default search action
Jiachi Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Zexu Wang, Jiachi Chen, Yanlin Wang, Yu Zhang, Weizhe Zhang, Zibin Zheng:
Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts. Proc. ACM Softw. Eng. 1(FSE): 161-181 (2024) - [j16]Wen Li, Lingfeng Bao, Jiachi Chen, John C. Grundy, Xin Xia, Xiaohu Yang:
Market Manipulation of Cryptocurrencies: Evidence from Social Media and Transaction Data. ACM Trans. Internet Techn. 24(2): 8:1-8:26 (2024) - [j15]Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, Mingxi Ye:
DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects. IEEE Trans. Software Eng. 50(6): 1360-1373 (2024) - [j14]Zewei Lin, Jiachi Chen, Jiajing Wu, Weizhe Zhang, Yongjuan Wang, Zibin Zheng:
CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts. IEEE Trans. Software Eng. 50(6): 1534-1547 (2024) - [c28]Mingyuan Huang, Jiachi Chen, Zigui Jiang, Zibin Zheng:
Revealing Hidden Threats: An Empirical Study of Library Misuse in Smart Contracts. ICSE 2024: 26:1-26:12 - [c27]Shuo Yang, Jiachi Chen, Mingyuan Huang, Zibin Zheng, Yuan Huang:
Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts. ICSE 2024: 128:1-128:12 - [c26]Jiashuo Zhang, Jiachi Chen, Zhiyuan Wan, Ting Chen, Jianbo Gao, Zhong Chen:
When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs. ICSE 2024: 164:1-164:13 - [c25]Shijian Chen, Jiachi Chen, Jiangshan Yu, Xiapu Luo, Yanlin Wang:
The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading. Internetware 2024 - [c24]Yifan Li, Ensheng Shi, Dewu Zheng, Kefeng Duan, Jiachi Chen, Yanlin Wang:
RepoMinCoder: Improving Repository-Level Code Generation Based on Information Loss Screening. Internetware 2024 - [c23]Zhiying Wu, Jiajing Wu, Hui Zhang, Ziwei Li, Jiachi Chen, Zibin Zheng, Qing Xia, Gang Fan, Yi Zhen:
DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3. ISSTA 2024: 137-148 - [c22]Lianghong Guo, Yanlin Wang, Ensheng Shi, Wanjun Zhong, Hongyu Zhang, Jiachi Chen, Ruikai Zhang, Yuchi Ma, Zibin Zheng:
When to Stop? Towards Efficient Code Generation in LLMs with Excess Token Prevention. ISSTA 2024: 1073-1085 - [c21]Jiachi Chen, Chong Chen, Jiang Hu, John C. Grundy, Yanlin Wang, Ting Chen, Zibin Zheng:
Identifying Smart Contract Security Issues in Code Snippets from Stack Overflow. ISSTA 2024: 1198-1210 - [c20]Shuwei Song, Jiachi Chen, Ting Chen, Xiapu Luo, Teng Li, Wenwu Yang, Leqing Wang, Weijie Zhang, Feng Luo, Zheyuan He, Yi Lu, Pan Li:
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis. ISSTA 2024: 1682-1694 - [i31]Yongkun Liu, Jiachi Chen, Tingting Bi, John C. Grundy, Yanlin Wang, Ting Chen, Yutian Tang, Zibin Zheng:
An Empirical Study on Low Code Programming using Traditional vs Large Language Model Support. CoRR abs/2402.01156 (2024) - [i30]Zexu Wang, Jiachi Chen, Zibin Zheng, Peilin Zheng, Yu Zhang, Weizhe Zhang:
Unity is Strength: Enhancing Precision in Reentrancy Vulnerability Detection of Smart Contract Analysis Tools. CoRR abs/2402.09094 (2024) - [i29]Zewei Lin, Jiachi Chen, Zibin Zheng, Jiajing Wu, Weizhe Zhang, Yongjuan Wang:
CRPWarner: Warning the Risk of Contract-related Rug Pull in DeFi Smart Contracts. CoRR abs/2403.01425 (2024) - [i28]Zexu Wang, Jiachi Chen, Yanlin Wang, Yu Zhang, Weizhe Zhang, Zibin Zheng:
Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts. CoRR abs/2403.11254 (2024) - [i27]Shuo Yang, Jiachi Chen, Mingyuan Huang, Zibin Zheng, Yuan Huang:
Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts. CoRR abs/2403.19112 (2024) - [i26]Jianzhong Su, Jiachi Chen, Zhiyuan Fang, Xingwei Lin, Yutian Tang, Zibin Zheng:
SmartOracle: Generating Smart Contract Oracle via Fine-Grained Invariant Detection. CoRR abs/2406.10054 (2024) - [i25]Yanlin Wang, Tianyue Jiang, Mingwei Liu, Jiachi Chen, Zibin Zheng:
Beyond Functional Correctness: Investigating Coding Style Inconsistencies in Large Language Models. CoRR abs/2407.00456 (2024) - [i24]Jiachi Chen, Chong Chen, Jiang Hu, John Grundy, Yanlin Wang, Ting Chen, Zibin Zheng:
Identifying Smart Contract Security Issues in Code Snippets from Stack Overflow. CoRR abs/2407.13271 (2024) - [i23]Yanlin Wang, Daya Guo, Jiachi Chen, Ruikai Zhang, Yuchi Ma, Zibin Zheng:
RLCoder: Reinforcement Learning for Repository-Level Code Completion. CoRR abs/2407.19487 (2024) - [i22]Lianghong Guo, Yanlin Wang, Ensheng Shi, Wanjun Zhong, Hongyu Zhang, Jiachi Chen, Ruikai Zhang, Yuchi Ma, Zibin Zheng:
When to Stop? Towards Efficient Code Generation in LLMs with Excess Token Prevention. CoRR abs/2407.20042 (2024) - [i21]Kaiwen Ning, Jiachi Chen, Qingyuan Zhong, Tao Zhang, Yanlin Wang, Wei Li, Yu Zhang, Weizhe Zhang, Zibin Zheng:
MCGMark: An Encodable and Robust Online Watermark for LLM-Generated Malicious Code. CoRR abs/2408.01354 (2024) - [i20]Jiashuo Zhang, Yiming Shen, Jiachi Chen, Jianzhong Su, Yanlin Wang, Ting Chen, Jianbo Gao, Zhong Chen:
Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts. CoRR abs/2408.04939 (2024) - [i19]Yanlin Wang, Lianghong Guo, Ensheng Shi, Wenqing Chen, Jiachi Chen, Wanjun Zhong, Menghan Wang, Hui Li, Hongyu Zhang, Ziyu Lyu, Zibin Zheng:
You Augment Me: Exploring ChatGPT-based Data Augmentation for Semantic Code Search. CoRR abs/2408.05542 (2024) - [i18]Shuo Yang, Xingwei Lin, Jiachi Chen, Qingyuan Zhong, Lei Xiao, Renke Huang, Yanlin Wang, Zibin Zheng:
Hyperion: Unveiling DApp Inconsistencies using LLM and Dataflow-Guided Symbolic Execution. CoRR abs/2408.06037 (2024) - 2023
- [j13]Zhou Liao, Shuwei Song, Hang Zhu, Xiapu Luo, Zheyuan He, Renkai Jiang, Ting Chen, Jiachi Chen, Tao Zhang, Xiaosong Zhang:
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts. IEEE Trans. Software Eng. 49(2): 777-801 (2023) - [j12]Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. IEEE Trans. Software Eng. 49(4): 1464-1486 (2023) - [j11]Yu Zhang, Jiachi Chen, Caijun Zhong, Hong Peng, Weidang Lu:
Active IRS-Assisted Integrated Sensing and Communication in C-RAN. IEEE Wirel. Commun. Lett. 12(3): 411-415 (2023) - [c19]Peilin Zheng, Bowei Su, Zigui Jiang, Changlin Yang, Jiachi Chen, Jiajing Wu:
Exploring Heterogeneous Decentralized Markets in DeFi and NFT on Ethereum Blockchain. CSCloud/EdgeCom 2023: 259-267 - [c18]Zibin Zheng, Neng Zhang, Jianzhong Su, Zhijie Zhong, Mingxi Ye, Jiachi Chen:
Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum. ICSE 2023: 295-306 - [c17]Yanlin Wang, Lianghong Guo, Ensheng Shi, Wenqing Chen, Jiachi Chen, Wanjun Zhong, Menghan Wang, Hui Li, Hongyu Zhang, Ziyu Lyu, Zibin Zheng:
You Augment Me: Exploring ChatGPT-based Data Augmentation for Semantic Code Search. ICSME 2023: 14-25 - [c16]Jiadong Wu, Yanlin Wang, Ruixin Wang, Jiachi Chen, Zibin Zheng:
Can Neural Networks Help Smart Contract Testing? An Empirical Study. Internetware 2023: 79-89 - [c15]Shuo Yang, Jiachi Chen, Zibin Zheng:
Definition and Detection of Defects in NFT Smart Contracts. ISSTA 2023: 373-384 - [c14]Queping Kong, Jiachi Chen, Yanlin Wang, Zigui Jiang, Zibin Zheng:
DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols. ISSTA 2023: 1144-1156 - [c13]Yifan Mo, Jiachi Chen, Yanlin Wang, Zibin Zheng:
