Christopher Natoli, Jiangshan Yu, Vincent Gramoli, Paulo Verissimo.
Deconstructing blockchains: A comprehensive survey on consensus, membership and structure
arXiv preprint arXiv:1908.08316
Jiangshan Yu and Mark Ryan.
Evaluating web PKIs
Software Architecture for Big Data and the Cloud
, 1st Edition, Chapter 7, June 2017.
Jiangshan Yu, David Kozhaya, Jeremie Decouchant, and Paulo Verissimo.
RepuCoin: Your Reputation is Your Power
IEEE Transactions on Computers (
Diego Kreutz, Jiangshan Yu, Fernando Ramos, and Paulo Verissimo.
ANCHOR: logically-centralized security for Software-Defined Networks
ACM Transactions on Privacy and Security (
, previously known as ACM TISSEC.)
Jiangshan Yu, Mark Ryan, and Cas Cremers.
DECIM: Detecting Endpoint Compromise In Messaging
IEEE Transactions on Information Forensics and Security (
, Vol. 13, No.1, pp. 106-118, 2018. (
Jiangshan Yu, Vincent Cheval, and Mark Ryan.
DTKI: a new formalized PKI with verifiable trusted parties
The Computer Journal
, Vol. 59, No. 11, pp. 1695-1713, 2016. (
Fault Independence in Blockchain
Disruptive Ideas and New Interdisciplinary Results (
, The 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (
Joao Otavio Chervinski, Diego Kreutz, Xiwei Xu, and Jiangshan Yu.
Analyzing the Performance of the Inter-Blockchain Communication Protocol
The 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (
Yuanzhe Zhang, Shirui Pan, and Jiangshan Yu.
TxAllo: Dynamic Transaction Allocation in Sharded Blockchain Systems
The 39th IEEE International Conference on Data Engineering (
Jeremie Decouchant, David Kozhaya, Vincent Rahli, and Jiangshan Yu. (Alphabetical Authorship)
DAMYSUS: Streamlined BFT Consensus Leveraging Trusted Components
The 17th European Conference on Computer Systems (
Runchao Han, Jiangshan Yu, Ren Zhang
Analysing and Improving Shard Allocation Protocols for Sharded Blockchains,
The 4th ACM Conference on Advances in Financial Technologies (
Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph Liu, and Shiping Chen.
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
The 16th ACM ASIA Conference on Computer and Communications Security (
Jiangshan Yu, Man Ho Allen Au, and Paulo Veríssimo.
Re-thinking untraceability in the CryptoNote-style blockchain
IEEE Computer Security Foundations Symposium (
Jiangshan Yu and Mark Ryan. 'Key usage detection'.
UK Patent Application GB 1416188.9
US Patent Application US 14/852,342
Remote User Authentication in Distributed Networks and Systems
Master of Research (MPhil)
in Computer Science (Network security and Cryptography)
University of Wollongong, Australia, 2012. (Supervised by
Dr. Guilin Wang
Prof. Yi Mu
Mitigating private key compromise
Doctor of Philosophy (PhD)
in Computer Science (cyber security).
University of Birmingham, UK, 2016. (Supervised by
Prof. Mark Ryan