Reputation-based Q-Routing for Robust Inter-committee Routing in the Sharding-based Blockchain
暂无分享,去创建一个
Shuhan Zhang | Yuanrong Shao | Bowen Sun | Zelei Cheng | Zuotian Li | Zelei Cheng | Zuotian Li | Shuhan Zhang | Bowen Sun | Yuanrong Shao
[1] Elaine Shi,et al. Thunderella: Blockchains with Optimistic Instant Confirmation , 2018, IACR Cryptol. ePrint Arch..
[2] Gabriel Bracha,et al. An O(log n) expected rounds randomized byzantine generals protocol , 1987, JACM.
[3] Philip C. Treleaven,et al. Blockchain Technology in Finance , 2017, Computer.
[4] Baruch Awerbuch,et al. A quantitative approach to dynamic networks , 1990, PODC '90.
[5] Yang Xu,et al. A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT , 2019, IEEE Transactions on Industrial Informatics.
[6] Raphael Rom,et al. Failsafe End-to-End Protocols in Computer Networks with Changing Topology , 1987, IEEE Trans. Commun..
[7] Changsheng Xu,et al. HAPGN: Hierarchical Attentive Pooling Graph Network for Point Cloud Segmentation , 2021, IEEE Transactions on Multimedia.
[8] Baojiang Cui,et al. A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack , 2019, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[9] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[10] Ying-Chang Liang,et al. Applications of Deep Reinforcement Learning in Communications and Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[11] Michael L. Littman,et al. A Distributed Reinforcement Learning Scheme for Network Routing , 1993 .
[12] K. V. S. Ramarao,et al. On the diagnosis of Byzantine faults , 1988, Proceedings [1988] Seventh Symposium on Reliable Distributed Systems.
[13] George Danezis,et al. Chainspace: A Sharded Smart Contracts Platform , 2017, NDSS.
[14] Zygmunt J. Haas,et al. Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..
[15] S. Finn. Resynch Procedures and a Fail-Safe Network Protocol , 1979, IEEE Trans. Commun..
[16] Neeraj Suri,et al. On-Line Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters , 2007, IEEE Transactions on Dependable and Secure Computing.
[17] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[18] Douglas R. Heisterkamp,et al. Simulated Annealing Based Hierarchical Q-Routing: A Dynamic Routing Protocol , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[19] Jim Dowling,et al. Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[20] Wei-Pang Yang,et al. Reaching Fault Diagnosis Agreement under a Hybrid Fault Model , 2000, IEEE Trans. Computers.
[21] GERNOT METZE,et al. On the Connection Assignment Problem of Diagnosable Systems , 1967, IEEE Trans. Electron. Comput..
[22] Baruch Awerbuch,et al. Reliable broadcast protocols in unreliable networks , 1986, Networks.
[23] Sreeram Kannan,et al. PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously , 2018, IEEE Transactions on Information Forensics and Security.
[24] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[25] Michael L. Littman,et al. Packet Routing in Dynamically Changing Networks: A Reinforcement Learning Approach , 1993, NIPS.
[26] Risto Miikkulainen,et al. Confidence-based Q-Routing: An on-line adaptive network routing algorithm , 1998 .
[27] Yehuda Afek,et al. End-to-end communication in unreliable networks , 1988, PODC '88.
[28] Kevin I-Kai Wang,et al. Multi-Modality Behavioral Influence Analysis for Personalized Recommendations in Health Social Media Environment , 2019, IEEE Transactions on Computational Social Systems.
[29] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[30] A. El Saddik,et al. Ant Colony-Based Reinforcement Learning Algorithm for Routing in Wireless Sensor Networks , 2007, 2007 IEEE Instrumentation & Measurement Technology Conference IMTC 2007.
[31] Song Han,et al. SoK: Sharding on Blockchain , 2019, IACR Cryptol. ePrint Arch..
[32] Frederick Ducatelle,et al. Adaptive routing in ad hoc wireless multi-hop networks , 2007 .
[33] Qun Jin,et al. Academic Influence Aware and Multidimensional Network Analysis for Research Collaboration Navigation Based on Scholarly Big Data , 2021, IEEE Transactions on Emerging Topics in Computing.
[34] Baruch Awerbuch,et al. Applying static network protocols to dynamic networks , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[35] Dit-Yan Yeung,et al. Predictive Q-Routing: A Memory-based Reinforcement Learning Approach to Adaptive Traffic Control , 1995, NIPS.
[36] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[37] Christopher Frost,et al. Spanner: Google's Globally-Distributed Database , 2012, OSDI.
[38] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[39] Philipp Jovanovic,et al. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[40] Amir Herzberg,et al. Blockchain Access Privacy: Challenges and Directions , 2018, IEEE Security & Privacy.
[41] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[42] Shailesh Kumar and Risto Miikkulainen. Dual Reinforcement Q-Routing: An On-Line Adaptive Routing Algorithm , 1997 .
[43] Xiaofei Xing,et al. Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT , 2020, IEEE Transactions on Industrial Informatics.
[44] Emin Gün Sirer,et al. Scalable and Probabilistic Leaderless BFT Consensus through Metastability , 2019, ArXiv.
[45] Jiwei Zhang,et al. Lightweight Attention Pyramid Network for Object Detection and Instance Segmentation , 2020 .
[46] George Danezis,et al. Centrally Banked Cryptocurrencies , 2015, NDSS.
[47] Cheng Zhang,et al. Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services , 2020, IEEE Transactions on Network Science and Engineering.
[48] Iddo Bentov,et al. Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[49] Cheng Zhang,et al. Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service , 2020, IEEE Transactions on Services Computing.
[50] Sean R Eddy,et al. What is dynamic programming? , 2004, Nature Biotechnology.
[51] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[52] Risto Miikkulainen,et al. Confidence Based Dual Reinforcement Q-Routing: An adaptive online network routing algorithm , 1999, IJCAI.
[53] Albert Cabellos-Aparicio,et al. A Deep-Reinforcement Learning Approach for Software-Defined Networking Routing Optimization , 2017, ArXiv.
[54] Aggelos Kiayias,et al. SoK: Communication Across Distributed Ledgers , 2019, IACR Cryptol. ePrint Arch..
[55] K. V. S. Ramarao,et al. Distributed diagnosis of Byzantine processors and links , 1989, [1989] Proceedings. The 9th International Conference on Distributed Computing Systems.
[56] Mariana Raykova,et al. RapidChain: Scaling Blockchain via Full Sharding , 2018, CCS.
[57] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.