Blockchain in global supply chains and cross border trade: a critical synthesis of the state-of-the-art, challenges and opportunities Y Chang, E Iakovou, W Shi International Journal of Production Research 58 (7), 2082-2099, 2020 | 673 | 2020 |
On security analysis of proof-of-elapsed-time (poet) L Chen, L Xu, N Shah, Z Gao, Y Lu, W Shi Stabilization, Safety, and Security of Distributed Systems: 19th …, 2017 | 467 | 2017 |
Continuous mobile authentication using touchscreen gestures T Feng, Z Liu, KA Kwon, W Shi, B Carbunar, Y Jiang, N Nguyen 2012 IEEE conference on technologies for homeland security (HST), 451-456, 2012 | 432 | 2012 |
Senguard: Passive user identification on smartphones using multiple sensors W Shi, J Yang, Y Jiang, F Yang, Y Xiong 2011 IEEE 7th international conference on wireless and mobile computing …, 2011 | 289 | 2011 |
Tips: Context-aware implicit user identification using touch screen in uncontrolled environments T Feng, J Yang, Z Yan, EM Tapia, W Shi Proceedings of the 15th workshop on mobile computing systems and …, 2014 | 183 | 2014 |
High efficiency counter mode security architecture via prediction and precomputation W Shi, HS Lee, M Ghosh, C Lu, A Boldyreva 32nd International Symposium on Computer Architecture (ISCA'05), 14-24, 2005 | 168 | 2005 |
Method and apparatus for user recognition employing motion passwords Y Yu, BO Carbunar, Z Li, W Shi US Patent App. 12/142,967, 2009 | 161 | 2009 |
A comparison study of intel SGX and AMD memory encryption technology S Mofrad, F Zhang, S Lu, W Shi Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018 | 134 | 2018 |
CoC: A unified distributed ledger based supply chain management system Z Gao, L Xu, L Chen, X Zhao, Y Lu, W Shi Journal of Computer Science and Technology 33, 237-248, 2018 | 128 | 2018 |
Architectural support for high speed protection of memory integrity and confidentiality in multiprocessor systems W Shi, HHS Lee, M Ghosh, C Lu Proceedings. 13th International Conference on Parallel Architecture and …, 2004 | 123 | 2004 |
Continuous mobile authentication using a novel graphic touch gesture feature X Zhao, T Feng, W Shi 2013 IEEE sixth international conference on biometrics: theory, applications …, 2013 | 115 | 2013 |
Enabling the sharing economy: Privacy respecting contract based on public blockchain L Xu, N Shah, L Chen, N Diallo, Z Gao, Y Lu, W Shi Proceedings of the ACM workshop on blockchain, cryptocurrencies and …, 2017 | 112 | 2017 |
eGov-DAO: A better government using blockchain based decentralized autonomous organization N Diallo, W Shi, L Xu, Z Gao, L Chen, Y Lu, N Shah, L Carranco, TC Le, ... 2018 International Conference on eDemocracy & eGovernment (ICEDEG), 166-171, 2018 | 108 | 2018 |
Query privacy in wireless sensor networks B Carbunar, Y Yu, W Shi, M Pearce, V Vasudevan ACM Transactions on Sensor Networks (TOSN) 6 (2), 1-34, 2010 | 108 | 2010 |
Method and apparatus for providing passive user identification W Shi, J Yang, F Yang, Y Xiong US Patent App. 12/979,698, 2012 | 106 | 2012 |
Continuous mobile authentication using virtual key typing biometrics T Feng, X Zhao, B Carbunar, W Shi 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 105 | 2013 |
Mobile user authentication using statistical touch dynamics images X Zhao, T Feng, W Shi, IA Kakadiaris IEEE Transactions on Information Forensics and Security 9 (11), 1780-1789, 2014 | 85 | 2014 |
Blockchain-based identity management with mobile device Z Gao, L Xu, G Turner, B Patel, N Diallo, L Chen, W Shi Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for …, 2018 | 76 | 2018 |
Using human body gestures as inputs for gaming via depth analysis Y Wang, T Yu, L Shi, Z Li 2008 IEEE International Conference on Multimedia and Expo, 993-996, 2008 | 75 | 2008 |
An integrated framework for dependable and revivable architectures using multicore processors W Shi, HHS Lee, L Falk, M Ghosh ACM SIGARCH Computer Architecture News 34 (2), 102-113, 2006 | 72 | 2006 |