Lei Xu

Orcid: 0000-0002-7662-2119

Affiliations:
  • Kent State University, Department of Computer Science, OH, USA
  • University of Texas Rio Grande Valley, TX, USA
  • University of Houston, Department of Computer Science, TX, USA
  • Huawei Technologies Co Ltd., Beijing, China (2011 - 2013)
  • Chinese Academy of Sciences, Institute of Software, Beijing, China (PhD 2011)


According to our database1, Lei Xu authored at least 85 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DIaC: Re-Imagining Decentralized Infrastructure as Code Using Blockchain.
IEEE Trans. Netw. Serv. Manag., April, 2024

A Game Theoretical Analysis of Non-linear Blockchain System.
Distributed Ledger Technol. Res. Pract., March, 2024

Teaching Machines to Code: Smart Contract Translation with LLMs.
CoRR, 2024

StarSPA: Stride-Aware Sparsity Compression for Efficient CNN Acceleration.
IEEE Access, 2024

2023
Electoral manipulation via influence: probabilistic model.
Auton. Agents Multi Agent Syst., June, 2023

An Empirical Study of AI-based Smart Contract Creation.
CoRR, 2023

TPU as Cryptographic Accelerator.
CoRR, 2023

Cross Chain Bribery Contracts: Majority vs Mighty Minority.
CoRR, 2023

Decentralized Machine Learning Governance: Overview, Opportunities, and Challenges.
IEEE Access, 2023

Privacy-Preserving Object Detection with Veracruz.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

DeFaaS: Decentralized Function-as-a-Service for Emerging dApps and Web3.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

DHTee: Decentralized Infrastructure for Heterogeneous TEEs.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Decentralized Machine Learning Governance.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Who is Smarter? An Empirical Study of AI-Based Smart Contract Creation.
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper.
Proceedings of the Fifth ACM International Workshop on Blockchain-enabled Networked Sensor Systems, 2023

2022
Audit and Improve Robustness of Private Neural Networks on Encrypted Data.
CoRR, 2022

Local Differential Privacy Meets Computational Social Choice - Resilience under Voter Deletion.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Decentralized Application Infrastructures as Smart Contract Codes.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

How Hard is Bribery in Elections with Randomly Selected Voters.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

2021
Computational complexity characterization of protecting elections from bribery.
Theor. Comput. Sci., 2021

EDSC: An Event-Driven Smart Contract Platform.
CoRR, 2021

Reshaping the Landscape of the Future: Software-Defined Manufacturing.
Computer, 2021

A Secure and Flexible FPGA-Based Blockchain System for the IIoT.
Computer, 2021

Privacy preserving event based transaction system in a decentralized environment.
Proceedings of the Middleware '21: 22nd International Middleware Conference, Québec City, Canada, December 6, 2021

Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021

On Conditional Cryptocurrency With Privacy.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

New Gold Mine: Harvesting IoT Data Through DeFi in a Secure Manner.
Proceedings of the Blockchain - ICBC 2021, 2021

Hardness and Algorithms for Electoral Manipulation Under Media Influence.
Proceedings of the Frontiers of Algorithmics - International Joint Conference, 2021

An event driven framework for smart contract execution.
Proceedings of the 15th ACM International Conference on Distributed and Event-based Systems, 2021

2020
DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems.
IEEE Netw., 2020

Blockchain-based access control for enterprise blockchain applications.
Int. J. Netw. Manag., 2020

Nonlinear Blockchain Scalability: a Game-Theoretic Perspective.
CoRR, 2020

Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices.
IEEE Consumer Electron. Mag., 2020

Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement.
Proceedings of the 19th IEEE International Conference on Trust, 2020

FPGA based Blockchain System for Industrial IoT.
Proceedings of the 19th IEEE International Conference on Trust, 2020

PrivateEx: privacy preserving exchange of crypto-assets on blockchain.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

New Bounds on Augmenting Steps of Block-Structured Integer Programs.
Proceedings of the 28th Annual European Symposium on Algorithms, 2020

DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

2019
Private and Atomic Exchange of Assets over Zero Knowledge Based Payment Ledger.
CoRR, 2019

Cross Chain Bribery Contracts: Majority vs Mighty Minority.
Proceedings of the Highlights of Practical Applications of Survivable Agents and Multi-Agent Systems. The PAAMS Collection, 2019

Election with Bribe-Effect Uncertainty: A Dichotomy Result.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

DAcc: Decentralized Ledger based Access Control for Enterprise Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

FPGALedger: FPGA based Decentralized Ledger for Enterprise Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

KCRS: A Blockchain-Based Key Compromise Resilient Signature System.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

SafeDB: Spark Acceleration on FPGA Clouds with Enclaved Data Processing and Bitstream Protection.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment.
IEEE Trans. Cloud Comput., 2018

Efficient Public Blockchain Client for Lightweight Users.
EAI Endorsed Trans. Security Safety, 2018

CoC: A Unified Distributed Ledger Based Supply Chain Management System.
J. Comput. Sci. Technol., 2018

Tyranny of the Majority: On the (Im)possibility of Correctness of Smart Contracts.
IEEE Secur. Priv., 2018

FASTEN: An FPGA-Based Secure System for Big Data Processing.
IEEE Des. Test, 2018

On the Graver basis of block-structured integer programming.
CoRR, 2018

Blockchain-based Identity Management with Mobile Device.
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018

The Game Among Bribers in a Smart Contract System.
Proceedings of the Financial Cryptography and Data Security, 2018

Protecting Early Stage Proof-of-Work Based Public Blockchain.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Proving Conditional Termination for Smart Contracts.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

Protecting Election from Bribery: New Approach and Computational Complexity Characterization.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

2017
DL-BAC: Distributed Ledger Based Access Control for Web Applications.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

On Security Analysis of Proof-of-Elapsed-Time (PoET).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

EPBC: Efficient Public Blockchain Client for lightweight users.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017

Smart Contract Execution - the (+-)-Biased Ballot Problem.
Proceedings of the 28th International Symposium on Algorithms and Computation, 2017

Scalable Blockchain Based Smart Contract Execution.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

CoC: Secure Supply Chain Management System Based on Public Ledger.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications.
Proceedings of the Financial Cryptography and Data Security, 2017

Evaluating coherence-exploiting hardware Trojan.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

2016
MapReduce for Elliptic Curve Discrete Logarithm Problem.
Proceedings of the IEEE World Congress on Services, 2016

2015
Integrity Protection for Big Data Processing with Dynamic Redundancy Computation.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Another Look at Secure Big Data Processing: Formal Framework and a Potential Approach.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
LUT based secure cloud computing - An implementation using FPGAs.
Proceedings of the 2014 International Conference on ReConFigurable Computing and FPGAs, 2014

Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior.
Proceedings of the 6th International Conference on Mobile Computing, 2014

Removing the Root of Trust: Secure Oblivious Key Establishment for FPGAs.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

Seasoning effect based side channel attacks to AES implementation with phase change memory.
Proceedings of the HASP 2014, 2014

Privacy preserving large scale DNA read-mapping in MapReduce framework using FPGAs.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

Fault resilient physical neural networks on a single chip.
Proceedings of the 2014 International Conference on Compilers, 2014

PFC: Privacy Preserving FPGA Cloud - A Case Study of MapReduce.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Hub: heterogeneous bucketization for database outsourcing.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
ECDLP on GPU.
IACR Cryptol. ePrint Arch., 2011

Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Accelerating Inverse of <i>GF</i>(2<sup><i>n</i></sup>) with Precomputation.
Proceedings of the Information Security, 2010

Refinement of Miller's Algorithm Over Edwards Curves.
Proceedings of the Topics in Cryptology, 2010


  Loading...