Xiapu Luo
YOU?
Author Swipe
View article: Scaling Agents via Continual Pre-training
Scaling Agents via Continual Pre-training Open
Large language models (LLMs) have evolved into agentic systems capable of autonomous tool use and multi-step reasoning for complex problem-solving. However, post-training approaches building upon general-purpose foundation models consisten…
View article: A New Benchmark for Evaluating Code Translation with Third-Party Libraries
A New Benchmark for Evaluating Code Translation with Third-Party Libraries Open
In recent years, Large Language Models (LLMs) have been widely studied in the code translation field on the method, class, and even repository levels. However, most of these benchmarks are limited in terms of Third-Party Library (TPL) cate…
View article: Automated and Accurate Token Transfer Identification and Its Applications in Cryptocurrency Security
Automated and Accurate Token Transfer Identification and Its Applications in Cryptocurrency Security Open
Cryptocurrency tokens, implemented by smart contracts, are prime targets for attackers due to their substantial monetary value. To illicitly gain profit, attackers often embed malicious code or exploit vulnerabilities within token contract…
View article: Recasting Type Hints from WebAssembly Contracts
Recasting Type Hints from WebAssembly Contracts Open
WebAssembly has become the preferred smart contract format for various blockchain platforms due to its high portability and near-native execution speed. To effectively understand WebAssembly contracts, it is crucial to recover high-level t…
View article: RSMA-Enabled Covert Communications Against Multiple Spatially Random Wardens
RSMA-Enabled Covert Communications Against Multiple Spatially Random Wardens Open
This work investigates covert communication in a rate-splitting multiple access (RSMA)-based multi-user multiple-input single-output system, where the random locations of the wardens follow a homogeneous Poisson point process. To demonstra…
View article: Security Analysis and Formal Verification on Blockchain and its Applications
Security Analysis and Formal Verification on Blockchain and its Applications Open
Blockchains have become an integrated part of our finance infrastructures. Being monetary yet fully automated, blockchains and their applications are unanimously deemed impracticable before undergoing necessary verification. This monograph…
View article: Vehicular Intrusion Detection System for Controller Area Network: A Comprehensive Survey and Evaluation
Vehicular Intrusion Detection System for Controller Area Network: A Comprehensive Survey and Evaluation Open
The progress of automotive technologies has made cybersecurity a crucial focus, leading to various cyber attacks. These attacks primarily target the Controller Area Network (CAN) and specialized Electronic Control Units (ECUs). In order to…
View article: DreaMark: Rooting Watermark in Score Distillation Sampling Generated Neural Radiance Fields
DreaMark: Rooting Watermark in Score Distillation Sampling Generated Neural Radiance Fields Open
Recent advancements in text-to-3D generation can generate neural radiance fields (NeRFs) with score distillation sampling, enabling 3D asset creation without real-world data capture. With the rapid advancement in NeRF generation quality, p…
View article: Mesh Watermark Removal Attack and Mitigation: A Novel Perspective of Function Space
Mesh Watermark Removal Attack and Mitigation: A Novel Perspective of Function Space Open
Mesh watermark embeds secret messages in 3D meshes and decodes the message from watermarked meshes for ownership verification. Current watermarking methods directly hide secret messages in vertex and face sets of meshes. However, mesh is a…
View article: Modern DDoS Threats and Countermeasures: Insights into Emerging Attacks and Detection Strategies
Modern DDoS Threats and Countermeasures: Insights into Emerging Attacks and Detection Strategies Open
Distributed Denial of Service (DDoS) attacks persist as significant threats to online services and infrastructure, evolving rapidly in sophistication and eluding traditional detection mechanisms. This evolution demands a comprehensive exam…
View article: Phantom Events: Demystifying the Issues of Log Forgery in Blockchain
Phantom Events: Demystifying the Issues of Log Forgery in Blockchain Open
With the rapid development of blockchain technology, transaction logs play a central role in various applications, including decentralized exchanges, wallets, cross-chain bridges, and other third-party services. However, these logs, partic…
View article: "It Warned Me Just at the Right Moment": Exploring LLM-based Real-time Detection of Phone Scams
"It Warned Me Just at the Right Moment": Exploring LLM-based Real-time Detection of Phone Scams Open
Despite living in the era of the internet, phone-based scams remain one of the most prevalent forms of scams. These scams aim to exploit victims for financial gain, causing both monetary losses and psychological distress. While governments…
View article: Bones of Contention: Exploring Query-Efficient Attacks against Skeleton Recognition Systems
Bones of Contention: Exploring Query-Efficient Attacks against Skeleton Recognition Systems Open
Skeleton action recognition models have secured more attention than video-based ones in various applications due to privacy preservation and lower storage requirements. Skeleton data are typically transmitted to cloud servers for action re…
View article: Fine-tuning is Not Fine: Mitigating Backdoor Attacks in GNNs with Limited Clean Data
Fine-tuning is Not Fine: Mitigating Backdoor Attacks in GNNs with Limited Clean Data Open
Graph Neural Networks (GNNs) have achieved remarkable performance through their message-passing mechanism. However, recent studies have highlighted the vulnerability of GNNs to backdoor attacks, which can lead the model to misclassify grap…
View article: SecBench: A Comprehensive Multi-Dimensional Benchmarking Dataset for LLMs in Cybersecurity
SecBench: A Comprehensive Multi-Dimensional Benchmarking Dataset for LLMs in Cybersecurity Open
Evaluating Large Language Models (LLMs) is crucial for understanding their capabilities and limitations across various applications, including natural language processing and code generation. Existing benchmarks like MMLU, C-Eval, and Huma…
View article: DreaMark: Rooting Watermark in Score Distillation Sampling Generated Neural Radiance Fields
DreaMark: Rooting Watermark in Score Distillation Sampling Generated Neural Radiance Fields Open
Recent advancements in text-to-3D generation can generate neural radiance fields (NeRFs) with score distillation sampling, enabling 3D asset creation without real-world data capture. With the rapid advancement in NeRF generation quality, p…
View article: A First Look at Security and Privacy Risks in the RapidAPI Ecosystem
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem Open
With the emergence of the open API ecosystem, third-party developers can publish their APIs on the API marketplace, significantly facilitating the development of cutting-edge features and services. The RapidAPI platform is currently the la…
View article: <scp>fAmulet:</scp> Finding Finalization Failure Bugs in Polygon zkRollup
<span>fAmulet:</span> Finding Finalization Failure Bugs in Polygon zkRollup Open
Zero-knowledge layer 2 protocols emerge as a compelling approach to overcoming blockchain scalability issues by processing transactions through the transaction finalization process. During this process, transactions are efficiently process…