


default search action
Peiyao Sheng
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c10]Weizhao Tang, Peiyao Sheng, Ronghao Ni, Pronoy Roy, Xuechao Wang, Giulia Fanti, Pramod Viswanath:
CFT-Forensics: High-Performance Byzantine Accountability for Crash Fault Tolerant Protocols. AFT 2024: 3:1-3:25 - [c9]Peiyao Sheng, Ranvir Rana, Senthil Bala, Himanshu Tyagi, Pramod Viswanath:
Proof of Diligence: Cryptoeconomic Security for Rollups. AFT 2024: 5:1-5:24 - [c8]Peiyao Sheng, Nikita Yadav, Vishal Sevani, Arun Babu, Anand SVR, Himanshu Tyagi, Pramod Viswanath:
Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth. NDSS 2024 - [i13]Peiyao Sheng, Ranvir Rana, Himanshu Tyagi, Pramod Viswanath:
Proof of Diligence: Cryptoeconomic Security for Rollups. CoRR abs/2402.07241 (2024) - [i12]Peiyao Sheng, Vishal Sevani, Ranvir Rana, Himanshu Tyagi, Pramod Viswanath:
BFT-PoLoc: A Byzantine Fortified Trigonometric Proof of Location Protocol using Internet Delays. CoRR abs/2403.13230 (2024) - [i11]Niusha Moshrefi, Peiyao Sheng, Soubhik Deb, Sreeram Kannan, Pramod Viswanath:
Unconditionally Safe Light Client. CoRR abs/2405.01459 (2024) - [i10]Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, Maofan Yin:
On Orchestrating Parallel Broadcasts for Distributed Ledgers. CoRR abs/2407.00030 (2024) - [i9]Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, Maofan Yin:
On Orchestrating Parallel Broadcasts for Distributed Ledgers. IACR Cryptol. ePrint Arch. 2024: 923 (2024) - 2023
- [c7]Peiyao Sheng, Xuechao Wang, Sreeram Kannan, Kartik Nayak, Pramod Viswanath:
TrustBoost: Boosting Trust among Interoperable Blockchains. CCS 2023: 1571-1584 - [c6]Peiyao Sheng
, Gerui Wang
, Kartik Nayak
, Sreeram Kannan
, Pramod Viswanath
:
Player-Replaceability and Forensic Support Are Two Sides of the Same (Crypto) Coin. FC (1) 2023: 56-74 - [i8]Weizhao Tang, Peiyao Sheng, Pronoy Roy, Xuechao Wang, Giulia Fanti, Pramod Viswanath:
Raft-Forensics: High Performance CFT Consensus with Accountability for Byzantine Faults. CoRR abs/2305.09123 (2023) - [i7]Suma Bhat, Canhui Chen, Zerui Cheng, Zhixuan Fang, S. Ashwin Hebbar, Sreeram Kannan, Ranvir Rana, Peiyao Sheng, Himanshu Tyagi, Pramod Viswanath, Xuechao Wang:
SAKSHI: Decentralized AI Platforms. CoRR abs/2307.16562 (2023) - 2022
- [c5]S. V. R. Anand, Serhat Arslan
, Rajat Chopra, Sachin Katti, Milind Kumar Vaddiraju, Ranvir Rana, Peiyao Sheng, Himanshu Tyagi, Pramod Viswanath:
Trust-free service measurement and payments for decentralized cellular networks. HotNets 2022: 68-75 - [i6]Peiyao Sheng, Nikita Yadav, Vishal Sevani, Arun Babu, S. V. R. Anand, Himanshu Tyagi, Pramod Viswanath:
Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth. CoRR abs/2210.11546 (2022) - [i5]Xuechao Wang, Peiyao Sheng, Sreeram Kannan, Kartik Nayak, Pramod Viswanath:
TrustBoost: Boosting Trust among Interoperable Blockchains. CoRR abs/2210.11571 (2022) - [i4]Xuechao Wang, Peiyao Sheng, Sreeram Kannan, Kartik Nayak, Pramod Viswanath:
TrustBoost: Boosting Trust among Interoperable Blockchains. IACR Cryptol. ePrint Arch. 2022: 1428 (2022) - [i3]Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath:
Player-Replaceability and Forensic Support are Two Sides of the Same (Crypto) Coin. IACR Cryptol. ePrint Arch. 2022: 1513 (2022) - 2021
- [c4]Peiyao Sheng, Gerui Wang
, Kartik Nayak, Sreeram Kannan, Pramod Viswanath:
BFT Protocol Forensics. CCS 2021: 1722-1743 - [c3]Peiyao Sheng, Bowen Xue, Sreeram Kannan, Pramod Viswanath:
ACeD: Scalable Data Availability Oracle. Financial Cryptography (2) 2021: 299-318 - 2020
- [i2]Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath:
BFT Protocol Forensics. CoRR abs/2010.06785 (2020) - [i1]Peiyao Sheng, Bowen Xue, Sreeram Kannan, Pramod Viswanath:
ACeD: Scalable Data Availability Oracle. CoRR abs/2011.00102 (2020)
2010 – 2019
- 2019
- [c2]Peiyao Sheng, Zhuolin Yang, Yanmin Qian:
GANs for Children: A Generative Data Augmentation Strategy for Children Speech Recognition. ASRU 2019: 129-135 - 2018
- [c1]Peiyao Sheng, Zhuolin Yang, Hu Hu, Tian Tan, Yanmin Qian:
Data Augmentation using Conditional Generative Adversarial Networks for Robust Speech Recognition. ISCSLP 2018: 121-125
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint