Shi, Shanghao
34  Ergebnisse:
Personensuche X
?
1

Bijack: Breaking Bitcoin Network with TCP Vulnerabilities:

, In: Computer Security – ESORICS 2023; Lecture Notes in Computer Science,
Li, Shaoyu ; Shi, Shanghao ; Xiao, Yang... - p. 306-326 , 2024
 
?
2

TriSAS: Toward Dependable Inter-SAS Coordination with Audit..:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
Shi, Shanghao ; Xiao, Yang ; Du, Changlai... - p. 399-411 , 2024
 
?
3

MS-PTP: Protecting Network Timing from Byzantine Attacks:

, In: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Shi, Shanghao ; Xiao, Yang ; Du, Changlai... - p. 61-71 , 2023
 
?
4

MINDFL: Mitigating the Impact of Imbalanced and Noisy-label..:

, In: MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM),
Zhang, Chaoyu ; Wang, Ning ; Shi, Shanghao... - p. 331-338 , 2023
 
?
5

BD-SAS: Enabling Dynamic Spectrum Sharing in Low-Trust Envi..:

Xiao, Yang ; Shi, Shanghao ; Lou, Wenjing...
IEEE Transactions on Cognitive Communications and Networking.  9 (2023)  4 - p. 842-856 , 2023
 
?
6

Decentralized Spectrum Access System: Vision, Challenges, a..:

Xiao, Yang ; Shi, Shanghao ; Lou, Wenjing...
IEEE Wireless Communications.  29 (2022)  1 - p. 220-228 , 2022
 
?
7

Session Key Distribution Made Practical for CAN and CAN-FD ..:

, In: Annual Computer Security Applications Conference,
Xiao, Yang ; Shi, Shanghao ; Zhang, Ning.. - p. 681-693 , 2020
 
1-15