Zhi Guan
Orcid: 0000-0002-6144-4815
According to our database1,
Zhi Guan
authored at least 73 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Frontiers Comput. Sci., March, 2025
2024
FedTop: a constraint-loosed federated learning aggregation method against poisoning attack.
Frontiers Comput. Sci., October, 2024
J. Parallel Distributed Comput., February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
Cryptcoder: An Automatic Code Generator for Cryptographic Tasks in Ethereum Smart Contracts.
Proceedings of the IEEE International Conference on Software Analysis, 2024
Proceedings of the Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, 2024
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
2023
Appl. Intell., May, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Enabling Integrity and Compliance Auditing in Blockchain-Based GDPR-Compliant Data Management.
IEEE Internet Things J., 2023
LightCert4IoTs: Blockchain-Based Lightweight Certificates Authentication for IoT Applications.
IEEE Access, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023
Proceedings of the 2023 5th International Conference on Blockchain Technology, 2023
Proceedings of the Design Studies and Intelligence Engineering, 2023
DIDAPPER: A Practical and Auditable On-Chain Identity Service for Decentralized Applications.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023
Privacy Protection Scheme for Epidemiological Investigation Based on Blockchain Technology.
Proceedings of the 5th Blockchain and Internet of Things Conference, 2023
Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
IACR Cryptol. ePrint Arch., 2022
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022
Make aspect-based sentiment classification go further: step into the long-document-level.
Appl. Intell., 2022
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022
Proceedings of the Fuzzy Systems and Data Mining VIII, 2022
Proceedings of CECNet 2022, 2022
2021
LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme.
IEEE Trans. Netw. Sci. Eng., 2021
TBFT: Understandable and Efficient Byzantine Fault Tolerance using Trusted Execution Environment.
CoRR, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of CECNet 2021, 2021
2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020
2019
CCF Trans. Netw., 2019
Proceedings of the 27th International Conference on Program Comprehension, 2019
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
2017
Seamless service migration for human-centered computing in future Internet architecture.
Proceedings of the 2017 IEEE SmartWorld, 2017
2016
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016
2015
Int. J. Distributed Sens. Networks, 2015
Proceedings of the Web-Age Information Management - 16th International Conference, 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the Information Security Practice and Experience, 2015
Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
2014
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services.
Proceedings of the Web-Age Information Management, 2014
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
2013
Inf. Sci., 2013
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.
Inf. Sci., 2013
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013
Proceedings of the Web-Age Information Management, 2013
Proceedings of the Web-Age Information Management - 14th International Conference, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013
2012
Information-theoretic modeling of false data filtering schemes in wireless sensor networks.
ACM Trans. Sens. Networks, 2012
J. Comput. Sci. Technol., 2012
Proceedings of the Radio Frequency Identification System Security, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
2010
J. Comput. Sci. Technol., 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
2007
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
Proceedings of the Information Security Practice and Experience, 2007