Shiyu Li

ORCID: 0000-0002-1504-5055
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • User Authentication and Security Systems
  • VLSI and Analog Circuit Testing
  • IoT and Edge/Fog Computing
  • VLSI and FPGA Design Techniques
  • Low-power high-performance VLSI design
  • Peer-to-Peer Network Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Sensorless Control of Electric Motors
  • 3D Printing in Biomedical Research
  • Anomaly Detection Techniques and Applications
  • Iterative Learning Control Systems
  • Advanced Authentication Protocols Security
  • Access Control and Trust
  • Full-Duplex Wireless Communications
  • Video Analysis and Summarization
  • Real-time simulation and control systems
  • Scientific Computing and Data Management
  • Radio Frequency Integrated Circuit Design
  • Evacuation and Crowd Dynamics
  • Cellular Mechanics and Interactions
  • Augmented Reality Applications
  • Acoustic Wave Resonator Technologies

University of Electronic Science and Technology of China
2003-2024

Shanghai East Hospital
2024

Tongji University
2024

Huzhou University
2022

Portland State University
2021

In mobile edge computing (MEC) systems, data is frequently transmitted between MEC servers and users holding devices for supporting related services. However, critical threats towards confidentiality authenticity are raised: adversaries always attempt to extract content from the transmission impersonate others spread malicious profits. Furthermore, have store (secret public) keys used locally. Consequently, only maintaining can be utilized access services provided by servers, "portability"...

10.1109/tc.2024.3355759 article EN IEEE Transactions on Computers 2024-01-22

In this paper, we propose a servers-aided password-based subsequent-key-locked encryption mechanism to ensure the confidentiality of outsourced electronic health records (EHRs). The achieves conditional forward transparency: doctor can only access patient's EHRs related current diagnosis with delegation. It also portability: delegate for accessing specific part EHRs, patient needs send one key (at most 256 bits) in addition delegation information doctor; does not need maintain any secret...

10.1109/tmc.2022.3199048 article EN IEEE Transactions on Mobile Computing 2022-08-15

In this letter, we point out that the privacy-preserving adaptive trapdoor hash authentication tree scheme (published in IEEE TIFS, doi: 10.1109/TIFS.2020.2986879) can be invalidated by an adversarial cloud server: if outsourced data is arbitrarily modified, server still pass third-party auditor's auditing.

10.1109/tifs.2021.3059270 article EN IEEE Transactions on Information Forensics and Security 2021-01-01

Single-sign-on (SSO) authentication employs an identity provider (IdP) to provide users with efficient way authenticate themselves different service providers and has been widely applied in digital systems. However, existing SSO schemes suffer from critical issues terms of security privacy. Regarding security, most achieve a high convenience at the expense are thereby susceptible various attacks. privacy, fail protect users' subscription pattern access against adversaries who can easily...

10.1109/tifs.2024.3392533 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

Mechanical aspects of tissues and cells critically influence a myriad biological processes can substantially alter the course diverse diseases. The emergence methodologies adapted from physical science now permits precise quantification cellular forces mechanical properties cells. Despite rising interest in tissue mechanics across fields like biology, bioengineering medicine, there remains noticeable absence comprehensive readily accessible repository this pertinent information. To fill gap,...

10.1093/database/baae040 article EN cc-by Database 2024-01-01

We propose a protection mechanism for password-based credential databases maintained by service providers against leakage, dubbed PCDL. In PCDL, each authentication is derived from user's password and salt, where provider employs set of key servers to share the salt in threshold way. With an external adversary cannot derive any information about underlying passwords compromised database, even if he can compromise some servers. The most prominent manifestation PCDL transparency: integrating...

10.1109/tifs.2023.3324326 article EN IEEE Transactions on Information Forensics and Security 2023-10-13

Certificate revocation checking (CRC) is a fundamental requirement in certificate-based public-key cryptographic systems. Most existing CRC schemes are not tailored for edge-cloud computing systems, and directly applying these would cause security efficiency problems. In this article, we first propose two-layer edge-cloud-assisted framework, dubbed ECA-CRC, where edge nodes utilizing probabilistic algorithm serve as layer, the cloud server deterministic serves second layer. Both...

10.1109/jiot.2023.3264682 article EN IEEE Internet of Things Journal 2023-04-05

In this paper, we investigate actual cloud-assisted electronic health (eHealth) systems in terms of security, efficiency, and functionality. Specifically, propose a password-based subsequent-key-locked encryption mechanism to ensure the confidentiality outsourced records (EHRs). We also blockchain-based secure EHR provenance by designing data structure record deploying public blockchain smart contract both EHRs their records. With two mechanisms, develop BESURE (blockchain-based eHealth...

10.1109/iwqos52092.2021.9521289 article EN 2021-06-25

Syndrome-based early epidemic warning plays a vital role in preventing and controlling unknown outbreaks. It monitors the frequency of each syndrome, issues if some is aberrant, identifies potential outbreaks, alerts governments as possible. Existing systems adopt cloud-assisted paradigm to achieve cross-facility statistics on syndrome frequencies. However, these systems, all symptom data would be directly leaked cloud, which causes critical security privacy issues. In this paper, we first...

10.56553/popets-2025-0020 article EN Proceedings on Privacy Enhancing Technologies 2024-11-10

In mobile edge computing (MEC) systems, data is frequently transmitted between MEC servers and devices for supporting related services. However, critical threats towards confidentiality authenticity are raised, where adversaries always attempt to extract content from the transmission impersonate others spread malicious profits. this paper, we propose a blockchain-based authenticated scheme, dubbed Badge, establish secure channels devices. Badge based on hybrid encryption mechanism, which...

10.1109/icc45855.2022.9838606 article EN ICC 2022 - IEEE International Conference on Communications 2022-05-16

With the high demand for reliability and performance, it is essential to determine an accurate estimation of maximum CMOS combinational circuit power consumption. However, large-scaled circuits, problem determining input patterns induce current NP-complete. In this paper, a novel approach was proposed obtain lower bound consumption using THGA (tabu-hierarchy genetic algorithm). The experiments with ISCAS85 benchmark circuits show that generates quality cannot be achieved simulation-based...

10.1109/icccas.2002.1178990 article EN 2003-08-27

Even-order intermodulation distortions are often considered easy to filter in narrowband radio frequency (RF) wireless systems because they usually located far away from the desired passband and adjacent bands. However, even-order have recently attracted more interest with increasing popularity of wideband RF applications. The authors' previous work was devoted establishing power spectrum model second-order distortion. Motivated by latest efforts on amplifier linearization fourth-order...

10.1049/tje2.12090 article EN cc-by The Journal of Engineering 2021-10-09

In this paper, we investigate actual exchange-assisted data trading systems and point out that the increment of content in a sensitive dataset always results its privacy level, i.e., making more than before. As consequence, follows an incremental privacy-driven paradigm, where (1) buyers with various requirements would purchase subsets different levels, (2) when buyer purchases subset entire higher level privacy, all lower levels are required (in other words, there is containment...

10.1109/pimrc56721.2023.10294035 article EN 2023-09-05

As more datapath stacks are integrated into system-on-chips (SOC), the is becoming a critical part of whole giga-scale circuit (GSI) design. The traditional layout design methodology cannot satisfy performance requirements since it has no knowledge bit-sliced structure. In this paper, we applied an approach OpenTS (open tabu search) to determine optimal element ordering minimize track density, wire length and interconnection delay. Experimental results show that efficient than existing...

10.1109/icccas.2002.1178989 article EN 2003-08-27
Coming Soon ...