Toward Automated Detecting Unanticipated Price Feed in Smart Contract. ISSTA 2023: 1257-1268 - [c12]Jianzhong Su, Xingwei Lin, Zhiyuan Fang, Zhirong Zhu, Jiachi Chen, Zibin Zheng, Wei Lv, Jiashui Wang:
DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities. ASE 2023: 1664-1675 - [c11]Chao Ni, Cong Tian, Kaiwen Yang, David Lo, Jiachi Chen, Xiaohu Yang:
Automatic Identification of Crash-inducing Smart Contracts. SANER 2023: 108-119 - [i17]Zibin Zheng, Neng Zhang, Jianzhong Su, Zhijie Zhong, Mingxi Ye, Jiachi Chen:
Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum. CoRR abs/2303.13770 (2023) - [i16]Renke Huang, Jiachi Chen, Yanlin Wang, Tingting Bi, Zibin Zheng:
An overview of Web3.0 Technology: Infrastructure, Applications, and Popularity. CoRR abs/2305.00427 (2023) - [i15]Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, Mingxi Ye:
DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects. CoRR abs/2305.08456 (2023) - [i14]Shuo Yang, Jiachi Chen, Zibin Zheng:
Definition and Detection of Defects in NFT Smart Contracts. CoRR abs/2305.15829 (2023) - [i13]Jiachi Chen, Mingyuan Huang, Zewei Lin, Peilin Zheng, Zibin Zheng:
To Healthier Ethereum: A Comprehensive and Iterative Smart Contract Weakness Enumeration. CoRR abs/2308.10227 (2023) - [i12]Zibin Zheng, Kaiwen Ning, Jiachi Chen, Yanlin Wang, Wenqing Chen, Lianghong Guo, Weicheng Wang:
Towards an Understanding of Large Language Models in Software Engineering Tasks. CoRR abs/2308.11396 (2023) - [i11]Chong Chen, Jianzhong Su, Jiachi Chen, Yanlin Wang, Tingting Bi, Yanli Wang, Xingwei Lin, Ting Chen, Zibin Zheng:
When ChatGPT Meets Smart Contract Vulnerability Detection: How Far Are We? CoRR abs/2309.05520 (2023) - [i10]Zibin Zheng, Kaiwen Ning, Yanlin Wang, Jingwen Zhang, Dewu Zheng, Mingxi Ye, Jiachi Chen:
A Survey of Large Language Models for Code: Evolution, Benchmarking, and Future Trends. CoRR abs/2311.10372 (2023) - [i9]Jiashuo Zhang, Jiachi Chen, Zhiyuan Wan, Ting Chen, Jianbo Gao, Zhong Chen:
When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs. CoRR abs/2312.09685 (2023) - [i8]Shijian Chen, Jiachi Chen, Jiangshan Yu, Xiapu Luo, Yanlin Wang, Zibin Zheng:
The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading. CoRR abs/2312.12544 (2023) - 2022
- [b1]Jiachi Chen:
Maintaining Ethereum Smart Contracts by Finding and Detecting Defects. Monash University, Australia, 2022 - [j10]Jiachi Chen, Xin Xia, David Lo, John C. Grundy:
Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum. ACM Trans. Softw. Eng. Methodol. 31(2): 30:1-30:37 (2022) - [j9]Jiachi Chen, Xin Xia, David Lo, John C. Grundy, Xiapu Luo, Ting Chen:
Defining Smart Contract Defects on Ethereum. IEEE Trans. Software Eng. 48(2): 327-345 (2022) - [j8]Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen:
DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. IEEE Trans. Software Eng. 48(7): 2189-2207 (2022) - [c10]Zhuo Zhang, Yan Lei, Meng Yan, Yue Yu, Jiachi Chen, Shangwen Wang, Xiaoguang Mao:
Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach. ASE 2022: 83:1-83:13 - 2021
- [j7]Jiachi Chen, Xin Xia, David Lo, John C. Grundy, Xiaohu Yang:
Maintenance-related concerns for post-deployed Ethereum smart contract development: issues, techniques, and future challenges. Empir. Softw. Eng. 26(6): 117 (2021) - [j6]Ting Chen, Youzheng Feng, Zihao Li, Hao Zhou, Xiapu Luo, Xiaoqi Li, Xiuzhuo Xiao, Jiachi Chen, Xiaosong Zhang:
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts. IEEE Trans. Emerg. Top. Comput. 9(3): 1433-1448 (2021) - [j5]Le Yu, Xiapu Luo, Jiachi Chen, Hao Zhou, Tao Zhang, Henry Chang, Hareton K. N. Leung:
