PUBLICATIONS


Publications:

    (An incomplete list of publications can be found at my Google scholar and DBLP page.)

  • Book Chapter:
    1. Jiangshan Yu and Mark Ryan.
      Evaluating web PKIs.
      Software Architecture for Big Data and the Cloud, 1st Edition, Chapter 7, June 2017.

  • Journal:
    2023
      1. Qin Wang, Jiangshan Yu, Shiping Chen, and Yang Xiang.
        SoK: DAG-based Blockchain Systems
        ACM Computing Surveys, 2023.
      2. Maxime Buser, Rafael Dowsley, Muhammed Esgin, Clémentine Gritti, Shabnam Kermanshahi, Veronika Kuchta, Jason LeGrow, Joseph Liu, Raphael Phan, Amin Sakzad, Ron Steinfeld, and Jiangshan Yu.
        A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions
        ACM Computing Surveys, 2023.
      3. Liang Yuan, Qiang He, Siyu Tan, Bo Li, Jiangshan Yu, Feifei Chen, and Yun Yang.
        CoopEdge+: Enabling Decentralized, Secure and Cooperative Mobile Edge Computing based on Blockchain.
        IEEE Transactions on Parallel and Distributed Systems (TPDS).
      4. Chaochen Shi, Yong Xiang, Jiangshan Yu, Keshav Sood, Longxiang Gao.
        Machine translation-based fine-grained comments generation for solidity smart contracts,
        Information and Software Technology, 2023.
      2022
      1. Lingjuan Lyu, Yitong Li, Karthik Nandakumar, Jiangshan Yu, Xingjun Ma.
        How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning,
        IEEE Trans. on Dependable and Secure Computing (IEEE TDSC). 2022.
      2. Wei Zhang, JiangshanYu, Qingqiang He, Nan Zhang, Nan Guan.
        TICK: Tiny Client for Blockchains,
        IEEE Internet of Things Journal (IOT-J). 2022.
      3. Wei Gao, Liqun Chen, Chunming Rong, Kaitai Liang, Xianghan Zheng and Jiangshan Yu.
        Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things,
        The Computer Journal, 2022.
      2021
      1. Canhui Chen, Xu Chen, Jiangshan Yu, Weigang Wu, Di Wu.
        Impact of Temporary Fork on the Evolution of Mining Pools in Blockchain Networks: An Evolutionary Game Analysis.
        IEEE Transactions on Network Science and Engineering (IEEE TNSE).2021.
      2020
      1. Lingjuan Lyu, Jiangshan Yu, Karthik Nandakumar, Yitong Li, Xingjun Ma, Jiong Jin, Han Yu, Kee Siong Ng.
        Towards Fair and Privacy-Preserving Federated Deep Models.
        IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS). 2020.
      2019
      1. Jiangshan Yu, David Kozhaya, Jeremie Decouchant, and Paulo Verissimo.
        RepuCoin: Your Reputation is Your Power.
        IEEE Transactions on Computers (IEEE TC). 2019.
      2. Diego Kreutz, Jiangshan Yu, Fernando Ramos, and Paulo Verissimo.
        ANCHOR: logically-centralized security for Software-Defined Networks.
        ACM Transactions on Privacy and Security (ACM TOPS, previously known as ACM TISSEC.) 2019. (Tamarin code)
      3. Bin Yu, Joseph K. Liu, Surya Nepal , Jiangshan Yu, Paul Rimba.
        Proof-of-QoS: QoS based blockchain consensus protocol..
        Computers & Security, 2019.
      2018
      1. Diego Kreutz, Jiangshan Yu, Paulo Jorge Esteves Veríssimo, Catia Magalhaes, Fernando M. V. Ramos.
        The KISS Principle in Software-Defined Networking: A Framework for Secure Communications.
        IEEE Security & Privacy, 2018.
      2. Jiangshan Yu, Mark Ryan, and Cas Cremers.
        DECIM: Detecting Endpoint Compromise In Messaging.
        IEEE Transactions on Information Forensics and Security (IEEE TIFS), Vol. 13, No.1, pp. 106-118, 2018. (Tamarin code)
      2013-2016
      1. Jiangshan Yu, Vincent Cheval, and Mark Ryan.
        DTKI: a new formalized PKI with verifiable trusted parties.
        The Computer Journal , Vol. 59, No. 11, pp. 1695-1713, 2016. (Tamarin code and Technical Report)
      2. Jiangshan Yu, Guilin Wang, Yi Mu, Wei Gao.
        An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation.
        IEEE Transactions on Information Forensics and Security (TIFS), 2014.
      3. Guilin Wang, Jiangshan Yu, Qi Xie.
        Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks.
        IEEE Transactions on Industrial Informatics (TII), 2013.

