Healthchain: A blockchain-based privacy preserving scheme for large-scale health data J Xu, K Xue, S Li, H Tian, J Hong, P Hong, N Yu IEEE Internet of Things Journal 6 (5), 8770-8781, 2019 | 413 | 2019 |
PPMA: Privacy-preserving multisubset data aggregation in smart grid S Li, K Xue, Q Yang, P Hong IEEE Transactions on Industrial Informatics 14 (2), 462-471, 2017 | 216 | 2017 |
A secure and efficient access and handover authentication protocol for Internet of Things in space information networks K Xue, W Meng, S Li, DSL Wei, H Zhou, N Yu IEEE Internet of Things Journal 6 (3), 5485-5499, 2019 | 119 | 2019 |
Falcon: A fourier transform based approach for fast and secure convolutional neural network predictions S Li, K Xue, B Zhu, C Ding, X Gao, D Wei, T Wan Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020 | 101 | 2020 |
Two-cloud secure database for numeric-related SQL range queries with privacy preserving K Xue, S Li, J Hong, Y Xue, N Yu, P Hong IEEE Transactions on Information Forensics and Security 12 (7), 1596-1608, 2017 | 95 | 2017 |
Enabling cross-chain transactions: A decentralized cryptocurrency exchange protocol H Tian, K Xue, X Luo, S Li, J Xu, J Liu, J Zhao, DSL Wei IEEE Transactions on Information Forensics and Security 16, 3928-3941, 2021 | 93 | 2021 |
PPSO: A privacy-preserving service outsourcing scheme for real-time pricing demand response in smart grid K Xue, Q Yang, S Li, DSL Wei, M Peng, I Memon, P Hong IEEE Internet of Things Journal 6 (2), 2486-2496, 2018 | 64 | 2018 |
SecGrid: A secure and efficient SGX-enabled smart grid system with rich functionalities S Li, K Xue, DSL Wei, H Yue, N Yu, P Hong IEEE Transactions on Information Forensics and Security 15, 1318-1330, 2019 | 57 | 2019 |
Detecting non-crashing functional bugs in Android apps via deep-state differential analysis J Wang, Y Jiang, T Su, S Li, C Xu, J Lu, Z Su Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 22 | 2022 |
LASA: Lightweight, auditable and secure access control in ICN with limitation of access times P He, Y Wan, Q Xia, S Li, J Hong, K Xue 2018 IEEE International Conference on Communications (ICC), 1-6, 2018 | 18 | 2018 |
Privacy-preserving prepayment based power request and trading in smart grid S Li, X Zhang, K Xue, L Zhou, H Yue China Communications 15 (4), 14-27, 2018 | 16 | 2018 |
Accelerating fuzzing through prefix-guided execution S Li, Z Su Proceedings of the ACM on Programming Languages 7 (OOPSLA1), 1-27, 2023 | 15 | 2023 |
Finding unstable code via compiler-driven differential testing S Li, Z Su Proceedings of the 28th ACM International Conference on Architectural …, 2023 | 15 | 2023 |
Enhanced attacks on defensively distilled deep neural networks Y Liu, W Zhang, S Li, N Yu arXiv preprint arXiv:1711.05934, 2017 | 8 | 2017 |
UBfuzz: finding bugs in sanitizer implementations S Li, Z Su Proceedings of the 29th ACM International Conference on Architectural …, 2024 | 6 | 2024 |
Boosting compiler testing by injecting real-world code S Li, T Theodoridis, Z Su Proceedings of the ACM on Programming Languages 8 (PLDI), 223-245, 2024 | 4 | 2024 |
SAND: Decoupling Sanitization from Fuzzing for Low Overhead Z Kong, S Li, H Huang, Z Su arXiv preprint arXiv:2402.16497, 2024 | | 2024 |