publications

2024

2024

  1. DYNASHARD: Secure and Adaptive Blockchain Sharding Protocol With Hybrid Consensus and Dynamic Shard Management
    Ao Liu, Jing Chen, Kun He, Ruiying Du, Jiahua Xu, Cong Wu, Yebo Feng, Teng Li, and Jianfeng Ma
    IEEE Internet of Things Journal, Nov 2024
  2. Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning
    Wei Qiao, Yebo Feng, Teng Li, Zijian Zhang, Zhengzi Xu, Zhuo Ma, Yulong Shen, JianFeng Ma, and Yang Liu
    Oct 2024
  3. HETEROSAMPLE: Meta-path Guided Sampling for Heterogeneous Graph Representation Learning
    Ao Liu, Jing Chen, Ruiying Du, Cong Wu, Yebo Feng, Teng Li, and Jianfeng Ma
    IEEE Internet of Things Journal, Oct 2024
  4. Heuristic-based Parsing System for Big Data Log
    Teng Li, Shengkai Zhang, Yebo Feng, Jiahua Xu, Zhuo Ma, Yulong Shen, and Jianfeng Ma
    In 2024 IEEE Global Communications Conference, Dec 2024
  5. DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications
    Maoyi Xie, Ming Hu, Ziqiao Kong, Cen Zhang, Yebo Feng, Haijun Wang, Yue Xue, Hao Zhang, Ye Liu, and Yang Liu
    In Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, Sep 2024
  6. Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains
    Hanze Guo, Yebo Feng, Cong Wu, Zengpeng Li, and Jiahua Xu
    Sep 2024
  7. Eliminating Backdoors in Neural Code Models via Trigger Inversion
    Weisong Sun, Yuchen Chen, Chunrong Fang, Yebo Feng, Yuan Xiao, An Guo, Quanjun Zhang, Yang Liu, Baowen Xu, and Zhenyu Chen
    Sep 2024
  8. On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic
    Yebo Feng, Jun Li, Devkishen Sisodia, and Peter Reiher
    IEEE Transactions on Dependable and Secure Computing, Jul 2024
  9. SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks
    Sanidhay Arora, Yingjiu Li, Yebo Feng, and Jiahua Xu
    In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Jul 2024
  10. How and Why LLMs Use Deprecated APIs in Code Completion? An Empirical Study
    Chong Wang, Kaifeng Huang, Jian Zhang, Yebo Feng, Lyuye Zhang, Yang Liu, and Xin Peng
    Jun 2024
  11. CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
    Chengyan Ma, Ning Xi, Di Lu, Yebo Feng, and Jianfeng Ma
    Science China Information Sciences, May 2024
  12. Piercing the Veil of TVL: DeFi Reappraised
    Yichen Luo, Yebo Feng, Jiahua Xu, and Paolo Tasca
    Apr 2024
  13. EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing
    Xiping Sun, Jing Chen, Kun He, Zhixiang He, Ruiying Du, Yebo Feng, Qingchuan Zhao, and Cong Wu
    Apr 2024
  14. MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes
    Xiping Sun, Jing Chen, Cong Wu, Kun He, Haozhe Xu, Yebo Feng, Ruiying Du, and Xianhao Chen
    Apr 2024
  15. On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder
    Tingxu Han, Shenghan Huang, Ziqi Ding, Weisong Sun, Yebo Feng, Chunrong Fang, Jun Li, Hanwei Qian, Cong Wu, Quanjun Zhang, Yang Liu, and Zhenyu Chen
    Mar 2024
  16. CSIPose: Unveiling Body Pose Using Commodity WiFi Devices Through the Wall
    Yangyang Gu, Jing Chen, Cong Wu, Kun He, Ju Jia, Yebo Feng, Congrui Chen, and Ruiying Du
    Feb 2024
  17. Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation
    Chong Wang, Jian Zhang, Yebo Feng, Tianlin Li, Weisong Sun, Yang Liu, and Xin Peng
    Jan 2024

2023

2023

  1. Automated Market Maker on the XRP Ledger
    Firas Dahi, Walter Hernandez, Yebo Feng, Jiahua Xu, Aanchal Malhotra, and Paolo Tasca
    Dec 2023
  2. Toward Adaptive DDoS-Filtering Rule Generation
    Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, and Peter Reiher
    In 2023 IEEE Conference on Communications and Network Security (CNS), Oct 2023
  3. SoK: Design, Vulnerabilities, and Security Measures of Cryptocurrency Wallets
    Yimika Erinle, Yathin Kethepalli, Yebo Feng, and Jiahua Xu
    Aug 2023
  4. Fine-Grained, Content-Agnostic Network Traffic Analysis for Malicious Activity Detection
    Yebo Feng
    University of Oregon, Jun 2023
    PhD Dissertation
  5. Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis
    Yebo Feng, Jun Li, Jelena Mirkovic, Cong Wu, Chong Wang, Hao Ren, and Yang Liu
    Mar 2023
  6. Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols
    Jiahua Xu, and Yebo Feng
    IEEE Transactions on Network and Service Management, Mar 2023
  7. SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols
    Jiahua Xu, Krzysztof Paruch, Simon Cousaert, and Yebo Feng
    ACM Computing Surveys, Feb 2023
  8. Auto.gov: Learning-based On-chain Governance for Decentralized Finance (DeFi)
    Jiahua Xu, Daniel Perez, Yebo Feng, and Benjamin Livshits
    Feb 2023

2022

2022

  1. CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic
    Yebo Feng, Jun Li, and Devkishen Sisodia
    In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Oct 2022
  2. I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network
    Yebo Feng, Jianzhen Luo, Chengyan Ma, Teng Li, and Liang Hui
    In 2022 IEEE Global Communications Conference, Dec 2022
  3. University Blockchain Research Initiative (UBRI): Boosting blockchain education and research
    Yebo Feng, Jiahua Xu, and Lauren Weymouth
    IEEE Potentials, Dec 2022
  4. CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases
    Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, and Jianfeng Ma
    IEEE Journal on Selected Areas in Communications, Dec 2022
  5. Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures
    Jelena Mirkovic, Yebo Feng, and Jun Li
    Mar 2022
  6. Toward Finer Granularity Analysis of Network Traffic
    Yebo Feng
    Mar 2022

2021

2021

  1. Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic
    Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu
    IEEE Transactions on Dependable and Secure Computing (TDSC), Mar 2021

2020

2020

  1. Application-Layer DDoS Defense with Reinforcement Learning
    Yebo Feng, Jun Li, and Thanh Nguyen
    In 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), Jun 2020
  2. Toward Explainable and Adaptable Detection and Classification of Distributed Denial-of-Service Attacks
    Yebo Feng, and Jun Li
    In 2020 KDD MLHat: The First International Workshop on Deployable Machine Learning for Security Defense, Jun 2020
  3. POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic
    Yebo Feng, Devkishen Sisodia, and Jun Li
    In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIACCS 2020) - poster paper, Jun 2020
  4. Towards Explicable and Adaptive DDoS Traffic Classification
    Yebo Feng, and Jun Li
    The 21st Passive and Active Measurement Conference (PAM) - poster paper, Mar 2020

2019

2019

  1. Towards Intelligent Defense against Application-Layer DDoS with Reinforcement Learning
    Yebo Feng
    Dec 2019
    Directed Research Project
  2. BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows
    Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu
    In 2019 IEEE Conference on Communications and Network Security (CNS), Jun 2019

2018

2018

  1. BotFlowMon: Identify Social Bot Traffic With NetFlow and Machine Learning
    Yebo Feng
    Jun 2018