A systematic mapping study for blockchain based on complex network

[1]  Florian Hawlitschek,et al.  The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy , 2018, Electron. Commer. Res. Appl..

[2]  M. Newman Coauthorship networks and patterns of scientific collaboration , 2004, Proceedings of the National Academy of Sciences of the United States of America.

[3]  Peter Haddawy,et al.  Small-world phenomenon of keywords network based on complex network , 2013, Scientometrics.

[4]  Markus Kraft,et al.  Blockchain technology in the chemical industry: Machine-to-machine electricity market , 2017 .

[5]  Xiangwei Zheng,et al.  A scalable coevolutionary multi-objective particle swarm optimizer , 2010 .

[6]  Zhe Liu,et al.  Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks , 2015, Mob. Inf. Syst..

[7]  Qiang He,et al.  Time-aware distributed service recommendation with privacy-preservation , 2019, Inf. Sci..

[8]  WangHao,et al.  Social rational secure multi-party computation , 2014 .

[9]  Xiangwei Zheng,et al.  A Multidomain Survivable Virtual Network Mapping Algorithm , 2017, Secur. Commun. Networks.

[10]  Gang Chen,et al.  Untangling Blockchain: A Data Processing View of Blockchain Systems , 2017, IEEE Transactions on Knowledge and Data Engineering.

[11]  M. Tomassini,et al.  Empirical analysis of the evolution of a scientific collaboration network , 2007 .

[12]  Hong Wang,et al.  Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments , 2016, Int. J. Ad Hoc Ubiquitous Comput..

[13]  Ye Guo,et al.  Blockchain application and outlook in the banking industry , 2016, Financial Innovation.

[14]  Tao Li,et al.  Socially-conforming cooperative computation in cloud networks , 2017, J. Parallel Distributed Comput..

[15]  Tao Li,et al.  Randomness invalidates criminal smart contracts , 2019, Inf. Sci..

[16]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[17]  Hao Wang,et al.  Social rational secure multi‐party computation , 2014, Concurr. Comput. Pract. Exp..

[18]  Josep Lluis De La Rosa,et al.  A Survey of Blockchain Technologies for Open Innovation , 2019 .

[19]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[20]  M. Sethumadhavan,et al.  Survey of consensus protocols on blockchain applications , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).

[21]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[22]  Qiang He,et al.  LSHiForest: A Generic Framework for Fast Tree Isolation Based Ensemble Anomaly Analysis , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).

[23]  Xuyun Zhang,et al.  A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.

[24]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[25]  Jun Tang,et al.  Formation of Autapse Connected to Neuron and Its Biological Function , 2017, Complex..

[26]  Jiguo Yu,et al.  Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment , 2017, Complex..

[27]  Zhi Zhou,et al.  Research on Weighted Complex Network Based Keywords Extraction , 2013, CLSW.

[28]  Satu Elisa Schaeffer,et al.  Graph Clustering , 2017, Encyclopedia of Machine Learning and Data Mining.

[29]  Antonio Puliafito,et al.  Blockchain and IoT Integration: A Systematic Survey , 2018, Sensors.

[30]  Maher Alharby,et al.  Blockchain-based Smart Contracts: A Systematic Mapping Study , 2017, ICAISC 2017.

[31]  Jinjun Chen,et al.  A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment , 2018, Future Gener. Comput. Syst..

[32]  Lianyong Qi,et al.  Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment , 2018, Wirel. Commun. Mob. Comput..

[33]  Fengyin Li,et al.  A game-theoretic method based on Q-learning to invalidate criminal smart contracts , 2019, Inf. Sci..

[34]  Andreas Strotmann,et al.  Author name disambiguation for collaboration network analysis and visualization , 2009, ASIST.

[35]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[36]  Marcel Ausloos,et al.  Self-citations, co-authorships and keywords: A new approach to scientists’ field mobility? , 2007, Scientometrics.

[37]  M. Newman,et al.  The structure of scientific collaboration networks. , 2000, Proceedings of the National Academy of Sciences of the United States of America.

[38]  Yue Wang,et al.  Evolutionary features of academic articles co-keyword network and keywords co-occurrence network: Based on two-mode affiliation network , 2016 .

[39]  Xinchun Cui,et al.  Secure computation protocols under asymmetric scenarios in enterprise information system , 2019, Enterp. Inf. Syst..

[40]  Hong Liu,et al.  A study on a cooperative character modeling based on an improved NSGA II , 2015, Multimedia Tools and Applications.