ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2012.01370
  4. Cited By
CLUE: Towards Discovering Locked Cryptocurrencies in Ethereum

CLUE: Towards Discovering Locked Cryptocurrencies in Ethereum

ACM Symposium on Applied Computing (SAC), 2020
2 December 2020
Xiaoqi Li
Ting Chen
Xiapu Luo
Chenxu Wang
ArXiv (abs)PDFHTML

Papers citing "CLUE: Towards Discovering Locked Cryptocurrencies in Ethereum"

18 / 18 papers shown
Immutable Digital Recognition via Blockchain
Immutable Digital Recognition via Blockchain
Zeng Zhang
Xiaoqi Li
206
0
0
26 Aug 2025
MoveScanner: Analysis of Security Risks of Move Smart Contracts
MoveScanner: Analysis of Security Risks of Move Smart Contracts
Yuhe Luo
Zhongwen Li
Xiaoqi Li
307
10
0
25 Aug 2025
Risk Assessment and Security Analysis of Large Language Models
Risk Assessment and Security Analysis of Large Language Models
Xiaoyan Zhang
Dongyang Lyu
Xiaoqi Li
218
7
0
24 Aug 2025
Security Analysis of ChatGPT: Threats and Privacy Risks
Security Analysis of ChatGPT: Threats and Privacy Risks
Yushan Xiang
Zhongwen Li
Xiaoqi Li
SILM
329
10
0
13 Aug 2025
Facial Recognition Leveraging Generative Adversarial Networks
Facial Recognition Leveraging Generative Adversarial Networks
Zhiyu Li
Zongwei Li
Xiaoqi Li
GAN
331
3
0
17 May 2025
Comparative Analysis of Blockchain Systems
Comparative Analysis of Blockchain Systems
Jiaqi Huang
Yuanzheng Niu
Xiaoqi Li
Zongwei Li
399
5
0
13 May 2025
Towards Understanding Deep Learning Model in Image Recognition via Coverage Test
Towards Understanding Deep Learning Model in Image Recognition via Coverage Test
Wenkai Li
Xiaoqi Li
Yingjie Mao
Yishun Wang
326
0
0
12 May 2025
A Comprehensive Study of Exploitable Patterns in Smart Contracts: From Vulnerability to Defense
A Comprehensive Study of Exploitable Patterns in Smart Contracts: From Vulnerability to Defense
Yuchen Ding
Hongli Peng
Xiaoqi Li
229
7
0
30 Apr 2025
Smart Contracts in the Real World: A Statistical Exploration of External Data Dependencies
Smart Contracts in the Real World: A Statistical Exploration of External Data Dependencies
Yishun Wang
Xiaoqi Li
Wenkai Li
Xin Wang
Ju Xing
377
30
0
19 Jun 2024
GasTrace: Detecting Sandwich Attack Malicious Accounts in Ethereum
GasTrace: Detecting Sandwich Attack Malicious Accounts in Ethereum
Zekai Liu
Xiaoqi Li
Hongli Peng
Wenkai Li
338
31
0
30 May 2024
DeFiTail: DeFi Protocol Inspection through Cross-Contract Execution
  Analysis
DeFiTail: DeFi Protocol Inspection through Cross-Contract Execution AnalysisThe Web Conference (WWW), 2024
Wenkai Li
Xiaoqi Li
Yuqing Zhang
Zongwei Li
322
31
0
17 May 2024
Characterizing the Solana NFT Ecosystem
Characterizing the Solana NFT Ecosystem
Dechao Kong
Xiaoqi Li
Wenkai Li
318
22
0
16 Mar 2024
Unveiling Wash Trading in Popular NFT Markets
Unveiling Wash Trading in Popular NFT MarketsThe Web Conference (WWW), 2024
Yuanzheng Niu
Xiaoqi Li
Hongli Peng
Wenkai Li
255
40
0
15 Mar 2024
An Overview of AI and Blockchain Integration for Privacy-Preserving
An Overview of AI and Blockchain Integration for Privacy-Preserving
Zongwei Li
D. Kong
Yuanzheng Niu
Hongli Peng
Xiaoqi Li
Wenkai Li
327
31
0
06 May 2023
Pre-deployment Analysis of Smart Contracts -- A Survey
Pre-deployment Analysis of Smart Contracts -- A Survey
Sundas Munir
Walid M. Taha
311
13
0
15 Jan 2023
AuthROS: Secure Data Sharing Among Robot Operating Systems Based on
  Ethereum
AuthROS: Secure Data Sharing Among Robot Operating Systems Based on EthereumInternational Conference on Software Quality, Reliability and Security (QRS), 2022
Shenhui Zhang
Wenkai Li
Xiaoqi Li
Boyi Liu
381
28
0
30 Aug 2022
A Survey of DeFi Security: Challenges and Opportunities
A Survey of DeFi Security: Challenges and OpportunitiesJournal of King Saud University: Computer and Information Sciences (JSUCIS), 2022
Wenkai Li
Jiuyang Bu
Xiaoqi Li
Hongli Peng
Yuanzheng Niu
Xianyi Chen
455
56
0
23 Jun 2022
Security Analysis of DeFi: Vulnerabilities, Attacks and Advances
Security Analysis of DeFi: Vulnerabilities, Attacks and AdvancesInternational Congress on Blockchain and Applications (ICBA), 2022
Wenkai Li
Jiuyang Bu
Xiaoqi Li
Xianyi Chen
264
29
0
19 May 2022
1
Page 1 of 1