What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jiangshan Yu
Google Scholar
ORCID:
0000-0001-8006-7392
32
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Constant Latency and Finality for Dynamically Available DAG.
Hans Schmiedel
Runchao Han
Qiang Tang
Ron Steinfeld
Jiangshan Yu
2025
conf/provsec
GenDetect: Generative Large Language Model Usage in Smart Contract Vulnerability Detection.
Peter Ince
Jiangshan Yu
Joseph K. Liu
Xiaoning Du
Xiapu Luo
2025
conf/provsec
SEARCHAIN: Searchable Encryption As Rewarded-Useful-Work on Blockchain.
Jun Zhao
Jiangshan Yu
Xingliang Yuan
Joseph K. Liu
Cong Zuo
Hui Cui
2024
conf/acisp
AegisDB: Scalable Blockchain Database with Secure Decentralised Load Balancing.
Jun Zhao
Jiangshan Yu
Xingliang Yuan
Joseph K. Liu
2024
conf/acisp
Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language Models.
Peter Ince
Xiapu Luo
Jiangshan Yu
Joseph K. Liu
Xiaoning Du
2024
conf/dsn
Test of Time Award; DSN 2024.
Juan-Carlos Ruiz-Garcia
Homa Alemzadeh
Jean-Charles Fabre
Jiangshan Yu
Sy-Yen Kuo
Elias P. Duarte
2024
conf/acsac
Janus: Enhancing Asynchronous Common Subset with Trusted Hardware.
Liangrong Zhao
Hans Schmiedel
Qin Wang
Jiangshan Yu
2023
conf/fc
Fair Delivery of Decentralised Randomness Beacon.
Runchao Han
Jiangshan Yu
2023
conf/fc
FTX Collapse: A Ponzi Story.
Shange Fu
Qin Wang
Jiangshan Yu
Shiping Chen
2023
conf/fc
A First Dive into OFAC in DeFi Space.
Qin Wang
Shange Fu
Shiping Chen
Jiangshan Yu
2023
conf/fc
Leveraging the Verifier's Dilemma to Double Spend in Bitcoin.
Tong Cao
Jérémie Decouchant
Jiangshan Yu
2023
conf/sp
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
Xianrui Qin
Shimin Pan
Arash Mirzaei
Zhimei Sui
Oguzhan Ersoy
Amin Sakzad
Muhammed F. Esgin
Joseph K. Liu
Jiangshan Yu
Tsz Hon Yuen
2023
conf/icbc2
A Referable NFT Scheme.
Qin Wang
Guangsheng Yu
Shange Fu
Shiping Chen
Jiangshan Yu
Xiwei Xu
2023
conf/icbc2
Rational Ponzi Game in Algorithmic Stablecoin.
Shange Fu
Qin Wang
Jiangshan Yu
Shiping Chen
2023
conf/dsn
Fault Independence in Blockchain.
Jiangshan Yu
2023
conf/dsn
Analyzing the Performance of the Inter-Blockchain Communication Protocol.
João Otávio Massari Chervinski
Diego Kreutz
Xiwei Xu
Jiangshan Yu
2022
conf/acisp
Garrison: A Novel Watchtower Scheme for Bitcoin.
Arash Mirzaei
Amin Sakzad
Jiangshan Yu
Ron Steinfeld
2022
conf/asiaccs
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains.
Zhimei Sui
Joseph K. Liu
Jiangshan Yu
Man Ho Au
Jia Liu
2021
conf/fc
FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin.
Arash Mirzaei
Amin Sakzad
Jiangshan Yu
Ron Steinfeld
2021
conf/asiaccs
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains.
Runchao Han
Zhimei Sui
Jiangshan Yu
Joseph K. Liu
Shiping Chen
2021
conf/icbc2
Analysis of transaction flooding attacks against Monero.
João Otávio Massari Chervinski
Diego Kreutz
Jiangshan Yu
2021
conf/icbc2
New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains.
Sina Aeeneh
João Otávio Massari Chervinski
Jiangshan Yu
Nikola Zlatanov
2021
conf/icbc2
Verifiable Observation of Permissioned Ledgers.
Ermyas Abebe
Yining Hu
Allison Irvin
Dileban Karunamoorthy
Vinayaka Pandit
Venkatraman Ramakrishna
Jiangshan Yu
2020
conf/fc
Security Analysis on dBFT Protocol of NEO.
Qin Wang
Jiangshan Yu
Zhiniang Peng
Van Cuong Bui
Shiping Chen
Yong Ding
Yang Xiang
2020
conf/fc
Exploring the Monero Peer-to-Peer Network.
Tong Cao
Jiangshan Yu
Jérémie Decouchant
Xiapu Luo
Paulo Veríssimo
2020
conf/esorics
VRF-Based Mining Simple Non-outsourceable Cryptocurrency Mining.
Runchao Han
Haoyu Lin
Jiangshan Yu
2019
journals/compsec
Proof-of-QoS: QoS based blockchain consensus protocol.
Bin Yu
Joseph K. Liu
Surya Nepal
Jiangshan Yu
Paul Rimba
2019
conf/ccs
On The Unforkability of Monero.
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Dongxi Liu
Jiangshan Yu
2019
conf/fc
New Empirical Traceability Analysis of CryptoNote-Style Blockchains.
Zuoxia Yu
Man Ho Au
Jiangshan Yu
Rupeng Yang
Qiuliang Xu
Wang Fat Lau
2019
conf/provsec
A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection.
Chaochen Shi
Jiangshan Yu
2018
journals/tifs
DECIM: Detecting Endpoint Compromise In Messaging.
Jiangshan Yu
Mark Ryan
Cas Cremers
2014
journals/tifs
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation.
Jiangshan Yu
Guilin Wang
Yi Mu
Wei Gao
Coauthors
Allison Irvin
(1)
Amin Sakzad
(3)
Arash Mirzaei
(3)
Bin Yu
(1)
Cas Cremers
(1)
Chaochen Shi
(1)
Cong Zuo
(1)
Diego Kreutz
(2)
Dileban Karunamoorthy
(1)
Dimaz Ankaa Wijaya
(1)
Dongxi Liu
(1)
Elias P. Duarte
(1)
Ermyas Abebe
(1)
Guangsheng Yu
(1)
Guilin Wang
(1)
Hans Schmiedel
(2)
Haoyu Lin
(1)
Homa Alemzadeh
(1)
Hui Cui
(1)
Jean-Charles Fabre
(1)
Jérémie Decouchant
(2)
Jia Liu
(1)
Jiangshan Yu
(32)
João Otávio Massari Chervinski
(3)
Joseph K. Liu
(9)
Juan-Carlos Ruiz-Garcia
(1)
Jun Zhao
(2)
Liangrong Zhao
(1)
Man Ho Au
(2)
Mark Ryan
(1)
Muhammed F. Esgin
(1)
Nikola Zlatanov
(1)
Oguzhan Ersoy
(1)
Paul Rimba
(1)
Paulo Veríssimo
(1)
Peter Ince
(2)
Qiang Tang
(1)
Qin Wang
(6)
Qiuliang Xu
(1)
Ron Steinfeld
(4)
Runchao Han
(4)
Rupeng Yang
(1)
Shange Fu
(4)
Shimin Pan
(1)
Shiping Chen
(6)
Sina Aeeneh
(1)
Surya Nepal
(1)
Sy-Yen Kuo
(1)
Tong Cao
(2)
Tsz Hon Yuen
(1)
Van Cuong Bui
(1)
Venkatraman Ramakrishna
(1)
Vinayaka Pandit
(1)
Wang Fat Lau
(1)
Wei Gao
(1)
Xianrui Qin
(1)
Xiaoning Du
(2)
Xiapu Luo
(3)
Xingliang Yuan
(2)
Xiwei Xu
(2)
Yang Xiang
(1)
Yi Mu
(1)
Yining Hu
(1)
Yong Ding
(1)
Zhimei Sui
(3)
Zhiniang Peng
(1)
Zuoxia Yu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to