Optimal mixed block withholding attacks based on reinforcement learning
暂无分享,去创建一个
Tao Li | Xiaomei Yu | Yanli Wang | Yilei Wang | Lishan Ke | Yi Dou | Shouzhe Li | Guoyu Yang | Lifeng Zhang | Xiaomei Yu | Yilei Wang | Tao Li | Lishan Ke | Guoyu Yang | Yanli Wang | Yi Dou | Shouzhe Li | Lifeng Zhang
[1] Harish Garg,et al. Generalized intuitionistic fuzzy soft power aggregation operator based on t‐norm and their application in multicriteria decision‐making , 2018, Int. J. Intell. Syst..
[2] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[3] Youliang Tian,et al. A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs , 2020, IEEE Transactions on Industrial Informatics.
[4] Hu-Chen Liu,et al. A new approach for emergency decision‐making based on zero‐sum game with Pythagorean fuzzy uncertain linguistic variables , 2019, Int. J. Intell. Syst..
[5] Prateek Saxena,et al. On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[6] Tao Li,et al. Randomness invalidates criminal smart contracts , 2019, Inf. Sci..
[7] Hongwei Li,et al. Secure Multi-Party Computation: Theory, practice and applications , 2019, Inf. Sci..
[8] Deke Guo,et al. Selfholding: A combined attack model using selfish mining with block withholding attack , 2019, Comput. Secur..
[9] Xinchun Cui,et al. Secure computation protocols under asymmetric scenarios in enterprise information system , 2019, Enterp. Inf. Syst..
[10] Fengyin Li,et al. A game-theoretic method based on Q-learning to invalidate criminal smart contracts , 2019, Inf. Sci..
[11] Zoe L. Jiang,et al. Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing , 2020, Inf. Sci..
[12] Hong Liu,et al. A scalable coevolutionary multi-objective particle swarm optimizer , 2010, Int. J. Comput. Intell. Syst..
[13] Bin Xiao,et al. Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System , 2019, CCS.
[14] Wei Yang,et al. New q‐rung orthopair fuzzy partitioned Bonferroni mean operators and their application in multiple attribute decision making , 2018, Int. J. Intell. Syst..
[15] Lei Guo,et al. Containment control of heterogeneous fractional-order multi-agent systems , 2017, J. Frankl. Inst..
[16] Jiaqi Zheng,et al. Toward optimal participant decisions with voting-based incentive model for crowd sensing , 2020, Inf. Sci..
[17] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[18] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[19] Hong Wang,et al. Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments , 2016, Int. J. Ad Hoc Ubiquitous Comput..
[20] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[21] Hong Wang,et al. An attention mechanism and multi-granularity-based Bi-LSTM model for Chinese Q&A system , 2020, Soft Comput..
[22] Michael Davidson,et al. On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms , 2020, IACR Cryptol. ePrint Arch..
[23] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[24] Yongdae Kim,et al. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.