Zhou Yu

ORCID: 0000-0001-5663-9178
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Spam and Phishing Detection
  • Cybercrime and Law Enforcement Studies
  • Crime, Illicit Activities, and Governance
  • Advanced machining processes and optimization
  • Industrial Vision Systems and Defect Detection
  • Network Security and Intrusion Detection
  • Advanced Machining and Optimization Techniques
  • Advanced Malware Detection Techniques
  • AI in Service Interactions
  • Topic Modeling
  • Data Quality and Management
  • Fault Detection and Control Systems
  • Immune Response and Inflammation
  • Probiotics and Fermented Foods
  • Big Data and Business Intelligence
  • User Authentication and Security Systems
  • Cryptography and Data Security
  • Metal Alloys Wear and Properties
  • Laser Material Processing Techniques
  • FinTech, Crowdfunding, Digital Finance
  • Speech and dialogue systems
  • Immunotherapy and Immune Responses
  • Digital Transformation in Industry
  • Internet Traffic Analysis and Secure E-voting

Beijing University of Posts and Telecommunications
2021-2023

Nanchang University
2021-2023

Columbia University
2023

Agency for Science, Technology and Research
2020-2021

The prosperity of the cryptocurrency ecosystem drives need for digital asset trading platforms. Beyond centralized exchanges (CEXs), decentralized (DEXs) are introduced to allow users trade without transferring custody their assets middlemen, thus eliminating security and privacy issues traditional CEX. Uniswap, as most prominent DEX, is continuing attract scammers, with fraudulent cryptocurrencies flooding in ecosystem. In this paper, we take first step detect characterize scam tokens on...

10.1145/3491051 article EN Proceedings of the ACM on Measurement and Analysis of Computing Systems 2021-12-14

DNS has often been criticized for inherent design flaws, which make the system vulnerable to attack. Further, domain names are not fully controlled by users, meaning that they can easily be taken down authorities and registrars. Due this, there have efforts build a decentralized name service gives greater control owners. The Ethereum Name Service (ENS) is major example. Yet, no existing work systematically studied this emerging system, particularly regarding security misbehavior. To address...

10.1145/3517745.3561469 article EN 2022-10-21

Gamma-aminobutyric acid (GABA) has positive effects on many physiological processes. Lactic bacterial production of GABA is a future trend. This study aimed to produce sodium-ion-free fermentation process for Levilactobacillus brevis CD0817. In this fermentation, both the seed and media used L-glutamic instead monosodium L-glutamate as substrate. We optimized key factors influencing formation, adopting Erlenmeyer flask fermentation. The values glucose, yeast extract, Tween 80, manganese ion,...

10.3390/metabo13050608 article EN cc-by Metabolites 2023-04-28

Due to the surging popularity of various cryptocurrencies in recent years, a large number browser extensions have been developed as portals access relevant services, such cryptocurrency exchanges and wallets. This has stimulated wild growth themed malicious that cause heavy financial losses users legitimate service providers. They shown their capability evading stringent vetting processes extension stores, highlighting lack understanding this emerging type malware our community. In work, we...

10.1145/3570603 article EN Proceedings of the ACM on Measurement and Analysis of Computing Systems 2022-12-01

Traditionally, there are two major limitations for machine learning (ML)-assisted manufacturing applications. First, it would require a tremendous amount of manual data annotations ML models. Second, models often learned offline and unable to capture the dynamism adapt changes over time. In this paper, we propose framework based on concept cognitive analytics with unsupervised health monitoring, anomaly detection predictive maintenance. The experimental results an industrial robot...

10.1109/iciea48937.2020.9248409 article EN 2020-11-09

The prosperity of the cryptocurrency ecosystem drives need for digital asset trading platforms. Beyond centralized exchanges (CEXs), decentralized (DEXs) are introduced to allow users trade without transferring custody their assets middlemen, thus eliminating security and privacy issues traditional CEX. Uniswap, as most prominent DEX, is continuing attract scammers, with fraudulent cryptocurrencies flooding in ecosystem. In this paper, we take first step detect characterize scam tokens on...

10.48550/arxiv.2109.00229 preprint EN other-oa arXiv (Cornell University) 2021-01-01

DNS has always been criticized for its inherent design flaws, making the system vulnerable to kinds of attacks. Besides, domain names are not fully controlled by users, which can be easily taken down authorities and registrars. Since blockchain unique properties like immutability decentralization, it seems promising build a decentralized name service on blockchain. Ethereum Name Service (ENS), as novel built atop Etheruem, received great attention from community. Yet, no existing work...

10.48550/arxiv.2104.05185 preprint EN other-oa arXiv (Cornell University) 2021-01-01

The prosperity of the cryptocurrency ecosystem drives need for digital asset trading platforms. Uniswap, as most prominent decentralized exchange (DEX), is continuing to attract scammers, with fraudulent cryptocurrencies flooding in ecosystem. In this paper, we take first step detect and characterize scam tokens on Uniswap. We investigate landscape Uniswap from different perspectives based its transactions. Then, propose an accurate approach flagging have identified over 10K listed which...

10.1145/3489048.3522636 article EN 2022-06-02

In advanced manufacturing industries, there is a need to monitor the health of tools with aim enhancing its lifetime. Often due several reasons such as cost and time, many organizations are faced difficulty in collecting complete degradation data for monitoring tool. As such, this makes tool wear prognostics challenging problem real world. Although have been number studies on prognosis, where unavailable still challenge. This paper presents framework prognosis when limited. First, we present...

10.1109/tencon.2019.8929526 article EN TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON) 2019-10-01

In advanced manufacturing, the tool quality is critical to ensure product quality, and thus needs be closely monitored. However, directly measuring can time-consuming impractical for continuous manufacturing. this work, leveraging on Internet of Things (IoT) infrastructure machine learning techniques, two important metrics turning machinery tools, namely surface roughness flank wear, are modeled using easily available sensory data from machines, including vibration data, force cutting...

10.1109/icphm49022.2020.9187056 article EN 2020-06-01

Due to the surging popularity of various cryptocurrencies in recent years, a large number browser extensions have been developed as portals access relevant services, such cryptocurrency exchanges and wallets. This has stimulated wild growth cryptocurrency-themed malicious that cause heavy financial losses users legitimate service providers. They shown their capability evading stringent vetting processes extension stores, highlighting lack understanding this emerging type malware our...

10.1145/3578338.3593529 article EN 2023-06-14

Due to the surging popularity of various cryptocurrencies in recent years, a large number browser extensions have been developed as portals access relevant services, such cryptocurrency exchanges and wallets. This has stimulated wild growth cryptocurrency-themed malicious that cause heavy financial losses users legitimate service providers. They shown their capability evading stringent vetting processes extension stores, highlighting lack understanding this emerging type malware our...

10.1145/3606376.3593529 article EN ACM SIGMETRICS Performance Evaluation Review 2023-06-26

The rapid growth of Decentralized Finance (DeFi) boosts the blockchain ecosystem. At same time, attacks on DeFi applications (apps) are increasing. However, to best our knowledge, existing smart contract vulnerability detection tools cannot directly detect attacks. That's because they lack capability recover and understand high-level semantics, e.g., a user trades token pair <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">X</monospace>...

10.1109/tdsc.2023.3346888 article EN IEEE Transactions on Dependable and Secure Computing 2023-12-25

The prosperity of the cryptocurrency ecosystem drives need for digital asset trading platforms. Uniswap, as most prominent decentralized exchange (DEX), is continuing to attract scammers, with fraudulent cryptocurrencies flooding in ecosystem. In this paper, we take first step detect and characterize scam tokens on Uniswap. We investigate landscape Uniswap from different perspectives based its transactions. Then, propose an accurate approach flagging have identified over 10K listed which...

10.1145/3547353.3522636 article EN ACM SIGMETRICS Performance Evaluation Review 2022-06-20

Maintaining a consistent persona is key quality for any open domain dialogue system. Current state-of-the-art systems do this by training agents with supervised learning or online reinforcement (RL). However, trained often lack consistency as they are never punished uttering contradictions. Additional RL can alleviate some of these issues, however the process expensive. Instead, we propose an offline framework to improve systems. Our allows us combine advantages previous methods...

10.48550/arxiv.2310.10735 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Maintaining a consistent persona is key quality for any open domain dialogue system. Current state-of-the-art systems do this by training agents with supervised learning or online reinforcement (RL). However, trained often lack consistency as they are never punished uttering contradictions. Additional RL can alleviate some of these issues, however the process expensive. Instead, we propose an offline framework to improve systems. Our allows us combine advantages previous methods...

10.18653/v1/2023.emnlp-main.110 article EN cc-by Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing 2023-01-01

The research of location privacy protection has a very important significance for the emergence and sustenance web-based communities in big data era. method differential position is model strictly measurement privacy. However, under multi-positions, it will bring much bigger errors by adopting adding noise to protect multi-positions. In this paper, author puts forward new multi-positions based on mechanism centroid positions compares with independent noise. experiment shows that better than...

10.1504/ijwbc.2021.112855 article EN International Journal of Web Based Communities 2021-01-01
Coming Soon ...