Zhi Guan

Orcid: 0000-0002-6144-4815

According to our database1, Zhi Guan authored at least 63 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Accelerating block lifecycle on blockchain via hardware transactional memory.
J. Parallel Distributed Comput., February, 2024

2023
DFHelper: Help clients to participate in federated learning tasks.
Appl. Intell., May, 2023

sChain: An Efficient and Secure Solution for Improving Blockchain Storage.
IEEE Trans. Inf. Forensics Secur., 2023

Enabling Integrity and Compliance Auditing in Blockchain-Based GDPR-Compliant Data Management.
IEEE Internet Things J., 2023

LightCert4IoTs: Blockchain-Based Lightweight Certificates Authentication for IoT Applications.
IEEE Access, 2023

Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023

Characteristics of Co-Design in the Context of Social Innovation.
Proceedings of the Design Studies and Intelligence Engineering, 2023

DIDAPPER: A Practical and Auditable On-Chain Identity Service for Decentralized Applications.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023

Privacy Protection Scheme for Epidemiological Investigation Based on Blockchain Technology.
Proceedings of the 5th Blockchain and Internet of Things Conference, 2023

Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022

LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022

Make aspect-based sentiment classification go further: step into the long-document-level.
Appl. Intell., 2022

Smifier: A Smart Contract Verifier for Composite Transactions.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

Xscope: Hunting for Cross-Chain Bridge Attacks.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

TBFT: Efficient Byzantine Fault Tolerance Using Trusted Execution Environment.
Proceedings of the IEEE International Conference on Communications, 2022

ChainDB: Ensuring Integrity of Querying Off-Chain Data on Blockchain.
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022

PShard: A Practical Sharding Protocol for Enterprise Blockchain.
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022

Intrusion Detection System Using PSO and DE Algorithms with BP Neural Network.
Proceedings of the Fuzzy Systems and Data Mining VIII, 2022

Attack and Improvement of a Hidden Vector Encryption Scheme.
Proceedings of CECNet 2022, 2022

2021
LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme.
IEEE Trans. Netw. Sci. Eng., 2021

TBFT: Understandable and Efficient Byzantine Fault Tolerance using Trusted Execution Environment.
CoRR, 2021

FASTBLOCK: Accelerating Blockchains via Hardware Transactional Memory.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

A New Identity-Based Encryption Scheme with Accountable Authority Based on SM9.
Proceedings of CECNet 2021, 2021

2020
EShield: protect smart contracts against reverse engineering.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Kaya: A Testing Framework for Blockchain-based Decentralized Applications.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

2019
Peer-to-peer file sharing in next generation eXpressive Internet Architecture.
CCF Trans. Netw., 2019

Towards automated testing of blockchain-based decentralized applications.
Proceedings of the 27th International Conference on Program Comprehension, 2019

EasyFlow: keep ethereum away from overflow.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Analysis of Man-In-The-Middle of Attack on Bitcoin Address.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Seamless service migration for human-centered computing in future Internet architecture.
Proceedings of the 2017 IEEE SmartWorld, 2017

2016
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016

2015
SCRHM: A Secure Continuous Remote Health Monitoring System.
Int. J. Distributed Sens. Networks, 2015

Location Semantics Protection Based on Bayesian Inference.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

API Sequences Based Malware Detection for Android.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Accelerating RSA with Fine-Grained Parallelism Using GPU.
Proceedings of the Information Security Practice and Experience, 2015

Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Appearance similarity evaluation for Android applications.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

Trustworthy Collaborative Filtering through Downweighting Noise and Redundancy.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2014
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services.
Proceedings of the Web-Age Information Management, 2014

Privacy Protection against Query Prediction in Location-Based Services.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2013
An efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2013

Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.
Inf. Sci., 2013

Authenticating Users of Recommender Systems Using Naive Bayes.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013

A Hybrid Approach for Privacy Preservation in Location Based Queries.
Proceedings of the Web-Age Information Management, 2013

Fuzzy Keyword Search over Encrypted Data in the Public Key Setting.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Accelerating AES in JavaScript with WebGL.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

An Efficient Privacy-Preserving RFID Ownership Transfer Protocol.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

2012
Information-theoretic modeling of false data filtering schemes in wireless sensor networks.
ACM Trans. Sens. Networks, 2012

Exploiting Consumer Reviews for Product Feature Ranking.
J. Comput. Sci. Technol., 2012

A RFID Path-Checking Protocol Based on Ordered Multisignatures.
Proceedings of the Radio Frequency Identification System Security, 2012

Permission-Based Abnormal Application Detection for Android.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Mobile Browser as a Second Factor for Web Authentication.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

Produre: A Novel Proximity Discovery Mechanism in Location Tagging System.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols.
J. Comput. Sci. Technol., 2010

Identity-based encryption based on DHIES.
Proceedings of the 5th ACM Symposium on Information, 2010

2008
Efficient Identity-Based Key Issue with TPM.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Pseudo-randomness Inside Web Browsers.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

WebIBC: Identity Based Cryptography for Client Side Security in Web Applications.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
Proceedings of the Information Security Practice and Experience, 2007


  Loading...