


default search action
Larry Shi
Person information
- affiliation: University of Houston, TX, USA
Other persons with the same name
- Weidong Shi — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[i38]Xinyu Hou, Yang Lu, Rabimba Karanjai, Lei Xu, Weidong Shi:
zkRansomware: Proof-of-Data Recoverability and Multi-round Game Theoretic Modeling of Ransomware Decisions. CoRR abs/2601.06667 (2026)- 2025
[j25]Ngoc-Son Pham
, Sangwon Shin, Lei Xu, Weidong Shi, Taeweon Suh
:
Cross-Filter Structured Pruning for Efficient Sparse CNN Acceleration. IEEE Access 13: 129461-129475 (2025)
[j24]Liangde Tao, Lin Chen
, Lei Xu, Weidong Shi, Md Mahabub Uz Zaman, Ahmed Sunny:
Bribery in elections with randomly selected voters: Hardness and algorithm. Theor. Comput. Sci. 1036: 115150 (2025)
[c102]Dana R. Alsagheer, Abdulrahman Kamal, Mohammad Kamal, Cosmo Yang Wu, Weidong Shi:
The Lawyer That Never Thinks: Consistency and Fairness as Keys to Reliable AI. ACL (1) 2025: 9943-9954
[c101]Rabimba Karanjai, Lei Xu, Weidong Shi:
Securing Smart Contract Languages with a Unified Agentic Framework for Vulnerability Repair in Solidity and Move. AIware 2025: 1-10
[c100]Rabimba Karanjai, Lei Xu, Weidong Shi:
HPCAgentTester: a Multi-Agent LLM Approach for Enhanced HPC Unit Test Generation. AIware 2025: 213-222
[c99]Nour Diallo, Lei Xu, Yang Lu, Dana R. Alsagheer, Weidong Larry Shi:
DAGWise++: GNN-Based Adaptive Optimization for DAG-BFT Consensus. BRAINS 2025: 1-9
[c98]Rabimba Karanjai, Yang Lu, Lei Xu, Weidong Larry Shi:
Unlocking On-Chain Intelligence: A Practical Framework for GenAI-Powered Smart Contracts. BRAINS 2025: 1-3
[c97]Nour Diallo, Lei Xu, Dana Alsagheer, Yang Lu, Larry Shi:
Optimized Consensus with DAGWise: A GNN-Enhanced Approach for Scalable and Fault-Tolerant DAG-Based BFT. ICBC 2025: 1-5
[c96]Xinyu Hou, Yang Lu, Rabimba Karanjai, Lei Xu, Larry Shi:
Ransomware 3.0: Enhancing Risk Management and Mitigation Options with Proof-of-Decryptability and Smart Contracts. ICBC 2025: 1-5
[c95]Sangwon Shin, Ngoc-Son Pham, Lei Xu, Weidong Shi, Taeweon Suh:
HBM-Aware Number Theoretic Transform Accelerator for Zero-Knowledge Proof. ICCD 2025: 127-130
[c94]Yang Lu
, Rabimba Karanjai
, Dana Alsagheer
, Keshav Kasichainula
, Lei Xu
, Weidong Shi
, Shou-Hsuan Stephen Huang
:
LogBabylon: A Unified Framework for Cross-Log File Integration and Analysis. SAC 2025: 1953-1960
[c93]Rabimba Karanjai
, Sam Blackshear
, Lei Xu
, Weidong Shi
:
Collaboration is all you need: LLM Assisted Safe Code Translation. SIGSOFT FSE Companion 2025: 671-675
[i37]Rabimba Karanjai, Lei Xu, Weidong Shi:
Weaving the Cosmos: WASM-Powered Interchain Communication for AI Enabled Smart Contracts. CoRR abs/2502.17604 (2025)
[i36]Rabimba Karanjai, Sam Blackshear, Lei Xu, Weidong Shi:
A Multi-Agent Framework for Automated Vulnerability Detection and Repair in Solidity and Move Smart Contracts. CoRR abs/2502.18515 (2025)
[i35]Rabimba Karanjai, Sam Blackshear, Lei Xu, Weidong Shi:
Collaboration is all you need: LLM Assisted Safe Code Translation. CoRR abs/2503.11237 (2025)
[i34]Rabimba Karanjai, Boris Shor, Amanda Austin, Ryan Kennedy, Yang Lu, Lei Xu, Weidong Shi:
Synthesizing Public Opinions with LLMs: Role Creation, Impacts, and the Future to eDemorcacy. CoRR abs/2504.00241 (2025)
[i33]Dana Alsagheer, Abdulrahman Kamal, Mohammad Kamal, Weidong Shi:
Governance Challenges in Reinforcement Learning from Human Feedback: Evaluator Rationality and Reinforcement Stability. CoRR abs/2504.13972 (2025)
[i32]Dana Alsagheer, Yang Lu, Abdulrahman Kamal, Omar Kamal, Mohammad Kamal, Nada Mansour, Cosmo Yang Wu, Rabimba Karanjai, Sen Li, Weidong Shi:
