@inproceedings{sun2025eliminatingbackdoors,doi={10.1145/3715782},title={Eliminating Backdoors in Neural Code Models for Secure Code Understanding},author={Sun, Weisong and Chen, Yuchen and Fang, Chunrong and Feng, Yebo and Xiao, Yuan and Guo, An and Zhang, Quanjun and Chen, Zhenyu and Xu, Baowen and Liu, Yang},year={2025},month=jul,booktitle={2025 ACM International Conference on the Foundations of Software Engineering},url={https://doi.org/10.1145/3715782}}
@inproceedings{wang2025llms,author={Wang, Chong and Huang, Kaifeng and Zhang, Jian and Feng, Yebo and Zhang, Lyuye and Liu, Yang and Peng, Xin},booktitle={ 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE) },title={{ LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-based Code Completion }},year={2025},volume={},issn={1558-1225},pages={781-781},doi={10.1109/ICSE55347.2025.00245},url={https://doi.ieeecomputersociety.org/10.1109/ICSE55347.2025.00245},publisher={IEEE Computer Society},address={Los Alamitos, CA, USA},month=may}
@inproceedings{luo2024piercing,title={Piercing the Veil of TVL: DeFi Reappraised},author={Luo, Yichen and Feng, Yebo and Xu, Jiahua and Tasca, Paolo},year={2025},month=apr,booktitle={Financial Cryptography and Data Security 2025}}
@article{xu2025autogov,url={https://doi.org/10.1109/TSC.2025.3553700},author={Xu, Jiahua and Feng, Yebo and Perez, Daniel and Livshits, Benjamin},journal={IEEE Transactions on Services Computing},title={Auto.gov: Learning-based Governance for Decentralized Finance (DeFi)},year={2025},volume={},number={},pages={1-14},doi={10.1109/TSC.2025.3553700}}
@article{feng2024fgta,url={https://doi.org/10.1109/COMST.2025.3545541},author={Feng, Yebo and Li, Jun and Mirkovic, Jelena and Wu, Cong and Wang, Chong and Ren, Hao and Xu, Jiahua and Liu, Yang},journal={IEEE Communications Surveys & Tutorials},title={Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis},year={2025},volume={},number={},pages={1-1},doi={10.1109/COMST.2025.3545541}}
@article{wang2025tosem,author={Wang, Chong and Zhang, Jian and Feng, Yebo and Li, Tianlin and Sun, Weisong and Liu, Yang and Peng, Xin},title={Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation},year={2025},publisher={Association for Computing Machinery},address={New York, NY, USA},issn={1049-331X},url={https://doi.org/10.1145/3714462},doi={10.1145/3714462},journal={ACM Transactions on Software Engineering and Methodology},month=jan}
@misc{luo2025llmpoweredmultiagentautomatedcrypto,doi={10.48550/arXiv.2501.00826},title={LLM-Powered Multi-Agent System for Automated Crypto Portfolio Management},author={Luo, Yichen and Feng, Yebo and Xu, Jiahua and Tasca, Paolo and Liu, Yang},year={2025},month=jan,eprint={2501.00826},archiveprefix={arXiv},primaryclass={q-fin.TR},url={https://arxiv.org/abs/2501.00826}}
@article{fi17010007,author={Erinle, Yimika and Feng, Yebo and Xu, Jiahua and Vadgama, Nikhil and Tasca, Paolo},title={Shared-Custodial Wallet for Multi-Party Crypto-Asset Management},journal={Future Internet},volume={17},year={2025},number={1},article-number={7},url={https://www.mdpi.com/1999-5903/17/1/7},issn={1999-5903},doi={10.3390/fi17010007}}
@article{liu2024dynashard,author={Liu, Ao and Chen, Jing and He, Kun and Du, Ruiying and Xu, Jiahua and Wu, Cong and Feng, Yebo and Li, Teng and Ma, Jianfeng},journal={IEEE Internet of Things Journal},title={DYNASHARD: Secure and Adaptive Blockchain Sharding Protocol With Hybrid Consensus and Dynamic Shard Management},year={2024},volume={},number={},pages={1-1},month=nov,doi={10.1109/JIOT.2024.3490036}}
@misc{qiao2024slotprovenancedrivenaptdetection,doi={10.48550/arXiv.2410.17910},title={Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning},author={Qiao, Wei and Feng, Yebo and Li, Teng and Ma, Zhuo and Shen, Yulong and Ma, JianFeng and Liu, Yang},year={2024},month=oct,eprint={2410.17910},archiveprefix={arXiv},primaryclass={cs.CR},url={https://arxiv.org/abs/2410.17910}}
@article{liu2024heterosample,author={Liu, Ao and Chen, Jing and Du, Ruiying and Wu, Cong and Feng, Yebo and Li, Teng and Ma, Jianfeng},journal={IEEE Internet of Things Journal},title={HETEROSAMPLE: Meta-path Guided Sampling for Heterogeneous Graph Representation Learning},year={2024},volume={},number={},pages={1-1},month=oct,doi={10.1109/JIOT.2024.3484996}}
@inproceedings{li2024logparser,author={Li, Teng and Zhang, Shengkai and Feng, Yebo and Xu, Jiahua and Ma, Zhuo and Shen, Yulong and Ma, Jianfeng},booktitle={GLOBECOM 2024 - 2024 IEEE Global Communications Conference},title={Heuristic-based Parsing System for Big Data Log},year={2024},volume={},number={},pages={2329-2334},month=dec,doi={10.1109/GLOBECOM52923.2024.10901555}}
@inproceedings{xie2024defort,doi={10.1145/3650212.3652137},author={Xie, Maoyi and Hu, Ming and Kong, Ziqiao and Zhang, Cen and Feng, Yebo and Wang, Haijun and Xue, Yue and Zhang, Hao and Liu, Ye and Liu, Yang},title={DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications},year={2024},isbn={9798400706127},publisher={Association for Computing Machinery},address={New York, NY, USA},url={https://doi.org/10.1145/3650212.3652137},booktitle={Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis},pages={402-414},numpages={13},keywords={blockchain, decentralized finance (DeFi), price manipulation attack, smart contract},location={Vienna, Austria},month=sep,series={ISSTA 2024}}
@misc{guo2024benchmarkingzkfriendlyhashfunctions,doi={10.48550/arXiv.2409.01976},title={Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains},author={Guo, Hanze and Feng, Yebo and Wu, Cong and Li, Zengpeng and Xu, Jiahua},year={2024},eprint={2409.01976},archiveprefix={arXiv},primaryclass={cs.CR},url={https://arxiv.org/abs/2409.01976}}
@inproceedings{arora2024secplf,author={Arora, Sanidhay and Li, Yingjiu and Feng, Yebo and Xu, Jiahua},title={SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks},year={2024},month=jul,isbn={9798400704826},publisher={Association for Computing Machinery},address={New York, NY, USA},url={https://doi.org/10.1145/3634737.3637681},doi={10.1145/3634737.3637681},booktitle={Proceedings of the 19th ACM Asia Conference on Computer and Communications Security},pages={1394-1405},numpages={12},location={Singapore, Singapore},series={ASIA CCS '24}}
@article{ma2024ctomp,author={Ma, Chengyan and Xi, Ning and Lu, Di and Feng, Yebo and Ma, Jianfeng},date={2024/05/21},date-added={2024-05-31 13:36:14 +0800},date-modified={2024-05-31 13:36:14 +0800},isbn={1869-1919},journal={Science China Information Sciences},number={6},pages={162305},title={CToMP: a cycle-task-oriented memory protection scheme for unmanned systems},url={https://doi.org/10.1007/s11432-023-3865-0},doi={10.1007/s11432-023-3865-0},volume={67},year={2024},month=may,bdsk-url-1={https://doi.org/10.1007/s11432-023-3865-0}}
@misc{sun2024earpasssecureimplicitreceiver,doi={10.48550/arXiv.2404.15000},title={EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing},author={Sun, Xiping and Chen, Jing and He, Kun and He, Zhixiang and Du, Ruiying and Feng, Yebo and Zhao, Qingchuan and Wu, Cong},year={2024},month=apr,eprint={2404.15000},archiveprefix={arXiv},primaryclass={cs.CR},url={https://arxiv.org/abs/2404.15000}}
@misc{sun2024magliverobustvoiceliveness,doi={10.48550/arXiv.2404.01106},title={MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes},author={Sun, Xiping and Chen, Jing and Wu, Cong and He, Kun and Xu, Haozhe and Feng, Yebo and Du, Ruiying and Chen, Xianhao},year={2024},month=apr,eprint={2404.01106},archiveprefix={arXiv},primaryclass={cs.CR},url={https://arxiv.org/abs/2404.01106}}
@misc{han2024backdoors,doi={10.48550/arXiv.2403.03846},url={https://arxiv.org/abs/2403.03846},title={On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder},author={Han, Tingxu and Huang, Shenghan and Ding, Ziqi and Sun, Weisong and Feng, Yebo and Fang, Chunrong and Li, Jun and Qian, Hanwei and Wu, Cong and Zhang, Quanjun and Liu, Yang and Chen, Zhenyu},year={2024},eprint={2403.03846},archiveprefix={arXiv},primaryclass={cs.LG},month=mar}
@article{Gu_2024,title={CSIPose: Unveiling Body Pose Using Commodity WiFi Devices Through the Wall},url={http://dx.doi.org/10.36227/techrxiv.170775475.59127516/v1},doi={10.36227/techrxiv.170775475.59127516/v1},publisher={Institute of Electrical and Electronics Engineers (IEEE)},author={Gu, Yangyang and Chen, Jing and Wu, Cong and He, Kun and Jia, Ju and Feng, Yebo and Chen, Congrui and Du, Ruiying},year={2024},month=feb}
@misc{dahi2023automated,doi={10.48550/arXiv.2312.13749},url={https://arxiv.org/abs/2312.13749},title={Automated Market Maker on the XRP Ledger},author={Dahi, Firas and Hernandez, Walter and Feng, Yebo and Xu, Jiahua and Malhotra, Aanchal and Tasca, Paolo},year={2023},month=dec,eprint={2312.13749},archiveprefix={arXiv},primaryclass={cs.CE}}
@inproceedings{li2023drawbridge,author={Li, Jun and Sisodia, Devkishen and Feng, Yebo and Shi, Lumin and Zhang, Mingwei and Early, Christopher and Reiher, Peter},booktitle={2023 IEEE Conference on Communications and Network Security (CNS)},title={Toward Adaptive DDoS-Filtering Rule Generation},month=oct,year={2023},volume={},number={},pages={1-9},doi={10.1109/CNS59707.2023.10288699}}
@misc{erinle2023sok,doi={10.48550/arXiv.2307.12874},url={https://arxiv.org/abs/2307.12874},title={SoK: Design, Vulnerabilities, and Security Measures of Cryptocurrency Wallets},author={Erinle, Yimika and Kethepalli, Yathin and Feng, Yebo and Xu, Jiahua},year={2023},month=aug,publisher={arXiv},eprint={2307.12874}}
@article{yield2022xu,author={Xu, Jiahua and Feng, Yebo},journal={IEEE Transactions on Network and Service Management},title={Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols},year={2023},volume={20},number={1},pages={858-869},doi={10.1109/TNSM.2022.3222815}}
@article{xu2023ammsok,author={Xu, Jiahua and Paruch, Krzysztof and Cousaert, Simon and Feng, Yebo},title={SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols},year={2023},issue_date={November 2023},publisher={Association for Computing Machinery},address={New York, NY, USA},volume={55},number={11},issn={0360-0300},url={https://doi.org/10.1145/3570639},doi={10.1145/3570639},journal={ACM Computing Surveys},month=feb,articleno={238},numpages={50}}
@inproceedings{10.1145/3545948.3545973,author={Feng, Yebo and Li, Jun and Sisodia, Devkishen},title={CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic},year={2022},isbn={9781450397049},publisher={Association for Computing Machinery},address={New York, NY, USA},url={https://doi.org/10.1145/3545948.3545973},doi={10.1145/3545948.3545973},booktitle={Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)},pages={482–494},numpages={13},keywords={anomaly detection, cryptocurrency, cryptojacking, cryptomining, network traffic analysis},location={Limassol, Cyprus},series={RAID '22},month=oct}
@inproceedings{feng2022osnfp,author={Feng, Yebo and Luo, Jianzhen and Ma, Chengyan and Li, Teng and Hui, Liang},booktitle={2022 IEEE Global Communications Conference},title={I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network},year={2022},month=dec,volume={},number={},pages={6427-6432},doi={10.1109/GLOBECOM48099.2022.10001510}}
@article{feng2022ubri,author={Feng, Yebo and Xu, Jiahua and Weymouth, Lauren},journal={IEEE Potentials},title={University Blockchain Research Initiative (UBRI): Boosting blockchain education and research},year={2022},volume={41},number={6},pages={19-25},doi={10.1109/MPOT.2022.3198929}}