PPChecker: Towards Accessing the Trustworthiness of Android Apps' Privacy Policies. IEEE Trans. Software Eng. 47(2): 221-242 (2021) - [j4]Tao Zhang, Jiachi Chen, Xian Zhan, Xiapu Luo, David Lo, He Jiang:
Where2Change: Change Request Localization for App Reviews. IEEE Trans. Software Eng. 47(11): 2590-2616 (2021) - [c9]Zhiyuan Wan, Xin Xia, David Lo, Jiachi Chen, Xiapu Luo, Xiaohu Yang:
Smart Contract Security: A Practitioners' Perspective: The Artifact of a Paper Accepted in the 43rd IEEE/ACM International Conference on Software Engineering (ICSE 2021). ICSE (Companion Volume) 2021: 227-228 - [c8]Zhiyuan Wan, Xin Xia, David Lo, Jiachi Chen, Xiapu Luo, Xiaohu Yang:
Smart Contract Security: a Practitioners' Perspective. ICSE 2021: 1410-1422 - [i7]Zhiyuan Wan, Xin Xia, David Lo, Jiachi Chen, Xiapu Luo, Xiaohu Yang:
Smart Contract Security: a Practitioners' Perspective. CoRR abs/2102.10963 (2021) - 2020
- [j3]Ting Chen, Zihao Li, Yuxiao Zhu, Jiachi Chen, Xiapu Luo, John Chi-Shing Lui, Xiaodong Lin, Xiaosong Zhang:
Understanding Ethereum via Graph Analysis. ACM Trans. Internet Techn. 20(2): 18:1-18:32 (2020) - [c7]Jiachi Chen:
Finding Ethereum Smart Contracts Security Issues by Comparing History Versions. ASE 2020: 1382-1384 - [i6]Jiachi Chen, Xin Xia, David Lo, John C. Grundy:
Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum. CoRR abs/2005.07908 (2020) - [i5]Jiachi Chen, Xin Xia, David Lo, John C. Grundy, Xiaohu Yang:
Maintaining Smart Contracts on Ethereum: Issues, Techniques, and Future Challenges. CoRR abs/2007.00286 (2020) - [i4]Jiachi Chen, Xin Xia, David Lo, John C. Grundy, Xiapu Luo, Ting Chen:
DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. CoRR abs/2009.02663 (2020) - [i3]Jiachi Chen:
Finding Ethereum Smart Contracts Security Issues by Comparing History Versions. CoRR abs/2010.02509 (2020)
2010 – 2019
- 2019
- [j2]Tao Zhang, Jiachi Chen, Xiapu Luo, Tao Li:
Bug Reports for Desktop Software and Mobile Apps in GitHub: What's the Difference? IEEE Softw. 36(1): 63-71 (2019) - [c6]Ting Chen, Teng Hu, Jiachi Chen, Xiaosong Zhang, Zihao Li, Yufei Zhang, Xiapu Luo, Ang Chen, Kun Yang, Bin Hu, Tong Zhu, Shifang Deng:
DataEther: Data Exploration Framework For Ethereum. ICDCS 2019: 1369-1380 - [i2]Jiachi Chen, Xin Xia, David Lo, John Grundy, Daniel Xiapu Luo, Ting Chen:
Domain Specific Code Smells in Smart Contracts. CoRR abs/1905.01467 (2019) - 2018
- [c5]Le Yu, Jiachi Chen, Hao Zhou, Xiapu Luo, Kang Liu:
Localizing Function Errors in Mobile Apps with User Reviews. DSN 2018: 418-429 - [c4]Ting Chen, Zihao Li, Hao Zhou, Jiachi Chen, Xiapu Luo, Xiaoqi Li, Xiaosong Zhang:
Towards saving money in using smart contracts. ICSE (NIER) 2018: 81-84 - [c3]Ting Chen, Yuxiao Zhu, Zihao Li, Jiachi Chen, Xiaoqi Li, Xiapu Luo, Xiaodong Lin, Xiaosong Zhang:
Understanding Ethereum via Graph Analysis. INFOCOM 2018: 1484-1492 - 2017
- [c2]Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. ISPEC 2017: 3-24 - [c1]Tao Zhang, Jiachi Chen, He Jiang, Xiapu Luo, Xin Xia:
Bug report enrichment with application of automated fixer recommendation. ICPC 2017: 230-240 - [i1]Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. CoRR abs/1712.06438 (2017) - 2016
- [j1]Tao Zhang, Jiachi Chen, Geunseok Yang, Byungjeong Lee, Xiapu Luo:
Towards more accurate severity prediction and fixer recommendation of software bugs. J. Syst. Softw. 117: 166-184 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint