A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling L Lao, Z Li, S Hou, B Xiao, S Guo, Y Yang ACM Computing Surveys (CSUR) 53 (1), 1-32, 2020 | 328 | 2020 |
Security threats in the data plane of software-defined networks S Gao, Z Li, B Xiao, G Wei IEEE network 32 (4), 108-113, 2018 | 90 | 2018 |
Vehicle safety improvement through deep learning and mobile sensing Z Peng, S Gao, Z Li, B Xiao, Y Qian IEEE network 32 (4), 28-33, 2018 | 79 | 2018 |
Power adjusting and bribery racing: Novel mining attacks in the bitcoin system S Gao, Z Li, Z Peng, B Xiao Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 71 | 2019 |
B-DNS: A secure and efficient DNS based on the blockchain technology Z Li, S Gao, Z Peng, S Guo, Y Yang, B Xiao IEEE Transactions on Network Science and Engineering 8 (2), 1674-1686, 2021 | 35 | 2021 |
Evaluating the credibility of cloud services Z Li, L Liao, H Leung, B Li, C Li Computers & Electrical Engineering 58, 161-175, 2017 | 25 | 2017 |
Abnormal Traffic Detection: Traffic Feature Extraction and DAE-GAN With Efficient Data Augmentation Z Li, S Chen, H Dai, D Xu, CK Chu, B Xiao IEEE Transactions on Reliability 72 (2), 498-510, 2022 | 18 | 2022 |
Securing deployed smart contracts and DeFi with distributed TEE cluster Z Li, B Xiao, S Guo, Y Yang IEEE Transactions on Parallel and Distributed Systems 34 (3), 828-842, 2022 | 13 | 2022 |
Solsaviour: A defending framework for deployed defective smart contracts Z Li, Y Zhou, S Guo, B Xiao Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 13 | 2021 |
Pistis: Issuing Trusted and Authorized Certificates With Distributed Ledger and TEE Z Li, H Wu, LH Lao, S Guo, Y Yang, B Xiao IEEE Transactions on Parallel and Distributed Systems 33 (7), 1636-1649, 2021 | 9 | 2021 |
Software-defined firewall: Enabling malware traffic detection and programmable security control S Gao, Z Li, Y Yao, B Xiao, S Guo, Y Yang Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 9 | 2018 |
Enabling Privacy-Preserving and Efficient Authenticated Graph Queries on Blockchain-Assisted Clouds H Wu, Z Li, R Song, B Xiao IEEE Transactions on Knowledge and Data Engineering 35 (9), 9728-9742, 2023 | 4 | 2023 |
n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi J Wang, J Li, Z Li, X Deng, B Xiao European Symposium on Research in Computer Security, 367-386, 2023 | 1 | 2023 |