From General Reasoning to Domain Expertise: Uncovering the Limits of Generalization in Large Language Models. CoRR abs/2506.21580 (2025)
[i31]Ranjith Chodavarapu, Rabimba Karanjai, Xinxin Fan, Weidong Shi, Lei Xu:
Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3. CoRR abs/2510.12062 (2025)
[i30]Rabimba Karanjai, Yang Lu, Ranjith Chodavarapu, Lei Xu, Weidong Shi:
Evaluating the Quality of Randomness and Entropy in Tasks Supported by Large Language Models. CoRR abs/2510.12080 (2025)
[i29]Rabimba Karanjai, Hemanth Hegadehalli Madhavarao, Lei Xu, Weidong Shi:
QuCoWE Quantum Contrastive Word Embeddings with Variational Circuits for NearTerm Quantum Devices. CoRR abs/2511.10179 (2025)
[i28]Rabimba Karanjai, Lei Xu, Weidong Shi:
HPCAgentTester: A Multi-Agent LLM Approach for Enhanced HPC Unit Test Generation. CoRR abs/2511.10860 (2025)- 2024
[j23]Ngoc-Son Pham
, Sangwon Shin, Lei Xu
, Weidong Shi, Taeweon Suh
:
StarSPA: Stride-Aware Sparsity Compression for Efficient CNN Acceleration. IEEE Access 12: 10893-10909 (2024)
[j22]Lin Chen
, Lei Xu
, Zhimin Gao
, Ahmed Imtiaz Sunny
, Keshav Kasichainula
, Weidong Shi
:
A Game Theoretical Analysis of Non-linear Blockchain System. Distributed Ledger Technol. Res. Pract. 3(1): 3:1-3:24 (2024)
[j21]Rabimba Karanjai
, Keshav Kasichainula, Lei Xu
, Nour Diallo, Lin Chen, Weidong Shi
:
DIaC: Re-Imagining Decentralized Infrastructure as Code Using Blockchain. IEEE Trans. Netw. Serv. Manag. 21(2): 1319-1332 (2024)
[c92]Rabimba Karanjai
, Lei Xu
, Weidong Shi
:
SolMover: Smart Contract Code Translation Based on Concepts. AIware 2024
[c91]Jiahui Shao, Maochao Xu, Rui Fang, Xiaoxiao Hu, Weidong Shi, Dana Alsagheer:
Reconstitution of NFTs Based on a Game Theory Model. FC Workshops 2024: 313-334
[c90]Rabimba Karanjai
, Sangwon Shin
, Wujie Xiong
, Xinxin Fan
, Lin Chen
, Tianwei Zhang
, Taeweon Suh
, Weidong Shi
, Veronika Kuchta
, Francesco Sica
, Lei Xu
:
TPU as Cryptographic Accelerator. HASP@MICRO 2024: 37-44
[c89]Rabimba Karanjai, Weidong Shi:
Trusted LLM Inference on the Edge with Smart Contracts. ICBC 2024: 1-7
[c88]Rabimba Karanjai, Lei Xudagger, Weidong Shi:
SolMover: Feasibility of Using LLMs for Translating Smart Contracts. ICBC 2024: 1-3
[c87]Rabimba Karanjai
, Lei Xu
, Lin Chen
, Nour Diallo
, Weidong Shi
:
Decentralized FaaS over Multi-Clouds with Blockchain based Management for Supporting Emerging Applications. SAC 2024: 122-130
[c86]Ranjith Chodavarapu, Rabimba Karanjai, Xinxin Fan, Weidong Shi, Lei Xu:
Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3. SSS 2024: 292-306
[i27]Rabimba Karanjai, Lei Xu, Weidong Shi:
Teaching Machines to Code: Smart Contract Translation with LLMs. CoRR abs/2403.09740 (2024)
[i26]Dana Alsagheer, Rabimba Karanjai, Nour Diallo, Weidong Shi, Yang Lu, Suha Beydoun, Qiaoning Zhang:
Comparing Rationality Between Large Language Models and Humans: Insights and Open Questions. CoRR abs/2403.09798 (2024)
[i25]Rabimba Karanjai, Weidong Shi:
LookALike: Human Mimicry based collaborative decision making. CoRR abs/2403.10824 (2024)
[i24]Rabimba Karanjai, Lei Xu, Lin Chen, Nour Diallo, Weidong Shi:
Decentralized FaaS over Multi-Clouds with Blockchain based Management for Supporting Emerging Applications. CoRR abs/2404.08151 (2024)
[i23]Rabimba Karanjai, Aftab Hussain, Md. Rafiqul Islam Rabin, Lei Xu, Weidong Shi, Mohammad Amin Alipour:
Harnessing the Power of LLMs: Automating Unit Test Generation for High-Performance Computing. CoRR abs/2407.05202 (2024)
[i22]Rabimba Karanjai, Yang Lu, Dana Alsagheer, Keshav Kasichainula, Lei Xu, Weidong Shi, Shou-Hsuan Stephen Huang:
LogBabylon: A Unified Framework for Cross-Log File Integration and Analysis. CoRR abs/2412.12364 (2024)
[i21]Rabimba Karanjai, Sam Blackshear, Lei Xu, Weidong Shi:
Generating Move Smart Contracts based on Concepts. CoRR abs/2412.12513 (2024)- 2023
[j20]Liangde Tao, Lin Chen
, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Electoral manipulation via influence: probabilistic model. Auton. Agents Multi Agent Syst. 37(1): 18 (2023)
[j19]Dana Alsagheer
, Lei Xu
, Weidong Shi
:
Decentralized Machine Learning Governance: Overview, Opportunities, and Challenges. IEEE Access 11: 96718-96732 (2023)
[c85]Dana Alsagheer, Hadi Mansourifar, Weidong Larry Shi:
Statistical Analysis of Counter-Hate Speech on Voice-based Social Media. ANT/EDI40 2023: 1009-1014
[c84]Rabimba Karanjai, Edward Li, Lei Xu, Weidong Shi:
Who is Smarter? An Empirical Study of AI-Based Smart Contract Creation. BRAINS 2023: 1-8
[c83]Rabimba Karanjai
, Rowan Collier
, Zhimin Gao
, Lin Chen
, Xinxin Fan
, Taeweon Suh
, Weidong Shi
, Lei Xu
:
Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection. BSCI 2023: 85-94
[c82]Dana Alsagheer, Nour Diallo, Rabimba Karanjai, Lei Xu, Larry Shi:
Decentralized Machine Learning Governance. ICBC 2023: 1-3
[c81]Rabimba Karanjai, Zhimin Gao, Lin Chen, Xinxin Fan, Teweon Suh, Weidong Shi, Lei Xu:
DHTee: Decentralized Infrastructure for Heterogeneous TEEs. ICBC 2023: 1-3
[c80]Rabimba Karanjai
, Lei Xu, Nour Diallo, Lin Chen, Weidong Shi:
DeFaaS: Decentralized Function-as-a-Service for Emerging dApps and Web3. ICBC 2023: 1-3
[i20]Quang Tran, Lin Chen, Lei Xu, Yang Lu, Rabimba Karanjai, Weidong Shi:
Cross Chain Bribery Contracts: Majority vs Mighty Minority. CoRR abs/2306.07984 (2023)
[i19]Rabimba Karanjai, Sangwon Shin, Xinxin Fan, Lin Chen, Tianwei Zhang, Taeweon Suh, Weidong Shi, Lei Xu:
TPU as Cryptographic Accelerator. CoRR abs/2307.06554 (2023)
[i18]Rabimba Karanjai, Rowan Collier, Zhimin Gao, Lin Chen, Xinxin Fan, Taeweon Suh, Weidong Shi, Lei Xu:
Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection. CoRR abs/2308.01474 (2023)
[i17]Rabimba Karanjai, Edward Li, Lei Xu, Weidong Shi:
An Empirical Study of AI-based Smart Contract Creation. CoRR abs/2308.02955 (2023)- 2022
[c79]Liangde Tao, Lin Chen, Lei Xu, Weidong Shi, Ahmed Sunny, Md Mahabub Uz Zaman:
How Hard is Bribery in Elections with Randomly Selected Voters. AAMAS 2022: 1265-1273
[c78]Rabimba Karanjai
, Keshav Kasichainula, Nour Diallo, Mudabbir Kaleem, Lei Xu
, Lin Chen
, Weidong Shi:
Decentralized Application Infrastructures as Smart Contract Codes. ICBC 2022: 1-9
[c77]Dana Alsagheer, Hadi Mansourifar, Mohammad Mahdi Dehshibi
, Weidong Shi:
Detecting Hate Speech Against Athletes in Social Media. IDSTA 2022: 75-81
[c76]Liangde Tao, Lin Chen
, Lei Xu
, Weidong Shi:
Local Differential Privacy Meets Computational Social Choice - Resilience under Voter Deletion. IJCAI 2022: 3940-3946
[i16]Dana Alsagheer, Hadi Mansourifar, Weidong Shi:
Counter Hate Speech in Social Media: A Survey. CoRR abs/2203.03584 (2022)
[i15]Rabimba Karanjai, Lei Xu, Lin Chen, Fengwei Zhang, Zhimin Gao, Weidong Shi:
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research. CoRR abs/2203.12724 (2022)
[i14]Liangde Tao, Lin Chen, Lei Xu, Weidong Shi:
Local Differential Privacy Meets Computational Social Choice - Resilience under Voter Deletion. CoRR abs/2205.00771 (2022)
[i13]Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, Qian Lou:
Audit and Improve Robustness of Private Neural Networks on Encrypted Data. CoRR abs/2209.09996 (2022)
[i12]Md Hasibul Amin, Harika Madanu, Sahithi Lavu, Hadi Mansourifar, Dana Alsagheer, Weidong Shi:
Detecting Conspiracy Theory Against COVID-19 Vaccines. CoRR abs/2211.13003 (2022)- 2021
[j18]Han-Yee Kim
, Lei Xu
, Weidong Shi, Taeweon Suh
:
A Secure and Flexible FPGA-Based Blockchain System for the IIoT. Computer 54(2): 50-59 (2021)
[j17]Lei Xu
, Lin Chen
, Zhimin Gao, Hiram Moya, Weidong Shi:
Reshaping the Landscape of the Future: Software-Defined Manufacturing. Computer 54(7): 27-36 (2021)
[j16]Lin Chen, Ahmed Imtiaz Sunny, Lei Xu
, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational complexity characterization of protecting elections from bribery. Theor. Comput. Sci. 891: 189-209 (2021)
[c75]Lin Chen, Lei Xu, Zhimin Gao, Ahmed Imtiaz Sunny, Keshav Kasichainula, Weidong Shi:
A Game Theoretical Analysis of Non-Linear Blockchain System. AAMAS 2021: 323-331
[c74]Mudabbir Kaleem, Keshav Kasichainula, Rabimba Karanjai
, Lei Xu, Zhimin Gao, Lin Chen, Weidong Shi:
An event driven framework for smart contract execution. DEBS 2021: 78-89
[c73]Liangde Tao, Lin Chen
, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi, Dian Huang:
Hardness and Algorithms for Electoral Manipulation Under Media Influence. IJTCS-FAW 2021: 53-64
[c72]Rabimba Karanjai
, Lei Xu, Zhimin Gao, Lin Chen, Mudabbir Kaleem, Weidong Shi:
On Conditional Cryptocurrency With Privacy. IEEE ICBC 2021: 1-3
[c71]Rabimba Karanjai
, Weidong Shi, Lei Xu, Lin Chen, Fengwei Zhang, Zhimin Gao:
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research. HASP@MICRO 2021: 5:1-5:8
[c70]Rabimba Karanjai
, Lei Xu
, Zhimin Gao, Lin Chen, Mudabbir Kaleem, Weidong Shi:
Privacy preserving event based transaction system in a decentralized environment. Middleware 2021: 286-297
[c69]Hadi Mansourifar, Dana Alsagheer, Reza Fathi, Weidong Shi, Lan Ni, Yan Huang
:
Hate Speech Detection in Clubhouse. PKDD/ECML Workshops (2) 2021: 341-351
[i11]Mudabbir Kaleem, Keshav Kasichainula, Rabimba Karanjai, Lei Xu, Zhimin Gao, Lin Chen, Weidong Shi:
EDSC: An Event-Driven Smart Contract Platform. CoRR abs/2101.05475 (2021)
[i10]Hadi Mansourifar, Dana Alsagheer, Reza Fathi, Weidong Shi, Lan Ni, Yan Huang:
Hate Speech Detection in Clubhouse. CoRR abs/2106.13238 (2021)
[i9]Hadi Mansourifar, Dana Alsagheer, Weidong Shi, Lan Ni, Yan Huang:
Statistical Analysis of Perspective Scores on Hate Speech Detection. CoRR abs/2107.02024 (2021)- 2020
[j15]Lei Xu
, Lin Chen, Zhimin Gao, Larry Carranco, Xinxin Fan, Nolan Shah, Nour Diallo, Weidong Shi:
Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices. IEEE Consumer Electron. Mag. 9(2): 26-33 (2020)
[j14]Roger W. H. Bons, Johan Versendaal, Liudmila Zavolokina
, Weidong Larry Shi:
Potential and limits of Blockchain technology for networked businesses. Electron. Mark. 30(2): 189-194 (2020)
[j13]Lei Xu
, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi:
DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems. IEEE Netw. 34(1): 38-46 (2020)
[j12]Abraham Báez-Suárez
, Nolan Shah, Juan Arturo Nolazco-Flores
, Shou-Hsuan Stephen Huang
, Omprakash Gnawali
, Weidong Shi:
SAMAF: Sequence-to-sequence Autoencoder Model for Audio Fingerprinting. ACM Trans. Multim. Comput. Commun. Appl. 16(2): 43:1-43:23 (2020)
[c68]Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Weidong Shi:
DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter. BSCI 2020: 53-62
[c67]Lin Chen
, Ahmed Sunny, Lei Xu
, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational Complexity Characterization of Protecting Elections from Bribery. COCOON 2020: 85-97
[c66]Lin Chen
, Martin Koutecký
, Lei Xu
, Weidong Shi:
New Bounds on Augmenting Steps of Block-Structured Integer Programs. ESA 2020: 33:1-33:19
[c65]Lei Xu
, Lin Chen
, Zhimin Gao, Keshav Kasichainula, Miguel Fernandez, Bogdan Carbunar, Weidong Shi:
PrivateEx: privacy preserving exchange of crypto-assets on blockchain. SAC 2020: 316-323
[c64]Lei Xu, Lin Chen, Zhimin Gao, Han-Yee Kim, Taeweon Suh, Weidong Shi:
FPGA based Blockchain System for Industrial IoT. TrustCom 2020: 876-883
[c63]Lei Xu, Zhimin Gao, Xinxin Fan, Lin Chen, Han-Yee Kim, Taeweon Suh, Weidong Shi:
Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement. TrustCom 2020: 1028-1035
[i8]Lin Chen, Lei Xu, Zhimin Gao, Keshav Kasichainula, Weidong Shi:
Nonlinear Blockchain Scalability: a Game-Theoretic Perspective. CoRR abs/2001.08231 (2020)
[i7]Hadi Mansourifar, Lin Chen, Weidong Shi:
Hybrid Cryptocurrency Pump and Dump Detection. CoRR abs/2003.06551 (2020)
[i6]Lin Chen, Ahmed Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational Complexity Characterization of Protecting Elections from Bribery. CoRR abs/2007.02533 (2020)
2010 – 2019
- 2019
[c62]Han-Yee Kim, Rohyoung Myung, Boeui Hong, Heon-Chang Yu
, Taeweon Suh, Lei Xu
, Weidong Shi:
SafeDB: Spark Acceleration on FPGA Clouds with Enclaved Data Processing and Bitstream Protection. CLOUD 2019: 107-114
[c61]Lin Chen
, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm. AAAI 2019: 2572-2579
[c60]Hadi Mansourifar, Lin Chen, Weidong Shi:
Virtual Big Data for GAN Based Data Augmentation. IEEE BigData 2019: 1478-1487
[c59]Lei Xu
, Lin Chen, Zhimin Gao, Xinxin Fan, Kimberly Doan, Shouhuai Xu, Weidong Shi:
KCRS: A Blockchain-Based Key Compromise Resilient Signature System. BlockSys 2019: 226-239
[c58]Han-Yee Kim, Taeweon Suh, Lei Xu
, Weidong Shi:
FPGALedger: FPGA based Decentralized Ledger for Enterprise Applications. IEEE ICBC 2019: 86-89
[c57]Lin Chen
, Lei Xu
, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribe-Effect Uncertainty: A Dichotomy Result. IJCAI 2019: 158-164
[c56]Quang Tran, Lin Chen
, Lei Xu
, Yang Lu, Weidong Shi:
Cross Chain Bribery Contracts: Majority vs Mighty Minority. PAAMS (Workshops) 2019: 121-133
[i5]Zhimin Gao, Lei Xu, Keshav Kasichainula, Lin Chen, Bogdan Carbunar, Weidong Shi:
Private and Atomic Exchange of Assets over Zero Knowledge Based Payment Ledger. CoRR abs/1909.06535 (2019)- 2018
[j11]Boeui Hong
, Han-Yee Kim, Minsu Kim, Taeweon Suh, Lei Xu
, Weidong Shi:
FASTEN: An FPGA-Based Secure System for Big Data Processing. IEEE Des. Test 35(1): 30-38 (2018)
[j10]Lin Chen
, Lei Xu
, Zhimin Gao, Yang Lu, Weidong Shi:
Tyranny of the Majority: On the (Im)possibility of Correctness of Smart Contracts. IEEE Secur. Priv. 16(4): 30-37 (2018)
[j9]Zhimin Gao, Lei Xu
, Lin Chen
, Xi Zhao, Yang Lu, Weidong Shi:
CoC: A Unified Distributed Ledger Based Supply Chain Management System. J. Comput. Sci. Technol. 33(2): 237-248 (2018)
[j8]Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
Efficient Public Blockchain Client for Lightweight Users. EAI Endorsed Trans. Security Safety 4(13): e5 (2018)
[j7]Lei Xu
, Jong-Hyuk Lee, Seung Hun Kim, Qingji Zheng, Shouhuai Xu
, Taeweon Suh, Won Woo Ro, Weidong Shi:
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment. IEEE Trans. Cloud Comput. 6(2): 478-491 (2018)
[c55]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Nolan Shah, Yang Lu, Weidong Shi:
Protecting Election from Bribery: New Approach and Computational Complexity Characterization. AAMAS 2018: 1894-1896
