Chunchi Liu

ORCID: 0000-0003-0200-8092
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Caching and Content Delivery
  • Security and Verification in Computing
  • Lipoproteins and Cardiovascular Health
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Malware Detection Techniques
  • Computational Drug Discovery Methods
  • Antifungal resistance and susceptibility
  • Auction Theory and Applications
  • Cryptography and Data Security
  • Distributed systems and fault tolerance
  • IoT and Edge/Fog Computing
  • Security in Wireless Sensor Networks
  • Synthesis and Biological Evaluation
  • Peroxisome Proliferator-Activated Receptors
  • Fungal Infections and Studies
  • Wireless Communication Security Techniques
  • Metal complexes synthesis and properties
  • Cloud Data Security Solutions
  • Internet Traffic Analysis and Secure E-voting
  • Mobile Ad Hoc Networks
  • Human Mobility and Location-Based Analysis
  • Evacuation and Crowd Dynamics
  • Recommender Systems and Techniques
  • Age of Information Optimization

Ernst & Young (United Kingdom)
2023-2024

Huawei Technologies (China)
2024

George Washington University
2018-2023

Shandong University
2021

Shandong University of Science and Technology
2019-2021

Beijing Normal University
2016-2018

Shenyang Pharmaceutical University
2015-2018

The rapid developments of the Internet Things (IoT) and smart mobile devices in recent years have been dramatically incentivizing advancement edge computing. On one hand, computing has provided a great assistance for lightweight to accomplish complicated tasks an efficient way; on other its hasty development leads neglection security threats large extent platforms their enabled applications. In this paper, we provide comprehensive survey most influential basic attacks as well corresponding...

10.1109/jproc.2019.2918437 article EN publisher-specific-oa Proceedings of the IEEE 2019-06-19

Internet of Things (IoT)-based E-commerce is a new business model that relies on autonomous transaction management IoT-devices. The system toward IoT-based demands autonomy, lightweight, and legitimacy. As blockchain an innovative technology competent in governing the decentralized network, we adopt it to design IoT E-commerce. However, current solutions, most namely cryptocurrencies, have fatal drawbacks nonsupervisability huge computational overhead, hence cannot be directly applied In...

10.1109/jiot.2018.2877634 article EN publisher-specific-oa IEEE Internet of Things Journal 2018-10-24

This paper presents <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$\mathit {wChain}$ </tex-math></inline-formula> , a blockchain protocol specifically designed for multihop wireless networks that deeply integrates communication properties and technologies under the realistic SINR model. We adopt hierarchical spanner as backbone to address medium contention achieve fast data aggregation within...

10.1109/twc.2021.3078639 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2021-06-03

Known as a distributed ledger technology (DLT), blockchain has attracted much attention due to its properties such decentralization, security, immutability and transparency, potential of servicing an infrastructure for various applications. Blockchain can empower wireless networks with identity management, data integrity, access control, high-level security. However, previous studies on blockchain-enabled mostly focus proposing architectures or building systems popular protocols....

10.1109/tmc.2022.3162117 article EN IEEE Transactions on Mobile Computing 2022-03-28

Blockchain creates a secure environment on top of strict cryptographic assumptions and rigorous security proofs. It permits on-chain interactions to achieve trustworthy properties such as traceability, transparency, accountability. However, current blockchain trustworthiness is only confined on-chain, creating "trust gap" the physical, off-chain environment. This due lack scheme that can truthfully reflect physical world in real-time consistent manner. Such an absence hinders further...

10.1109/tc.2022.3148379 article EN publisher-specific-oa IEEE Transactions on Computers 2022-01-01

With the rapid development of blockchain and its applications, amount data stored on decentralized storage networks (DSNs) has grown exponentially. DSNs bring together affordable resources from around world to provide robust, services for tens thousands applications (dApps). However, existing do not offer verifiability when implementing erasure coding redundant storage, making them vulnerable Byzantine encoders. Additionally, there is a lack fault-tolerant consensus optimal resilience in...

10.1109/tc.2024.3365953 article EN IEEE Transactions on Computers 2024-02-14

Decentralized Storage Networks (DSNs) can gather storage resources from mutually untrusted providers and form worldwide decentralized file systems. Compared to traditional networks, DSNs are built on top of blockchains, which incentivize service ensure strong security. However, existing face two major challenges. First, deduplication only be achieved at the directory-level. Missing file-level leads unavoidable extra bandwidth cost. Second, current realize indexing by storing metadata while...

