ORCID as entered in ROS

Select Publications
2023, 'Leveraging Architectural Approaches in Web3 Applications - A DAO Perspective Focused', in 2023 IEEE International Conference on Blockchain and Cryptocurrency Icbc 2023, http://dx.doi.org/10.1109/ICBC56567.2023.10174988
,2023, 'Predicting NFT Classification with GNN: A Recommender System for Web3 Assets', in 2023 IEEE International Conference on Blockchain and Cryptocurrency Icbc 2023, http://dx.doi.org/10.1109/ICBC56567.2023.10174882
,2023, 'Rational Ponzi Game in Algorithmic Stablecoin', in 2023 IEEE International Conference on Blockchain and Cryptocurrency Icbc 2023, http://dx.doi.org/10.1109/ICBC56567.2023.10174904
,2023, 'SID: Service Identification and Discovery Framework for Decentralised Supply Chains', in Proceedings 2023 IEEE International Conference on Software Services Engineering Sse 2023, pp. 1 - 9, http://dx.doi.org/10.1109/SSE60056.2023.00012
,2022, 'Deep Transfer Learning for Actions Recognition with WiFi Signals', in 2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), IEEE, PEOPLES R CHINA, Zhangye, pp. 406 - 411, presented at IEEE 10th International Conference on Information, Communication and Networks (ICICN), PEOPLES R CHINA, Zhangye, 19 August 2022 - 24 August 2022, http://dx.doi.org/10.1109/ICICN56848.2022.10006577
,2022, 'Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies', in Asia Ccs 2022 Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security, pp. 123 - 137, http://dx.doi.org/10.1145/3488932.3517394
,2022, 'Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional Datasets', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 324 - 341, http://dx.doi.org/10.1007/978-3-031-15777-6_18
,2022, 'Frontrunning Block Attack in PoA Clique: A Case Study', in IEEE International Conference on Blockchain and Cryptocurrency Icbc 2022, http://dx.doi.org/10.1109/ICBC54727.2022.9805543
,2022, 'Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment', in Proceedings 2022 IEEE 21st International Conference on Trust Security and Privacy in Computing and Communications Trustcom 2022, pp. 874 - 881, http://dx.doi.org/10.1109/TrustCom56396.2022.00121
,2021, 'A weak consensus algorithm and its application to high-performance blockchain', in Proceedings IEEE INFOCOM, http://dx.doi.org/10.1109/INFOCOM42981.2021.9488725
,2021, 'An offline delegatable cryptocurrency system', in IEEE International Conference on Blockchain and Cryptocurrency Icbc 2021, http://dx.doi.org/10.1109/ICBC51069.2021.9461112
,2021, 'ChainSim: A P2P Blockchain Simulation Framework', in Communications in Computer and Information Science, pp. 1 - 16, http://dx.doi.org/10.1007/978-981-33-6478-3_1
,2020, 'Investigating different stress-relief methods using Electroencephalogram (EEG)', in 42ND ANNUAL INTERNATIONAL CONFERENCES OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY: ENABLING INNOVATIVE TECHNOLOGIES FOR GLOBAL HEALTHCARE EMBC'20, IEEE, CANADA, Montreal, pp. 2999 - 3002, presented at 42nd Annual International Conference of the IEEE-Engineering-in-Medicine-and-Biology-Society (EMBC), CANADA, Montreal, 20 July 2020 - 24 July 2020
,2020, 'PPM: A Provenance-Provided Data Sharing Model for Open Banking via Blockchain', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3373017.3373022
,2020, 'An Accountable Decryption System Based on Privacy-Preserving Smart Contracts', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 372 - 390, http://dx.doi.org/10.1007/978-3-030-62974-8_21
,2020, 'Security Analysis on dBFT Protocol of NEO', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 20 - 31, http://dx.doi.org/10.1007/978-3-030-51280-4_2
,2020, 'Security Analysis on Tangle-Based Blockchain Through Simulation', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 653 - 663, http://dx.doi.org/10.1007/978-3-030-55304-3_35
