IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers
暂无分享,去创建一个
Youliang Tian | Xiaomei Yu | Yilei Wang | Zhaojie Wang | Shouzhe Li | Guoyu Yang | Youliang Tian | Xiaomei Yu | Yilei Wang | Zhaojie Wang | Guoyu Yang | Shouzhe Li
[1] Zoe L. Jiang,et al. Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing , 2020, Inf. Sci..
[2] Tao Li,et al. Randomness invalidates criminal smart contracts , 2019, Inf. Sci..
[3] Jing Chen,et al. PAN: Pipeline assisted neural networks model for data-to-text generation in social internet of things , 2020, Inf. Sci..
[4] Hong Wang,et al. Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments , 2016, Int. J. Ad Hoc Ubiquitous Comput..
[5] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[6] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[7] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[8] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[9] Deepak Puthal,et al. Everything You Wanted to Know About the Blockchain: Its Promise, Components, Processes, and Problems , 2018, IEEE Consumer Electronics Magazine.
[10] Soung Chang Liew,et al. When blockchain meets AI: Optimal mining strategy achieved by machine learning , 2019, Int. J. Intell. Syst..
[11] Marie-Josée Cros,et al. MDPtoolbox: a multi-platform toolbox to solve stochastic dynamic programming problems , 2014 .
[12] Aleksander Berentsen. Aleksander Berentsen Recommends “Bitcoin: A Peer-to-Peer Electronic Cash System” by Satoshi Nakamoto , 2019, 21st Century Economics.
[13] Bin Xiao,et al. Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System , 2019, CCS.
[14] Fengyin Li,et al. A game-theoretic method based on Q-learning to invalidate criminal smart contracts , 2019, Inf. Sci..
[15] Sarah Meiklejohn,et al. Smart contracts for bribing miners , 2018, IACR Cryptol. ePrint Arch..
[16] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[17] Joseph Bonneau,et al. Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus , 2016, Financial Cryptography Workshops.
[18] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[19] Joshua A. Kroll,et al. Why buy when you can rent ? Bribery attacks on Bitcoin consensus , 2015 .
[20] Holger Paul Keeler,et al. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.
[21] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[22] Lei Guo,et al. Containment control of heterogeneous fractional-order multi-agent systems , 2017, J. Frankl. Inst..
[23] Jiaqi Zheng,et al. Toward optimal participant decisions with voting-based incentive model for crowd sensing , 2020, Inf. Sci..
[24] Ho-fung Leung,et al. Incentive compatible and anti-compounding of wealth in proof-of-stake , 2020, Inf. Sci..
[25] Hong Liu,et al. A scalable coevolutionary multi-objective particle swarm optimizer , 2010, Int. J. Comput. Intell. Syst..
[26] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[27] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[28] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[29] Jeffrey S. Rosenschein,et al. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.