Ye Liu

ORCID: 0000-0001-6709-3721
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Cryptography and Data Security
  • Adversarial Robustness in Machine Learning
  • Computational Drug Discovery Methods
  • Higher Education and Teaching Methods
  • Software Testing and Debugging Techniques
  • FinTech, Crowdfunding, Digital Finance
  • Software Reliability and Analysis Research
  • Web Application Security Vulnerabilities
  • Artificial Intelligence in Law
  • Bioinformatics and Genomic Networks
  • Cloud Computing and Resource Management
  • Melanoma and MAPK Pathways
  • Cybercrime and Law Enforcement Studies
  • Digital Rights Management and Security
  • Auction Theory and Applications
  • Open Education and E-Learning
  • Digital and Cyber Forensics
  • Privacy-Preserving Technologies in Data
  • Law, Economics, and Judicial Systems
  • Participatory Visual Research Methods
  • Imbalanced Data Classification Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security

Nanyang Technological University
2020-2025

Donghua University
2020-2024

Singapore Management University
2024

Anhui University
2024

Zhoukou Normal University
2023

Philippine Christian University
2023

China Southern Power Grid (China)
2018-2023

Heilongjiang Bayi Agricultural University
2020

Beihang University
2014-2018

Northeastern University
2012

Decentralized cryptocurrencies feature the use of blockchain to transfer values among peers on networks without central agency. Smart contracts are programs running top consensus protocol enable people make agreements while minimizing trusts. Millions smart have been deployed in various decentralized applications. The security vulnerabilities within those pose significant threats their Indeed, many critical Ethereum platform caused huge financial losses users. In this work, we present...

10.1145/3238147.3238177 preprint EN 2018-08-20

Despite the high stakes involved in smart contracts, they are often developed an undisciplined manner, leaving security and reliability of blockchain transactions at risk. In this article, we introduce ContraMaster—an oracle-supported dynamic exploit generation framework for contracts. Existing approaches mutate only single transactions; ContraMaster exceeds these by mutating transaction sequences. uses data-flow, control-flow, contract state to guide its mutations. It then monitors...

10.1109/tdsc.2020.3037332 article EN IEEE Transactions on Dependable and Secure Computing 2020-11-11

Smart contracts deployed on permissionless blockchains, such as Ethereum, are accessible to any user in a trustless environment. Therefore, most smart contract applications implement access control policies protect their valuable assets from unauthorized accesses. A difficulty validating the conformance policies, i.e., whether implementation adheres expected behaviors, is lack of policy specifications. In this paper, we mine past transactions recover likely model, which can then be checked...

10.1145/3533767.3534372 article EN 2022-07-15

In this study, we investigate the effectiveness of entropic uncertainty relations (EURs) in discerning energy variation quantum batteries (QBs) modelled by battery-charger field presence bosonic and fermionic reservoirs. Our results suggest that extractable works (exergy ergotropy) have versatile characteristics different scenarios, resulting a complex relationship between tightness work. It is worth noting lower bound can be good indicator for conversion efficiency charging QBs....

10.1103/physreve.109.064103 article EN Physical review. E 2024-06-03

Decentralized Finance (DeFi) is a prominent application of smart contracts, representing novel financial paradigm in contrast to centralized finance. While DeFi applications are rapidly emerging on mainstream blockchain platforms, their quality varies greatly, presenting numerous challenges, particularly terms governance mechanisms. In this paper, we present comprehensive study issues applications. Initially, collected 3,165 academic papers and industry reports. After thorough screening,...

10.1145/3717062 article EN other-oa ACM Transactions on Software Engineering and Methodology 2025-02-13

Trusted Execution Environments (TEEs) isolate a special space within device's memory that is not accessible to the normal world (also known as Untrusted Environment), even when device compromised. Thus, developers can utilize TEEs provide strong security guarantees for their programs, making sensitive operations like encrypted data storage, fingerprint verification, and remote attestation protected from malicious attacks. Despite protections offered by TEEs, adapting existing programs...

10.48550/arxiv.2502.13379 preprint EN arXiv (Cornell University) 2025-02-18

Smart contracts are highly susceptible to manipulation attacks due the leakage of sensitive information. Addressing vulnerabilities is particularly challenging because they stem from inherent data confidentiality issues rather than straightforward implementation bugs. To tackle this by preventing information leakage, we present PartitionGPT, first LLM-driven approach that combines static analysis with in-context learning capabilities large language models (LLMs) partition smart into...

10.48550/arxiv.2502.14215 preprint EN arXiv (Cornell University) 2025-02-19

10.1109/saner64311.2025.00022 article EN 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) 2025-03-04

Unlike those on public permissionless blockchains, smart contracts enterprise permissioned blockchains are not limited by resource constraints, and therefore often larger more complex. Current testing analysis tools lack support for such contracts, which demonstrate stateful behaviors require special treatment in quality assurance. In this paper, we present a model-based platform, called ModCon, relying user-specified models to define test oracles, guide generation, measure adequacy. ModCon...

10.1145/3368089.3417939 article EN 2020-11-07

This article presents findings from approximately 150 users who created instructional projects using educational digital library resources. One hundred of these were teachers participating in professional development workshops on the topic libraries. Our iterative approach to tool and workshop implementation was based a framework that characterizes several input, output, process variables affecting dissemination such technologies contexts. Data sources involved mix qualitative quantitative...