,2019, 'Improving the scalability of blockchain through DAG', in Middleware 2019 Proceedings of the 2019 20th International Middleware Conference Doctoral Symposium Part of Middleware 2019, pp. 34 - 35, http://dx.doi.org/10.1145/3366624.3368165
,2019, 'An efficient supply chain architecture based on blockchain for high-value commodities', in Bsci 2019 Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure Co Located with Asiaccs 2019, pp. 81 - 88, http://dx.doi.org/10.1145/3327960.3332384
,2019, 'ArtChain: Blockchain-enabled platform for art marketplace', in Proceedings 2019 2nd IEEE International Conference on Blockchain Blockchain 2019, pp. 447 - 454, http://dx.doi.org/10.1109/Blockchain.2019.00068
,2018, 'Research on solving the problem of original families and personal growth', in 2018 INTERNATIONAL SEMINAR ON COMPUTER SCIENCE AND ENGINEERING TECHNOLOGY (SCSET 2018), IOP PUBLISHING LTD, PEOPLES R CHINA, Shanghai, presented at International Seminar on Computer Science and Engineering Technology (SCSET), PEOPLES R CHINA, Shanghai, 17 December 2018 - 18 December 2018, http://dx.doi.org/10.1088/1742-6596/1176/4/042031
,2017, 'Outsourcing encrypted excel files', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 506 - 524, http://dx.doi.org/10.1007/978-3-319-72359-4_30
,2025, PoLO: Proof-of-Learning and Proof-of-Ownership at Once with Chained Watermarking, http://arxiv.org/abs/2505.12296v1
,2025, Slow is Fast! Dissecting Ethereum's Slow Liquidity Drain Scams, http://arxiv.org/abs/2503.04850v2
,2025, BRC20 Snipping Attack, http://arxiv.org/abs/2501.11942v1
,2025, Logic Meets Magic: LLMs Cracking Smart Contract Vulnerabilities, http://arxiv.org/abs/2501.07058v1
,2024, BRC20 Pinning Attack, http://arxiv.org/abs/2410.11295v3
,2024, SoK: Bitcoin Layer Two (L2), http://arxiv.org/abs/2409.02650v1
,2024, Is Your AI Truly Yours? Leveraging Blockchain for Copyrights, Provenance, and Lineage, http://arxiv.org/abs/2404.06077v1
,2024, Maximizing NFT Incentives: References Make You Rich, http://arxiv.org/abs/2402.06459v1
,2023, Bridging BRC-20 to Ethereum, http://arxiv.org/abs/2310.10065v2
,2023, How to Rationally Select Your Delegatee in PoS, http://arxiv.org/abs/2310.08895v1
,2023, Cryptocurrency in the Aftermath: Unveiling the Impact of the SVB Collapse, http://arxiv.org/abs/2311.10720v1
,2023, Account Abstraction, Analysed, http://arxiv.org/abs/2309.00448v1
,2023, BRC-20: Hope or Hype, http://arxiv.org/abs/2310.10652v1
,2023, Split Unlearning, http://arxiv.org/abs/2308.10422v6
,2023, Decentralized Finance (DeFi): A Survey, http://arxiv.org/abs/2308.05282v2
,2023, Leveraging Ponzi-like Designs in Stablecoins, http://dx.doi.org/10.22541/au.169087340.01726624/v1
,2023, IronForge: An Open, Secure, Fair, Decentralized Federated Learning, http://arxiv.org/abs/2301.04006v1
,2022, FTX Collapse: A Ponzi Story, http://arxiv.org/abs/2212.09436v1
,2022, Leveraging Architectural Approaches in Web3 Applications -- A DAO Perspective Focused, http://arxiv.org/abs/2212.05314v2
,2022, An Empirical Study on Snapshot DAOs, http://arxiv.org/abs/2211.15993v3
,2022, BDTS: Blockchain-based Data Trading System, http://dx.doi.org/10.1007/978-981-99-7356-9_38
,2022, Rational Ponzi Games in Algorithmic Stablecoin, http://arxiv.org/abs/2210.11928v2
,2022, A Referable NFT Scheme, http://arxiv.org/abs/2210.10910v2
,2022, Exploring Web3 From the View of Blockchain, http://arxiv.org/abs/2206.08821v1
,2022, Frontrunning Block Attack in PoA Clique: A Case Study, http://arxiv.org/abs/2205.10257v1
,2022, SoK: TEE-assisted Confidential Smart Contract, http://arxiv.org/abs/2203.08548v2
,2022, Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies, http://arxiv.org/abs/2203.03008v2
,2022, How Do Smart Contracts Benefit Security Protocols?, http://arxiv.org/abs/2202.08699v2
,