default search action
Kai Li 0017
Person information
- affiliation: San Diego State University, CA, USA
- affiliation (former): Syracuse University, Department of EECS, NY, USA
Other persons with the same name
- Kai Li — disambiguation page
- Kai Li 0001 — Princeton University, NJ, USA
- Kai Li 0002 — University of Cambridge, Department of Engineering, UK (and 3 more)
- Kai Li 0003 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
- Kai Li 0004 — North University of China, Department of the Shanxi Key Laboratory of Signal Capturing and Processing, Taiyuan, China
- Kai Li 0005 — Facebook Inc, Menlo Park, CA, USA (and 1 more)
- Kai Li 0006 — Fujian Normal University, School of Mathematics and Computer Science, Fuzhou, China
- Kai Li 0007 — East Carolina University, Department of Industrial Technology, Greenville, NC, USA (and 1 more)
- Kai Li 0008 — Toyohashi University of Technology, Research Center for Agrotechnology and Biotechnology, Japan
- Kai Li 0009 — InterDigital Communications, Melville, NY, USA (and 1 more)
- Kai Li 0010 — Renmin University of China, School of Information Resource Management, Beijing, China (and 2 more)
- Kai Li 0011 — Shanghai University of Finance and Economics, School of Information Management and Engineering, China
- Kai Li 0012 — NEC Laboratories America, Machine Learning Department, Princeton, NJ, USA (and 1 more)
- Kai Li 0013 — Zhengzhou Institute of Surveying and Mapping, China
- Kai Li 0014 — University of Electronic Science and Technology of China, School of Automation Engineering, Chengdu, China
- Kai Li 0015 — Wuhan University, School of Remote Sensing and Information Engineering, Hubei, China
- Kai Li 0016 — Shanghai University, School of Communication and Information Engineering, China (and 1 more)
- Kai Li 0018 — Japan Advanced Institute of Science and Technology, School of Information Science, Japan
- Kai Li 0019 — Hefei University of Technology, School of Management, China
- Kai Li 0020 — Nankai University, Business School, Tianjin, China
- Kai Li 0021 — Chinese Academy of Sciences, State Key Laboratory of Resources and Environmental Information System, Beijing, China (and 3 more)
- Kai Li 0022 — Chinese Academy of Sciences, Institute of Automation, Beijing, China (and 1 more)
- Kai Li 0023 — Tsinghua University, Department of Computer Science and Technology, Beijing, China (and 1 more)
- Kai Li 0024 — Southern University of Science and Technology, School of Microelectronics, Shenzhen, Guangdong, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Shixuan Guan, Kai Li:
Characterizing Ethereum Address Poisoning Attack. CCS 2024: 986-1000 - [c14]Kai Li, Shixuan Guan, Darren Lee:
Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild. SIGMETRICS/Performance (Abstracts) 2024: 89-90 - [c13]Yibo Wang, Yuzhe Tang, Kai Li, Wanning Ding, Zhihua Yang:
Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing. USENIX Security Symposium 2024 - [i10]Jiaqi Chen, Yibo Wang, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, Xiaofeng Wang, Kai Li:
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild. CoRR abs/2401.11547 (2024) - 2023
- [j3]Kai Li, Shixuan Guan, Darren Lee:
Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild. Proc. ACM Meas. Anal. Comput. Syst. 7(3): 52:1-52:29 (2023) - [j2]Yibo Wang, Kai Li, Yuzhe Tang, Jiaqi Chen, Qi Zhang, Xiapu Luo, Ting Chen:
Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations. IEEE Trans. Software Eng. 49(4): 2980-2995 (2023) - [c12]Kai Li, Darren Lee, Shixuan Guan:
