Privacy in internet of things: From principles to technologies C Li, B Palanisamy IEEE Internet of Things Journal 6 (1), 488-505, 2018 | 123 | 2018 |
Incentivized Blockchain-based Social Media Platforms: A Case Study of Steemit C Li, B Palanisamy Proceedings of the 10th ACM conference on web science, 145-154, 2019 | 121 | 2019 |
Cryptonn: Training neural networks over encrypted data R Xu, JBD Joshi, C Li 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 86 | 2019 |
Measuring decentralization in bitcoin and ethereum using multiple metrics and granularities Q Lin, C Li, X Zhao, X Chen 2021 IEEE 37th International Conference on Data Engineering Workshops (ICDEW …, 2021 | 60 | 2021 |
Scalable and privacy-preserving design of on/off-chain smart contracts C Li, B Palanisamy, R Xu 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW …, 2019 | 52 | 2019 |
Comparison of decentralization in dpos and pow blockchains C Li, B Palanisamy Blockchain–ICBC 2020: Third International Conference, Held as Part of the …, 2020 | 47 | 2020 |
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets R Xu, J Joshi, C Li IEEE Transactions on Dependable and Secure Computing 19 (4), 2807-2820, 2021 | 30 | 2021 |
Decentralized release of self-emerging data using smart contracts C Li, B Palanisamy 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 213-220, 2018 | 27 | 2018 |
Decentralized privacy-preserving timed execution in blockchain-based smart contract platforms C Li, B Palanisamy 2018 IEEE 25th International Conference on High Performance Computing (HiPC …, 2018 | 26 | 2018 |
Differentially private trajectory analysis for points-of-interest recommendation C Li, B Palanisamy, J Joshi 2017 IEEE International Congress on Big Data (BigData Congress), 49-56, 2017 | 23 | 2017 |
Steemops: Extracting and analyzing key operations in steemit blockchain-based social media platform C Li, B Palanisamy, R Xu, J Xu, J Wang Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 18 | 2021 |
Reversecloak: Protecting multi-level location privacy over road networks C Li, B Palanisamy Proceedings of the 24th ACM international on conference on information and …, 2015 | 18 | 2015 |
Timed-release of self-emerging data using distributed hash tables C Li, B Palanisamy 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 17 | 2017 |
Reversible spatio-temporal perturbation for protecting location privacy C Li, B Palanisamy Computer Communications 135, 16-27, 2019 | 16 | 2019 |
Group differential privacy-preserving disclosure of multi-level association graphs B Palanisamy, C Li, P Krishnamurthy 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 11 | 2017 |
Eventwarden: A decentralized event-driven proxy service for outsourcing arbitrary transactions in ethereum-like blockchains C Li, B Palanisamy 2020 IEEE International Conference on Web Services (ICWS), 9-16, 2020 | 9 | 2020 |
De-anonymizable location cloaking for privacy-controlled mobile systems C Li, B Palanisamy Network and System Security: 9th International Conference, NSS 2015, New …, 2015 | 9 | 2015 |
Silentdelivery: Practical timed-delivery of private information using smart contracts C Li, B Palanisamy IEEE Transactions on Services Computing 15 (6), 3528-3540, 2021 | 8 | 2021 |
Nf-crowd: Nearly-free blockchain-based crowdsourcing C Li, B Palanisamy, R Xu, J Wang, J Liu 2020 International Symposium on Reliable Distributed Systems (SRDS), 41-50, 2020 | 8 | 2020 |
k-trustee: Location injection attack-resilient anonymization for location privacy L Jin, C Li, B Palanisamy, J Joshi Computers & Security 78, 212-230, 2018 | 8 | 2018 |