Rujia Li

Orcid: 0000-0001-8009-530X

According to our database1, Rujia Li authored at least 22 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Correction to: Construction and analysis of students' physical health portrait based on principal component analysis improved Canopy-K-means algorithm.
J. Supercomput., September, 2024

Construction and analysis of students' physical health portrait based on principal component analysis improved Canopy-K-means algorithm.
J. Supercomput., July, 2024

2023
Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS.
IACR Cryptol. ePrint Arch., 2023

Accountable Decryption made Formal and Practical.
IACR Cryptol. ePrint Arch., 2023

Transaction Fairness in Blockchains, Revisited.
IACR Cryptol. ePrint Arch., 2023

Transparent Registration-Based Encryption through Blockchain.
Distributed Ledger Technol. Res. Pract., 2023

Formal Security Analysis on dBFT Protocol of NEO.
Distributed Ledger Technol. Res. Pract., 2023

Time-manipulation Attack: Breaking Fairness against Proof of Authority Aura.
Proceedings of the ACM Web Conference 2023, 2023

2022
Design and evaluation of blockchain-based security protocols.
PhD thesis, 2022

SoK: TEE-Assisted Confidential Smart Contract.
Proc. Priv. Enhancing Technol., 2022

Exploring Web3 From the View of Blockchain.
CoRR, 2022

How Do Smart Contracts Benefit Security Protocols?
CoRR, 2022

Interpretation Study of Unknown Oracle Bones Based on Self-training Learning.
Proceedings of the 4th International Conference on Video, Signal and Image Processing, 2022

Explainable Artificial Intelligence for Evaluation of Liquor.
Proceedings of the IECON 2022, 2022

Frontrunning Block Attack in PoA Clique: A Case Study.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Attention-based Multi-scale ViT Fine-grained Visual Classification.
Proceedings of the 6th International Conference on Computer Science and Artificial Intelligence, 2022

Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Non-Fungible Token (NFT): Overview, Evaluation, Opportunities and Challenges.
CoRR, 2021

A Weak Consensus Algorithm and Its Application to High-Performance Blockchain.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

An Offline Delegatable Cryptocurrency System.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

2020
An Accountable Decryption System Based on Privacy-Preserving Smart Contracts.
Proceedings of the Information Security - 23rd International Conference, 2020

2019
Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019


  Loading...