On security analysis of proof-of-elapsed-time (poet) L Chen, L Xu, N Shah, Z Gao, Y Lu, W Shi Stabilization, Safety, and Security of Distributed Systems: 19th …, 2017 | 492 | 2017 |
eGov-DAO: A better government using blockchain based decentralized autonomous organization N Diallo, W Shi, L Xu, Z Gao, L Chen, Y Lu, N Shah, L Carranco, TC Le, ... 2018 International Conference on eDemocracy & eGovernment (ICEDEG), 166-171, 2018 | 122 | 2018 |
Coc: Secure supply chain management system based on public ledger L Xu, L Chen, Z Gao, Y Lu, W Shi 2017 26th International Conference on Computer Communication and Networks …, 2017 | 50 | 2017 |
Dl-bac: Distributed ledger based access control for web applications L Xu, L Chen, N Shah, Z Gao, Y Lu, W Shi Proceedings of the 26th international conference on world wide web companion …, 2017 | 38 | 2017 |
Scalable blockchain based smart contract execution Z Gao, L Xu, L Chen, N Shah, Y Lu, W Shi 2017 IEEE 23Rd international conference on parallel and distributed systems …, 2017 | 35 | 2017 |
Protecting early stage proof-of-work based public blockchain L Chen, L Xu, Z Gao, Y Lu, W Shi 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 31 | 2018 |
SHARC: A scalable 3D graphics virtual appliance delivery framework in cloud W Shi, Y Lu, Z Li, J Engelsma Journal of Network and Computer Applications 34 (4), 1078-1087, 2011 | 23 | 2011 |
Decentralized execution of smart contracts: Agent model perspective and its implications L Chen, L Xu, N Shah, Z Gao, Y Lu, W Shi Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017 | 22 | 2017 |
Scalable support for 3D graphics applications in cloud W Shi, Y Lu, Z Li, J Engelsma 2010 IEEE 3rd International Conference on Cloud Computing, 346-353, 2010 | 19 | 2010 |
Unraveling blockchain based crypto-currency system supporting oblivious transactions: a formalized approach L Chen, L Xu, N Shah, N Diallo, Z Gao, Y Lu, W Shi Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and …, 2017 | 16 | 2017 |
Tyranny of the majority: On the (Im) possibility of correctness of smart contracts L Chen, L Xu, Z Gao, Y Lu, W Shi IEEE Security & Privacy 16 (4), 30-37, 2018 | 10 | 2018 |
Smart contract execution-the (+-)-biased ballot problem L Chen, L Xu, Z Gao, N Shah, Y Lu, W Shi 28th International Symposium on Algorithms and Computation (ISAAC 2017), 2017 | 8 | 2017 |
The game among bribers in a smart contract system L Chen, L Xu, Z Gao, N Shah, TC Le, Y Lu, W Shi Financial Cryptography and Data Security: FC 2018 International Workshops …, 2019 | 7 | 2019 |
Illuminating the black box: A psychometric investigation into the multifaceted nature of large language models Y Lu, J Yu, SHS Huang arXiv preprint arXiv:2312.14202, 2023 | 5 | 2023 |
Cross chain bribery contracts: Majority vs mighty minority Q Tran, L Chen, L Xu, Y Lu, W Shi Highlights of Practical Applications of Survivable Agents and Multi-Agent …, 2019 | 1 | 2019 |
Building an online conference with open-source components R Halstead-Nussloch, Y Lu Proceedings of the 43rd annual Southeast regional conference-Volume 1, 376-377, 2005 | 1 | 2005 |
Evaluating Irrationality in Large Language Models and Open Research Questions DR Alsagheer, R Karanjai, W Shi, N Diallo, Y Lu, S Beydoun, Q Zhang HEAL@CHI'24, https://heal-workshop.github.io/papers/6, 2024 | | 2024 |