering, Nanjing, China
- Yibo Wang 0005 — Nanjing University, National Key Laboratory for Novel Software Technology, Nanjing, China (and 1 more)
- Yibo Wang 0007 — Renmin University of China, School of Information, Beijing, China
- Yibo Wang 0008 — Northeastern University, Shenyang, China
- Yibo Wang 0009 — Tsinghua University, Department of Computer Science and Technology, Beijing, China
- Yibo Wang 0010 — Southeast University, School of Mathematics, Nanjing, China
- Yibo Wang 0011 — Chinese Academy of Sciences, Changchun Institute of Applied Chemistry, Laboratory of Chemical Biology, Changchun, China
- Yibo Wang 0012 — Dalian University of Technology, School of Software, Dalian, China
- Yibo Wang 0013 — University of Virginia, Department of Chemistry, Charlottesville, VA, USA
- Yibo Wang 0014 — Chinese Academy of Sciences, Aerospace Information Research Institute, Beijing, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c9]Yibo Wang, Yuzhe Tang, Kai Li, Wanning Ding, Zhihua Yang:
Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing. USENIX Security Symposium 2024 - [c8]Yuxuan Zhou, Jiaqi Chen, Yibo Wang, Yuzhe Tang, Guofei Gu:
Towards Understanding Crypto-Asset Risks on Ethereum Caused by Key Leakage on the Internet. WWW (Companion Volume) 2024: 875-878 - [i8]Jiaqi Chen, Yibo Wang, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, Xiaofeng Wang, Kai Li:
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild. CoRR abs/2401.11547 (2024) - [i7]Wanning Ding, Yibo Wang, Yuzhe Tang:
Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs. CoRR abs/2407.03543 (2024) - 2023
- [j1]Yibo Wang, Kai Li, Yuzhe Tang, Jiaqi Chen, Qi Zhang, Xiapu Luo, Ting Chen:
Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations. IEEE Trans. Software Eng. 49(4): 2980-2995 (2023) - [c7]Jiaqi Chen, Yibo Wang, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, XiaoFeng Wang, Kai Li:
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild. EuroS&P 2023: 332-351 - [i6]Yibo Wang, Wanning Ding, Kai Li, Yuzhe Tang:
Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolic Fuzzing. CoRR abs/2312.02642 (2023) - 2022
- [c6]Yibo Wang, Yuzhe Tang:
Poster: Enabling Cost-Effective Blockchain Applications via Workload-Adaptive Transaction Execution. CCS 2022: 3483-3485 - [c5]Sinan Wang, Yibo Wang, Xian Zhan, Ying Wang, Yepang Liu, Xiapu Luo, Shing-Chi Cheung:
APER: Evolution-Aware Runtime Permission Misuse Detection for Android Apps. ICSE 2022: 125-137 - [i5]Sinan Wang, Yibo Wang, Xian Zhan, Ying Wang, Yepang Liu, Xiapu Luo, Shing-Chi Cheung:
Aper: Evolution-Aware Runtime Permission Misuse Detection for Android Apps. CoRR abs/2201.12542 (2022) - [i4]Yibo Wang, Yuzhe Tang:
Enabling Cost-Effective Blockchain Applications via Workload-Adaptive Transaction Execution. CoRR abs/2210.04644 (2022) - [i3]Yuzhe Tang, Kai Li, Yibo Wang, Jiaqi Chen, Cheng Xu:
Efficiently Hardening SGX Enclaves against Memory Access Pattern Attacks via Dynamic Program Partitioning. CoRR abs/2212.12656 (2022) - 2021
- [c4]Kai Li, Yibo Wang, Yuzhe Tang:
DETER: Denial of Ethereum Txpool sERvices. CCS 2021: 1645-1667 - [c3]Kai Li, Yuzhe Tang, Jiaqi Chen, Yibo Wang, Xianghong Liu:
TopoShot: uncovering Ethereum's network topology leveraging replacement transactions. Internet Measurement Conference 2021: 302-319 - [c2]Yibo Wang, Qi Zhang, Kai Li, Yuzhe Tang, Jiaqi Chen, Xiapu Luo, Ting Chen:
iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocations. ESEC/SIGSOFT FSE 2021: 566-577 - [i2]Yibo Wang, Qi Zhang, Kai Li, Yuzhe Richard Tang, Xiapu Luo, Ting Chen:
iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations. CoRR abs/2106.08554 (2021) - [i1]Kai Li, Yuzhe Tang, Jiaqi Chen, Yibo Wang, Xianghong Liu:
TopoShot: Uncovering Ethereum's Network Topology Leveraging Replacement Transactions. CoRR abs/2109.14794 (2021) - 2020
- [c1]Yuzhe Richard Tang, Kai Li, Yibo Wang, Sencer Burak Somuncuoglu:
Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention. SERIAL@Middleware 2020: 1-4
Coauthor Index
aka: Yuzhe Richard Tang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint