Lei Wu
Lei Wu
Assistant Professor
Verified email at zju.edu.cn
Cited by
Cited by
The impact of vendor customizations on android security
L Wu, M Grace, Y Zhou, C Wu, X Jiang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Honeypot detection in advanced botnet attacks
P Wang, L Wu, R Cunningham, CC Zou
International Journal of Information and Computer Security 4 (1), 30-51, 2010
A systematic study on peer-to-peer botnets
P Wang, L Wu, B Aslam, CC Zou
2009 Proceedings of 18th International Conference on Computer Communications …, 2009
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
N He, L Wu, H Wang, Y Guo, X Jiang
The 24th International Conference on Financial Cryptography and Data …, 2020
Harvesting developer credentials in android apps
Y Zhou, L Wu, Z Wang, X Jiang
Proceedings of the 8th ACM conference on security & privacy in wireless and …, 2015
Hybrid user-level sandboxing of third-party android apps
Y Zhou, K Patel, L Wu, Z Wang, X Jiang
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
Characterizing eosio blockchain
Y Huang, H Wang, L Wu, G Tyson, X Luo, R Zhang, X Liu, G Huang, ...
arXiv preprint arXiv:2002.05369, 2020
Mobile App Squatting
Y Hu, H Wang, R He, L Li, G Tyson, I Castro, Y Guo, L Wu, G Xu
The Web Conference 2020 (WWW'20), 2020
Analysis of Peer-to-Peer botnet attacks and defenses
P Wang, L Wu, B Aslam, CC Zou
Propagation phenomena in real world networks, 183-214, 2015
Learning classifier system ensemble and compact rule set
Y Gao, JZ Huang, L Wu
Connection Science 19 (4), 321-337, 2007
Beyond the virus: A first look at coronavirus-themed mobile malware
L Wang, R He, H Wang, P Xia, Y Li, L Wu, Y Zhou, X Luo, Y Sui, Y Guo, ...
arXiv preprint arXiv:2005.14619, 2020
EVulHunter: detecting fake transfer vulnerabilities for EOSIO's smart contracts at Webassembly-level
L Quan, L Wu, H Wang
arXiv preprint arXiv:1906.10362, 2019
PwdIP-hash: A lightweight solution to phishing and pharming attacks
B Aslam, L Wu, CC Zou
2010 Ninth IEEE International Symposium on Network Computing and …, 2010
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem
D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren
Proceedings of the Ninth International Workshop on Security in Blockchain …, 2021
Understanding (mis) behavior on the eosio blockchain
Y Huang, H Wang, L Wu, G Tyson, X Luo, R Zhang, X Liu, G Huang, ...
Proceedings of the ACM on Measurement and Analysis of Computing Systems 4 (2 …, 2020
Security analysis of EOSIO smart contracts
N He, R Zhang, L Wu, H Wang, X Luo, Y Guo, T Yu, X Jiang
arXiv preprint arXiv:2003.06568, 2020
Synergistic toughening of polypropylene with ultra-high molecular weight polyethylene and elastomer-olefin block copolymers
L Qi, L Wu, R He, H Cheng, B Liu, X He
RSC advances 9 (41), 23994-24002, 2019
Characterizing cryptocurrency exchange scams
P Xia, H Wang, B Zhang, R Ji, B Gao, L Wu, X Luo, G Xu
Computers & Security 98, 101993, 2020
Automated deobfuscation of Android native binary code
Z Kan, H Wang, L Wu, Y Guo, DX Luo
arXiv preprint arXiv:1907.06828, 2019
Don't fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams
P Xia, H Wang, X Luo, L Wu, Y Zhou, G Bai, G Xu, G Huang, X Liu
arXiv preprint arXiv:2007.13639, 2020
The system can't perform the operation now. Try again later.
Articles 1–20