    1. Conference:
      2023
        1. Tong Cao, Jeremie Decouchant, and Jiangshan Yu.
          Leveraging the Verifier’s Dilemma to Double Spend in Bitcoin ,
          The 27th International Conference on Financial Cryptography and Data Security. (FC), 2023.
        2. Runchao Han and Jiangshan Yu.
          Fair Delivery of Decentralised Randomness Beacon ,
          The 27th International Conference on Financial Cryptography and Data Security. (FC), 2023.
        3. Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oguzhan Ersoy, Amin Sakzad, Jiangshan Yu, Muhammed Esgin, Joseph Liu, and Tsz Hon Yuen.
          BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts,
          The 44th IEEE Symposium on Security and Privacy (IEEE S&P), 2023.
        4. Yuanzhe Zhang, Shirui Pan, and Jiangshan Yu.
          TxAllo: Dynamic Transaction Allocation in Sharded Blockchain Systems,
          The 39th IEEE International Conference on Data Engineering (ICDE), 2023.
        2022
        1. Zhimei Sui, Joseph Liu, Jiangshan Yu and Xianrui Qin.
          MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero,
          The 42nd IEEE International Conference on Distributed Computing Systems (ICDCS), 2022.
        2. Jeremie Decouchant, David Kozhaya, Vincent Rahli, and Jiangshan Yu. (Alphabetical Authorship)
          DAMYSUS: Streamlined BFT Consensus Leveraging Trusted Components,
          The 17th European Conference on Computer Systems (EuroSys), 2022.
        3. Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu
          Enabling Efficient Bi-Directional Channel for Scriptless Blockchains
          The 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS), 2022.
        4. Runchao Han, Jiangshan Yu, Ren Zhang
          Analysing and Improving Shard Allocation Protocols for Sharded Blockchains
          The 4th ACM Conference on Advances in Financial Technologies (AFT), 2022.
        5. Chaochen Shi, Yong Xiang, Jiangshan Yu, Longxiang Gao, Keshav Sood, and Robin Doss.
          A Bytecode-based Approach for Smart Contract Classification,
          The 29th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022.
        6. Ziyi Li, Joseph Liu, Jiangshan Yu, and Dragan Gasevic
          Blockchain-Based Solutions for Education Credentialing System: Comparison and Implications for Future Development, [Best Paper Award]
          IEEE Blockchain 2022.
        7. Ziyi Li, Joseph Liu, Jiangshan Yu, Dragan Gasevic, Wayne Yang.
          CVallet: a Blockchain-oriented Application Development for Education and Recruitment, [Best Paper Award]
          16th International Conference on Network and System Security (NSS), 2022.
        8. Arash Mirzaei, Amin Sakzad, Jiangshan Yu and Ron Steinfeld.
          Daric: A Storage Efficient Payment Channel With Punishment Mechanism,
          The 25th Information Security Conference (ISC), 2022.
        9. Chaochen Shi, Yong Xiang, Jiangshan Yu and Longxiang Gao.
          Towards Accurate Knowledge Transfer between Transformer-based Models for Code Summarization,
          The 34th International Conference on Software Engineering & Knowledge Engineering (SEKE), 2022.
        10. Arash Mirzaei, Amin Sakzad, Jiangshan Yu and Ron Steinfeld.
          Garrison: A Novel Watchtower Scheme for Bitcoin.
          The 27th Australasian Conference on Information Security and Privacy (ACISP ), 2022.
        2021
        1. Liang Yuan, Qiang He, Siyu Tan, Bo Li, Jiangshan Yu, Feifei Chen, Hai Jin, and Yun Yang.
          CoopEdge: A Decentralized Blockchain-based Platform for Cooperative Edge Computing,
          The Web Conference (WWW), 2021.
        2. Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld.
          FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin,
          The 25th Financial Cryptography and Data Security (FC), 2021.
        3. Tong Cao, Jeremie Decouchant, Jiangshan Yu, Paulo Esteves-Verissimo.
          Characterizing the Impact of Network Delay on Bitcoin Mining ,
          The 40th International Symposium on Reliable Distributed Systems (SRDS), 2021.
        4. Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph Liu, and Shiping Chen.
          Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains,
          The 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2021.
        5. Ermyas Abebe, Yining Hu, Allison Irvin, Dileban Karunamoorthy, Vinayaka Pandit, Venkatraman Ramakrishna, Jiangshan Yu. (Alphabetical Authorship)
          Verifiable Observation of Permissioned Ledgers ,
          IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2021.
        6. Joao Otavio Chervinski, Diego Kreutz, Jiangshan Yu.
          Analysis of transaction flooding attacks against Monero,
          IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2021.
        7. Sina Aeeneh, Joao Otavio Chervinski, Jiangshan Yu, Nikola Zlatanov.
          New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains,
          IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2021.
        8. Zhichun Lu, Runchao Han, Jiangshan Yu.
          General Congestion Attack on HTLC-Based Payment Channel Networks,
          The 3rd International Conference on Blockchain Economics, Security and Protocols (Tokenomics) 2021.
        9. Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph K. Liu.
          On the Shutdown Price of Blockchain Mining Machines [Best Paper Award],
          IEEE Blockchain 2021.
        10. Van Cuong Bui, Sheng Wen, Jiangshan Yu, Yang Xiang, Mohammad Sayad Haghighi
          Evaluating Upgradable Smart Contract,
          IEEE Blockchain 2021.
        11. Chaochen Shi, Yong Xiang, Jiangshan Yu and Longxiang Gao.
          Towards a Semantics-Based Search Engine for Smart Contract Information, The 19th ICSOC Workshops, 2021.
        12. Joao Massari Chervinski, Jiangshan Yu, Xiwei Xu,
          Characterizing Blockchain Interoperability Systems From An Architecture Perspective.
          EAI International Conference on Privacy and Forensics in Smart Mobility (EAI PFSM), 2021.
        2020
        1. Tong Cao, Jiangshan Yu, Jeremie Decouchant, Xiapu Luo, Paulo Verissimo.
          Exploring the Monero Peer-to-Peer Network,
          Financial Cryptography and Data Security (FC) 2020.
        2. Qin WANG, Jiangshan YU, Zhiniang Peng, Vancuong Bui, Shiping Chen, Yong Ding, Yang Xiang.
          Security Analysis on dBFT protocol of NEO,
          Financial Cryptography and Data Security (FC) 2020.
        3. Xiaoqi Li, Ting Chen, Xiapu Luo, Jiangshan Yu.
          Characterizing Erasable Accounts in Ethereum.
          The 23rd International Conference on Information Security (ISC), 2020.
        4. Lianyang Yu, Jiangshan Yu and Yevhen Zolotavkin,
          Game Theoretic Analysis of Reputation Approach on Block Withholding Attack,
          The 14th International Conference on Network and System Security (NSS), 2020
        5. Runchao Han, Haoyu Lin, Jiangshan Yu.
          VRF-Based Mining Simple Non-outsourceable Cryptocurrency Mining.
          DPM/CBT@ESORICS, 2020.
        2019
        1. Jiangshan Yu, Man Ho Allen Au, and Paulo Veríssimo.
          Re-thinking untraceability in the CryptoNote-style blockchain,
          IEEE Computer Security Foundations Symposium (CSF) 2019.
        2. Zuoxia Yu, Man Ho Au, Jiangshan Yu, Rupeng Yang, Qiuliang Xu, and Wang Fat Lau.
          New Empirical Traceability Analysis of CryptoNote-Style Blockchains,
          Financial Cryptography and Data Security (FC) 2019.
        3. Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu, Jiangshan Yu.
          On The Unforkability of Monero,
          ACM Asia Conference on Information, Computer and Communications Security (ASIACCS) 2019.
        4. Jérémie Decouchant, Antoine Boutet, Jiangshan Yu and Paulo Verissimo
          P3LS: Plausible Deniability for Practical Privacy-Preserving Live Streaming,
          The 38th IEEE International Symposium on Reliable Distributed Systems (SRDS) 2019
        5. Runchao Han, Haoyu Lin, and Jiangshan Yu.
          On the optionality and fairness of Atomic Swaps,
          ACM Advances in Financial Technology (AFT) 2019.
        6. Xinyu Zhang, Joseph K. Liu, Ron Steinfeld, Veronika Kuchta, Jiangshan Yu.
          Revocable and Linkable Ring Signature.
          The 15th International Conference on Information Security and Cryptology (Inscrypt), 2019.
        7. Jun Zhao, Jiangshan Yu, Joseph K. Liu.
          Consolidating Hash Power in Blockchain Shards with a Forest. The 15th International Conference on Information Security and Cryptology (Inscrypt), 2019.
        8. Chaochen Shi, Jiangshan Yu.
          A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection. The 13th International Conference on Provable Security (ProvSec), 2019.
        9. Liangrong Zhao, Jiangshan Yu.
          Evaluating DAG-Based Blockchains for IoT. The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom/BigDataSE), 2019.
        2012-2018
        1. Runchao Han, Jiangshan Yu, Joseph K. Liu, Peng Zhang.
          Evaluating CryptoNote-Style Blockchains. The 14th International Conference on Information Security and Cryptology (Inscrypt), 2018.
        2. Kevin Milner, Cas Cremers, Jiangshan Yu, and Mark Ryan.
          Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications,
          IEEE Computer Security Foundations Symposium (CSF) 2017.
        3. Marcus Völp, Francisco Rocha, Jeremie Decouchant, Jiangshan Yu, Paulo Jorge Esteves Veríssimo.
          Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come.
          The 25th Security Protocols Workshop (SPW), 2017.
        4. Jiangshan Yu, Mark Ryan, Liqun Chen.
          Authenticating Compromisable Storage Systems.
          The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2017.
        5. Jiangshan Yu, Mark Dermot Ryan.
          Device Attacker Models: Fact and Fiction.
          The 23rd Security Protocols Workshop (SPW), 2015.
        6. Jiangshan Yu, Guilin Wang, Yi Mu.
          Provably Secure Single Sign-on Scheme in Distributed Systems and Networks
          The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012.

      1. Patent:
        • Jiangshan Yu and Mark Ryan. 'Key usage detection'.
          UK Patent Application GB 1416188.9
          US Patent Application US 14/852,342

      2. Thesis: