Follow
Chao Li
Chao Li
Verified email at pitt.edu - Homepage
Title
Cited by
Cited by
Year
Privacy in internet of things: From principles to technologies
C Li, B Palanisamy
IEEE Internet of Things Journal 6 (1), 488-505, 2018
742018
Incentivized Blockchain-based Social Media Platforms: A Case Study of Steemit
C Li, B Palanisamy
Proceedings of the 10th ACM conference on web science, 145-154, 2019
582019
Cryptonn: Training neural networks over encrypted data
R Xu, JBD Joshi, C Li
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
512019
Scalable and privacy-preserving design of on/off-chain smart contracts
C Li, B Palanisamy, R Xu
2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW …, 2019
402019
Decentralized release of self-emerging data using smart contracts
C Li, B Palanisamy
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 213-220, 2018
202018
Differentially private trajectory analysis for points-of-interest recommendation
C Li, B Palanisamy, J Joshi
2017 IEEE International Congress on Big Data (BigData Congress), 49-56, 2017
182017
Reversecloak: Protecting multi-level location privacy over road networks
C Li, B Palanisamy
Proceedings of the 24th ACM international on conference on information and …, 2015
182015
Comparison of decentralization in dpos and pow blockchains
C Li, B Palanisamy
International Conference on Blockchain, 18-32, 2020
172020
Decentralized privacy-preserving timed execution in blockchain-based smart contract platforms
C Li, B Palanisamy
2018 IEEE 25th International Conference on High Performance Computing (HiPC …, 2018
162018
Measuring decentralization in bitcoin and ethereum using multiple metrics and granularities
Q Lin, C Li, X Zhao, X Chen
2021 IEEE 37th International Conference on Data Engineering Workshops (ICDEW …, 2021
152021
Timed-release of self-emerging data using distributed hash tables
C Li, B Palanisamy
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
132017
Nn-emd: Efficiently training neural networks using encrypted multi-sourced datasets
R Xu, J Joshi, C Li
IEEE Transactions on Dependable and Secure Computing, 2021
92021
Reversible spatio-temporal perturbation for protecting location privacy
C Li, B Palanisamy
Computer Communications 135, 16-27, 2019
92019
De-anonymizable location cloaking for privacy-controlled mobile systems
C Li, B Palanisamy
International Conference on Network and System Security, 449-458, 2015
92015
Group differential privacy-preserving disclosure of multi-level association graphs
B Palanisamy, C Li, P Krishnamurthy
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
82017
k-Trustee: Location injection attack-resilient anonymization for location privacy
L Jin, C Li, B Palanisamy, J Joshi
Computers & Security 78, 212-230, 2018
72018
Emerge: Self-emerging data release using cloud data storage
C Li, B Palanisamy
2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 26-33, 2017
62017
Silentdelivery: Practical timed-delivery of private information using smart contracts
C Li, B Palanisamy
IEEE Transactions on Services Computing, 2021
52021
SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform
C Li, B Palanisamy, R Xu, J Xu, J Wang
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
42021
Eventwarden: A decentralized event-driven proxy service for outsourcing arbitrary transactions in ethereum-like blockchains
C Li, B Palanisamy
2020 IEEE International Conference on Web Services (ICWS), 9-16, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20