Weidong Shi

Orcid: 0000-0002-1994-4218

According to our database1, Weidong Shi authored at least 163 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DIaC: Re-Imagining Decentralized Infrastructure as Code Using Blockchain.
IEEE Trans. Netw. Serv. Manag., April, 2024

A Game Theoretical Analysis of Non-linear Blockchain System.
Distributed Ledger Technol. Res. Pract., March, 2024

LookALike: Human Mimicry based collaborative decision making.
CoRR, 2024

Comparing Rationality Between Large Language Models and Humans: Insights and Open Questions.
CoRR, 2024

Teaching Machines to Code: Smart Contract Translation with LLMs.
CoRR, 2024

StarSPA: Stride-Aware Sparsity Compression for Efficient CNN Acceleration.
IEEE Access, 2024

Decentralized FaaS over Multi-Clouds with Blockchain based Management for Supporting Emerging Applications.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

SolMover: Smart Contract Code Translation Based on Concepts.
Proceedings of the 1st ACM International Conference on AI-Powered Software, 2024

2023
Electoral manipulation via influence: probabilistic model.
Auton. Agents Multi Agent Syst., June, 2023

An Empirical Study of AI-based Smart Contract Creation.
CoRR, 2023

TPU as Cryptographic Accelerator.
CoRR, 2023

Cross Chain Bribery Contracts: Majority vs Mighty Minority.
CoRR, 2023

Decentralized Machine Learning Governance: Overview, Opportunities, and Challenges.
IEEE Access, 2023

DeFaaS: Decentralized Function-as-a-Service for Emerging dApps and Web3.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

DHTee: Decentralized Infrastructure for Heterogeneous TEEs.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Enhancing IoT Flow Anomaly Detection with Differential Optimal Feature Subspace.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Who is Smarter? An Empirical Study of AI-Based Smart Contract Creation.
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023

2022
A CAM-Guided Parameter-Free Attention Network for Person Re-Identification.
IEEE Signal Process. Lett., 2022

Detecting Conspiracy Theory Against COVID-19 Vaccines.
CoRR, 2022

Audit and Improve Robustness of Private Neural Networks on Encrypted Data.
CoRR, 2022

Counter Hate Speech in Social Media: A Survey.
CoRR, 2022

VAC-Net: Visual Attention Consistency Network for Person Re-identification.
Proceedings of the ICMR '22: International Conference on Multimedia Retrieval, Newark, NJ, USA, June 27, 2022

Local Differential Privacy Meets Computational Social Choice - Resilience under Voter Deletion.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Detecting Hate Speech Against Athletes in Social Media.
Proceedings of the 3rd International Conference on Intelligent Data Science Technologies and Applications, 2022

Decentralized Application Infrastructures as Smart Contract Codes.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

A light and efficient attention model for 3D shape part-segmentation.
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022

RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries.
Proceedings of the IEEE International Conference on Big Data, 2022

How Hard is Bribery in Elections with Randomly Selected Voters.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

2021
Computational complexity characterization of protecting elections from bribery.
Theor. Comput. Sci., 2021

Particle image velocimetry measurement of flow fields in a mixed-flow pump with non-uniform tip clearance.
J. Vis., 2021

Statistical Analysis of Perspective Scores on Hate Speech Detection.
CoRR, 2021

EDSC: An Event-Driven Smart Contract Platform.
CoRR, 2021

Reshaping the Landscape of the Future: Software-Defined Manufacturing.
Computer, 2021

A Secure and Flexible FPGA-Based Blockchain System for the IIoT.
Computer, 2021

Hate Speech Detection in Clubhouse.
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2021

Privacy preserving event based transaction system in a decentralized environment.
Proceedings of the Middleware '21: 22nd International Middleware Conference, Québec City, Canada, December 6, 2021

Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021

On Conditional Cryptocurrency With Privacy.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Demystifying Pythia: A Survey of ChainLink Oracles Usage on Ethereum.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Hardness and Algorithms for Electoral Manipulation Under Media Influence.
Proceedings of the Frontiers of Algorithmics - International Joint Conference, 2021

Poisoning Attacks via Generative Adversarial Text to Image Synthesis.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

An event driven framework for smart contract execution.
Proceedings of the 15th ACM International Conference on Distributed and Event-based Systems, 2021

Cross-Concatenation: Tackling Uncertainty in Imbalanced Big Data Classification.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
SAMAF: Sequence-to-sequence Autoencoder Model for Audio Fingerprinting.
ACM Trans. Multim. Comput. Commun. Appl., 2020

DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems.
IEEE Netw., 2020

Multi-level and multi-scale horizontal pooling network for person re-identification.
Multim. Tools Appl., 2020

A level-set immersed interface method for simulating the electrohydrodynamics.
J. Comput. Phys., 2020

Blockchain in global supply chains and cross border trade: a critical synthesis of the state-of-the-art, challenges and opportunities.
Int. J. Prod. Res., 2020

ProxylessKD: Direct Knowledge Distillation with Inherited Classifier for Face Recognition.
CoRR, 2020

Towards Stable Imbalanced Data Classification via Virtual Big Data Projection.
CoRR, 2020

Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack.
CoRR, 2020

One-Shot GAN Generated Fake Face Detection.
CoRR, 2020

Deep Synthetic Minority Over-Sampling Technique.
CoRR, 2020

Hybrid Cryptocurrency Pump and Dump Detection.
CoRR, 2020

Algebraic multigrid block preconditioning for multi-group radiation diffusion equations.
CoRR, 2020

Nonlinear Blockchain Scalability: a Game-Theoretic Perspective.
CoRR, 2020

Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices.
IEEE Consumer Electron. Mag., 2020

Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement.
Proceedings of the 19th IEEE International Conference on Trust, 2020

FPGA based Blockchain System for Industrial IoT.
Proceedings of the 19th IEEE International Conference on Trust, 2020

PrivateEx: privacy preserving exchange of crypto-assets on blockchain.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Scale-Invariant Siamese Network For Person Re-Identification.
Proceedings of the IEEE International Conference on Image Processing, 2020

New Bounds on Augmenting Steps of Block-Structured Integer Programs.
Proceedings of the 28th Annual European Symposium on Algorithms, 2020

DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

Privacy Preserving Proxy for Machine Learning as a Service.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Private and Atomic Exchange of Assets over Zero Knowledge Based Payment Ledger.
CoRR, 2019

Cross Chain Bribery Contracts: Majority vs Mighty Minority.
Proceedings of the Highlights of Practical Applications of Survivable Agents and Multi-Agent Systems. The PAAMS Collection, 2019

Election with Bribe-Effect Uncertainty: A Dichotomy Result.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Dual Reverse Attention Networks for Person Re-Identification.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

FPGALedger: FPGA based Decentralized Ledger for Enterprise Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

KCRS: A Blockchain-Based Key Compromise Resilient Signature System.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

Virtual Big Data for GAN Based Data Augmentation.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

SafeDB: Spark Acceleration on FPGA Clouds with Enclaved Data Processing and Bitstream Protection.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
Accelerated bulk memory operations on heterogeneous multi-core systems.
J. Supercomput., 2018

Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment.
IEEE Trans. Cloud Comput., 2018

Efficient Public Blockchain Client for Lightweight Users.
EAI Endorsed Trans. Security Safety, 2018

Defending a cyber system with early warning mechanism.
Reliab. Eng. Syst. Saf., 2018

CoC: A Unified Distributed Ledger Based Supply Chain Management System.
J. Comput. Sci. Technol., 2018

A level-set method for two-phase flows with soluble surfactant.
J. Comput. Phys., 2018

Tyranny of the Majority: On the (Im)possibility of Correctness of Smart Contracts.
IEEE Secur. Priv., 2018

FASTEN: An FPGA-Based Secure System for Big Data Processing.
IEEE Des. Test, 2018

Toward Efficient Breast Cancer Diagnosis and Survival Prediction Using L-Perceptron.
CoRR, 2018

Next Generation of Star Patterns.
CoRR, 2018

On the Graver basis of block-structured integer programming.
CoRR, 2018

Blockchain-based Identity Management with Mobile Device.
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018

A comparison study of intel SGX and AMD memory encryption technology.
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018

The Game Among Bribers in a Smart Contract System.
Proceedings of the Financial Cryptography and Data Security, 2018

Protecting Early Stage Proof-of-Work Based Public Blockchain.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Proving Conditional Termination for Smart Contracts.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

Protecting Election from Bribery: New Approach and Computational Complexity Characterization.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

2017
DL-BAC: Distributed Ledger Based Access Control for Web Applications.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Failure Analysis for Distributed Computing Environments.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

On Security Analysis of Proof-of-Elapsed-Time (PoET).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

EPBC: Efficient Public Blockchain Client for lightweight users.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017

Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments.
Proceedings of the Hardware and Architectural Support for Security and Privacy, 2017

Smart Contract Execution - the (+-)-Biased Ballot Problem.
Proceedings of the 28th International Symposium on Algorithms and Computation, 2017

Scalable Blockchain Based Smart Contract Execution.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

CoC: Secure Supply Chain Management System Based on Public Ledger.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications.
Proceedings of the Financial Cryptography and Data Security, 2017

Evaluating coherence-exploiting hardware Trojan.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

Performance Analytics for Scientific Distributed Computing Environments.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

Modeling Instability for Large Scale Processing Tasks Within HEP Distributed Computing Environments.
Proceedings of the Advances on P2P, 2017

2016
MapReduce for Elliptic Curve Discrete Logarithm Problem.
Proceedings of the IEEE World Congress on Services, 2016

2015
Integrity Protection for Big Data Processing with Dynamic Redundancy Computation.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Scalable 3D Facial Shape Motion Retrieval from Image Sequences Using a Map-Reduce Framework.
Proceedings of the 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015, 2015

Another Look at Secure Big Data Processing: Formal Framework and a Potential Approach.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Mobile User Authentication Using Statistical Touch Dynamics Images.
IEEE Trans. Inf. Forensics Secur., 2014

TIPS: context-aware implicit user identification using touch screen in uncontrolled environments.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

LUT based secure cloud computing - An implementation using FPGAs.
Proceedings of the 2014 International Conference on ReConFigurable Computing and FPGAs, 2014

Enhancing independence for people with low vision to use daily panel-interface machines.
Proceedings of the 6th International Conference on Mobile Computing, 2014

Eye contact reminder system for people with autism.
Proceedings of the 6th International Conference on Mobile Computing, 2014

USR: Enabling identity awareness and usable app access control during hand-free mobile interactions.
Proceedings of the 6th International Conference on Mobile Computing, 2014

Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior.
Proceedings of the 6th International Conference on Mobile Computing, 2014

Eye Contact Conditioning in Autistic Children Using Virtual Reality Technology.
Proceedings of the Pervasive Computing Paradigms for Mental Health, 2014

Removing the Root of Trust: Secure Oblivious Key Establishment for FPGAs.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

Seasoning effect based side channel attacks to AES implementation with phase change memory.
Proceedings of the HASP 2014, 2014

Privacy preserving large scale DNA read-mapping in MapReduce framework using FPGAs.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Multi resolution touch panel with built-in fingerprint sensing support.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Fault resilient physical neural networks on a single chip.
Proceedings of the 2014 International Conference on Compilers, 2014

PFC: Privacy Preserving FPGA Cloud - A Case Study of MapReduce.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Continuous Mobile Authentication Using Virtual Key Typing Biometrics.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Computerized-eyewear based face recognition system for improving social lives of prosopagnosics.
Proceedings of the 7th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, 2013

