Related references
Note: Only part of the references are listed.
Article
Computer Science, Theory & Methods
Huawei Huang et al.
Summary: This article studies the impact of transaction assignment strategy on the stability of a PBFT-based sharded permissioned blockchain and proposes an adaptive resource-allocation algorithm to address this issue.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
(2022)
Article
Automation & Control Systems
Jiajing Wu et al.
Summary: This article proposes an approach to detect phishing scams on Ethereum by mining its transaction records. By constructing the transaction network and using a novel network embedding algorithm, the features of addresses are successfully extracted and classified using a support vector machine. Experimental results demonstrate the effectiveness of this method on Ethereum and the superiority of the feature extraction algorithm.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
(2022)
Article
Automation & Control Systems
Peilin Zheng et al.
Summary: This study proposes Aeolus blockchain to address the performance limitations of traditional blockchain systems in the context of massive IoT devices. The proposed approach achieves distributed execution of transactions through a distributed transaction structure and distributed state update sharding. Experimental results demonstrate significant improvements in throughput compared to traditional blockchain systems, showing the feasibility and stability of Aeolus in a large-scale IoT environment.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Proceedings Paper
Computer Science, Hardware & Architecture
Huawei Huang et al.
Summary: This article discusses the issues of hot shards and cross-shard transactions in blockchain state sharding. Through a review of related studies, it is found that a cross-shard transaction protocol that achieves workload balance and reduces the number of cross-shard transactions is currently lacking in the literature. To address this, the proposed solution, BrokerChain, utilizes fine-grained state partition and account segmentation. The security issues and properties of BrokerChain are analyzed, and comprehensive evaluations show its superiority over other solutions in terms of system throughput, transaction confirmation latency, transaction pool queue size, and workload balance.
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022)
(2022)
Article
Computer Science, Theory & Methods
Huawei Huang et al.
Summary: The study outlines the main focus of blockchain surveys in the past 5 years, emphasizing the current lack of comprehensive investigation into the essential aspects of blockchain technology. By identifying and categorizing recent high-quality research outputs, the study conducts a thorough investigation into topics closely related to the theoretical findings and fundamental mechanisms of blockchain systems and networks.
ACM COMPUTING SURVEYS
(2021)
Article
Computer Science, Information Systems
Jelle Hellings et al.
Summary: The emergence of blockchains has led to the development of resilient systems that can handle Byzantine failures, with recent exploration of sharding for scalability. However, current sharded resilient systems lack the flexibility of traditional systems. To enhance this, a unifying framework ByShard is introduced to study sharded resilient systems, proposing efficient transaction processing protocols.
PROCEEDINGS OF THE VLDB ENDOWMENT
(2021)
Proceedings Paper
Computer Science, Information Systems
Peilin Zheng et al.
Summary: The performance of blockchain is currently inadequate, and one crucial way to improve it is through sharding. The proposal of Meepo focuses on studying sharded consortium blockchain, enhancing efficiency through cross-epoch and cross-call, and using strategies like partial cross-call merging to handle multi-state dependency in contract calls.
2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021)
(2021)
Article
Computer Science, Hardware & Architecture
Yuzheng Li et al.
Summary: Federated learning allows users to collaboratively train a shared global model without exposing private data, but security concerns arise due to potential attacks from malicious clients or central servers. A decentralized federated learning framework based on blockchain, called BFLC, is proposed to address these security issues. It utilizes a Committee consensus mechanism to enhance security and scalability, as demonstrated in experiments using real-world datasets.
Proceedings Paper
Computer Science, Information Systems
Hung Dang et al.
SIGMOD '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA
(2019)
Article
Computer Science, Information Systems
Mohammad Javad Amiri et al.
PROCEEDINGS OF THE VLDB ENDOWMENT
(2019)
Article
Computer Science, Information Systems
Pingcheng Ruan et al.
PROCEEDINGS OF THE VLDB ENDOWMENT
(2019)
Proceedings Paper
Computer Science, Theory & Methods
Mahdi Zamani et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18)
(2018)
Proceedings Paper
Computer Science, Theory & Methods
Eleftherios Kokoris-Kogias et al.
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP)
(2018)
Proceedings Paper
Computer Science, Artificial Intelligence
Han Zhu et al.
KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING
(2018)
Article
Computer Science, Information Systems
Sheng Wang et al.
PROCEEDINGS OF THE VLDB ENDOWMENT
(2018)
Proceedings Paper
Computer Science, Information Systems
Tien Tuan Anh Dinh et al.
SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA
(2017)
Proceedings Paper
Computer Science, Software Engineering
Yossi Gilad et al.
PROCEEDINGS OF THE TWENTY-SIXTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '17)
(2017)
Article
Computer Science, Information Systems
Zibin Zheng et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2012)