Systems and methods for managing top-level domain names using consortium blockchain H Li, X Wang, Z Lin, J Wu, X Si, K Li, X Yang, H Wang US Patent 10,178,069, 2019 | 38 | 2019 |
Indexing a multi-layer blockchain system H Li, LI Haopeng, H Ma, H Wang, P Yi, K Li, X Yang US Patent App. 15/997,726, 2018 | 33 | 2018 |
MIN: Co-governing multi-identifier network architecture and its prototype on operator’s network H Li, J Wu, X Yang, H Wang, J Lan, K Xu, H Tan, J Wei, W Liang, F Zhu, ... IEEE Access 8, 36569-36581, 2020 | 32 | 2020 |
Blockchain-based domain name resolution system H Li, H Ma, LI Haopeng, Z Huang, X Yang, K Li, H Wang US Patent App. 15/768,833, 2019 | 31 | 2019 |
BV-ICVs: A privacy-preserving and verifiable federated learning framework for V2X environments using blockchain and zkSNARKs A Smahi, H Li, Y Yang, X Yang, P Lu, Y Zhong, C Liu Journal of King Saud University-Computer and Information Sciences 35 (6), 101542, 2023 | 20 | 2023 |
MDFS: A mimic defense theory based architecture for distributed file system Z Lin, K Li, H Hou, X Yang, H Li 2017 IEEE International Conference on Big Data (Big Data), 2670-2675, 2017 | 12 | 2017 |
Co-governed Sovereignty Network: Legal Basis and Its Prototype & Applications with MIN Architecture H Li, X Yang Springer Nature, 2021 | 11 | 2021 |
On distributed object storage architecture based on mimic defense H Yu, H Li, X Yang, H Ma China Communications 18 (8), 109-120, 2021 | 8 | 2021 |
Optimal strategy for cyberspace mimic defense based on game theory Z Chen, G Cui, L Zhang, X Yang, H Li, Y Zhao, C Ma, T Sun IEEE Access 9, 68376-68386, 2021 | 8 | 2021 |
An improved vulnerability detection system of smart contracts based on symbolic execution Y Yao, H Li, X Yang, Y Le 2022 IEEE International Conference on Big Data (Big Data), 3225-3234, 2022 | 7 | 2022 |
NPM: An anti-attacking analysis model of the MTD system based on martingale theory X Yang, H Li, H Wang 2018 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2018 | 4 | 2018 |
An SRN-Based Model for Assessing Co-Resident Attack Mitigation in Cloud with VM Migration and Allocation Policies X Yang, A Smahi, H Li, H Zhang, SYR Li GLOBECOM 2023-2023 IEEE Global Communications Conference, 4995-5000, 2023 | 3 | 2023 |
Co-governed Space-Terrestrial Integrated Network Architecture and Prototype Based on MIN G Wei, H Li, Y Bai, X Yang, H Zhang, JM Que, W Li 2021 International Conference on Computer Communications and Networks (ICCCN …, 2021 | 3 | 2021 |
A High Security Signature Algorithm Based on Kerberos for REST-style Cloud Storage Service Y Yang, H Li, X Cheng, X Yang, Y Huo 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2020 | 3 | 2020 |
Anti-attacking modelling for CMD systems based on GSPN and Martingale theory H Li, J Wu, X Yang, P Yi, SYR Li US Patent 10,440,048, 2019 | 3 | 2019 |
Architecture of sovereignty network H Li, X Yang, H Li, X Yang Co-Governed Sovereignty Network: Legal Basis and Its Prototype …, 2021 | 2 | 2021 |
Sovereignty and Network Sovereignty H Li, X Yang, H Li, X Yang Co-governed Sovereignty Network: Legal Basis and Its Prototype …, 2021 | 2 | 2021 |
Meteorological evolution of boundary layer during heavy pollution in Beijing during the CPPCC (China People's Political Consultative Conference) in March 2018. Y Zhao, Y Chen, X Yang, J Hu, F Chai, P Yi, Z Wu | 2 | 2019 |
Triple methods-based empirical assessment of the effectiveness of adaptive cyber defenses in the cloud X Yang, A Smahi, H Li, P Lu, H Zhang, SYR Li The Journal of Supercomputing 79 (8), 8634-8667, 2023 | 1 | 2023 |
Differentially authorized deduplication system based on blockchain T ZHAO, H LI, X YANG, H WANG, M ZENG, H GUO, D WANG ZTE Communications 19 (2), 67-76, 2021 | 1 | 2021 |