A real-time selective speaker cancellation system for relieving social anxiety in autistics.
Proceedings of the 7th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, 2013

Back to the Future: Using Magnetic Tapes in Cloud Based Storage Infrastructures.
Proceedings of the Middleware 2013, 2013

CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013

Speaker localization and cancellation for improving social attention.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment.
Proceedings of the Computing Frontiers Conference, 2013

Continuous mobile authentication using a novel Graphic Touch Gesture Feature.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

Investigating Mobile Device Picking-up motion as a novel biometric modality.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

Tape Cloud: Scalable and Cost Efficient Big Data Infrastructure for Cloud Computing.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display.
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012

Support for power efficient mobile video playback on simultaneous hybrid display.
Proceedings of the IEEE 10th Symposium on Embedded Systems for Real-time Multimedia, 2012

Architectural support of multiple hypervisors over single platform for enhancing cloud computing security.
Proceedings of the Computing Frontiers Conference, CF'12, 2012

Energy efficient hybrid display and predictive models for embedded and mobile systems.
Proceedings of the 15th International Conference on Compilers, 2012

Acceleration of bulk memory operations in a heterogeneous multicore architecture.
Proceedings of the International Conference on Parallel Architectures and Compilation Techniques, 2012

Towards Quality Aware Collaborative Video Analytic Cloud.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Conditional e-payments with transferability.
J. Parallel Distributed Comput., 2011

SHARC: A scalable 3D graphics virtual appliance delivery framework in cloud.
J. Netw. Comput. Appl., 2011

SenGuard: Passive user identification on smartphones using multiple sensors.
Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, 2011

2010
Query privacy in wireless sensor networks.
ACM Trans. Sens. Networks, 2010

Video indexed VM continuous checkpoints: time travel support for virtual 3d graphics applications.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2010

Scalable Support for 3D Graphics Applications in Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2007
Memory-Centric Security Architecture.
Trans. High Perform. Embed. Archit. Compil., 2007

Accelerating memory decryption and authentication with frequent value prediction.
Proceedings of the 4th Conference on Computing Frontiers, 2007

2006
Architectural Support for Protecting Memory Integrity and Confidentiality.
PhD thesis, 2006

M-TREE: A high efficiency security architecture for protecting integrity and privacy of software.
J. Parallel Distributed Comput., 2006

Authentication Control Point and Its Implications For Secure Processor Design.
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-39 2006), 2006

An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors.
Proceedings of the 33rd International Symposium on Computer Architecture (ISCA 2006), 2006

InfoShield: a security architecture for protecting information usage in memory.
Proceedings of the 12th International Symposium on High-Performance Computer Architecture, 2006

A Digital Rights Enabled Graphics Processing System.
Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, 2006

2005
Towards the issues in architectural support for protection of software execution.
SIGARCH Comput. Archit. News, 2005

High Efficiency Counter Mode Security Architecture via Prediction and Precomputation.
Proceedings of the 32st International Symposium on Computer Architecture (ISCA 2005), 2005

An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor.
Proceedings of the Second International Conference on Autonomic Computing (ICAC 2005), 2005

2004
CoolPression - a hybrid significance compression technique for reducing energy in caches.
Proceedings of the Proceedings 2004 IEEE International SOC Conference, 2004

Static Techniques to Improve Power Efficiency of Branch Predictors.
Proceedings of the High Performance Computing, 2004

Attacks and risk analysis for hardware supported software copy protection systems.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems.
Proceedings of the 13th International Conference on Parallel Architectures and Compilation Techniques (PACT 2004), 29 September, 2004

2003
Power-aware State Dissemination in Mobile Distributed Virtual Environments.
Proceedings of the 17th Workshop on Parallel and Distributed Simulation, 2003

2002
Efficient Implementation of Packet Scheduling Algorithm on High-Speed Programmable Network Processors.
Proceedings of the Management of Multimedia on the Internet, 2002


  Loading...