default search action
Huizhong Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Azur Azapagic, Jayant P. Agarwal, Bruce K. Gale, Huizhong Li, Samuel Nelson, Jill Shea, Himanshu J. Sant:
A Novel Vascular Anastomotic Coupling Device for End-to-End Anastomosis of Arteries and Veins. IEEE Trans. Biomed. Eng. 71(2): 542-552 (2024) - 2023
- [j13]Zehua Qiao, Yuejun Liu, Yongbin Zhou, Jingdian Ming, Chengbin Jin, Huizhong Li:
Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages. IEEE Trans. Inf. Forensics Secur. 18: 1-14 (2023) - [j12]Fuchen Ma, Meng Ren, Fu Ying, Wanting Sun, Houbing Song, Heyuan Shi, Yu Jiang, Huizhong Li:
V-Gas: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability. ACM Trans. Internet Techn. 23(3): 40:1-40:22 (2023) - [c20]Fuchen Ma, Yuanliang Chen, Yuanhang Zhou, Jingxuan Sun, Zhuo Su, Yu Jiang, Jiaguang Sun, Huizhong Li:
Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos. CCS 2023: 1182-1196 - [c19]Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li:
Table Re-Computation Based Low Entropy Inner Product Masking Scheme. DATE 2023: 1-6 - [c18]Mingxi Ye, Yuhong Nan, Zibin Zheng, Dongpeng Wu, Huizhong Li:
Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing. ISSTA 2023: 298-309 - [c17]Fuchen Ma, Yuanliang Chen, Meng Ren, Yuanhang Zhou, Yu Jiang, Ting Chen, Huizhong Li, Jiaguang Sun:
LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols. NDSS 2023 - [c16]Huizhong Li, Yujie Chen, Xiang Shi, Xingqiang Bai, Nan Mo, Wenlin Li, Rui Guo, Zhang Wang, Yi Sun:
FISCO-BCOS: An Enterprise-grade Permissioned Blockchain System with High-performance. SC 2023: 68:1-68:17 - 2022
- [j11]Huizhong Li, Chaoyang Fang, Yang Xia, Zhiyong Liu, Wei Wang:
Multi-Scenario Simulation of Production-Living-Ecological Space in the Poyang Lake Area Based on Remote Sensing and RF-Markov-FLUS Model. Remote. Sens. 14(12): 2830 (2022) - [j10]Yingying Li, Jianfeng Ma, Yinbin Miao, Huizhong Li, Qiang Yan, Yue Wang, Ximeng Liu, Kim-Kwang Raymond Choo:
DVREI: Dynamic Verifiable Retrieval Over Encrypted Images. IEEE Trans. Computers 71(8): 1755-1769 (2022) - [j9]Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li:
Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme. IEEE Trans. Inf. Forensics Secur. 17: 3555-3568 (2022) - [j8]Fuchen Ma, Zhenyang Xu, Meng Ren, Zijing Yin, Yuanliang Chen, Lei Qiao, Bin Gu, Huizhong Li, Yu Jiang, Jia-Guang Sun:
Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios. IEEE Trans. Software Eng. 48(11): 4380-4396 (2022) - [c15]Shuyuan Zheng, Yang Cao, Masatoshi Yoshikawa, Huizhong Li, Qiang Yan:
FL-Market: Trading Private Models in Federated Learning. IEEE Big Data 2022: 1525-1534 - [c14]Shuo Yang, Huizhong Li, Zibin Zheng:
WaLi: Control-Flow-Based Analysis of Wasm Smart Contracts. BlockSys 2022: 322-335 - [c13]Yu Zhang, Hongqing Ma, Peihong Li, Xihua Li, Xiangdong Jin, Qimin Zhou, Xiaoxing Shi, Xinyu Jin, Huizhong Li:
Cross-Grade Curriculum Group Based Teaching Experiment System for Innovative Design of IoT Intelligent Dynamic Measurement and Control. ISCAS 2022: 2122-2126 - [c12]Zonghao Feng, Qipeng Xie, Qiong Luo, Yujie Chen, Haoxuan Li, Huizhong Li, Qiang Yan:
Accelerating Elliptic Curve Digital Signature Algorithms on GPUs. SC 2022: 27:1-27:13 - 2021
- [j7]Jingdian Ming, Yongbin Zhou, Huizhong Li, Qian Zhang:
A secure and highly efficient first-order masking scheme for AES linear operations. Cybersecur. 4(1): 14 (2021) - [j6]Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou, Chengbin Jin:
Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes. Cybersecur. 4(1): 35 (2021) - [j5]Fuchen Ma, Meng Ren, Ying Fu, Mingzhe Wang, Huizhong Li, Houbing Song, Yu Jiang:
Security reinforcement for Ethereum virtual machine. Inf. Process. Manag. 58(4): 102565 (2021) - [j4]Yang Xia, Chaoyang Fang, Hui Lin, Huizhong Li, Bobo Wu:
Spatiotemporal Evolution of Wetland Eco-Hydrological Connectivity in the Poyang Lake Area Based on Long Time-Series Remote Sensing Images. Remote. Sens. 13(23): 4812 (2021) - [j3]Jingdian Ming, Huizhong Li, Yongbin Zhou, Wei Cheng, Zehua Qiao:
Revealing the Weakness of Addition Chain Based Masked SBox Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 326-350 (2021) - [c11]Jingdian Ming, Wei Cheng, Yongbin Zhou, Huizhong Li:
APT: Efficient Side-Channel Analysis Framework against Inner Product Masking Scheme. ICCD 2021: 575-582 - [c10]Meng Ren, Zijing Yin, Fuchen Ma, Zhenyang Xu, Yu Jiang, Chengnian Sun, Huizhong Li, Yan Cai:
Empirical evaluation of smart contract testing: what is the best choice? ISSTA 2021: 566-579 - [c9]Meng Ren, Fuchen Ma, Zijing Yin, Huizhong Li, Ying Fu, Ting Chen, Yu Jiang:
SCStudio: a secure and efficient integrated development environment for smart contracts. ISSTA 2021: 666-669 - [c8]Meng Ren, Fuchen Ma, Zijing Yin, Ying Fu, Huizhong Li, Wanli Chang, Yu Jiang:
Making smart contract development more secure and easier. ESEC/SIGSOFT FSE 2021: 1360-1370 - [i3]Qing Zhang, Xueping Gong, Huizhong Li, Hao Wu, Jiheng Zhang:
Improving Blockchain Consistency by Assigning Weights to Random Blocks. CoRR abs/2107.10467 (2021) - 2020
- [j2]Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin:
The Notion of Transparency Order, Revisited. Comput. J. 63(12): 1915-1938 (2020) - [j1]Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li, Guang Yang, Qian Zhang:
Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. IEEE Trans. Inf. Forensics Secur. 15: 3694-3708 (2020)
2010 – 2019
- 2019
- [c7]Zhaoyang Wang, Qingqi Pei, Xuefeng Liu, Lichuan Ma, Huizhong Li, Shui Yu:
DAPS: A Decentralized Anonymous Payment Scheme with Supervision. ICA3PP (2) 2019: 537-550 - [c6]Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou:
CDAE: Towards Empowering Denoising in Side-Channel Analysis. ICICS 2019: 269-286 - [c5]Yawei Wang, Chenxu Wang, Xiapu Luo, Kaixiang Zhang, Huizhong Li:
A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing. NSS 2019: 167-184 - [c4]Ying Fu, Meng Ren, Fuchen Ma, Heyuan Shi, Xin Yang, Yu Jiang, Huizhong Li, Xiang Shi:
EVMFuzzer: detect EVM vulnerabilities via fuzz testing. ESEC/SIGSOFT FSE 2019: 1110-1114 - [c3]Fuchen Ma, Ying Fu, Meng Ren, Mingzhe Wang, Yu Jiang, Kaixiang Zhang, Huizhong Li, Xiang Shi:
EVM*: From Offline Detection to Online Reinforcement for Ethereum Virtual Machine. SANER 2019: 554-558 - [i2]Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin:
The Notion of Transparency Order, Revisited. IACR Cryptol. ePrint Arch. 2019: 683 (2019) - 2018
- [c2]Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou:
Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations. CARDIS 2018: 1-17 - [i1]Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou, Qian Zhang:
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure. IACR Cryptol. ePrint Arch. 2018: 745 (2018) - 2014
- [c1]Huizhong Li, Bruce K. Gale, Himanshu J. Sant, Jill Shea, Jayant P. Agarwal:
Design, fabrication, and testing of a novel end-to-end vascular coupling system. EMBC 2014: 6593-6596
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint