Projects per year
Fingerprint
- 1 Similar Profiles
Network
Projects
-
SaTC: CORE: Small: External Obliviousness in Trusted Execution Environments
10/1/18 → 9/30/21
Project: Research project
-
Planning IUCRC Syracuse University: Center for High-Assurance Secure Systems and IoT (CHASSI)
Chin, S. K., Du, W., Oh, J. C., Phoha, V. & Tang, Y.
10/1/19 → 9/30/20
Project: Research project
-
-
Optimizing Privacy-Preserving Analytics in Information Networks
Empire State Development Corporation, Cyber Research Institute (CRI)
5/1/15 → 5/15/16
Project: Research project
Research Output
-
Cost-effective data feeds to blockchains via workload-adaptive data replication
Li, K., Yuan, Z., Tang, Y., Xu, C., Chen, J. & Xu, J., Dec 7 2020, Middleware 2020 - Proceedings of the 2020 21st International Middleware Conference. Association for Computing Machinery, Inc, p. 371-385 15 p. (Middleware 2020 - Proceedings of the 2020 21st International Middleware Conference).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Authenticated LSM Trees with Minimal Trust
Tang, Y., Li, K. & Chen, J., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 454-471 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 305 LNICST).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Computing node clustering coefficients securely
Areekijseree, K., Tang, Y. & Soundarajan, S., Aug 27 2019, Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019. Spezzano, F., Chen, W. & Xiao, X. (eds.). Association for Computing Machinery, Inc, p. 532-533 2 p. (Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
GEM 2-tree: A gas-efficient structure for authenticated range queries in blockchain
Zhang, C., Xu, C., Xu, J., Tang, Y. & Choi, B., Jun 6 2019, Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019. IEEE Computer Society, p. 842-853 12 p. 8731412. (Proceedings - International Conference on Data Engineering; vol. 2019-April).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
19 Scopus citations -
Lightweight blockchain logging for data-intensive applications
Tang, Y. R., Xing, Z., Xu, C., Chen, J. & Xu, J., 2019, Financial Cryptography and Data Security - FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Revised Selected Papers. Sala, M., Teague, V., Clark, J., Bracciali, A., Eyal, I., Zohar, A. & Pintore, F. (eds.). Springer Verlag, p. 308-324 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10958 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Scopus citations
Press and Media
-
‘Ethical hacking’? Syracuse research lab accused of launching cyberattacks for a week
8/14/20
1 item of Media coverage
Press/Media: Expert Comment
-
CRYPTOCURRENCY PRICE PLUMMET REMINDS US THIRD-PARTY EXCHANGE SERVICES AREN'T SECURE
6/14/18
1 item of Media coverage
Press/Media: Expert Comment