10.1145/1065385.1065387 article EN 2005-06-07

Smart contracts are computer programs allowing users to define and execute transactions automatically on top of the blockchain platform. Many such smart can be viewed as games. A game-like contract accepts inputs from multiple participants, upon ending, derives an outcome while distributing assets according some predefined rules. Without clear understanding game rules, participants may suffer fraudulent advertisements financial losses. In this paper, we present a framework perform...

10.1145/3368089.3409740 article EN 2020-11-07

Smart contracts are self-executing computer programs deployed on blockchain to enable trustworthy exchange of value without the need a central authority. With absence documentation and specifications, routine tasks such as program understanding, maintenance, verification, validation, remain challenging for smart contracts. In this paper, we propose dynamic invariant detection tool, InvCon, Ethereum mitigate issue. The detected invariants can be used not only support reverse engineering...

10.1145/3551349.3559539 article EN 2022-10-10

An international association advancing the multidisciplinary study of informing systems. Founded in 1998, Informing Science Institute (ISI) is a global community academics shaping future science.

10.28945/421 article EN Interdisciplinary Journal of e-Skills and Lifelong Learning 2005-01-01

Most of the existing smart contract symbolic execution tools perform analysis on bytecode, which loses high-level semantic information presented in source code. This makes interactive tasks—such as visualization and debugging—extremely challenging, significantly limits tool usability. In this paper, we present SolSEE, a source-level engine for Solidity contracts. We describe design highlight its key features, demonstrate usages through Web-based user interface. SolSEE demonstrates advantages...

10.1145/3540250.3558923 article EN Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering 2022-11-07

With recent advances in large language models (LLMs), this paper explores the potential of leveraging state-of-the-art LLMs, such as GPT-4, to transfer existing human-written properties (e.g., those from Certora auditing reports) and automatically generate customized for unknown code. To end, we embed into a vector database retrieve reference property LLM-based in-context learning new prop- erty given While basic process is relatively straight- forward, ensuring that generated are (i)...

10.48550/arxiv.2405.02580 preprint EN arXiv (Cornell University) 2024-05-04

Huawei Fusion Insight Libr A (FI-MPPDB) is a petabyte scale enterprise analytics platform developed by the data-base group. It started as prototype more than five years ago, and now being used many customers over globe, including some of world's largest financial institutions. Our product direction enhancements have been mainly driven customer requirements in fast evolving Chinese market. This paper describes architecture FI-MPPDB its major enhancements. In particular, we focus on top four...

10.14778/3229863.3229870 article EN Proceedings of the VLDB Endowment 2018-08-01

Smart contracts are gaining popularity as a means to support transparent, traceable, and self-executing decentralized applications, which enable the exchange of value in trustless environment. Developers smart rely on various libraries, such OpenZeppelin for Solidity contracts, improve application quality reduce development costs. The API documentations these libraries important sources information developers who unfamiliar with APIs. Yet, maintaining high-quality is non-trivial, errors may...

10.1145/3551349.3556963 article EN 2022-10-10

Folk art is the essence condensed from daily life of working people in our country, and it one profound historical cultural deposits country.As a part heritage human beings, folk about people's emotions, thoughts, crystallization wisdom.There are many kinds around world with its own characteristics.It reflects living state emotional style different regions.In recent years, along impact modern civilization, trend on verge disappearance becoming more serious, although all levels departments...

10.26855/er.2023.06.015 article EN The Educational Review USA 2023-07-27

Decentralized Finance (DeFi) is a prominent application of smart contracts, representing novel financial paradigm in contrast to centralized finance. While DeFi applications are rapidly emerging on mainstream blockchain platforms, their quality varies greatly, presenting numerous challenges, particularly terms governance mechanisms. In this paper, we present comprehensive study issues applications. Drawing upon insights from industry reports and academic research articles, develop taxonomy...

10.48550/arxiv.2311.01433 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Smart contracts are susceptible to various security issues, among which access control (AC) vulnerabilities particularly critical. While existing research has proposed multiple detection tools, the automatic and appropriate repair of AC in smart remains a challenge. Unlike commonly supported vulnerability types by such as reentrancy, usually fixed template-based approaches, main obstacle lies identifying roles or permissions amid long list non-AC-related source code generate proper patch...

10.48550/arxiv.2403.06838 preprint EN arXiv (Cornell University) 2024-03-11

Smart contracts are computer programs running on blockchains to implement Decentralized Applications.The absence of contract specifications hinders routine tasks, such as understanding and testing. Inthis work, we propose a specification mining approach infer from past transactionhistories. Our derives high-level behavioral automata function invocations, accompanied byprogram invariants statistically inferred the transaction histories. We implemented our toolSmConand evaluated it eleven...

10.48550/arxiv.2403.13279 preprint EN arXiv (Cornell University) 2024-03-19

Smart contract transactions associated with security attacks often exhibit distinct behavioral patterns compared historical benign before the attacking events. While many runtime monitoring and guarding mechanisms have been proposed to validate invariants stop anomalous on fly, empirical effectiveness of used remains largely unexplored. In this paper, we studied 23 prevalent 8 categories, which are either deployed in high-profile protocols or endorsed by leading auditing firms experts. Using...

10.48550/arxiv.2404.14580 preprint EN arXiv (Cornell University) 2024-04-22
Coming Soon ...