A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling

L Lao, Z Li, S Hou, B Xiao, S Guo, Y Yang - ACM Computing Surveys …, 2020 - dl.acm.org
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …

Blockchain on security and forensics management in edge computing for IoT: A comprehensive survey

Z Liao, X Pang, J Zhang, B Xiong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Security and forensics represent two key components for network management, especially
to guarantee the trusted operation of massive access networks such as the Internet of Things …

Vfchain: Enabling verifiable and auditable federated learning via blockchain systems

Z Peng, J Xu, X Chu, S Gao, Y Yao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Advanced artificial intelligence techniques, such as federated learning, has been applied to
broad areas, eg, image classification, speech recognition, smart city, and healthcare …

Is semi‐selfish mining available without being detected?

T Li, Z Wang, Y Chen, C Li, Y Jia… - International Journal of …, 2022 - Wiley Online Library
Selfish mining attacks get a high prize due to the additional rewards unproportionate to their
mining power (mining pools have particular advantages). Generally, this category of attacks …

Semi‐selfish mining based on hidden Markov decision process

T Li, Z Wang, G Yang, Y Cui, Y Chen… - International Journal of …, 2021 - Wiley Online Library
Selfish mining attacks sabotage the blockchain systems by utilizing the vulnerabilities of
consensus mechanism. The attackers' main target is to obtain higher revenues compared …

[HTML][HTML] A survey on blockchain systems: Attacks, defenses, and privacy preservation

Y Chen, H Chen, Y Zhang, M Han, M Siddula… - High-Confidence …, 2022 - Elsevier
Owing to the incremental and diverse applications of cryptocurrencies and the continuous
development of distributed system technology, blockchain has been broadly used in fintech …

G-PBFT: A location-based and scalable consensus protocol for IoT-blockchain applications

L Lao, X Dai, B Xiao, S Guo - 2020 IEEE international parallel …, 2020 - ieeexplore.ieee.org
IoT-blockchain applications have advantages of managing massive IoT devices, achieving
advanced data security, and data credibility. However, there are still some challenges when …

P2B-Trace: Privacy-Preserving Blockchain-based Contact Tracing to Combat Pandemics

Z Peng, C Xu, H Wang, J Huang, J Xu… - Proceedings of the 2021 …, 2021 - dl.acm.org
The eruption of a pandemic, such as COVID-19, can cause an unprecedented global crisis.
Contact tracing, as a pillar of communicable disease control in public health for decades …

Do the rich get richer? fairness analysis for blockchain incentives

Y Huang, J Tang, Q Cong, A Lim, J Xu - Proceedings of the 2021 …, 2021 - dl.acm.org
Proof-of-Work (PoW) is the most widely adopted incentive model in current blockchain
systems, which unfortunately is energy inefficient. Proof-of-Stake (PoS) is then proposed to …

BSM-ether: Bribery selfish mining in blockchain-based healthcare systems

Y Wang, Z Wang, M Zhao, X Han, H Zhou, X Wang… - Information …, 2022 - Elsevier
Blockchain-enabled distributed networks present a new infrastructure for building reliable
and privacy-preserving healthcare utilities. Among them, Ethereum networks have gained …