default search action
Yang Shi 0002
Person information
- affiliation: Tongji University, School of Software Engineering, Shanghai, China
- affiliation (2005 - 2011): Pudong CS&S Co., Ltd., Shanghai, China
- affiliation (PhD 2005): Tongji University, Shanghai, China
Other persons with the same name
- Yang Shi — disambiguation page
- Yang Shi 0001 — University of Victoria, Department of Mechanical Engineering, BC, Canada (and 2 more)
- Yang Shi 0003 — Sun Yat-sen University, School of Information Science and Technology, Guangzhou, China
- Yang Shi 0004 — North Carolina State University, NC, USA (and 1 more)
- Yang Shi 0005 — University of California, Irvine, CA, USA
- Yang Shi 0006 — Ocean University of China, Qingdao, China
- Yang Shi 0007 — Tongji University, College of Design and Innovation, Shanghai, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Yang Shi, Yimin Li, Tianyuan Luo, Xiong Jiang, Bowen Du, Hongfei Fan:
Space-Hard Obfuscation Against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-Based Blockchains. IEEE Trans. Cloud Comput. 12(2): 625-643 (2024) - [j22]Yang Shi, Tianyuan Luo, Jingwen Liang, Man Ho Au, Xiapu Luo:
Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains. IEEE Trans. Dependable Secur. Comput. 21(4): 2982-2996 (2024) - [j21]Minyu Teng, Jingxuan Han, Jintao Xie, Jiayao Gao, Jiangfeng Li, Yang Shi:
Obfuscating Ciphertext-Policy Attribute-Based Re-Encryption for Sensor Networks with Cloud Storage. ACM Trans. Sens. Networks 20(5): 110:1-110:39 (2024) - 2023
- [j20]Yinjia Zhang, Qinpei Zhao, Yang Shi, Jiangfeng Li, Weixiong Rao:
Category tree distance: a taxonomy-based transaction distance for web user analysis. Data Min. Knowl. Discov. 37(1): 39-66 (2023) - [j19]Jiayao Gao, Hongfei Fan, Yumei Zhao, Yang Shi:
Leveraging Deep Learning for IoT Transceiver Identification. Entropy 25(8): 1191 (2023) - [j18]Xiaoling Huang, Youxia Dong, Guodong Ye, Yang Shi:
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform. Frontiers Comput. Sci. 17(3): 173804 (2023) - [j17]Qinpei Zhao, Lingjun Fan, Yinjia Zhang, Jiangfeng Li, Yang Shi, Weixiong Rao, Xiang Liu:
DualTaxoVec: Web user embedding and taxonomy generation. Knowl. Based Syst. 271: 110565 (2023) - [c17]Jiangfeng Li, Hao Luo, Qinpei Zhao, Yang Shi, Chenxi Zhang, Ming Li, Xuefeng Li:
CTKM: Crypto-Based User Clustering on Web Transaction Data. ADMA (5) 2023: 359-373 - 2022
- [j16]Guodong Ye, Huishan Wu, Min Liu, Yang Shi:
Image encryption scheme based on blind signature and an improved Lorenz system. Expert Syst. Appl. 205: 117709 (2022) - [c16]Tianyuan Luo, Yang Shi:
Efficiently Obfuscating Proxy Signature for Protecting Signing Keys on Untrusted Cloud Servers. CSCWD 2022: 705-710 - [c15]Yang Shi, Junqing Liang, Mianhong Li, Tianchen Ma, Guodong Ye, Jiangfeng Li, Qinpei Zhao:
Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications. RAID 2022: 129-142 - 2021
- [j15]Jiangfeng Li, Yifan Yu, Shili Hu, Yang Shi, Shengjie Zhao, Chenxi Zhang:
A blockchain-based authority management framework in traceability systems. Int. J. Comput. Sci. Eng. 24(1): 42-54 (2021) - [c14]Shili Hu, Jiangfeng Li, Qinpei Zhao, Chenxi Zhang, Zijian Zhang, Yang Shi:
BlockDL: Privacy-Preserving and Crowd-Sourced Deep Learning Through Blockchain. ISCC 2021: 1-7 - [c13]Yang Shi, Mianhong Li, Wujing Wei, Yangyang Liu, Xiapu Luo:
Secure and Efficient White-box Encryption Scheme for Data Protection against Shared Cache Attacks in Cloud Computing. ISSRE 2021: 446-456 - [c12]Lei Xue, Hao Zhou, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au:
Happer: Unpacking Android Apps via a Hardware-Assisted Approach. SP 2021: 1641-1658 - 2020
- [j14]Guodong Ye, Chen Pan, Youxia Dong, Yang Shi, Xiaoling Huang:
Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process. 172: 107563 (2020) - [j13]Yang Shi, Wujing Wei, Fangguo Zhang, Xiapu Luo, Zongjian He, Hongfei Fan:
SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT. IEEE Trans. Ind. Informatics 16(3): 1602-1616 (2020) - [c11]Qiuyue Han, Yang Yang, Zhiyuan Ma, Jiangfeng Li, Yang Shi, Junjie Zhang, Sheng Yang:
CMBIoV: Consensus Mechanism for Blockchain on Internet of Vehicles. BlockSys 2020: 347-352
2010 – 2019
- 2019
- [j12]Yang Shi, Qing Zhang, Jingwen Liang, Zongjian He, Hongfei Fan:
Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing. IEEE Syst. J. 13(3): 2918-2929 (2019) - [j11]Yang Shi, Wujing Wei, Hongfei Fan, Man Ho Au, Xiapu Luo:
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices. IEEE Trans. Computers 68(10): 1411-1427 (2019) - [c10]Jiangfeng Li, Shili Hu, Yang Shi, Chenxi Zhang:
A Blockchain-Based Trustable Framework for IoT Data Storage and Access. BlockSys 2019: 336-349 - 2018
- [j10]Yang Shi, Jingxuan Han, Jiangfeng Li, Guoyue Xiong, Qinpei Zhao:
Identity-based undetachable digital signature for mobile agents in electronic commerce. Soft Comput. 22(20): 6921-6935 (2018) - [c9]Yang Shi, Jingwen Liang, Jingxuan Han, Jiayao Gao, Guoyue Xiong, Hongfei Fan:
Intrusion-Resilient Undetachable Digital Signature for Mobile-Agent-Based Collaborative Business Systems. CSCWD 2018: 401-406 - 2017
- [j9]Hongfei Fan, Hongming Zhu, Qin Liu, Yang Shi, Chengzheng Sun:
A Novel DAL Scheme With Shared-Locking for Semantic Conflict Prevention in Unconstrained Real-Time Collaborative Programming. IEEE Access 5: 22566-22583 (2017) - [j8]Yang Shi, Jingxuan Han, Xiaoping Wang, Jiayao Gao, Hongfei Fan:
An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems. IEEE Internet Things J. 4(4): 1067-1081 (2017) - [j7]Yang Shi, Xiaoping Wang, Hongfei Fan:
Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices. IEEE Trans. Consumer Electron. 63(1): 44-52 (2017) - [j6]Yang Shi, Hongfei Fan, Qin Liu:
An Obfuscatable Designated Verifier Signature Scheme. IEEE Trans. Emerg. Top. Comput. 5(2): 271-285 (2017) - [c8]Yang Shi, Shupei Wang, Qinpei Zhao, Jiangfeng Li:
A Hybrid Approach of HTTP Anomaly Detection. APWeb/WAIM Workshops 2017: 128-137 - [c7]Hongfei Fan, Jiayao Gao, Hongming Zhu, Qin Liu, Yang Shi, Chengzheng Sun:
Balancing Conflict Prevention and Concurrent Work in Real-Time Collaborative Programming. ChineseCSCW 2017: 217-220 - [c6]Hongfei Fan, Hongmmg Zhu, Qin Liu, Yang Shi, Chengzheng Sun:
Shared-locking for semantic conflict prevention in real-time collaborative programming. CSCWD 2017: 174-179 - 2016
- [j5]Yang Shi, Jingxuan Han, Hongfei Fan, Qinpei Zhao, Qin Liu:
Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation. IEEE Access 4: 6401-6415 (2016) - [j4]Yang Shi, Jie Lin, Guoyue Xiong, Xiaoping Wang, Hongfei Fan:
Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce. Mob. Inf. Syst. 2016: 4375072:1-4375072:18 (2016) - [c5]Yang Shi, Wujing Wei, Zongjian He, Hongfei Fan:
An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices. ACSAC 2016: 16-29 - [c4]Qinpei Zhao, Zhenyu Liao, Jiangfeng Li, Yang Shi:
A Comparative Study on EM Algorithms for Color-Texture Image Segmentation. ICCCNT 2016: 18:1-18:6 - [c3]Qinpei Zhao, Zhenyu Liao, Jiangfeng Li, Yang Shi, Qirong Tang:
A Split Smart Swap Clustering for Clutter Problem in Web Mapping System. WI 2016: 439-443 - 2015
- [j3]Qinpei Zhao, Yang Shi, Qin Liu, Pasi Fränti:
A grid-growing clustering algorithm for geo-spatial data. Pattern Recognit. Lett. 53: 77-84 (2015) - [j2]Yang Shi, Wujing Wei, Zongjian He:
A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs. Sensors 15(5): 11928-11952 (2015) - [c2]Yang Shi, Hongfei Fan:
On Security of a White-Box Implementation of SHARK. ISC 2015: 455-471 - 2014
- [c1]Yang Shi, Zongjian He:
A lightweight white-box symmetric encryption algorithm against node capture for WSNs. WCNC 2014: 3058-3063 - 2013
- [j1]Yang Shi, Qin Liu, Qinpei Zhao:
A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts. J. Appl. Math. 2013: 431794:1-431794:9 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 22:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint