Huizhong Li

Orcid: 0000-0001-8638-2887

According to our database1, Huizhong Li authored at least 36 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Novel Vascular Anastomotic Coupling Device for End-to-End Anastomosis of Arteries and Veins.
IEEE Trans. Biomed. Eng., February, 2024

2023
V-Gas: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability.
ACM Trans. Internet Techn., August, 2023

Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages.
IEEE Trans. Inf. Forensics Secur., 2023

FISCO-BCOS: An Enterprise-grade Permissioned Blockchain System with High-performance.
Proceedings of the International Conference for High Performance Computing, 2023

LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Table Re-Computation Based Low Entropy Inner Product Masking Scheme.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios.
IEEE Trans. Software Eng., 2022

Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme.
IEEE Trans. Inf. Forensics Secur., 2022

DVREI: Dynamic Verifiable Retrieval Over Encrypted Images.
IEEE Trans. Computers, 2022

Multi-Scenario Simulation of Production-Living-Ecological Space in the Poyang Lake Area Based on Remote Sensing and RF-Markov-FLUS Model.
Remote. Sens., 2022

Accelerating Elliptic Curve Digital Signature Algorithms on GPUs.
Proceedings of the SC22: International Conference for High Performance Computing, 2022

Cross-Grade Curriculum Group Based Teaching Experiment System for Innovative Design of IoT Intelligent Dynamic Measurement and Control.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022

WaLi: Control-Flow-Based Analysis of Wasm Smart Contracts.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

FL-Market: Trading Private Models in Federated Learning.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Revealing the Weakness of Addition Chain Based Masked SBox Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Spatiotemporal Evolution of Wetland Eco-Hydrological Connectivity in the Poyang Lake Area Based on Long Time-Series Remote Sensing Images.
Remote. Sens., 2021

Security reinforcement for Ethereum virtual machine.
Inf. Process. Manag., 2021

A secure and highly efficient first-order masking scheme for AES linear operations.
Cybersecur., 2021

Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes.
Cybersecur., 2021

Improving Blockchain Consistency by Assigning Weights to Random Blocks.
CoRR, 2021

Making smart contract development more secure and easier.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Empirical evaluation of smart contract testing: what is the best choice?
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

SCStudio: a secure and efficient integrated development environment for smart contracts.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

APT: Efficient Side-Channel Analysis Framework against Inner Product Masking Scheme.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

2020
Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes.
IEEE Trans. Inf. Forensics Secur., 2020

The Notion of Transparency Order, Revisited.
Comput. J., 2020

2019
EVM<sup>*</sup>: From Offline Detection to Online Reinforcement for Ethereum Virtual Machine.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

EVMFuzzer: detect EVM vulnerabilities via fuzz testing.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing.
Proceedings of the Network and System Security - 13th International Conference, 2019

CDAE: Towards Empowering Denoising in Side-Channel Analysis.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

DAPS: A Decentralized Anonymous Payment Scheme with Supervision.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure.
IACR Cryptol. ePrint Arch., 2018

Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations.
Proceedings of the Smart Card Research and Advanced Applications, 2018

2014
Design, fabrication, and testing of a novel end-to-end vascular coupling system.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014


  Loading...