Understanding the Cryptocurrency Free Giveaway Scam Disseminated on Twitter Lists. Blockchain 2023: 9-16 - [c11]Jiaqi Chen, Yibo Wang, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, XiaoFeng Wang, Kai Li:
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild. EuroS&P 2023: 332-351 - [i9]Kai Li, Darren Lee, Shixuan Guan:
Understanding and Characterizing Cryptocurrency Free Giveaway and Arbitrage Bot Scams In the Wild. CoRR abs/2306.10634 (2023) - [i8]Kai Li, Shixuan Guan, Darren Lee:
Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild. CoRR abs/2310.12306 (2023) - [i7]Yibo Wang, Wanning Ding, Kai Li, Yuzhe Tang:
Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolic Fuzzing. CoRR abs/2312.02642 (2023) - 2022
- [i6]Yuzhe Tang, Kai Li, Yibo Wang, Jiaqi Chen, Cheng Xu:
Efficiently Hardening SGX Enclaves against Memory Access Pattern Attacks via Dynamic Program Partitioning. CoRR abs/2212.12656 (2022) - 2021
- [c10]Kai Li, Yibo Wang, Yuzhe Tang:
DETER: Denial of Ethereum Txpool sERvices. CCS 2021: 1645-1667 - [c9]Kai Li, Yuzhe Tang, Jiaqi Chen, Yibo Wang, Xianghong Liu:
TopoShot: uncovering Ethereum's network topology leveraging replacement transactions. Internet Measurement Conference 2021: 302-319 - [c8]Kai Li, Yuzhe Tang, Qi Zhang, Jianliang Xu, Ju Chen:
Authenticated key-value stores with hardware enclaves. Middleware Industry 2021: 1-8 - [c7]Kai Li, Jiaqi Chen, Xianghong Liu, Yuzhe Richard Tang, XiaoFeng Wang, Xiapu Luo:
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service. NDSS 2021 - [c6]Yibo Wang, Qi Zhang, Kai Li, Yuzhe Tang, Jiaqi Chen, Xiapu Luo, Ting Chen:
iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocations. ESEC/SIGSOFT FSE 2021: 566-577 - [i5]Yibo Wang, Qi Zhang, Kai Li, Yuzhe Richard Tang, Xiapu Luo, Ting Chen:
iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations. CoRR abs/2106.08554 (2021) - [i4]Kai Li, Yuzhe Tang, Jiaqi Chen, Yibo Wang, Xianghong Liu:
TopoShot: Uncovering Ethereum's Network Topology Leveraging Replacement Transactions. CoRR abs/2109.14794 (2021) - 2020
- [c5]Yuzhe Richard Tang, Kai Li, Yibo Wang, Sencer Burak Somuncuoglu:
Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention. SERIAL@Middleware 2020: 1-4 - [c4]Kai Li, Yuzhe Richard Tang, Jiaqi Chen, Zhehu Yuan, Cheng Xu, Jianliang Xu:
Cost-Effective Data Feeds to Blockchains via Workload-Adaptive Data Replication. Middleware 2020: 371-385
2010 – 2019
- 2019
- [j1]Yuzhe Richard Tang, Kai Li, Katchaguy Areekijseree, Shuigeng Zhou, Liting Hu:
Privacy-Preserving Multi-Party Directory Services. EAI Endorsed Trans. Security Safety 6(19): e5 (2019) - [c3]Kai Li, Yuzhe Richard Tang, Beom Heyn Ben Kim, Jianliang Xu:
Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains. SecureComm (1) 2019: 39-62 - [c2]Yuzhe Richard Tang, Kai Li, Ju Chen:
Authenticated LSM Trees with Minimal Trust. SecureComm (2) 2019: 454-471 - [i3]Kai Li, Yuzhe Richard Tang, Beom Heyn Kim, Jianliang Xu:
Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains. CoRR abs/1904.06626 (2019) - [i2]Yuzhe Richard Tang, Ju Chen, Kai Li, Jianliang Xu, Qi Zhang:
Authenticated Key-Value Stores with Hardware Enclaves. CoRR abs/1904.12068 (2019) - [i1]Kai Li, Yuzhe Richard Tang, Qi Zhang, Cheng Xu, Jianliang Xu:
GRuB: Gas-Efficient Blockchain Storage via Workload-Adaptive Data Replication. CoRR abs/1911.04078 (2019) - 2018
- [c1]Yuzhe Richard Tang, Qiwu Zou, Ju Chen, Kai Li, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
ChainFS: Blockchain-Secured Cloud Storage. IEEE CLOUD 2018: 987-990
Coauthor Index
aka: Yuzhe Richard Tang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-27 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint