Lei Fan

Affiliations:
  • Shanghai Jiao Tong University, Shanghai, China


According to our database1, Lei Fan authored at least 13 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability.
IACR Cryptol. ePrint Arch., 2021

2020
An Efficient and Robust Aggregation Algorithm for Learning Federated CNN.
Proceedings of the SPML 2020: 3rd International Conference on Signal Processing and Machine Learning, 2020

2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.
Proceedings of the Computer Security - ESORICS 2020, 2020

2018
A Generic Paradigm for Blockchain Design.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

A Binary Feature Extraction Based Data Provenance System Implemented on Flink Platform.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

2017
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake).
IACR Cryptol. ePrint Arch., 2017

TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2017

2016
Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power.
IACR Cryptol. ePrint Arch., 2016

2013
Implementing quasi-parallel breadth-first search in MapReduce for large-scale social network mining.
Proceedings of the Fifth International Conference on Computational Aspects of Social Networks, 2013

2008
Building network attack graph for alert causal correlation.
Comput. Secur., 2008

Behavior-Aware Role Based Trust Management.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2006
Cryptanalysis and improvement on Yang-Shieh authentication schemes.
Proceedings of the 2006 International Conference on Privacy, 2006

2004
Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004


  Loading...