• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20082020

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint

Dive into the research topics where Yuzhe Tang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Network

Recent external collaboration on country level. Dive into details by clicking on the dots.
  • Cost-effective data feeds to blockchains via workload-adaptive data replication

    Li, K., Yuan, Z., Tang, Y., Xu, C., Chen, J. & Xu, J., Dec 7 2020, Middleware 2020 - Proceedings of the 2020 21st International Middleware Conference. Association for Computing Machinery, Inc, p. 371-385 15 p. (Middleware 2020 - Proceedings of the 2020 21st International Middleware Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Authenticated LSM Trees with Minimal Trust

    Tang, Y., Li, K. & Chen, J., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 454-471 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 305 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Computing node clustering coefficients securely

    Areekijseree, K., Tang, Y. & Soundarajan, S., Aug 27 2019, Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019. Spezzano, F., Chen, W. & Xiao, X. (eds.). Association for Computing Machinery, Inc, p. 532-533 2 p. (Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • GEM 2-tree: A gas-efficient structure for authenticated range queries in blockchain

    Zhang, C., Xu, C., Xu, J., Tang, Y. & Choi, B., Jun 6 2019, Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019. IEEE Computer Society, p. 842-853 12 p. 8731412. (Proceedings - International Conference on Data Engineering; vol. 2019-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • Lightweight blockchain logging for data-intensive applications

    Tang, Y. R., Xing, Z., Xu, C., Chen, J. & Xu, J., 2019, Financial Cryptography and Data Security - FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Revised Selected Papers. Sala, M., Teague, V., Clark, J., Bracciali, A., Eyal, I., Zohar, A. & Pintore, F. (eds.). Springer Verlag, p. 308-324 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10958 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
If you made any changes in Pure these will be visible here soon.