default search action
Zhi Guan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j16]Che Wang, Zhenhao Wu, Jianbo Gao, Jiashuo Zhang, Junjie Xia, Feng Gao, Zhi Guan, Zhong Chen:
FedTop: a constraint-loosed federated learning aggregation method against poisoning attack. Frontiers Comput. Sci. 18(5): 185348 (2024) - [j15]Yue Li, Han Liu, Jianbo Gao, Jiashuo Zhang, Zhi Guan, Zhong Chen:
Accelerating block lifecycle on blockchain via hardware transactional memory. J. Parallel Distributed Comput. 184: 104779 (2024) - [j14]Lipeng Wang, Mingsheng Hu, Zhijuan Jia, Zhi Guan, Zhong Chen:
SStore: An Efficient and Secure Provable Data Auditing Platform for Cloud. IEEE Trans. Inf. Forensics Secur. 19: 4572-4584 (2024) - 2023
- [j13]Abba Garba, David J. Khoury, Patrick Balian, Samir Haddad, Jinane Sayah, Zhong Chen, Zhi Guan, Hani Hamdan, Jinan Charafeddine, Khalid Al Mutib:
LightCert4IoTs: Blockchain-Based Lightweight Certificates Authentication for IoT Applications. IEEE Access 11: 28370-28383 (2023) - [j12]Zhenhao Wu, Jianbo Gao, Jiashuo Zhang, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
DFHelper: Help clients to participate in federated learning tasks. Appl. Intell. 53(10): 12749-12773 (2023) - [j11]Lipeng Wang, Zhi Guan, Zhong Chen, Mingsheng Hu:
Enabling Integrity and Compliance Auditing in Blockchain-Based GDPR-Compliant Data Management. IEEE Internet Things J. 10(23): 20955-20968 (2023) - [j10]Lipeng Wang, Zhi Guan, Zhong Chen, Mingsheng Hu:
sChain: An Efficient and Secure Solution for Improving Blockchain Storage. IEEE Trans. Inf. Forensics Secur. 18: 3662-3676 (2023) - 2022
- [j9]Zhenhao Wu, Jianbo Gao, Qingshan Li, Zhi Guan, Zhong Chen:
Make aspect-based sentiment classification go further: step into the long-document-level. Appl. Intell. 52(8): 8428-8447 (2022) - 2021
- [j8]Abba Garba, Zhong Chen, Zhi Guan, Gautam Srivastava:
LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme. IEEE Trans. Netw. Sci. Eng. 8(2): 1698-1710 (2021) - 2019
- [j7]Ziqian Meng, Zhong Chen, Zhi Guan:
Peer-to-peer file sharing in next generation eXpressive Internet Architecture. CCF Trans. Netw. 1(1-4): 28-36 (2019) - 2015
- [j6]Qiuxiang Dong, Zhi Guan, Kunlun Gao, Zhong Chen:
SCRHM: A Secure Continuous Remote Health Monitoring System. Int. J. Distributed Sens. Networks 11: 392439:1-392439:12 (2015) - 2013
- [j5]Hu Xiong, Zhi Guan, Zhong Chen, Fagen Li:
An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219: 225-235 (2013) - [j4]Hu Xiong, Yanan Chen, Zhi Guan, Zhong Chen:
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf. Sci. 235: 329-340 (2013) - 2012
- [j3]Suke Li, Zhi Guan, Liyong Tang, Zhong Chen:
Exploiting Consumer Reviews for Product Feature Ranking. J. Comput. Sci. Technol. 27(3): 635-649 (2012) - [j2]Zhen Cao, Hui Deng, Zhi Guan, Zhong Chen:
Information-theoretic modeling of false data filtering schemes in wireless sensor networks. ACM Trans. Sens. Networks 8(2): 14:1-14:19 (2012) - 2010
- [j1]Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang:
Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols. J. Comput. Sci. Technol. 25(2): 375-387 (2010)
Conference and Workshop Papers
- 2024
- [c51]Ke Wang, L. Yue, Jianbo Gao, Che Wang, Zhi Guan, Zhong Chen:
RollupNet: Trustless State Channels for Real-Time Cross Rollup Contract Execution. INFOCOM (Workshops) 2024: 1-2 - [c50]Che Wang, Yue Li, Jianbo Gao, Ke Wang, Jiashuo Zhang, Zhi Guan, Zhong Chen:
SolaSim: Clone Detection for Solana Smart Contracts via Program Representation. ICPC 2024: 258-269 - [c49]Ke Wang, Yue Li, Che Wang, Jianbo Gao, Zhi Guan, Zhong Chen:
XGuard: Detecting Inconsistency Behaviors of Crosschain Bridges. SIGSOFT FSE Companion 2024: 612-616 - [c48]Libin Xia, Jiashuo Zhang, Che Wang, Zezhong Tan, Jianbo Gao, Zhi Guan, Zhong Chen:
Cryptcoder: An Automatic Code Generator for Cryptographic Tasks in Ethereum Smart Contracts. SANER 2024: 976-980 - 2023
- [c47]Ke Wang, Jianbo Gao, Qiao Wang, Jiashuo Zhang, Yue Li, Zhi Guan, Zhong Chen:
Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance. ACSAC 2023: 216-228 - [c46]Ya Han, Jianbo Gao, Zhi Guan, Zhong Chen, Lifeng Ren:
Privacy Protection Scheme for Epidemiological Investigation Based on Blockchain Technology. BIOTC 2023: 15-22 - [c45]Libin Xia, Jiashuo Zhang, Xihan Zhang, Yue Li, Jianbo Gao, Zhi Guan, Zhong Chen:
DIDAPPER: A Practical and Auditable On-Chain Identity Service for Decentralized Applications. DAPPS 2023: 151-157 - [c44]Zhi Guan, Yue Qiu:
Characteristics of Co-Design in the Context of Social Innovation. DSIE 2023: 595-604 - [c43]Ya Han, Jianbo Gao, Zhi Guan, Zhong Chen, Lifeng Ren:
Intelligent New Energy Vehicle Battery Swap Scheme based on Blockchain Technology. ICBCT 2023: 57-63 - [c42]Jiashuo Zhang, Yue Li, Jianbo Gao, Zhi Guan, Zhong Chen:
Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts. ICSE Companion 2023: 31-35 - 2022
- [c41]Ke Wang, Zhikun Wang, Song Luo, Zhi Guan:
Attack and Improvement of a Hidden Vector Encryption Scheme. CECNet 2022: 1-9 - [c40]Ke Wang, Jingwei Guan, Song Luo, Zhi Guan:
Intrusion Detection System Using PSO and DE Algorithms with BP Neural Network. FSDM 2022: 376-383 - [c39]Jianbo Gao, Jiashuo Zhang, Yue Li, Jiakun Hao, Ke Wang, Zhi Guan, Zhong Chen:
PShard: A Practical Sharding Protocol for Enterprise Blockchain. ICBTA 2022: 110-116 - [c38]Jianbo Gao, Jiashuo Zhang, Yue Li, Jiakun Hao, Ke Wang, Zhi Guan, Zhong Chen:
ChainDB: Ensuring Integrity of Querying Off-Chain Data on Blockchain. ICBTA 2022: 175-181 - [c37]Jiashuo Zhang, Jianbo Gao, Ke Wang, Zhenhao Wu, Yue Li, Zhi Guan, Zhong Chen:
TBFT: Efficient Byzantine Fault Tolerance Using Trusted Execution Environment. ICC 2022: 1004-1009 - [c36]Jiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, Zhong Chen:
Xscope: Hunting for Cross-Chain Bridge Attacks. ASE 2022: 171:1-171:4 - [c35]Yu Dong, Yue Li, Dongqi Cui, Jianbo Gao, Zhi Guan, Zhong Chen:
Smifier: A Smart Contract Verifier for Composite Transactions. SEKE 2022: 507-512 - 2021
- [c34]Ke Wang, Yuan Zhao, Song Luo, Zhi Guan:
A New Identity-Based Encryption Scheme with Accountable Authority Based on SM9. CECNet 2021: 440-449 - [c33]Yue Li, Han Liu, Yuanliang Chen, Jianbo Gao, Zhenhao Wu, Zhi Guan, Zhong Chen:
FASTBLOCK: Accelerating Blockchains via Hardware Transactional Memory. ICDCS 2021: 250-260 - 2020
- [c32]Zhenhao Wu, Jiashuo Zhang, Jianbo Gao, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
Kaya: A Testing Framework for Blockchain-based Decentralized Applications. ICSME 2020: 826-829 - [c31]Wentian Yan, Jianbo Gao, Zhenhao Wu, Yue Li, Zhi Guan, Qingshan Li, Zhong Chen:
EShield: protect smart contracts against reverse engineering. ISSTA 2020: 553-556 - 2019
- [c30]Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche:
AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme. ICISSP 2019: 345-352 - [c29]Jianbo Gao, Han Liu, Chao Liu, Qingshan Li, Zhi Guan, Zhong Chen:
EasyFlow: keep ethereum away from overflow. ICSE (Companion Volume) 2019: 23-26 - [c28]Jianbo Gao, Han Liu, Yue Li, Chao Liu, Zhiqiang Yang, Qingshan Li, Zhi Guan, Zhong Chen:
Towards automated testing of blockchain-based decentralized applications. ICPC 2019: 294-299 - 2018
- [c27]Abba Garba, Zhi Guan, Anran Li, Zhong Chen:
Analysis of Man-In-The-Middle of Attack on Bitcoin Address. ICETE (2) 2018: 554-561 - 2017
- [c26]Ziqian Meng, Zhong Chen, Zhi Guan:
Seamless service migration for human-centered computing in future Internet architecture. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-7 - 2016
- [c25]Hongwei Meng, Zhong Chen, Jian-bin Hu, Zhi Guan:
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key. CFI 2016: 62-68 - 2015
- [c24]Qiuxiang Dong, Zhi Guan, Zhong Chen:
Trustworthy Collaborative Filtering through Downweighting Noise and Redundancy. APWeb 2015: 129-140 - [c23]Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen:
Appearance similarity evaluation for Android applications. ICACI 2015: 323-328 - [c22]Qiuxiang Dong, Zhi Guan, Zhong Chen:
Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach. ICPADS 2015: 298-305 - [c21]Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen:
Accelerating RSA with Fine-Grained Parallelism Using GPU. ISPEC 2015: 454-468 - [c20]Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen:
API Sequences Based Malware Detection for Android. UIC/ATC/ScalCom 2015: 673-676 - [c19]Zhengang Wu, Zhong Chen, Jiawei Zhu, Huiping Sun, Zhi Guan:
Location Semantics Protection Based on Bayesian Inference. WAIM 2015: 297-308 - 2014
- [c18]Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen:
Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. ICICS 2014: 49-60 - [c17]Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
Privacy Protection against Query Prediction in Location-Based Services. UIC/ATC/ScalCom 2014: 525-532 - [c16]Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services. WAIM Workshops 2014: 247-258 - 2013
- [c15]Wei Xin, Zhi Guan, Tao Yang, Huiping Sun, Zhong Chen:
An Efficient Privacy-Preserving RFID Ownership Transfer Protocol. APWeb 2013: 538-549 - [c14]Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen:
Accelerating AES in JavaScript with WebGL. ICICS 2013: 275-287 - [c13]Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
A Hybrid Approach for Privacy Preservation in Location Based Queries. WAIM Workshops 2013: 315-326 - [c12]Qiuxiang Dong, Zhi Guan, Liang Wu, Zhong Chen:
Fuzzy Keyword Search over Encrypted Data in the Public Key Setting. WAIM 2013: 729-740 - [c11]Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Authenticating Users of Recommender Systems Using Naive Bayes. WISE (1) 2013: 199-208 - 2012
- [c10]Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen:
Permission-Based Abnormal Application Detection for Android. ICICS 2012: 228-239 - [c9]Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen:
A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains. ICICS 2012: 400-407 - [c8]Wei Xin, Huiping Sun, Zhao Wang, Zhi Guan, Zhong Chen:
A RFID Path-Checking Protocol Based on Ordered Multisignatures. RFIDSec Asia 2012: 33-44 - 2011
- [c7]Jian-bin Hu, Yonggang Wang, Tao Yang, Zhi Guan, Nike Gui, Zhong Chen:
Produre: A Novel Proximity Discovery Mechanism in Location Tagging System. CISIS 2011: 238-245 - [c6]Zhi Guan, Hu Xiong, Suke Li, Zhong Chen:
Mobile Browser as a Second Factor for Web Authentication. ISPA 2011: 276-281 - 2010
- [c5]Yu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen:
Identity-based encryption based on DHIES. AsiaCCS 2010: 82-88 - 2008
- [c4]Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhong Chen, Xianghao Nan:
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications. ICDCS 2008: 689-696 - [c3]Zhi Guan, Long Zhang, Zhong Chen, Xianghao Nan:
Pseudo-randomness Inside Web Browsers. ICICS 2008: 267-278 - [c2]Zhi Guan, Huiping Sun, Zhong Chen, Xianghao Nan:
Efficient Identity-Based Key Issue with TPM. ICYCS 2008: 2354-2359 - 2007
- [c1]Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang:
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. ISPEC 2007: 129-144
Informal and Other Publications
- 2022
- [i6]Jiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, Zhong Chen:
Xscope: Hunting for Cross-Chain Bridge Attacks. CoRR abs/2208.07119 (2022) - [i5]Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan:
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3. IACR Cryptol. ePrint Arch. 2022: 1491 (2022) - [i4]Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan:
XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3. IACR Cryptol. ePrint Arch. 2022: 1552 (2022) - 2021
- [i3]Jiashuo Zhang, Jianbo Gao, Ke Wang, Zhenhao Wu, Ying Lan, Zhi Guan, Zhong Chen:
TBFT: Understandable and Efficient Byzantine Fault Tolerance using Trusted Execution Environment. CoRR abs/2102.01970 (2021) - 2020
- [i2]Zhenhao Wu, Jiashuo Zhang, Jianbo Gao, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
Kaya: A Testing Framework for Blockchain-based Decentralized Applications. CoRR abs/2006.01476 (2020) - 2018
- [i1]Jianbo Gao, Han Liu, Chao Liu, Qingshan Li, Zhi Guan, Zhong Chen:
EASYFLOW: Keep Ethereum Away From Overflow. CoRR abs/1811.03814 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-21 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint