default search action
Yue Li 0037
Person information
- affiliation: Peking University, School of Computer Science, HCST, Beijing, China
Other persons with the same name
- Yue Li — disambiguation page
- Yue Li 0001 — California Institute of Technology, Pasadena, CA, USA (and 1 more)
- Yue Li 0002 — College of William & Mary, Williamsburg, VA, USA
- Yue Li 0003 — Jilin University, Department of Information, College of Communication Engineering, Changchun, China
- Yue Li 0004 — City University of Hong Kong, Department of Mechanical and Biomedical Engineering, Hong Kong
- Yue Li 0005 — Purdue University, West Lafayette, IN, USA
- Yue Li 0006 — Nanjing University, China (and 2 more)
- Yue Li 0007 — University of Victoria, Department of Electrical and Computer Engineering, BC, Canada
- Yue Li 0008 — Hong Kong University of Science and Technology, Department of Electrical and Computer Engineering, Hong Kong
- Yue Li 0009 — Tsinghua University, Department of Electronic Engineering, Microwave and Antenna Institute, Beijing, China
- Yue Li 0010 — Donghua University, School of Computer Science and Technology, Shanghai, China (and 1 more)
- Yue Li 0011 — University of Rennes 1, France
- Yue Li 0012 — University of Karlsruhe, Germany
- Yue Li 0013 — Nankai University, College of Software, Tianjin, China (and 1 more)
- Yue Li 0014 — Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA, USA
- Yue Li 0015 — Bytedance Inc., San Diego, CA, USA (and 1 more)
- Yue Li 0016 — Hunan University, School of Information Science and Engineering, Changsha, China
- Yue Li 0017 — Massachusetts Institute of Technology, Computer Science and Artificial Intelligence Laboratory, Boston, MA, USA (and 1 more)
- Yue Li 0018 — Harbin Institute of Technology, Communications Engineering Research Center, Shenzhen, China
- Yue Li 0019 — Florida International University, School of Computing and Information Sciences, Miami, FL, USA (and 2 more)
- Yue Li 0020 — Wuhan University of Science and Engineering, Wuhan, China
- Yue Li 0021 — Heriot-Watt University, School of Mathematical and Computer Sciences, Edinburgh, UK
- Yue Li 0022 — Naval Aviation University, College of Basic Science for Aviation, Yantai, China
- Yue Li 0023 — Xi'an Jiaotong-Liverpool University, Suzhou, China (and 1 more)
- Yue Li 0024 — Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
- Yue Li 0025 — Chinese University of Hong Kong, Department of Geography and Resource Management, Hong Kong
- Yue Li 0026 — University College Dublin, School of Electrical and Electronic Engineering, Dublin, Ireland
- Yue Li 0027 — Nanjing University of Aeronautics and Astronautics, College of Automation Engineering, Nanjing, China
- Yue Li 0028 — Capital Normal University, Information Engineering College, Beijing, China
- Yue Li 0029 — University of Science and Technology Beijing, School of Computer and Communication Engineering, Beijing, China
- Yue Li 0030 — Zhejiang University, College of Electrical Engineering, Hangzhou, China
- Yue Li 0031 — Case Western Reserve University, Department of Civil Engineering, Cleveland, OH, USA (and 1 more)
- Yue Li 0032 — National University of Defense Technology, Laboratory of Science and Technology on Integrated Logistics Support, Changsha, China
- Yue Li 0033 — AIG Software, Jersey City, NJ, USA (and 1 more)
- Yue Li 0034 — University of New South Wales, UNSW, School of Electrical Engineering and Telecommunications, Sydney, Australia
- Yue Li 0035 — Télécom ParisTech, INFRES, France,
- Yue Li 0036 — University of Amsterdam, Atlas Lab, The Netherlands (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Yue Li, Han Liu, Jianbo Gao, Jiashuo Zhang, Zhi Guan, Zhong Chen:
Accelerating block lifecycle on blockchain via hardware transactional memory. J. Parallel Distributed Comput. 184: 104779 (2024) - [j3]Qian Ren, Yue Li, Yingjun Wu, Yuchen Wu, Hong Lei, Lei Wang, Bangdao Chen:
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network. IEEE Trans. Inf. Forensics Secur. 19: 88-103 (2024) - [c21]Che Wang, Yue Li, Jianbo Gao, Ke Wang, Jiashuo Zhang, Zhi Guan, Zhong Chen:
SolaSim: Clone Detection for Solana Smart Contracts via Program Representation. ICPC 2024: 258-269 - [c20]Ke Wang, Yue Li, Che Wang, Jianbo Gao, Zhi Guan, Zhong Chen:
XGuard: Detecting Inconsistency Behaviors of Crosschain Bridges. SIGSOFT FSE Companion 2024: 612-616 - 2023
- [j2]Zhenhao Wu, Jianbo Gao, Jiashuo Zhang, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
DFHelper: Help clients to participate in federated learning tasks. Appl. Intell. 53(10): 12749-12773 (2023) - [c19]Ke Wang, Jianbo Gao, Qiao Wang, Jiashuo Zhang, Yue Li, Zhi Guan, Zhong Chen:
Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance. ACSAC 2023: 216-228 - [c18]Libin Xia, Jiashuo Zhang, Xihan Zhang, Yue Li, Jianbo Gao, Zhi Guan, Zhong Chen:
DIDAPPER: A Practical and Auditable On-Chain Identity Service for Decentralized Applications. DAPPS 2023: 151-157 - [c17]Jiashuo Zhang, Yue Li, Jianbo Gao, Zhi Guan, Zhong Chen:
Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts. ICSE Companion 2023: 31-35 - 2022
- [c16]Qian Ren, Yingjun Wu, Han Liu, Yue Li, Anne Victor, Hong Lei, Lei Wang, Bangdao Chen:
Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation. ACSAC 2022: 117-131 - [c15]Jianbo Gao, Jiashuo Zhang, Yue Li, Jiakun Hao, Ke Wang, Zhi Guan, Zhong Chen:
PShard: A Practical Sharding Protocol for Enterprise Blockchain. ICBTA 2022: 110-116 - [c14]Jianbo Gao, Jiashuo Zhang, Yue Li, Jiakun Hao, Ke Wang, Zhi Guan, Zhong Chen:
ChainDB: Ensuring Integrity of Querying Off-Chain Data on Blockchain. ICBTA 2022: 175-181 - [c13]Jiashuo Zhang, Jianbo Gao, Ke Wang, Zhenhao Wu, Yue Li, Zhi Guan, Zhong Chen:
TBFT: Efficient Byzantine Fault Tolerance Using Trusted Execution Environment. ICC 2022: 1004-1009 - [c12]Jiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, Zhong Chen:
Xscope: Hunting for Cross-Chain Bridge Attacks. ASE 2022: 171:1-171:4 - [c11]Yu Dong, Yue Li, Dongqi Cui, Jianbo Gao, Zhi Guan, Zhong Chen:
Smifier: A Smart Contract Verifier for Composite Transactions. SEKE 2022: 507-512 - [i5]Qian Ren, Yingjun Wu, Yue Li, Han Liu, Hong Lei, Lei Wang, Bangdao Chen:
TENET: Towards Self-sovereign and Fair Multi-party Computation Ecology Empowered by Decentralized TEE Network. CoRR abs/2202.10206 (2022) - [i4]Jiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, Zhong Chen:
Xscope: Hunting for Cross-Chain Bridge Attacks. CoRR abs/2208.07119 (2022) - 2021
- [c10]Ying Lan, Jianbo Gao, Yue Li, Ke Wang, Yuesheng Zhu, Zhong Chen:
TrustCross: Enabling Confidential Interoperability across Blockchains Using Trusted Hardware. ICBTA 2021: 17-23 - [c9]Yue Li, Han Liu, Yuanliang Chen, Jianbo Gao, Zhenhao Wu, Zhi Guan, Zhong Chen:
FASTBLOCK: Accelerating Blockchains via Hardware Transactional Memory. ICDCS 2021: 250-260 - [c8]Qian Ren, Han Liu, Yue Li, Hong Lei:
Demo: Cloak: A Framework For Development of Confidential Blockchain Smart Contracts. ICDCS 2021: 1102-1105 - [i3]Qian Ren, Han Liu, Yue Li, Hong Lei:
CLOAK: A Framework For Development of Confidential Blockchain Smart Contracts. CoRR abs/2106.13460 (2021) - [i2]Qian Ren, Han Liu, Yue Li, Hong Lei, Lei Wang, Bangdao Chen:
CLOAK: Towards Practical Development and Deployment of Confidential Smart Contracts. CoRR abs/2106.13926 (2021) - 2020
- [j1]Chao Liu, Jianbo Gao, Yue Li, Huihui Wang, Zhong Chen:
Studying gas exceptions in blockchain-based cloud applications. J. Cloud Comput. 9: 35 (2020) - [c7]Yue Li, Han Liu, Zhiqiang Yang, Qian Ren, Lei Wang, Bangdao Chen:
SafePay on Ethereum: A Framework For Detecting Unfair Payments in Smart Contracts. ICDCS 2020: 1219-1222 - [c6]Zhiqiang Yang, Han Liu, Yue Li, Huixuan Zheng, Lei Wang, Bangdao Chen:
Seraph: enabling cross-platform security analysis for EVM and WASM smart contracts. ICSE (Companion Volume) 2020: 21-24 - [c5]Zhenhao Wu, Jiashuo Zhang, Jianbo Gao, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
Kaya: A Testing Framework for Blockchain-based Decentralized Applications. ICSME 2020: 826-829 - [c4]Wentian Yan, Jianbo Gao, Zhenhao Wu, Yue Li, Zhi Guan, Qingshan Li, Zhong Chen:
EShield: protect smart contracts against reverse engineering. ISSTA 2020: 553-556 - [c3]Yue Li, Han Liu, Zhiqiang Yang, Bin Wang, Qian Ren, Lei Wang, Bangdao Chen:
Protect Your Smart Contract Against Unfair Payment. SRDS 2020: 61-70 - [i1]Zhenhao Wu, Jiashuo Zhang, Jianbo Gao, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
Kaya: A Testing Framework for Blockchain-based Decentralized Applications. CoRR abs/2006.01476 (2020)
2010 – 2019
- 2019
- [c2]Chao Liu, Jianbo Gao, Yue Li, Zhong Chen:
Understanding Out of Gas Exceptions on Ethereum. BlockSys 2019: 505-519 - [c1]Jianbo Gao, Han Liu, Yue Li, Chao Liu, Zhiqiang Yang, Qingshan Li, Zhi Guan, Zhong Chen:
Towards automated testing of blockchain-based decentralized applications. ICPC 2019: 294-299
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint