Follow
Kai Li (李凯)
Title
Cited by
Cited by
Year
ChainFS: Blockchain-secured cloud storage
Y Tang, Q Zou, J Chen, K Li, CA Kamhoua, K Kwiat, L Njilla
2018 IEEE 11th international conference on cloud computing (CLOUD), 987-990, 2018
482018
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service.
K Li, J Chen, X Liu, YR Tang, XF Wang, X Luo
NDSS 2021, 2021
362021
Cost-effective data feeds to blockchains via workload-adaptive data replication
K Li, Y Tang, J Chen, Z Yuan, C Xu, J Xu
Proceedings of the 21st international middleware conference, 371-385, 2020
20*2020
Deter: Denial of ethereum txpool services
K Li, Y Wang, Y Tang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
192021
TopoShot: uncovering Ethereum's network topology leveraging replacement transactions
K Li, Y Tang, J Chen, Y Wang, X Liu
Proceedings of the 21st ACM Internet Measurement Conference, 302-319, 2021
132021
iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocations
Y Wang, Q Zhang, K Li, Y Tang, J Chen, X Luo, T Chen
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
122021
Authenticated key-value stores with hardware enclaves
K Li, Y Tang, Q Zhang, J Xu, J Chen
Proceedings of the 22nd International Middleware Conference: Industrial …, 2021
9*2021
Secure consistency verification for untrusted cloud storage by public blockchains
K Li, Y Tang, BH Kim, J Xu
Security and Privacy in Communication Networks: 15th EAI International …, 2019
62019
Towards saving blockchain fees via secure and cost-effective batching of smart-contract invocations
Y Wang, K Li, Y Tang, J Chen, Q Zhang, X Luo, T Chen
IEEE Transactions on Software Engineering 49 (4), 2980-2995, 2023
52023
Authenticated LSM Trees with Minimal Trust
Y Tang, K Li, J Chen
SecureComm 2019, 2019
5*2019
Scalable log auditing on private blockchains via lightweight log-fork prevention
Y Tang, K Li, Y Wang, SB Somuncuoglu
Proceedings of the 4th Workshop on Scalable and Resilient Infrastructures …, 2020
32020
Understanding the Cryptocurrency Free Giveaway Scam Disseminated on Twitter Lists
K Li, D Lee, S Guan
IEEE Blockchain 2023, 2023
2*2023
Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild
K Li, S Guan, D Lee
ACM SIGMETRICS 2024, 2024
12024
Understanding ethereum mempool security under asymmetric dos by symbolic fuzzing
Y Wang, W Ding, K Li, Y Tang
arXiv preprint arXiv:2312.02642, 2023
12023
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild
J Chen, Y Wang, Y Zhou, W Ding, Y Tang, XF Wang, K Li
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 332-351, 2023
12023
Ethical Challenges in Blockchain Network Measurement Research
Y Tang, K Li, Y Wang, J Chen
The 2nd International Workshop on Ethics in Computer Security, 2023
1*2023
Understanding and Hardening Blockchain Network Security Against Denial of Service Attacks
K Li
Syracuse University, 2022
12022
DRL-Clusters: Buffer Management with Clustering based Deep Reinforcement Learning
K Li, Q Zhang, L Yu, H Min
Workshop on Databases and AI, 2021
12021
Efficiently Hardening SGX Enclaves against Memory Access Pattern Attacks via Dynamic Program Partitioning
Y Tang, K Li, Y Wang, J Chen, C Xu
arXiv preprint arXiv:2212.12656, 2022
2022
Privacy-Preserving Multi-Party Directory Services
Y Tang, K Li, K Areekijseree, S Zhou, L Hu
EAI Endorsed Transactions on Security and Safety 6 (19), 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20