Qi Chai

According to our database1, Qi Chai authored at least 22 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MoCA: Incorporating domain pretraining and cross attention for textbook question answering.
Pattern Recognit., August, 2023

Connecting Smart Devices to Smart Contracts with W3bstream.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

2022
Weakly Supervised Learning for Textbook Question Answering.
IEEE Trans. Image Process., 2022

2021
MoCA: Incorporating Multi-stage Domain Pretraining and Cross-guided Multimodal Attention for Textbook Question Answering.
CoRR, 2021

New Gold Mine: Harvesting IoT Data Through DeFi in a Secure Manner.
Proceedings of the Blockchain - ICBC 2021, 2021

2020
Decentralized IoT Data Authorization with Pebble Tracker.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System.
Proceedings of the Security and Privacy in Communication Networks, 2020

MULTAV: A Multi-chain Token Backed Voting Framework for Decentralized Blockchain Governance.
Proceedings of the Blockchain - ICBC 2020, 2020

DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

EMS: An Extensible and Modular Staking Architecture for Proof-of-Stake Systems.
Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, 2020

2018
Roll-DPoS: A Randomized Delegated Proof of Stake Scheme for Scalable Blockchain-Based Internet of Things Systems.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

2012
Design and Analysis of Security Schemes for Low-cost RFID Systems.
PhD thesis, 2012

A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis.
IACR Cryptol. ePrint Arch., 2012

How to develop clairaudience - active eavesdropping in passive RFID systems.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers.
Proceedings of IEEE International Conference on Communications, 2012

2011
On the (in)security of two Joint Encryption and Error Correction schemes.
Int. J. Secur. Networks, 2011

An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2.
IACR Cryptol. ePrint Arch., 2011

BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes.
Proceedings of the Global Communications Conference, 2011

Tag Impersonation Attack on Two RFID Mutual Authentication Protocols.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Physical layer assisted authentication for distributed ad hoc wireless sensor networks.
IET Inf. Secur., 2010

A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication.
Proceedings of the Global Communications Conference, 2010


  Loading...