Blockchain Analysis
- SoK: Stablecoins in Retail Payments
Y. Li, Y. Xiang, Q. Wang, T. H. Yuen, A. Deppeler, and J. Yu
arXiv preprint, 2026. - Leveraging Large Language Models to Bridge On-chain and Off-chain Transparency in Stablecoins
Y. Xiang, Y. Lei, Y. Zhang, Q. Wang, T. H. Yuen, and J. Yu
arXiv preprint, 2025. - Measuring Memecoin Fragility
Y. Xiang, Q. Fu, Y. Li, Q. Wang, T. H. Yuen, and J. Yu
arXiv preprint, 2025. - Large Language Models for Cryptocurrency Transaction Analysis: A Bitcoin Case Study
Y. Lei, Y. Xiang, Q. Wang, R. Dowsley, T. H. Yuen, K. K. R. Choo, and J. Yu
arXiv preprint, 2025.
code data - BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis
Y. Xiang, Y. Lei, D. Bao, T. Li, Q. Yang, W. Liu, W. Ren, and K. K. R. Choo
IEEE Transactions on Information Forensics and Security, 2024.
code data - BTC-Shadow: An Analysis and Visualization System for Exposing Implicit Behaviors in Bitcoin Transaction Graphs
D. Bao, W. Ren, Y. Xiang, W. Liu, T. Zhu, Y. Ren, and K. K. R. Choo
Frontiers of Computer Science, 2023.
- Leveraging Subgraph Structure for Exploration and Analysis of Bitcoin Address
Y. Xiang, T. Li, and Y. Li
IEEE International Conference on Big Data, 2022.
data video - An Illicit Bitcoin Address Analysis Scheme Based on Subgraph Evolution
Q. Yang, Y. Xiang, W. Liu, and W. Ren
IEEE International Conference on High Performance Computing and Communications, 2022.
Blockchain Applications
- A Multi-type and Decentralized Data Transaction Scheme Based on Smart Contracts and Digital Watermarks
Y. Xiang, W. Ren, T. Li, X. Zheng, T. Zhu, and K. K. R. Choo
Journal of Network and Computer Applications, 2021.
- FAPS: A Fair, Autonomous and Privacy-preserving Scheme for Big Data Exchange Based on Oblivious Transfer, Ether Cheque and Smart Contracts
T. Li, W. Ren, Y. Xiang, X. Zheng, T. Zhu, K. K. R. Choo, and G. Srivastava
Information Sciences, 2021.
- CVT: A Crowdsourcing Video Transcoding Scheme Based on Blockchain Smart Contracts
Y. Chen, H. Yin, Y. Xiang, W. Ren, Y. Ren, and N. N. Xiong
IEEE Access, 2020.
AI Security
- AdvEWM: Generating Image Adversarial Examples by Embedding Digital Watermarks
Y. Xiang, T. Li, W. Ren, J. He, T. Zhu, and K. K. R. Choo
Journal of Information Security and Applications, 2024.
- A Lightweight Privacy-Preserving Scheme Using Pixel Block Mixing for Facial Image Classification in Deep Learning
Y. Xiang, T. Li, W. Ren, T. Zhu, and K. K. R. Choo
Engineering Applications of Artificial Intelligence, 2023.