Seguir
Shanghao Shi
Shanghao Shi
Dirección de correo verificada de vt.edu - Página principal
Título
Citado por
Citado por
Año
Decentralized spectrum access system: Vision, challenges, and a blockchain solution
Y Xiao, S Shi, W Lou, C Wang, X Li, N Zhang, YT Hou, JH Reed
IEEE Wireless Communications 29 (1), 220-228, 2022
302022
Challenges and new directions in securing spectrum access systems
S Shi, Y Xiao, W Lou, C Wang, X Li, YT Hou, JH Reed
IEEE Internet of Things Journal 8 (8), 6498-6518, 2021
172021
Session key distribution made practical for CAN and CAN-FD message authentication
Y Xiao, S Shi, N Zhang, W Lou, YT Hou
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
162020
MS-PTP: Protecting Network Timing from Byzantine Attacks
S Shi, Y Xiao, C Du, MH Shahriar, A Li, N Zhang, YT Hou, W Lou
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023
32023
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction
S Shi, N Wang, Y Xiao, C Zhang, Y Shi, YT Hou, W Lou
arXiv preprint arXiv:2311.05808, 2023
22023
MINDFL: Mitigating the Impact of Imbalanced and Noisy-labeled Data in Federated Learning with Quality and Fairness-Aware Client Selection
C Zhang, N Wang, S Shi, C Du, W Lou, YT Hou
MILCOM 2023-2023 IEEE Military Communications Conference (MILCOM), 331-338, 2023
22023
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
S Li, S Shi, Y Xiao, C Zhang, YT Hou, W Lou
European Symposium on Research in Computer Security, 306-326, 2023
22023
BD-SAS: Enabling Dynamic Spectrum Sharing in Low-trust Environment
Y Xiao, S Shi, W Lou, C Wang, X Li, N Zhang, YT Hou, JH Reed
IEEE Transactions on Cognitive Communications and Networking, 2023
22023
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
S Li, S Shi, Y Xiao, C Zhang, YT Hou, W Lou
Computer Security--ESORICS 2023, 2024
2024
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–9