What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Liyi Zhou
Google Scholar
ORCID:
0000-0002-2820-9872
10
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
DeFi '24: Workshop on Decentralized Finance and Security.
Liyi Zhou
Kaihua Qin
2024
conf/uss
Speculative Denial-of-Service Attacks In Ethereum.
Aviv Yaish
Kaihua Qin
Liyi Zhou
Aviv Zohar
Arthur Gervais
2023
conf/uss
The Blockchain Imitation Game.
Kaihua Qin
Stefanos Chaliasos
Liyi Zhou
Benjamin Livshits
Dawn Song
Arthur Gervais
2023
conf/fc
Mitigating Decentralized Finance Liquidations with Reversible Call Options.
Kaihua Qin
Jens Ernstberger
Liyi Zhou
Philipp Jovanovic
Arthur Gervais
2023
conf/sp
SoK: Decentralized Finance (DeFi) Attacks.
Liyi Zhou
Xihan Xiong
Jens Ernstberger
Stefanos Chaliasos
Zhipeng Wang
Ye Wang
Kaihua Qin
Roger Wattenhofer
Dawn Song
Arthur Gervais
2023
conf/eurosp
SoK: Data Sovereignty.
Jens Ernstberger
Jan Lauinger
Fatima Elsheimy
Liyi Zhou
Sebastian Steinhorst
Ran Canetti
Andrew Miller
Arthur Gervais
Dawn Song
2022
conf/sp
Quantifying Blockchain Extractable Value: How dark is the forest?
Kaihua Qin
Liyi Zhou
Arthur Gervais
2021
conf/fc
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.
Kaihua Qin
Liyi Zhou
Benjamin Livshits
Arthur Gervais
2021
conf/sp
High-Frequency Trading on Decentralized On-Chain Exchanges.
Liyi Zhou
Kaihua Qin
Christof Ferreira Torres
Duc Viet Le
Arthur Gervais
2021
conf/sp
On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.
Liyi Zhou
Kaihua Qin
Antoine Cully
Benjamin Livshits
Arthur Gervais
Coauthors
Andrew Miller
(1)
Antoine Cully
(1)
Arthur Gervais
(9)
Aviv Yaish
(1)
Aviv Zohar
(1)
Benjamin Livshits
(3)
Christof Ferreira Torres
(1)
Dawn Song
(3)
Duc Viet Le
(1)
Fatima Elsheimy
(1)
Jan Lauinger
(1)
Jens Ernstberger
(3)
Kaihua Qin
(9)
Liyi Zhou
(10)
Philipp Jovanovic
(1)
Ran Canetti
(1)
Roger Wattenhofer
(1)
Sebastian Steinhorst
(1)
Stefanos Chaliasos
(2)
Xihan Xiong
(1)
Ye Wang
(1)
Zhipeng Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to