10.1109/tc.2023.3288760 article EN IEEE Transactions on Computers 2023-06-24

<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Overprivilege Attack</i> , a widely reported phenomenon in IoT that accesses unauthorized or excessive resources, is notoriously hard to prevent, trace and mitigate. In this paper, we propose TBAC, Tokoin-Based Access Control model enabled by blockchain Trusted Execution Environment (TEE) technologies, offer fine-grained access control strong auditability for IoT. TBAC materializes the virtual...

10.1109/tmc.2023.3316622 article EN IEEE Transactions on Mobile Computing 2023-09-19

Smart home systems have become more and prevailent in recent years. On the one hand, they make our everyday life convenient; on other suffer from two notorious security problems, namely, open-port problem overprivilege problem, making their situations extremely worrying uncheerful. In this article, we proposed HomeShield, a novel credential-less authentication framework to shield smart by effectively defending against attacks resulted these problems without need for sensitive credentials. We...

10.1109/jiot.2020.3003621 article EN publisher-specific-oa IEEE Internet of Things Journal 2020-06-19

Crowdsensing has been earning increasing credits for effectively integrating the mass sensors to achieve significant tasks that one single sensor cannot imagine. However in many existing works this field, some key information of participants is incomplete each other, hence causing non-optimality result. Noticing a potential cooperation between players, we propose cooperative Stackelberg game based optimal task allocation and pricing mechanism crowdsensing scenario. Aiming at different...

10.1504/ijsnet.2018.094696 article EN International Journal of Sensor Networks 2018-01-01

Crowdsourcing applications are vulnerable to malicious behaviors, posing serious threats their adoption and large deployment. Based on the notion that requestor (i.e., crowdsourcer) can block behaviors via leveraging market power through task allocation pricing, we propose two novel frameworks based mechanism design game theory reverse theory). To best of our knowledge, first exploit apply in thwarting crowdsourcing. The proposed framework is built a requestor-dominant (Rd-MDG), where rule...

10.1109/infocom.2017.8057176 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2017-05-01

Blockchain has attracted significant attention in recent years due to its potential revolutionize various industries by providing trustlessness. To comprehensively examine blockchain systems, this article presents both a macro-level overview on the most popular and micro-level analysis general framework crucial components. The exploration provides big picture endeavors made professionals over enhance performance while investigation details building blocks for deep technology comprehension....

10.48550/arxiv.2304.08283 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Blockchain creates a secure environment on top of strict cryptographic assumptions and rigorous security proofs. It permits on-chain interactions to achieve trustworthy properties such as traceability, transparency, accountability. However, current blockchain trustworthiness is only confined on-chain, creating "trust gap" the physical, off-chain environment. This due lack scheme that can truthfully reflect physical world in real-time consistent manner. Such an absence hinders further...

10.48550/arxiv.2106.15934 preprint EN other-oa arXiv (Cornell University) 2021-01-01

Cholesteryl ester transfer protein (CETP) has been identified as a potential target for cardiovascular disease (CVD) its important role in the reverse cholesteryl (RCT) process. In our previous work, compound 5 was discovered moderate CETP inhibitor. The replacement of amide linker by heterocyclic aromatics and then series N,N-substituted-4-arylthiazole-2-methylamine derivatives were designed utilizing conformational restriction strategy. Thirty-six compounds synthesized evaluated their...

10.3390/molecules22111925 article EN cc-by Molecules 2017-11-07

Crowdsourcing has been an inspiration of effectively integrating the power crowd. Lots current contributions on crowdsourcing focus only competition between worker and requester resource allocation. However, most these works lacked attention to cooperation requester. In this paper, we take into consideration competition-cooperation coexisting trait relationship in market allocation (workload assignment pricing), adopt Stackelberg game model design a two-stage optimal win-win workload pricing...

10.1109/bdcloud-socialcom-sustaincom.2016.39 article EN 2016-10-01

Crowdsourcing is a new paradigm emerged in recentyears. It can deal with the tasks posted by requestor, who wants worker to accept task and finish it. Incrowdsourcing, it common case that using reputationmechanism estimates worker's ability avoid workercontributes low-quality work. Therefore, reputation mechanismis integrated into crowdsourcing for assignmentand biding price this paper. However, undesirable forsome requestors evaluation workers, as requestors'private information, exposed....

10.1109/iiki.2016.36 article EN 2016-10-01

The routing in DTN (Delay/Disruption Tolerant Network) deals with network partition and the mobility of nodes. In order to motivate involvement routing, several incentive schemes are created, one them is by payment. Suppose budget limited, question how make a plan based on payments. That say sender can decide data amount assigned special next hop payment for it. This paper proposes mechanism design approach define utility function hops, then maximize functions all participants, including...

10.1109/iiki.2016.42 article EN 2016-10-01
Coming Soon ...