Jiangshan Yu

Orcid: 0000-0001-8006-7392

According to our database1, Jiangshan Yu authored at least 95 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Modeling Mobile Crash in Byzantine Consensus.
IACR Cryptol. ePrint Arch., 2024

2023
Enhancing Blockchain Adoption through Tailored Software Engineering: An Industrial-grounded Study in Education Credentialing.
Distributed Ledger Technol. Res. Pract., December, 2023

SoK: DAG-based Blockchain Systems.
ACM Comput. Surv., December, 2023

A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023

CoopEdge+: Enabling Decentralized, Secure and Cooperative Multi-Access Edge Computing Based on Blockchain.
IEEE Trans. Parallel Distributed Syst., March, 2023

Machine translation-based fine-grained comments generation for solidity smart contracts.
Inf. Softw. Technol., 2023

Fair Delivery of Decentralised Randomness Beacon.
IACR Cryptol. ePrint Arch., 2023

The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading.
CoRR, 2023

Vivisecting the Dissection: On the Role of Trusted Components in BFT Protocols.
CoRR, 2023

New Bounds on the Accuracy of Majority Voting for Multi-Class Classification.
CoRR, 2023

TxAllo: Dynamic Transaction Allocation in Sharded Blockchain Systems.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

A Referable NFT Scheme.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Rational Ponzi Game in Algorithmic Stablecoin.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A First Dive into OFAC in DeFi Space.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

FTX Collapse: A Ponzi Story.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

Leveraging the Verifier's Dilemma to Double Spend in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2023

Fault Independence in Blockchain.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Analyzing the Performance of the Inter-Blockchain Communication Protocol.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Towards Scalable Cross-Chain Messaging.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2022

TICK: Tiny Client for Blockchains.
IEEE Internet Things J., 2022

MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2022

AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains.
IACR Cryptol. ePrint Arch., 2022

BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
IACR Cryptol. ePrint Arch., 2022

Garrison: A Novel Watchtower Scheme for Bitcoin.
IACR Cryptol. ePrint Arch., 2022

Daric: A Storage Efficient Payment Channel With Penalization Mechanism.
IACR Cryptol. ePrint Arch., 2022

A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022

Rational Ponzi Games in Algorithmic Stablecoin.
CoRR, 2022

Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things.
Comput. J., 2022

A Bytecode-based Approach for Smart Contract Classification.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Towards Accurate Knowledge Transfer between Transformer-based Models for Code Summarization.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

CVallet: A Blockchain-Oriented Application Development for Education and Recruitment.
Proceedings of the Network and System Security - 16th International Conference, 2022

Daric: A Storage Efficient Payment Channel with Punishment Mechanism.
Proceedings of the Information Security - 25th International Conference, 2022

DAMYSUS: streamlined BFT consensus leveraging trusted components.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

Blockchain-based Solutions for Education Credentialing System: Comparison and Implications for Future Development.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
Impact of Temporary Fork on the Evolution of Mining Pools in Blockchain Networks: An Evolutionary Game Analysis.
IEEE Trans. Netw. Sci. Eng., 2021

FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin.
IACR Cryptol. ePrint Arch., 2021

On the Security and Performance of Blockchain Sharding.
IACR Cryptol. ePrint Arch., 2021

Semantic Code Search for Smart Contracts.
CoRR, 2021

SolcTrans: Towards machine translation of Solidity smart contract source code.
CoRR, 2021

CoopEdge: A Decentralized Blockchain-based Platform for Cooperative Edge Computing.
Proceedings of the WWW '21: The Web Conference 2021, 2021

General Congestion Attack on HTLC-Based Payment Channel Networks.
Proceedings of the 3rd International Conference on Blockchain Economics, 2021

Characterizing the Impact of Network Delay on Bitcoin Mining.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Characterizing Blockchain Interoperability Systems from an Architecture Perspective.
Proceedings of the Science and Technologies for Smart Cities, 2021

Towards a Semantics-Based Search Engine for Smart Contract Information.
Proceedings of the Service-Oriented Computing - ICSOC 2021 Workshops, 2021

Analysis of transaction flooding attacks against Monero.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Verifiable Observation of Permissioned Ledgers.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

On the Shutdown Price of Blockchain Mining Machines.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

Evaluating Upgradable Smart Contract.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Towards Fair and Privacy-Preserving Federated Deep Models.
IEEE Trans. Parallel Distributed Syst., 2020

Bank run Payment Channel Networks.
IACR Cryptol. ePrint Arch., 2020

Analysing and Improving Shard Allocation Protocols for Sharded Blockchains.
IACR Cryptol. ePrint Arch., 2020

RandChain: Decentralised Randomness Beacon from Sequential Proof-of-Work.
IACR Cryptol. ePrint Arch., 2020

Analysing Mining Machine Shutdown Price.
IACR Cryptol. ePrint Arch., 2020

SoK: Diving into DAG-based Blockchain Systems.
CoRR, 2020

Game Theoretic Analysis of Reputation Approach on Block Withholding Attack.
Proceedings of the Network and System Security - 14th International Conference, 2020

Characterizing Erasable Accounts in Ethereum.
Proceedings of the Information Security - 23rd International Conference, 2020

Security Analysis on dBFT Protocol of NEO.
Proceedings of the Financial Cryptography and Data Security, 2020

VRF-Based Mining Simple Non-outsourceable Cryptocurrency Mining.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

2019
ANCHOR: Logically Centralized Security for Software-Defined Networks.
ACM Trans. Priv. Secur., 2019

RepuCoin: Your Reputation Is Your Power.
IEEE Trans. Computers, 2019

TICK: Tiny Client for Blockchains.
IACR Cryptol. ePrint Arch., 2019

Re-thinking untraceability in the CryptoNote-style blockchain.
IACR Cryptol. ePrint Arch., 2019

Sucker punch makes you richer: Rethinking Proof-of-Work security model.
IACR Cryptol. ePrint Arch., 2019

On the optionality and fairness of Atomic Swaps.
IACR Cryptol. ePrint Arch., 2019

FloodXMR: Low-cost transaction flooding attack with Monero's bulletproof protocol.
IACR Cryptol. ePrint Arch., 2019

Exploring the Monero Peer-to-Peer Network.
IACR Cryptol. ePrint Arch., 2019

Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey.
CoRR, 2019

Deconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure.
CoRR, 2019

Towards Fair and Decentralized Privacy-Preserving Deep Learning with Blockchain.
CoRR, 2019

Proof-of-QoS: QoS based blockchain consensus protocol.
Comput. Secur., 2019

Evaluating DAG-Based Blockchains for IoT.
Proceedings of the 18th IEEE International Conference On Trust, 2019

P3LS: Plausible Deniability for Practical Privacy-Preserving Live Streaming.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection.
Proceedings of the Provable Security, 2019

New Empirical Traceability Analysis of CryptoNote-Style Blockchains.
Proceedings of the Financial Cryptography and Data Security, 2019

Consolidating Hash Power in Blockchain Shards with a Forest.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Revocable and Linkable Ring Signature.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

On The Unforkability of Monero.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
DECIM: Detecting Endpoint Compromise In Messaging.
IEEE Trans. Inf. Forensics Secur., 2018

The KISS Principle in Software-Defined Networking: A Framework for Secure Communications.
IEEE Secur. Priv., 2018

Evaluating CryptoNote-Style Blockchains.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Authenticating compromisable storage systems.
IACR Cryptol. ePrint Arch., 2017

Evaluating web PKIs.
IACR Cryptol. ePrint Arch., 2017

Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.
IACR Cryptol. ePrint Arch., 2017

Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come.
Proceedings of the Security Protocols XXV, 2017

2016
Mitigating private key compromise.
PhD thesis, 2016

DTKI: A New Formalized PKI with Verifiable Trusted Parties.
Comput. J., 2016

2015
How to detect unauthorised usage of a key.
IACR Cryptol. ePrint Arch., 2015

Device Attacker Models: Fact and Fiction.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

2014
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation.
IEEE Trans. Inf. Forensics Secur., 2014

DTKI: a new formalized PKI with no trusted parties.
CoRR, 2014

2013
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks.
IEEE Trans. Ind. Informatics, 2013

2012
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012


  Loading...