A systematic mapping study for blockchain based on complex network
暂无分享,去创建一个
Xiaomei Yu | Kang Li | Peng Li | Ying Zheng | Dongfeng Wang | Yilei Wang | Guoyu Yang | Xiaomei Yu | Yilei Wang | Guoyu Yang | Dongfeng Wang | Peng Li | Kang Li | Ying Zheng
[1] Florian Hawlitschek,et al. The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy , 2018, Electron. Commer. Res. Appl..
[2] M. Newman. Coauthorship networks and patterns of scientific collaboration , 2004, Proceedings of the National Academy of Sciences of the United States of America.
[3] Peter Haddawy,et al. Small-world phenomenon of keywords network based on complex network , 2013, Scientometrics.
[4] Markus Kraft,et al. Blockchain technology in the chemical industry: Machine-to-machine electricity market , 2017 .
[5] Xiangwei Zheng,et al. A scalable coevolutionary multi-objective particle swarm optimizer , 2010 .
[6] Zhe Liu,et al. Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks , 2015, Mob. Inf. Syst..
[7] Qiang He,et al. Time-aware distributed service recommendation with privacy-preservation , 2019, Inf. Sci..
[8] WangHao,et al. Social rational secure multi-party computation , 2014 .
[9] Xiangwei Zheng,et al. A Multidomain Survivable Virtual Network Mapping Algorithm , 2017, Secur. Commun. Networks.
[10] Gang Chen,et al. Untangling Blockchain: A Data Processing View of Blockchain Systems , 2017, IEEE Transactions on Knowledge and Data Engineering.
[11] M. Tomassini,et al. Empirical analysis of the evolution of a scientific collaboration network , 2007 .
[12] Hong Wang,et al. Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments , 2016, Int. J. Ad Hoc Ubiquitous Comput..
[13] Ye Guo,et al. Blockchain application and outlook in the banking industry , 2016, Financial Innovation.
[14] Tao Li,et al. Socially-conforming cooperative computation in cloud networks , 2017, J. Parallel Distributed Comput..
[15] Tao Li,et al. Randomness invalidates criminal smart contracts , 2019, Inf. Sci..
[16] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[17] Hao Wang,et al. Social rational secure multi‐party computation , 2014, Concurr. Comput. Pract. Exp..
[18] Josep Lluis De La Rosa,et al. A Survey of Blockchain Technologies for Open Innovation , 2019 .
[19] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[20] M. Sethumadhavan,et al. Survey of consensus protocols on blockchain applications , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).
[21] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[22] Qiang He,et al. LSHiForest: A Generic Framework for Fast Tree Isolation Based Ensemble Anomaly Analysis , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).
[23] Xuyun Zhang,et al. A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.
[24] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[25] Jun Tang,et al. Formation of Autapse Connected to Neuron and Its Biological Function , 2017, Complex..
[26] Jiguo Yu,et al. Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment , 2017, Complex..
[27] Zhi Zhou,et al. Research on Weighted Complex Network Based Keywords Extraction , 2013, CLSW.
[28] Satu Elisa Schaeffer,et al. Graph Clustering , 2017, Encyclopedia of Machine Learning and Data Mining.
[29] Antonio Puliafito,et al. Blockchain and IoT Integration: A Systematic Survey , 2018, Sensors.
[30] Maher Alharby,et al. Blockchain-based Smart Contracts: A Systematic Mapping Study , 2017, ICAISC 2017.
[31] Jinjun Chen,et al. A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment , 2018, Future Gener. Comput. Syst..
[32] Lianyong Qi,et al. Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment , 2018, Wirel. Commun. Mob. Comput..
[33] Fengyin Li,et al. A game-theoretic method based on Q-learning to invalidate criminal smart contracts , 2019, Inf. Sci..
[34] Andreas Strotmann,et al. Author name disambiguation for collaboration network analysis and visualization , 2009, ASIST.
[35] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[36] Marcel Ausloos,et al. Self-citations, co-authorships and keywords: A new approach to scientists’ field mobility? , 2007, Scientometrics.
[37] M. Newman,et al. The structure of scientific collaboration networks. , 2000, Proceedings of the National Academy of Sciences of the United States of America.
[38] Yue Wang,et al. Evolutionary features of academic articles co-keyword network and keywords co-occurrence network: Based on two-mode affiliation network , 2016 .
[39] Xinchun Cui,et al. Secure computation protocols under asymmetric scenarios in enterprise information system , 2019, Enterp. Inf. Syst..
[40] Hong Liu,et al. A study on a cooperative character modeling based on an improved NSGA II , 2015, Multimedia Tools and Applications.