ChainFS: Blockchain-secured cloud storage Y Tang, Q Zou, J Chen, K Li, CA Kamhoua, K Kwiat, L Njilla 2018 IEEE 11th international conference on cloud computing (CLOUD), 987-990, 2018 | 48 | 2018 |
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service. K Li, J Chen, X Liu, YR Tang, XF Wang, X Luo NDSS 2021, 2021 | 36 | 2021 |
Deter: Denial of ethereum txpool services K Li, Y Wang, Y Tang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 21 | 2021 |
Cost-effective data feeds to blockchains via workload-adaptive data replication K Li, Y Tang, J Chen, Z Yuan, C Xu, J Xu Proceedings of the 21st international middleware conference, 371-385, 2020 | 21* | 2020 |
TopoShot: uncovering Ethereum's network topology leveraging replacement transactions K Li, Y Tang, J Chen, Y Wang, X Liu Proceedings of the 21st ACM Internet Measurement Conference, 302-319, 2021 | 13 | 2021 |
iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocations Y Wang, Q Zhang, K Li, Y Tang, J Chen, X Luo, T Chen Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 12 | 2021 |
Authenticated key-value stores with hardware enclaves K Li, Y Tang, Q Zhang, J Xu, J Chen Proceedings of the 22nd International Middleware Conference: Industrial …, 2021 | 9* | 2021 |
Towards saving blockchain fees via secure and cost-effective batching of smart-contract invocations Y Wang, K Li, Y Tang, J Chen, Q Zhang, X Luo, T Chen IEEE Transactions on Software Engineering 49 (4), 2980-2995, 2023 | 6 | 2023 |
Secure consistency verification for untrusted cloud storage by public blockchains K Li, Y Tang, BH Kim, J Xu Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 6 | 2019 |
Authenticated LSM Trees with Minimal Trust Y Tang, K Li, J Chen SecureComm 2019, 2019 | 5* | 2019 |
Scalable log auditing on private blockchains via lightweight log-fork prevention Y Tang, K Li, Y Wang, SB Somuncuoglu Proceedings of the 4th Workshop on Scalable and Resilient Infrastructures …, 2020 | 3 | 2020 |
Understanding ethereum mempool security under asymmetric dos by symbolic fuzzing Y Wang, W Ding, K Li, Y Tang arXiv preprint arXiv:2312.02642, 2023 | 2 | 2023 |
Understanding the Cryptocurrency Free Giveaway Scam Disseminated on Twitter Lists K Li, D Lee, S Guan IEEE Blockchain 2023, 2023 | 2* | 2023 |
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild J Chen, Y Wang, Y Zhou, W Ding, Y Tang, XF Wang, K Li 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 332-351, 2023 | 2 | 2023 |
Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild K Li, S Guan, D Lee ACM SIGMETRICS 2024, 2024 | 1 | 2024 |
Ethical Challenges in Blockchain Network Measurement Research Y Tang, K Li, Y Wang, J Chen The 2nd International Workshop on Ethics in Computer Security, 2023 | 1* | 2023 |
Understanding and Hardening Blockchain Network Security Against Denial of Service Attacks K Li Syracuse University, 2022 | 1 | 2022 |
DRL-Clusters: Buffer Management with Clustering based Deep Reinforcement Learning K Li, Q Zhang, L Yu, H Min Workshop on Databases and AI, 2021 | 1 | 2021 |
Efficiently Hardening SGX Enclaves against Memory Access Pattern Attacks via Dynamic Program Partitioning Y Tang, K Li, Y Wang, J Chen, C Xu arXiv preprint arXiv:2212.12656, 2022 | | 2022 |
Privacy-Preserving Multi-Party Directory Services Y Tang, K Li, K Areekijseree, S Zhou, L Hu EAI Endorsed Transactions on Security and Safety 6 (19), 2019 | | 2019 |