[c54]Ton Chanh Le, Lei Xu
, Lin Chen
, Weidong Shi:
Proving Conditional Termination for Smart Contracts. BCC@AsiaCCS 2018: 57-59
[c53]Lin Chen
, Lei Xu
, Zhimin Gao, Yang Lu, Weidong Shi:
Protecting Early Stage Proof-of-Work Based Public Blockchain. DSN Workshops 2018: 122-127
[c52]Lin Chen
, Lei Xu
, Zhimin Gao, Nolan Shah, Ton Chanh Le, Yang Lu, Weidong Shi:
The Game Among Bribers in a Smart Contract System. Financial Cryptography Workshops 2018: 294-307
[c51]Zhimin Gao, Lei Xu
, Glenn Turner, Brijesh Patel, Nour Diallo, Lin Chen
, Weidong Shi:
Blockchain-based Identity Management with Mobile Device. CRYBLOCK@MobiSys 2018: 66-70
[i4]Lin Chen, Lei Xu, Weidong Shi:
On the Graver basis of block-structured integer programming. CoRR abs/1805.03741 (2018)
[i3]Millad Ghane, Jeff Larkin, Larry Shi, Sunita Chandrasekaran, Margaret S. Cheung:
Power and Energy-efficiency Roofline Model for GPUs. CoRR abs/1809.09206 (2018)
[i2]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm. CoRR abs/1811.03158 (2018)
[i1]Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
Efficient Public Blockchain Client for Lightweight Users. CoRR abs/1811.04900 (2018)- 2017
[c50]Minsu Kim, Sunhee Kong, Boeui Hong, Lei Xu
, Weidong Shi, Taeweon Suh:
Evaluating coherence-exploiting hardware Trojan. DATE 2017: 157-162
[c49]Lin Chen
, Lei Xu
, Nolan Shah, Zhimin Gao, Yang Lu, Weidong Shi:
Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications. Financial Cryptography Workshops 2017: 468-477
[c48]Lei Xu
, Lin Chen
, Zhimin Gao, Yang Lu, Weidong Shi:
CoC: Secure Supply Chain Management System Based on Public Ledger. ICCCN 2017: 1-6
[c47]Zhimin Gao, Lei Xu
, Lin Chen
, Nolan Shah, Yang Lu, Weidong Shi:
Scalable Blockchain Based Smart Contract Execution. ICPADS 2017: 352-359
[c46]Lin Chen
, Lei Xu
, Zhimin Gao, Nolan Shah, Yang Lu, Weidong Shi:
Smart Contract Execution - the (+-)-Biased Ballot Problem. ISAAC 2017: 21:1-21:12
[c45]Lei Xu
, Lin Chen
, Zhimin Gao, Shouhuai Xu, Weidong Shi:
EPBC: Efficient Public Blockchain Client for lightweight users. SERIAL@Middleware 2017: 1:1-1:6
[c44]Lin Chen
, Lei Xu
, Nolan Shah, Zhimin Gao, Yang Lu, Weidong Shi:
On Security Analysis of Proof-of-Elapsed-Time (PoET). SSS 2017: 282-297
[c43]Lei Xu
, Lin Chen
, Nolan Shah, Zhimin Gao, Yang Lu, Weidong Shi:
DL-BAC: Distributed Ledger Based Access Control for Web Applications. WWW (Companion Volume) 2017: 1445-1450- 2016
[c42]Zhimin Gao, Lei Xu
, Weidong Shi:
MapReduce for Elliptic Curve Discrete Logarithm Problem. SERVICES 2016: 39-46- 2015
[c41]Lei Xu
, Pham Dang Khoa, Seung-Hun Kim, Won Woo Ro, Weidong Shi:
Another Look at Secure Big Data Processing: Formal Framework and a Potential Approach. CLOUD 2015: 548-555
[c40]Xi Zhao, Zhimin Gao, Jianhua Zou, Weidong Shi, Wei Huang:
Scalable 3D Facial Shape Motion Retrieval from Image Sequences Using a Map-Reduce Framework. BigMM 2015: 252-255
[c39]Lei Xu
, Xinwen Zhang, Xiaoxin Wu, Weidong Shi:
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud. CODASPY 2015: 167-169
[c38]Seung-Hun Kim, Lei Xu
, Ziyi Liu, Zhiqiang Lin, Won Woo Ro, Weidong Shi:
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization. DSN 2015: 251-262
[c37]Zhimin Gao, Nicholas DeSalvo, Pham Dang Khoa, Seung-Hun Kim, Lei Xu
, Won Woo Ro, Rakesh M. Verma
, Weidong Shi:
Integrity Protection for Big Data Processing with Dynamic Redundancy Computation. ICAC 2015: 159-160- 2014
[j6]Xi Zhao, Tao Feng, Weidong Shi, Ioannis A. Kakadiaris
:
Mobile User Authentication Using Statistical Touch Dynamics Images. IEEE Trans. Inf. Forensics Secur. 9(11): 1780-1789 (2014)
[c36]Lei Xu
, Weidong Shi, Taeweon Suh:
PFC: Privacy Preserving FPGA Cloud - A Case Study of MapReduce. IEEE CLOUD 2014: 280-287
[c35]Weidong Shi, Yuanfeng Wen, Ziyi Liu, Xi Zhao, Dainis Boumber
, Ricardo Vilalta, Lei Xu
:
Fault resilient physical neural networks on a single chip. CASES 2014: 24:1-24:10
[c34]Pranav Koundinya, Sandhya Theril, Tao Feng, Varun Prakash, Jiming Bao, Weidong Shi:
Multi resolution touch panel with built-in fingerprint sensing support. DATE 2014: 1-6
[c33]Ziyi Liu, Weidong Shi, Shouhuai Xu, Zhiqiang Lin:
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy. DATE 2014: 1-6
[c32]Lei Xu
, Han-Yee Kim, Xi Wang, Weidong Shi, Taeweon Suh:
Privacy preserving large scale DNA read-mapping in MapReduce framework using FPGAs. FPL 2014: 1-4
[c31]Lei Xu
, Weidong Shi, Nicholas DeSalvo:
Seasoning effect based side channel attacks to AES implementation with phase change memory. HASP@ISCA 2014: 5:1-5:8
[c30]Lei Xu
, Weidong Shi:
Removing the Root of Trust: Secure Oblivious Key Establishment for FPGAs. ISVLSI 2014: 160-165
[c29]Sravan Kumar Thokala, Pranav Koundinyaa, Shivakant Mishra, Larry Shi:
Virtual GPS: a middleware for power efficient localization of smartphones using cross layer approach. Middleware (Industry Track) 2014: 2:1-2:7
[c28]Xi Wang, Nicholas DeSalvo, Zhimin Gao, Xi Zhao, Dorothea C. Lerman, Omprakash Gnawali
, Weidong Shi:
Eye Contact Conditioning in Autistic Children Using Virtual Reality Technology. MindCare 2014: 79-89
[c27]Xi Wang, Xi Zhao, Omprakash Gnawali
, Weidong Shi:
Enhancing independence for people with low vision to use daily panel-interface machines. MobiCASE 2014: 155-159
[c26]Xi Wang, Nicholas DeSalvo, Xi Zhao, Tao Feng, Katherine A. Loveland, Weidong Shi, Omprakash Gnawali
:
Eye contact reminder system for people with autism. MobiCASE 2014: 160-163
[c25]Tao Feng, Nicholas DeSalvo, Lei Xu
, Xi Zhao, Xi Wang, Weidong Shi:
Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior. MobiCASE 2014: 206-215
[c24]Tao Feng, Zhimin Gao, Dainis Boumber
, Tzu-Hua Liu, Nicholas DeSalvo, Xi Zhao, Weidong Shi:
USR: Enabling identity awareness and usable app access control during hand-free mobile interactions. MobiCASE 2014: 225-234
[c23]Lei Xu
, Pham Dang Khoa, Seung-Hun Kim, Won Woo Ro, Weidong Shi:
LUT based secure cloud computing - An implementation using FPGAs. ReConFig 2014: 1-6
[c22]Tao Feng, Jun Yang, Zhixian Yan, Emmanuel Munguia Tapia, Weidong Shi:
TIPS: context-aware implicit user identification using touch screen in uncontrolled environments. HotMobile 2014: 9:1-9:6- 2013
[c21]Tao Feng, Xi Zhao, Weidong Shi:
Investigating Mobile Device Picking-up motion as a novel biometric modality. BTAS 2013: 1-6
[c20]Xi Zhao, Tao Feng, Weidong Shi:
Continuous mobile authentication using a novel Graphic Touch Gesture Feature. BTAS 2013: 1-6
[c19]Yuanfeng Wen, Jong-Hyuk Lee, Ziyi Liu, Qingji Zheng, Weidong Shi, Shouhuai Xu, Taeweon Suh:
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment. Conf. Computing Frontiers 2013: 25:1-25:10
[c18]Xi Wang, Weidong Shi, Omprakash Gnawali, Katherine A. Loveland:
Speaker localization and cancellation for improving social attention. ICCPS 2013: 261
[c17]Ziyi Liu, Jong-Hyuk Lee, Junyuan Zeng, Yuanfeng Wen, Zhiqiang Lin, Weidong Shi:
CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM. ISCA 2013: 392-403
[c16]Varun Prakash, Xi Zhao, Yuanfeng Wen, Weidong Shi:
Back to the Future: Using Magnetic Tapes in Cloud Based Storage Infrastructures. Middleware 2013: 328-347
[c15]Xi Wang, Xi Zhao, Varun Prakash, Weidong Shi, Omprakash Gnawali
:
Computerized-eyewear based face recognition system for improving social lives of prosopagnosics. PervasiveHealth 2013: 77-80
[c14]Xi Wang, Xi Zhao, Omprakash Gnawali
, Katherine A. Loveland, Varun Prakash, Weidong Shi:
A real-time selective speaker cancellation system for relieving social anxiety in autistics. PervasiveHealth 2013: 420-423
[c13]Tao Feng, Xi Zhao, Bogdan Carbunar, Weidong Shi:
Continuous Mobile Authentication Using Virtual Key Typing Biometrics. TrustCom/ISPA/IUCC 2013: 1547-1552- 2012
[c12]Jong-Hyuk Lee, Tao Feng, Weidong Shi, Apurva Bedagkar-Gala, Shishir K. Shah
, Hanako Yoshida
:
Towards Quality Aware Collaborative Video Analytic Cloud. IEEE CLOUD 2012: 147-154
[c11]Jong-Hyuk Lee, Ziyi Liu, Xiaonan Tian, Dong Hyuk Woo, Weidong Shi, Dainis Boumber
, Yonghong Yan, Kyeong-An Kwon:
Acceleration of bulk memory operations in a heterogeneous multicore architecture. PACT 2012: 423-424
[c10]Yuanfeng Wen, Ziyi Liu, Weidong Shi, Yifei Jiang, Albert M. K. Cheng
, Khoa Le:
Energy efficient hybrid display and predictive models for embedded and mobile systems. CASES 2012: 121-130
[c9]Yuanfeng Wen, Ziyi Liu, Weidong Shi, Yifei Jiang, Albert M. K. Cheng
, Feng Yang, Abhinav Kohar:
Support for power efficient mobile video playback on simultaneous hybrid display. ESTIMedia 2012: 87-96
[c8]Tao Feng, Ziyi Liu, Bogdan Carbunar, Dainis Boumber
, Weidong Shi:
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display. MICRO Workshops 2012: 55-62
[c7]Yifei Jiang, Abhishek Jaiantilal, Xin Pan, Mohammad Al-Mutawa, Shivakant Mishra, Larry Shi:
Personalized Energy Consumption Modeling on Smartphones. MobiCASE 2012: 343-354- 2011
[j5]Weidong Shi, Yang Lu, Zhu Li, Jonathan Engelsma
:
SHARC: A scalable 3D graphics virtual appliance delivery framework in cloud. J. Netw. Comput. Appl. 34(4): 1078-1087 (2011)
[j4]Bogdan Carbunar, Weidong Shi, Radu Sion
:
Conditional e-payments with transferability. J. Parallel Distributed Comput. 71(1): 16-26 (2011)- 2010
[j3]Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pearce, Venu Vasudevan:
Query privacy in wireless sensor networks. ACM Trans. Sens. Networks 6(2): 14:1-14:34 (2010)
[c6]Weidong Shi, Yang Lu, Zhu Li, Jonathan Engelsma
:
Scalable Support for 3D Graphics Applications in Cloud. IEEE CLOUD 2010: 346-353
2000 – 2009
- 2008
[j2]Yang Yu, Zhu Li, Larry Shi, Yi-Chiun Chen, Hua Xu:
Cross-Layer Optimization for State Update in Mobile Gaming. IEEE Trans. Multim. 10(5): 701-710 (2008)
[c5]Yong Wang, Tian-Li Yu, Larry Shi, Zhu Li:
Using human body gestures as inputs for gaming via depth analysis. ICME 2008: 993-996- 2007
[j1]Michael Zyda, Dhruv Thukral, Sumeet Jakatdar, Jonathan Engelsma
, James C. Ferrans, Mat Hans, Larry Shi, Frederick L. Kitson, Venu Vasudevan:
Educating the Next Generation of Mobile Game Developers. IEEE Computer Graphics and Applications 27(2): 92-96 (2007)
[c4]Larry Shi, Bogdan Carbunar, Radu Sion:
Conditional E-Cash. Financial Cryptography 2007: 15-28
[c3]Yang Yu, Zhu Li, Larry Shi, Yi-Chiun Chen, Hua Xu:
Network-Aware State Update For Large Scale Mobile Games. ICCCN 2007: 563-568
[c2]Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pearce, Venu Vasudevan:
Query privacy in wireless sensor networks. SECON 2007: 203-212- 2004
[c1]Larry Shi, Weiyun Huang:
Apply Social Network Analysis and Data Mining to Dynamic Task Synthesis for Persistent MMORPG Virtual World. ICEC 2004: 204-215
Coauthor Index
aka: Dana R. Alsagheer

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-23 04:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







