Jiangshan Yu (于江山)
Jiangshan Yu (于江山)
Associate Professor, University of Sydney
Verified email at - Homepage
Cited by
Cited by
Towards fair and privacy-preserving federated deep models
L Lyu, J Yu, K Nandakumar, Y Li, X Ma, J Jin, H Yu, KS Ng
IEEE Transactions on Parallel and Distributed Systems 31 (11), 2524-2541, 2020
Security analysis methods on ethereum smart contract vulnerabilities: a survey
P Praitheeshan, L Pan, J Yu, J Liu, R Doss
arXiv preprint arXiv:1908.08605, 2019
RepuCoin: Your Reputation is Your Power
J Yu, D Kozhaya, J Decouchant, P Esteves-Verissimo
IEEE Transactions on Computers, 2019
Sok: Dag-based blockchain systems
Q Wang, J Yu, S Chen, Y Xiang
ACM Computing Surveys 55 (12), 1-38, 2023
Coopedge: A decentralized blockchain-based platform for cooperative edge computing
L Yuan, Q He, S Tan, B Li, J Yu, F Chen, H Jin, Y Yang
Proceedings of the Web Conference 2021, 2245-2257, 2021
An Efficient Generic Framework for Three-Factor Authentication with Provably Secure Instantiation
J Yu, G Wang, Y Mu, W Gao
IEEE Transactions on Information Forensics and Security 9 (12), 2302-2313, 2014
Security analysis of a single sign-on mechanism for distributed computer networks
G Wang, J Yu, Q Xie
IEEE Transactions on Industrial Informatics 9 (1), 294-302, 2012
Deconstructing blockchains: A comprehensive survey on consensus, membership and structure
C Natoli, J Yu, V Gramoli, P Esteves-Verissimo
arXiv preprint arXiv:1908.08316, 2019
DTKI: A New Formalized PKI with Verifiable Trusted Parties
J Yu, V Cheval, M Ryan
The Computer Journal 59 (11), 1695-1713, 2016
On the optionality and fairness of atomic swaps
R Han, H Lin, J Yu
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
Proof-of-QoS: QoS based blockchain consensus protocol
B Yu, J Liu, S Nepal, J Yu, P Rimba
Computers & Security 87, 101580, 2019
New empirical traceability analysis of CryptoNote-style blockchains
Z Yu, MH Au, J Yu, R Yang, Q Xu, WF Lau
International Conference on Financial Cryptography and Data Security, 133-149, 2019
How to democratise and protect AI: Fair and differentially private decentralised deep learning
L Lyu, Y Li, K Nandakumar, J Yu, X Ma
IEEE Transactions on Dependable and Secure Computing 19 (2), 1003-1017, 2020
Exploring the monero peer-to-peer network
T Cao, J Yu, J Decouchant, X Luo, P Verissimo
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
Security Analysis on dBFT protocol of NEO
Q Wang, J Yu, Z Peng, VC Bui, S Chen, Y Ding, Y Xiang
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
DECIM: Detecting endpoint compromise in messaging
J Yu, M Ryan, C Cremers
IEEE Transactions on Information Forensics and Security, 2017
Impact of temporary fork on the evolution of mining pools in blockchain networks: An evolutionary game analysis
C Chen, X Chen, J Yu, W Wu, D Wu
IEEE Transactions on Network Science and Engineering 8 (1), 400-418, 2020
DAMYSUS: streamlined BFT consensus leveraging trusted components
J Decouchant, D Kozhaya, V Rahli, J Yu
Proceedings of the Seventeenth European Conference on Computer Systems, 1-16, 2022
Provably secure single sign-on scheme in distributed systems and networks
J Yu, G Wang, Y Mu
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
ANCHOR: Logically centralized security for software-defined networks
D Kreutz, J Yu, FMV Ramos, P Esteves-Verissimo
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-36, 2019
The system can't perform the operation now. Try again later.
Articles 1–20