publications

2025

2025

  1. Eliminating Backdoors in Neural Code Models for Secure Code Understanding
    Weisong Sun, Yuchen Chen, Chunrong Fang, Yebo Feng, Yuan Xiao, An Guo, Quanjun Zhang, Zhenyu Chen, Baowen Xu, and Yang Liu
    In 2025 ACM International Conference on the Foundations of Software Engineering, Jul 2025
  2. LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-based Code Completion
    Chong Wang, Kaifeng Huang, Jian Zhang, Yebo Feng, Lyuye Zhang, Yang Liu, and Xin Peng
    In 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE) , May 2025
  3. Piercing the Veil of TVL: DeFi Reappraised
    Yichen Luo, Yebo Feng, Jiahua Xu, and Paolo Tasca
    In Financial Cryptography and Data Security 2025, Apr 2025
  4. Auto.gov: Learning-based Governance for Decentralized Finance (DeFi)
    Jiahua Xu, Yebo Feng, Daniel Perez, and Benjamin Livshits
    IEEE Transactions on Services Computing, Apr 2025
  5. Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis
    Yebo Feng, Jun Li, Jelena Mirkovic, Cong Wu, Chong Wang, Hao Ren, Jiahua Xu, and Yang Liu
    IEEE Communications Surveys & Tutorials, Apr 2025
  6. Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation
    Chong Wang, Jian Zhang, Yebo Feng, Tianlin Li, Weisong Sun, Yang Liu, and Xin Peng
    ACM Transactions on Software Engineering and Methodology, Jan 2025
  7. LLM-Powered Multi-Agent System for Automated Crypto Portfolio Management
    Yichen Luo, Yebo Feng, Jiahua Xu, Paolo Tasca, and Yang Liu
    Jan 2025
  8. Shared-Custodial Wallet for Multi-Party Crypto-Asset Management
    Yimika Erinle, Yebo Feng, Jiahua Xu, Nikhil Vadgama, and Paolo Tasca
    Future Internet, Jan 2025

2024

2024

  1. DYNASHARD: Secure and Adaptive Blockchain Sharding Protocol With Hybrid Consensus and Dynamic Shard Management
    Ao Liu, Jing Chen, Kun He, Ruiying Du, Jiahua Xu, Cong Wu, Yebo Feng, Teng Li, and Jianfeng Ma
    IEEE Internet of Things Journal, Nov 2024
  2. Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning
    Wei Qiao, Yebo Feng, Teng Li, Zhuo Ma, Yulong Shen, JianFeng Ma, and Yang Liu
    Oct 2024
  3. HETEROSAMPLE: Meta-path Guided Sampling for Heterogeneous Graph Representation Learning
    Ao Liu, Jing Chen, Ruiying Du, Cong Wu, Yebo Feng, Teng Li, and Jianfeng Ma
    IEEE Internet of Things Journal, Oct 2024
  4. Heuristic-based Parsing System for Big Data Log
    Teng Li, Shengkai Zhang, Yebo Feng, Jiahua Xu, Zhuo Ma, Yulong Shen, and Jianfeng Ma
    In GLOBECOM 2024 - 2024 IEEE Global Communications Conference, Dec 2024
  5. DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications
    Maoyi Xie, Ming Hu, Ziqiao Kong, Cen Zhang, Yebo Feng, Haijun Wang, Yue Xue, Hao Zhang, Ye Liu, and Yang Liu
    In Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, Sep 2024
  6. Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains
    Hanze Guo, Yebo Feng, Cong Wu, Zengpeng Li, and Jiahua Xu
    Sep 2024
  7. On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic
    Yebo Feng, Jun Li, Devkishen Sisodia, and Peter Reiher
    IEEE Transactions on Dependable and Secure Computing, Jul 2024
  8. SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks
    Sanidhay Arora, Yingjiu Li, Yebo Feng, and Jiahua Xu
    In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Jul 2024
  9. CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
    Chengyan Ma, Ning Xi, Di Lu, Yebo Feng, and Jianfeng Ma
    Science China Information Sciences, May 2024
  10. EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing
    Xiping Sun, Jing Chen, Kun He, Zhixiang He, Ruiying Du, Yebo Feng, Qingchuan Zhao, and Cong Wu
    Apr 2024
  11. MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes
    Xiping Sun, Jing Chen, Cong Wu, Kun He, Haozhe Xu, Yebo Feng, Ruiying Du, and Xianhao Chen
    Apr 2024
  12. On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder
    Tingxu Han, Shenghan Huang, Ziqi Ding, Weisong Sun, Yebo Feng, Chunrong Fang, Jun Li, Hanwei Qian, Cong Wu, Quanjun Zhang, Yang Liu, and Zhenyu Chen
    Mar 2024
  13. CSIPose: Unveiling Body Pose Using Commodity WiFi Devices Through the Wall
    Yangyang Gu, Jing Chen, Cong Wu, Kun He, Ju Jia, Yebo Feng, Congrui Chen, and Ruiying Du
    Feb 2024

2023

2023

  1. Automated Market Maker on the XRP Ledger
    Firas Dahi, Walter Hernandez, Yebo Feng, Jiahua Xu, Aanchal Malhotra, and Paolo Tasca
    Dec 2023
  2. Toward Adaptive DDoS-Filtering Rule Generation
    Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, and Peter Reiher
    In 2023 IEEE Conference on Communications and Network Security (CNS), Oct 2023
  3. SoK: Design, Vulnerabilities, and Security Measures of Cryptocurrency Wallets
    Yimika Erinle, Yathin Kethepalli, Yebo Feng, and Jiahua Xu
    Aug 2023
  4. Fine-Grained, Content-Agnostic Network Traffic Analysis for Malicious Activity Detection
    Yebo Feng
    University of Oregon, Jun 2023
    PhD Dissertation
  5. Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols
    Jiahua Xu, and Yebo Feng
    IEEE Transactions on Network and Service Management, Jun 2023
  6. SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols
    Jiahua Xu, Krzysztof Paruch, Simon Cousaert, and Yebo Feng
    ACM Computing Surveys, Feb 2023

2022

2022

  1. CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic
    Yebo Feng, Jun Li, and Devkishen Sisodia
    In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Oct 2022
  2. I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network
    Yebo Feng, Jianzhen Luo, Chengyan Ma, Teng Li, and Liang Hui
    In 2022 IEEE Global Communications Conference, Dec 2022
  3. University Blockchain Research Initiative (UBRI): Boosting blockchain education and research
    Yebo Feng, Jiahua Xu, and Lauren Weymouth
    IEEE Potentials, Dec 2022
  4. CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases
    Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, and Jianfeng Ma
    IEEE Journal on Selected Areas in Communications, Dec 2022
  5. Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures
    Jelena Mirkovic, Yebo Feng, and Jun Li
    Mar 2022
  6. Toward Finer Granularity Analysis of Network Traffic
    Yebo Feng
    Mar 2022

2021

2021

  1. Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic
    Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu
    IEEE Transactions on Dependable and Secure Computing (TDSC), Mar 2021

2020

2020

  1. Application-Layer DDoS Defense with Reinforcement Learning
    Yebo Feng, Jun Li, and Thanh Nguyen
    In 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), Jun 2020
  2. Toward Explainable and Adaptable Detection and Classification of Distributed Denial-of-Service Attacks
    Yebo Feng, and Jun Li
    In 2020 KDD MLHat: The First International Workshop on Deployable Machine Learning for Security Defense, Jun 2020
  3. POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic
    Yebo Feng, Devkishen Sisodia, and Jun Li
    In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIACCS 2020) - poster paper, Jun 2020
  4. Towards Explicable and Adaptive DDoS Traffic Classification
    Yebo Feng, and Jun Li
    The 21st Passive and Active Measurement Conference (PAM) - poster paper, Mar 2020

2019

2019

  1. Towards Intelligent Defense against Application-Layer DDoS with Reinforcement Learning
    Yebo Feng
    Dec 2019
    Directed Research Project
  2. BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows
    Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu
    In 2019 IEEE Conference on Communications and Network Security (CNS), Jun 2019

2018

2018

  1. BotFlowMon: Identify Social Bot Traffic With NetFlow and Machine Learning
    Yebo Feng
    Jun 2018