Chao Li

Orcid: 0000-0003-4561-6899

Affiliations:
  • Beijing Jiaotong University, School of Computer and Information Technology, China
  • University of Pittsburgh, School of Computing and Information, PA, USA


According to our database1, Chao Li authored at least 42 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
T-Watch: Towards Timed Execution of Private Transaction in Blockchains.
IEEE Trans. Serv. Comput., 2024

TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem Incident.
CoRR, 2024

The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems.
CoRR, 2024

TLSCG: Transfer Learning-Based Efficient Anomalous Smart Contract Generation to Empower Unknown Vulnerability Detection.
Proceedings of the IEEE International Conference on Web Services, 2024

Detecting Unknown Threats in Smart Contracts With Domain Adaptation.
Proceedings of the IEEE International Conference on Software Services Engineering, 2024

2023
Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services.
IEEE Trans. Dependable Secur. Comput., 2023

Secure Cross-domain Medical Data Sharing based on Distributed Cloud and Blockchain Services.
Proceedings of the IEEE International Conference on Web Services, 2023

How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Liquid Democracy in DPoS Blockchains.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Cross-Consensus Measurement of Individual-level Decentralization in Blockchains.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
SilentDelivery: Practical Timed-Delivery of Private Information Using Smart Contracts.
IEEE Trans. Serv. Comput., 2022

NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets.
IEEE Trans. Dependable Secur. Comput., 2022

Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System.
IEICE Trans. Inf. Syst., 2022

TBFL: A Trusted Blockchain-based Federated Learning System.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
T3AB: Transparent and Trustworthy Third-party Authority using Blockchain.
CoRR, 2021

Measuring Decentralization in Bitcoin and Ethereum using Multiple Metrics and Granularities.
Proceedings of the 37th IEEE International Conference on Data Engineering Workshops, 2021

SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

EventWarden: A Decentralized Event-driven Proxy Service for Outsourcing Arbitrary Transactions in Ethereum-like Blockchains.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

Comparison of Decentralization in DPoS and PoW Blockchains.
Proceedings of the Blockchain - ICBC 2020, 2020

A Survey on Cyberspace Search Engines.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

2019
Privacy in Internet of Things: From Principles to Technologies.
IEEE Internet Things J., 2019

Incentivized Blockchain-based Social Media Platforms: A Case Study of Steemit.
CoRR, 2019

Reversible spatio-temporal perturbation for protecting location privacy.
Comput. Commun., 2019

Incentivized Blockchain-based Social Media Platforms: A Case Study of <i>Steemit</i>.
Proceedings of the 11th ACM Conference on Web Science, 2019

Scalable and Privacy-Preserving Design of On/Off-Chain Smart Contracts.
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019

CryptoNN: Training Neural Networks over Encrypted Data.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Self-Emerging Data Infrastructures.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

2018
<i>k-Trustee</i>: Location injection attack-resilient anonymization for location privacy.
Comput. Secur., 2018

Decentralized Release of Self-Emerging Data using Smart Contracts.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Decentralized Privacy-Preserving Timed Execution in Blockchain-Based Smart Contract Platforms.
Proceedings of the 25th IEEE International Conference on High Performance Computing, 2018

Reversible Data Perturbation Techniques for Multi-level Privacy-Preserving Data Publication.
Proceedings of the Big Data - BigData 2018, 2018

2017
Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

ReverseCloak: A Reversible Multi-level Location Privacy Protection System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Timed-Release of Self-Emerging Data Using Distributed Hash Tables.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Group privacy-aware disclosure of association graph data.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Differentially Private Trajectory Analysis for Points-of-Interest Recommendation.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Emerge: Self-Emerging Data Release Using Cloud Data Storage.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
SocialMix: Supporting Privacy-Aware Trusted Social Networking Services.
Proceedings of the IEEE International Conference on Web Services, 2016

2015
De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems.
Proceedings of the Network and System Security - 9th International Conference, 2015

ReverseCloak: Protecting Multi-level Location Privacy over Road Networks.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015


  Loading...