Bio
I’m currently a second-year master student of cyberspace security at Xi’an Jiaotong University under the supervision of Prof.Haijun Wang. Previously, I received my Bachelor’s Degree in Automation from Xi’an Jiaotong University in 2023.
My current research interests are blockchain security
, and program analysis
.
If you are interested in what I’m learning recently, you can visit my personal website
Education
- Xi’an Jiaotong University
2023.9-Present
- Master in Cyberspace Security
- Adivsor:Prof. Haijun Wang
- Xi’an Jiaotong University
2019.9-2023.6
- B.S. in Automation(GPA 92+/100)
- Outstanding Undergraduate in ShannXi Province
Publications
H. Wang, Y. Hu, H. Wu, D. Liu, C. Peng, Y. Wu, M. Fan, T. Liu. Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts (CCF-A ASE2024)
Y. Wu, X. Xie, C. Peng, D. Liu, H. Wu, M. Fan, T. Liu, H. Wang. AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis (CCF-A ASE2024)
Y. Wu, H. Wang, Y. Zhang, X. Li, H. Wu, M. Fan, T. Liu. Business Compliance Detection of Smart Contracts in Electricity and Carbon Trading Scenarios (AISTA2024)
Honors & Awards
Honors:
- Outstanding graduates of Shaanxi Province
XJTU 2023
- Outstanding graduates of XJTU
XJTU 2023
- Xi an Jiaotong University first-class scholarship
XJTU 2020,2021,2022(TOP 3%)
- Merit student of Hefei
High school 2019
Awards:
- Second Price of National Mathematical Modeling Contest for Postgraduates at National Level
XJTU 2023.11
- Second Prize of National Mathematical Modeling Contest for Undergraduates at Provincial Level
XJTU 2021.11
- First Price of National Undergraduates Mathematics Competitions at Provincial Level
XJTU 2021.11
- First Price of National Undergraduates Mathematics Competitions at Provincial Level
XJTU 2020.11
Skills
English: CET-6 551
Programming language:Python, Solidity, Matlab, Latex
django, vue, docker, redis
Patent and Software copyright:
- Data element circulation method and related device based on blockchain (Patent, position: second)
- Smart Contract Vulnerability Detection Method and Related Devices Based on Key Parameter Identification (Patent, position: third)
- Real-time Monitoring Method and Related Devices for Blockchain Malicious Attack Based on Supervised Comparative Learning (Patent, position: second)
- Smart Contract Security Protection System (Software copyright, position: second)
- Data Privacy Trusted Computing Platform (Software copyright, position: third)