default search action
Shaohua Li 0002
Person information
- affiliation: ETH Zurich, Switzerland
- affiliation (former): Univerity of Science and Technology of China, Hefei, China
Other persons with the same name
- Shaohua Li — disambiguation page
- Shaohua Li 0001 — Nokia Siemens Networks, Beijing, China (and 1 more)
- Shaohua Li 0003 — Agency for Science, Technology and Research (A*STAR), Singapore
- Shaohua Li 0004 — Shanghai University, Shanghai, China
- Shaohua Li 0005 — CISPA Helmholtz Center for Information Security, Saarbrücken, Germany (and 2 more)
- Shaohua Li 0006 — Central South University, School of Information Science and Engineering, Changsha, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b1]Shaohua Li:
Advancing Software Reliability from Code to Compilation. ETH Zurich, Zürich, Switzerland, 2024 - [j9]Shaohua Li, Theodoros Theodoridis, Zhendong Su:
Boosting Compiler Testing by Injecting Real-World Code. Proc. ACM Program. Lang. 8(PLDI): 223-245 (2024) - [c6]Shaohua Li, Zhendong Su:
UBFuzz: Finding Bugs in Sanitizer Implementations. ASPLOS (1) 2024: 435-449 - [i5]Shaohua Li, Zhendong Su:
UBfuzz: Finding Bugs in Sanitizer Implementations. CoRR abs/2401.04538 (2024) - [i4]Ziqiao Kong, Shaohua Li, Heqing Huang, Zhendong Su:
SAND: Decoupling Sanitization from Fuzzing for Low Overhead. CoRR abs/2402.16497 (2024) - 2023
- [j8]Shaohua Li, Zhendong Su:
Accelerating Fuzzing through Prefix-Guided Execution. Proc. ACM Program. Lang. 7(OOPSLA1): 1-27 (2023) - [c5]Shaohua Li, Zhendong Su:
Finding Unstable Code via Compiler-Driven Differential Testing. ASPLOS (3) 2023: 238-251 - 2022
- [c4]Jue Wang, Yanyan Jiang, Ting Su, Shaohua Li, Chang Xu, Jian Lu, Zhendong Su:
Detecting non-crashing functional bugs in Android apps via deep-state differential analysis. ESEC/SIGSOFT FSE 2022: 434-446 - 2021
- [j7]Hangyu Tian, Kaiping Xue, Xinyi Luo, Shaohua Li, Jie Xu, Jianqing Liu, Jun Zhao, David S. L. Wei:
Enabling Cross-Chain Transactions: A Decentralized Cryptocurrency Exchange Protocol. IEEE Trans. Inf. Forensics Secur. 16: 3928-3941 (2021) - 2020
- [j6]Shaohua Li, Kaiping Xue, David S. L. Wei, Hao Yue, Nenghai Yu, Peilin Hong:
SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities. IEEE Trans. Inf. Forensics Secur. 15: 1318-1330 (2020) - [c3]Shaohua Li, Kaiping Xue, Bin Zhu, Chenkai Ding, Xindi Gao, David S. L. Wei, Tao Wan:
FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions. CVPR 2020: 8702-8711 - [i3]Hangyu Tian, Kaiping Xue, Shaohua Li, Jie Xu, Jianqing Liu, Jun Zhao:
Enabling Cross-chain Transactions: A Decentralized Cryptocurrency Exchange Protocol. CoRR abs/2005.03199 (2020)
2010 – 2019
- 2019
- [j5]Kaiping Xue, Qingyou Yang, Shaohua Li, David S. L. Wei, Min Peng, Imran Memon, Peilin Hong:
PPSO: A Privacy-Preserving Service Outsourcing Scheme for Real-Time Pricing Demand Response in Smart Grid. IEEE Internet Things J. 6(2): 2486-2496 (2019) - [j4]Kaiping Xue, Wei Meng, Shaohua Li, David S. L. Wei, Huancheng Zhou, Nenghai Yu:
A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks. IEEE Internet Things J. 6(3): 5485-5499 (2019) - [j3]Jie Xu, Kaiping Xue, Shaohua Li, Hangyu Tian, Jianan Hong, Peilin Hong, Nenghai Yu:
Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data. IEEE Internet Things J. 6(5): 8770-8781 (2019) - 2018
- [j2]Shaohua Li, Kaiping Xue, Qingyou Yang, Peilin Hong:
PPMA: Privacy-Preserving Multisubset Data Aggregation in Smart Grid. IEEE Trans. Ind. Informatics 14(2): 462-471 (2018) - [c2]Peixuan He, Yinxin Wan, Qiudong Xia, Shaohua Li, Jianan Hong, Kaiping Xue:
LASA: Lightweight, Auditable and Secure Access Control in ICN with Limitation of Access Times. ICC 2018: 1-6 - [i2]Shaohua Li, Kaiping Xue:
SecGrid: A Secure and Efficient SGX-enabled Smart Grid System with Rich Functionalities. CoRR abs/1810.01651 (2018) - [i1]Shaohua Li, Kaiping Xue, Chenkai Ding, Xindi Gao, David S. L. Wei, Tao Wan, Feng Wu:
FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions. CoRR abs/1811.08257 (2018) - 2017
- [j1]Kaiping Xue, Shaohua Li, Jianan Hong, Yingjie Xue, Nenghai Yu, Peilin Hong:
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving. IEEE Trans. Inf. Forensics Secur. 12(7): 1596-1608 (2017) - [c1]Xiang Zhang, Lijie Zhou, Shaohua Li, Kaiping Xue, Hao Yue:
Privacy-preserving power request and trading by prepayment in smart grid. ICCC 2017: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint