@inproceedings{sun2025ase,title={Learning from the Past: Real-World Exploit Migration for Smart Contract PoC Generation},author={Sun, Kairan and Xu, Zhengzi and Li, Kaixuan and Zhang, Lyuye and Feng, Yebo and Wu, Daoyuan and Liu, Yang},booktitle={The 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)},year={2025},month=nov}
@article{wu2025tifs,author={Qiao, Wei and Wu, Weiheng and Liu, Song and Li, Teng and Feng, Yebo and Wang, Zehui and Liu, Junrong and Jiang, Bo and Lu, Zhigang and Liu, Baoxu},journal={IEEE Transactions on Information Forensics and Security},title={SauronEyes: Disentangling Voluminous Logs to Unveil Deep Threat Intentions},year={2025}}
@inproceedings{li2025dspp,title={Chaos: Robust Spatio-Temporal Fusion for Generalizable APT Provenance Tracing},author={Li, Teng and Qiao, Wei and Feng, Yebo and Xu, Jiahua and Tasca, Paolo and Lin, Weiguo and Dang, Zexu and Ma, Zhuo and Ma, Jianfeng},booktitle={The 3rd International Conference on Data Security and Privacy Protection (DSPP)},year={2025},month=oct}
@article{ERINLE2025CN,title={SoK: Design, vulnerabilities, and security measures of cryptocurrency wallets},journal={Computer Networks},pages={111691},year={2025},issn={1389-1286},doi={10.1016/j.comnet.2025.111691},url={https://www.sciencedirect.com/science/article/pii/S1389128625006589},author={Erinle, Yimika and Kethepalli, Yathin and Feng, Yebo and Xu, Jiahua}}
@article{li2025tkde,author={Li, Teng and Lin, Zejian and Feng, Yebo and Wang, Chong and Ma, Zhuo and Xiao, Bin and Ma, Jianfeng and Liu, Yang},journal={IEEE Transactions on Knowledge and Data Engineering},title={CryptIF: Towards Cloud-based IoT Anomaly Detection over Encrypted Feature Streams},year={2025},pages={1-15},doi={10.1109/TKDE.2025.3609407}}
@article{li2025jsa,title={Log2Evt: Constructing high-level events for IoT Systems through log-code execution path correlation},journal={Journal of Systems Architecture},pages={103578},year={2025},issn={1383-7621},doi={https://doi.org/10.1016/j.sysarc.2025.103578},url={https://www.sciencedirect.com/science/article/pii/S1383762125002504},author={Li, Teng and Zheng, Baichuan and Feng, Yebo and Quan, Xiaowen and Xu, Jiahua and Liu, Yang and Ma, Jianfeng}}
@inproceedings{li2025raid,title={STGraph: Spatio-Temporal Graph Mining for Anomaly Detection in Distributed System Logs},author={Li, Teng and Zhang, Shengkai and Feng, Yebo and Xu, Jiahua and Dang, Zexu and Liu, Yang and Ma, Jianfeng},booktitle={The 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)},year={2025},month=oct}
@inproceedings{qiao2025ccs,doi={10.48550/arXiv.2410.17910},title={Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning},author={Qiao, Wei and Feng, Yebo and Li, Teng and Ma, Zhuo and Shen, Yulong and Ma, JianFeng and Liu, Yang},booktitle={2025 ACM Conference on Computer and Communications Security},year={2025},month=oct}
@article{wu2025tift,author={Wu, Cong and Chen, Jing and Li, Jiahong and Xu, Jiahua and Jia, Ju and Hu, Yutao and Feng, Yebo and Liu, Yang and Xiang, Yang},journal={IEEE Transactions on Information Forensics and Security},title={Profit or Deceit? Mitigating Pump and Dump in DeFi via Graph and Contrastive Learning},year={2025},volume={20},number={},pages={8994-9008},doi={10.1109/TIFS.2025.3594873}}
@article{sun2025tifs,author={Sun, Xiping and Chen, Jing and He, Kun and He, Zhixiang and Du, Ruiying and Feng, Yebo and Zhao, Qingchuan and Wu, Cong},journal={IEEE Transactions on Information Forensics and Security},title={SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes},year={2025},volume={20},number={},pages={6763-6777},doi={10.1109/TIFS.2025.3584643}}
@article{LI2025FGCS,title={CANDICE: An explainable and intelligent framework for network intrusion detection},journal={Future Generation Computer Systems},pages={108059},year={2025},issn={0167-739X},doi={https://doi.org/10.1016/j.future.2025.108059},url={https://www.sciencedirect.com/science/article/pii/S0167739X25003541},author={Li, Shuhua and Du, Ruiying and Chen, Jing and He, Kun and Wu, Cong and Feng, Yebo}}
@inproceedings{yildiz2025acl,title={Benchmarking {LLM}s and {LLM}-based Agents in Practical Vulnerability Detection for Code Repositories},author={Yildiz, Alperen and Teo, Sin G and Lou, Yiling and Feng, Yebo and Wang, Chong and Divakaran, Dinil Mon},editor={Che, Wanxiang and Nabende, Joyce and Shutova, Ekaterina and Pilehvar, Mohammad Taher},booktitle={Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)},month=jul,year={2025},address={Vienna, Austria},publisher={Association for Computational Linguistics},url={https://aclanthology.org/2025.acl-long.1490/},doi={10.18653/v1/2025.acl-long.1490},pages={30848--30865},isbn={979-8-89176-251-0}}
@inproceedings{guo2025icws,author={Guo, Hanze and Feng, Yebo and Wu, Cong and Li, Zengpeng and Xu, Jiahua},booktitle={2025 IEEE International Conference on Web Services (ICWS)},title={StealthHub: Utxo-Based Stealth Address Protocol},year={2025},volume={},number={},pages={996-1003},doi={10.1109/ICWS67624.2025.00131}}
@inproceedings{sun2025eliminatingbackdoors,doi={10.1145/3715782},title={Eliminating Backdoors in Neural Code Models for Secure Code Understanding},author={Sun, Weisong and Chen, Yuchen and Fang, Chunrong and Feng, Yebo and Xiao, Yuan and Guo, An and Zhang, Quanjun and Chen, Zhenyu and Xu, Baowen and Liu, Yang},year={2025},month=jul,booktitle={2025 ACM International Conference on the Foundations of Software Engineering},url={https://doi.org/10.1145/3715782}}
@inproceedings{hernandez2025icbc,url={https://doi.org/10.1109/ICBC64466.2025.11114626},title={AMM-based DEX on the XRP Ledger},author={Cruz, Walter Hernandez and Dahi, Firas and Feng, Yebo and Xu, Jiahua and Malhotra, Aanchal and Tasca, Paolo},booktitle={2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)},pages={1-10},year={2025},month=jun,doi={10.1109/ICBC64466.2025.11114626}}
@article{gu2025tmc,author={Gu, Yangyang and Chen, Jing and Chen, Congrui and He, Kun and Ju, Jia and Feng, Yebo and Du, Ruiying and Wu, Cong},journal={IEEE Transactions on Mobile Computing},title={CSIPose: Unveiling Human Poses Using Commodity WiFi Devices Through the Wall},year={2025},volume={24},number={10},pages={10914-10926},doi={10.1109/TMC.2025.3571469}}
@inproceedings{wang2025llms,author={Wang, Chong and Huang, Kaifeng and Zhang, Jian and Feng, Yebo and Zhang, Lyuye and Liu, Yang and Peng, Xin},booktitle={ 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE) },title={{ LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-based Code Completion }},year={2025},volume={},issn={1558-1225},pages={781-781},doi={10.1109/ICSE55347.2025.00245},url={https://doi.ieeecomputersociety.org/10.1109/ICSE55347.2025.00245},publisher={IEEE Computer Society},address={Los Alamitos, CA, USA},month=may}
@inproceedings{luo2024piercing,title={Piercing the Veil of TVL: DeFi Reappraised},author={Luo, Yichen and Feng, Yebo and Xu, Jiahua and Tasca, Paolo},year={2025},month=apr,booktitle={Financial Cryptography and Data Security 2025}}
@misc{liu2025visionautoresearchllm,title={A Vision for Auto Research with LLM Agents},author={Liu, Chengwei and Wang, Chong and Cao, Jiayue and Ge, Jingquan and Wang, Kun and Zhang, Lyuye and Cheng, Ming-Ming and Zhao, Penghai and Li, Tianlin and Jia, Xiaojun and Li, Xiang and Li, Xingshuai and Liu, Yang and Feng, Yebo and Huang, Yihao and Xu, Yijia and Sun, Yuqiang and Zhou, Zhenhong and Xu, Zhengzi},year={2025},eprint={2504.18765},archiveprefix={arXiv},primaryclass={cs.AI},url={https://arxiv.org/abs/2504.18765}}
@article{xu2025autogov,url={https://doi.org/10.1109/TSC.2025.3553700},author={Xu, Jiahua and Feng, Yebo and Perez, Daniel and Livshits, Benjamin},journal={IEEE Transactions on Services Computing},title={Auto.gov: Learning-based Governance for Decentralized Finance (DeFi)},year={2025},volume={18},number={3},pages={1278-1292},doi={10.1109/TSC.2025.3553700}}
@article{feng2024fgta,url={https://doi.org/10.1109/COMST.2025.3545541},author={Feng, Yebo and Li, Jun and Mirkovic, Jelena and Wu, Cong and Wang, Chong and Ren, Hao and Xu, Jiahua and Liu, Yang},journal={IEEE Communications Surveys & Tutorials},title={Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis},year={2025},volume={},number={},pages={1-1},doi={10.1109/COMST.2025.3545541}}
@article{wang2025tosem,author={Wang, Chong and Zhang, Jian and Feng, Yebo and Li, Tianlin and Sun, Weisong and Liu, Yang and Peng, Xin},title={Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation},year={2025},publisher={Association for Computing Machinery},address={New York, NY, USA},issn={1049-331X},url={https://doi.org/10.1145/3714462},doi={10.1145/3714462},journal={ACM Transactions on Software Engineering and Methodology},month=jan}
@misc{luo2025llmpoweredmultiagentautomatedcrypto,doi={10.48550/arXiv.2501.00826},title={LLM-Powered Multi-Agent System for Automated Crypto Portfolio Management},author={Luo, Yichen and Feng, Yebo and Xu, Jiahua and Tasca, Paolo and Liu, Yang},year={2025},month=jan,eprint={2501.00826},archiveprefix={arXiv},primaryclass={q-fin.TR},url={https://arxiv.org/abs/2501.00826}}
@article{fi17010007,author={Erinle, Yimika and Feng, Yebo and Xu, Jiahua and Vadgama, Nikhil and Tasca, Paolo},title={Shared-Custodial Wallet for Multi-Party Crypto-Asset Management},journal={Future Internet},volume={17},year={2025},number={1},article-number={7},url={https://www.mdpi.com/1999-5903/17/1/7},issn={1999-5903},doi={10.3390/fi17010007}}
@article{liu2024dynashard,author={Liu, Ao and Chen, Jing and He, Kun and Du, Ruiying and Xu, Jiahua and Wu, Cong and Feng, Yebo and Li, Teng and Ma, Jianfeng},journal={IEEE Internet of Things Journal},title={DYNASHARD: Secure and Adaptive Blockchain Sharding Protocol With Hybrid Consensus and Dynamic Shard Management},year={2024},volume={},number={},pages={1-1},month=nov,doi={10.1109/JIOT.2024.3490036}}
@article{liu2024heterosample,author={Liu, Ao and Chen, Jing and Du, Ruiying and Wu, Cong and Feng, Yebo and Li, Teng and Ma, Jianfeng},journal={IEEE Internet of Things Journal},title={HETEROSAMPLE: Meta-path Guided Sampling for Heterogeneous Graph Representation Learning},year={2024},volume={},number={},pages={1-1},month=oct,doi={10.1109/JIOT.2024.3484996}}
@inproceedings{li2024logparser,author={Li, Teng and Zhang, Shengkai and Feng, Yebo and Xu, Jiahua and Ma, Zhuo and Shen, Yulong and Ma, Jianfeng},booktitle={GLOBECOM 2024 - 2024 IEEE Global Communications Conference},title={Heuristic-based Parsing System for Big Data Log},year={2024},volume={},number={},pages={2329-2334},month=dec,doi={10.1109/GLOBECOM52923.2024.10901555}}
@inproceedings{xie2024defort,doi={10.1145/3650212.3652137},author={Xie, Maoyi and Hu, Ming and Kong, Ziqiao and Zhang, Cen and Feng, Yebo and Wang, Haijun and Xue, Yue and Zhang, Hao and Liu, Ye and Liu, Yang},title={DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications},year={2024},isbn={9798400706127},publisher={Association for Computing Machinery},address={New York, NY, USA},url={https://doi.org/10.1145/3650212.3652137},booktitle={Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis},pages={402-414},numpages={13},keywords={blockchain, decentralized finance (DeFi), price manipulation attack, smart contract},location={Vienna, Austria},month=sep,series={ISSTA 2024}}
@misc{guo2024benchmarkingzkfriendlyhashfunctions,doi={10.48550/arXiv.2409.01976},title={Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains},author={Guo, Hanze and Feng, Yebo and Wu, Cong and Li, Zengpeng and Xu, Jiahua},year={2024},eprint={2409.01976},archiveprefix={arXiv},primaryclass={cs.CR},url={https://arxiv.org/abs/2409.01976}}