@article{9908579,author={Li, Teng and Yin, Siwei and Yu, Runze and Feng, Yebo and Jiao, Lei and Shen, Yulong and Ma, Jianfeng},journal={IEEE Journal on Selected Areas in Communications},title={{CoAvoid}: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases},year={2022},volume={40},number={11},pages={3191-3206},doi={10.1109/JSAC.2022.3211547}}
@misc{mirkovic2022measuring,doi={10.48550/ARXIV.2203.00742},url={https://arxiv.org/abs/2203.00742},author={Mirkovic, Jelena and Feng, Yebo and Li, Jun},keywords={Networking and Internet Architecture (cs.NI), Computers and Society (cs.CY), FOS: Computer and information sciences, FOS: Computer and information sciences},title={Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures},publisher={arXiv},year={2022},month=mar,copyright={arXiv.org perpetual, non-exclusive license}}
@techreport{AREA-202203-Feng,type={Area Exam},author={Feng, Yebo},title={Toward Finer Granularity Analysis of Network Traffic},school={College of Arts and Sciences, University of Oregon},month=mar,year={2022},url={https://www.cs.uoregon.edu/Reports/AREA-202203-Feng.pdf}}
@article{feng2021botflowmon,author={Feng, Yebo and Li, Jun and Jiao, Lei and Wu, Xintao},journal={IEEE Transactions on Dependable and Secure Computing (TDSC)},title={Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic},year={2021},volume={18},number={5},pages={2149-2163},doi={10.1109/TDSC.2020.3047399}}
@inproceedings{feng2020appddos,author={Feng, Yebo and Li, Jun and Nguyen, Thanh},booktitle={2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS)},title={Application-Layer {DDoS} Defense with Reinforcement Learning},year={2020},pages={1-10},doi={10.1109/IWQoS49365.2020.9213026},issn={1548-615X},month=jun,keywords={application-layer DDoS;distributed denial of service (DDoS);reinforcement learning;anomaly detection}}
@inproceedings{10.1007/978-3-030-59621-7_6,author={Feng, Yebo and Li, Jun},title={Toward Explainable and Adaptable Detection and Classification of Distributed Denial-of-Service Attacks},booktitle={2020 KDD MLHat: The First International Workshop on Deployable Machine Learning for Security Defense},year={2020},publisher={Springer International Publishing},address={Cham},pages={105--121},isbn={978-3-030-59621-7}}
@inproceedings{feng2020crypto,author={Feng, Yebo and Sisodia, Devkishen and Li, Jun},title={POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic},year={2020},isbn={9781450367509},publisher={Association for Computing Machinery},address={New York, NY, USA},url={https://doi.org/10.1145/3320269.3405440},doi={10.1145/3320269.3405440},booktitle={Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIACCS 2020) - poster paper},pages={907–909},numpages={3},keywords={anomaly detection, network traffic classification, cryptojacking},location={Taipei, Taiwan},series={ASIA CCS '20}}
@misc{DRP-201912-Feng,author={Feng, Yebo},title={Towards Intelligent Defense against Application-Layer {DDoS} with Reinforcement Learning},note={Directed Research Project},publisher={University of Oregon, Computer and Information Sciences Department},address={Eugene OR},month=dec,year={2019},howpublished={Available at \url{http://www.cs.uoregon.edu/Reports/DRP-201912-Feng.pdf} (2020/02/25)}}
@inproceedings{feng2019botflowmon,author={Feng, Yebo and Li, Jun and Jiao, Lei and Wu, Xintao},booktitle={2019 IEEE Conference on Communications and Network Security (CNS)},title={{BotFlowMon}: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows},year={2019},pages={169-177},keywords={online social network (OSN);OSN security;social bot;NetFlow data;OSN bot traffic;machine learning},doi={10.1109/CNS.2019.8802706},month=jun}
@article{feng2018botflowmon,title={{BotFlowMon}: Identify Social Bot Traffic With {NetFlow} and Machine Learning},author={Feng, Yebo},year={2018},month=jun,publisher={University of Oregon},url={http://hdl.handle.net/1794/23799}}