Author of the publication

SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework.

, , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 2070-2088 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Type Information Utilized Event Detection via Multi-Channel GNNs in Electrical Power Systems., , , , , , , , and . CoRR, (2022)Practical AgentChain: A compatible cross-chain exchange system., , , , , and . Future Gener. Comput. Syst., (2022)Hawk: Rapid Android Malware Detection Through Heterogeneous Graph Attention Networks., , , , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 35 (4): 4703-4717 (April 2024)Fair and smart spectrum allocation scheme for IIoT based on blockchain., , , , and . Ad Hoc Networks, (2021)HAWK: Rapid Android Malware Detection through Heterogeneous Graph Attention Networks., , , , , , , , and . CoRR, (2021)A Dual-Classifier Model for General Fine-Grained Event Detection Task., , , , , , , and . CCKS (Evaluation Track), volume 1553 of Communications in Computer and Information Science, page 18-27. Springer, (2021)A Malicious Android Malware Detection System based on Implicit Relationship Mining., , , , and . CSCloud/EdgeCom, page 59-64. IEEE, (2021)Label graph augmented soft cascade decoding model for overlapping event extraction., , , , , and . Int. J. Mach. Learn. Cybern., 15 (1): 79-95 (January 2024)A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness., , , , and . TrustCom, page 1012-1019. IEEE, (2020)An Evaluation of Uncle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined With an Eclipse Attack., , , and . IEEE Access, (2020)