@inproceedings{arora2024secplf,author={Arora, Sanidhay and Li, Yingjiu and Feng, Yebo and Xu, Jiahua},title={SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks},year={2024},month=jul,isbn={9798400704826},publisher={Association for Computing Machinery},address={New York, NY, USA},url={https://doi.org/10.1145/3634737.3637681},doi={10.1145/3634737.3637681},booktitle={Proceedings of the 19th ACM Asia Conference on Computer and Communications Security},pages={1394-1405},numpages={12},location={Singapore, Singapore},series={ASIA CCS '24}}
@article{ma2024ctomp,author={Ma, Chengyan and Xi, Ning and Lu, Di and Feng, Yebo and Ma, Jianfeng},date={2024/05/21},date-added={2024-05-31 13:36:14 +0800},date-modified={2024-05-31 13:36:14 +0800},isbn={1869-1919},journal={Science China Information Sciences},number={6},pages={162305},title={CToMP: a cycle-task-oriented memory protection scheme for unmanned systems},url={https://doi.org/10.1007/s11432-023-3865-0},doi={10.1007/s11432-023-3865-0},volume={67},year={2024},month=may,bdsk-url-1={https://doi.org/10.1007/s11432-023-3865-0}}
@misc{sun2024magliverobustvoiceliveness,doi={10.48550/arXiv.2404.01106},title={MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes},author={Sun, Xiping and Chen, Jing and Wu, Cong and He, Kun and Xu, Haozhe and Feng, Yebo and Du, Ruiying and Chen, Xianhao},year={2024},month=apr,eprint={2404.01106},archiveprefix={arXiv},primaryclass={cs.CR},url={https://arxiv.org/abs/2404.01106}}
@misc{han2024backdoors,doi={10.48550/arXiv.2403.03846},url={https://arxiv.org/abs/2403.03846},title={On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder},author={Han, Tingxu and Huang, Shenghan and Ding, Ziqi and Sun, Weisong and Feng, Yebo and Fang, Chunrong and Li, Jun and Qian, Hanwei and Wu, Cong and Zhang, Quanjun and Liu, Yang and Chen, Zhenyu},year={2024},eprint={2403.03846},archiveprefix={arXiv},primaryclass={cs.LG},month=mar}
@inproceedings{li2023drawbridge,author={Li, Jun and Sisodia, Devkishen and Feng, Yebo and Shi, Lumin and Zhang, Mingwei and Early, Christopher and Reiher, Peter},booktitle={2023 IEEE Conference on Communications and Network Security (CNS)},title={Toward Adaptive DDoS-Filtering Rule Generation},month=oct,year={2023},volume={},number={},pages={1-9},doi={10.1109/CNS59707.2023.10288699}}
@article{yield2022xu,author={Xu, Jiahua and Feng, Yebo},journal={IEEE Transactions on Network and Service Management},title={Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols},year={2023},volume={20},number={1},pages={858-869},doi={10.1109/TNSM.2022.3222815}}
@article{xu2023ammsok,author={Xu, Jiahua and Paruch, Krzysztof and Cousaert, Simon and Feng, Yebo},title={SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols},year={2023},issue_date={November 2023},publisher={Association for Computing Machinery},address={New York, NY, USA},volume={55},number={11},issn={0360-0300},url={https://doi.org/10.1145/3570639},doi={10.1145/3570639},journal={ACM Computing Surveys},month=feb,articleno={238},numpages={50}}
@inproceedings{10.1145/3545948.3545973,author={Feng, Yebo and Li, Jun and Sisodia, Devkishen},title={CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic},year={2022},isbn={9781450397049},publisher={Association for Computing Machinery},address={New York, NY, USA},url={https://doi.org/10.1145/3545948.3545973},doi={10.1145/3545948.3545973},booktitle={Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)},pages={482–494},numpages={13},keywords={anomaly detection, cryptocurrency, cryptojacking, cryptomining, network traffic analysis},location={Limassol, Cyprus},series={RAID '22},month=oct}
@inproceedings{feng2022osnfp,author={Feng, Yebo and Luo, Jianzhen and Ma, Chengyan and Li, Teng and Hui, Liang},booktitle={2022 IEEE Global Communications Conference},title={I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network},year={2022},month=dec,volume={},number={},pages={6427-6432},doi={10.1109/GLOBECOM48099.2022.10001510}}
@article{feng2022ubri,author={Feng, Yebo and Xu, Jiahua and Weymouth, Lauren},journal={IEEE Potentials},title={University Blockchain Research Initiative (UBRI): Boosting blockchain education and research},year={2022},volume={41},number={6},pages={19-25},doi={10.1109/MPOT.2022.3198929}}
@article{9908579,author={Li, Teng and Yin, Siwei and Yu, Runze and Feng, Yebo and Jiao, Lei and Shen, Yulong and Ma, Jianfeng},journal={IEEE Journal on Selected Areas in Communications},title={{CoAvoid}: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases},year={2022},volume={40},number={11},pages={3191-3206},doi={10.1109/JSAC.2022.3211547}}
@misc{mirkovic2022measuring,doi={10.48550/ARXIV.2203.00742},url={https://arxiv.org/abs/2203.00742},author={Mirkovic, Jelena and Feng, Yebo and Li, Jun},keywords={Networking and Internet Architecture (cs.NI), Computers and Society (cs.CY), FOS: Computer and information sciences, FOS: Computer and information sciences},title={Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures},publisher={arXiv},year={2022},month=mar,copyright={arXiv.org perpetual, non-exclusive license}}
@techreport{AREA-202203-Feng,type={Area Exam},author={Feng, Yebo},title={Toward Finer Granularity Analysis of Network Traffic},school={College of Arts and Sciences, University of Oregon},month=mar,year={2022},url={https://www.cs.uoregon.edu/Reports/AREA-202203-Feng.pdf}}
@article{feng2021botflowmon,author={Feng, Yebo and Li, Jun and Jiao, Lei and Wu, Xintao},journal={IEEE Transactions on Dependable and Secure Computing (TDSC)},title={Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic},year={2021},volume={18},number={5},pages={2149-2163},doi={10.1109/TDSC.2020.3047399}}
@inproceedings{feng2020appddos,author={Feng, Yebo and Li, Jun and Nguyen, Thanh},booktitle={2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS)},title={Application-Layer {DDoS} Defense with Reinforcement Learning},year={2020},pages={1-10},doi={10.1109/IWQoS49365.2020.9213026},issn={1548-615X},month=jun,keywords={application-layer DDoS;distributed denial of service (DDoS);reinforcement learning;anomaly detection}}
@inproceedings{10.1007/978-3-030-59621-7_6,author={Feng, Yebo and Li, Jun},title={Toward Explainable and Adaptable Detection and Classification of Distributed Denial-of-Service Attacks},booktitle={2020 KDD MLHat: The First International Workshop on Deployable Machine Learning for Security Defense},year={2020},publisher={Springer International Publishing},address={Cham},pages={105--121},isbn={978-3-030-59621-7}}
@inproceedings{feng2020crypto,author={Feng, Yebo and Sisodia, Devkishen and Li, Jun},title={POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic},year={2020},isbn={9781450367509},publisher={Association for Computing Machinery},address={New York, NY, USA},url={https://doi.org/10.1145/3320269.3405440},doi={10.1145/3320269.3405440},booktitle={Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIACCS 2020) - poster paper},pages={907–909},numpages={3},keywords={anomaly detection, network traffic classification, cryptojacking},location={Taipei, Taiwan},series={ASIA CCS '20}}
@misc{DRP-201912-Feng,author={Feng, Yebo},title={Towards Intelligent Defense against Application-Layer {DDoS} with Reinforcement Learning},note={Directed Research Project},publisher={University of Oregon, Computer and Information Sciences Department},address={Eugene OR},month=dec,year={2019},howpublished={Available at \url{http://www.cs.uoregon.edu/Reports/DRP-201912-Feng.pdf} (2020/02/25)}}
@inproceedings{feng2019botflowmon,author={Feng, Yebo and Li, Jun and Jiao, Lei and Wu, Xintao},booktitle={2019 IEEE Conference on Communications and Network Security (CNS)},title={{BotFlowMon}: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows},year={2019},pages={169-177},keywords={online social network (OSN);OSN security;social bot;NetFlow data;OSN bot traffic;machine learning},doi={10.1109/CNS.2019.8802706},month=jun}
@article{feng2018botflowmon,title={{BotFlowMon}: Identify Social Bot Traffic With {NetFlow} and Machine Learning},author={Feng, Yebo},year={2018},month=jun,publisher={University of Oregon},url={http://hdl.handle.net/1794/23799}}