Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack | 0 | 0.34 | 2022 |
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective | 0 | 0.34 | 2022 |
A high performance two-layer consensus architecture for blockchain-based IoT systems | 0 | 0.34 | 2022 |
Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment | 0 | 0.34 | 2022 |
Dual-UAV Aided Secure Dynamic G2U Communication | 0 | 0.34 | 2022 |
Evaluating fork after withholding (FAW) attack in Bitcoin | 0 | 0.34 | 2022 |
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X. | 0 | 0.34 | 2022 |
Self-Training Enabled Efficient Classification Algorithm: An Application to Charging Pile Risk Assessment | 0 | 0.34 | 2022 |
Proof of Stake Voting in Multiple Entry PBFT System | 0 | 0.34 | 2022 |
DI-AA: An interpretable white-box attack for fooling deep neural networks | 0 | 0.34 | 2022 |
IWA: Integrated gradient-based white-box attacks for fooling deep neural networks | 0 | 0.34 | 2022 |
Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems | 0 | 0.34 | 2022 |
Revisiting FAW attack in an imperfect PoW blockchain system | 0 | 0.34 | 2022 |
Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach | 0 | 0.34 | 2022 |
Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning | 0 | 0.34 | 2022 |
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples | 0 | 0.34 | 2022 |
DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics | 0 | 0.34 | 2022 |
How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach | 0 | 0.34 | 2022 |
Energy-efficient client selection in federated learning with heterogeneous data on edge | 0 | 0.34 | 2022 |
Mec 2 : Mobile Edge Computing enabled Caching Framework for Internet of Vehicles | 0 | 0.34 | 2021 |
Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles | 0 | 0.34 | 2021 |
Adapting PBFT for Use With Blockchain-Enabled IoT Systems | 2 | 0.42 | 2021 |
LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X | 0 | 0.34 | 2021 |
Mal-LSGAN: An Effective Adversarial Malware Example Generation Model | 0 | 0.34 | 2021 |
A Scalable Two-Tier PBFT Consensus for Blockchain-Based IoT Data Recording | 0 | 0.34 | 2021 |
Performance Analysis Of Heterogeneous Cloud-Edge Services: A Modeling Approach | 0 | 0.34 | 2021 |
Resilience-Driven Quantitative Analysis of Vehicle Platooning Service | 1 | 0.36 | 2021 |
Cost-Effective Migration-Based Dynamic Platform Defense Technique: A Ctmdp Approach | 0 | 0.34 | 2021 |
A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System | 0 | 0.34 | 2021 |
On Selfholding Attack Impact on Imperfect PoW Blockchain Networks | 0 | 0.34 | 2021 |
Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks | 2 | 0.40 | 2021 |
Trade-offs in large blockchain-based IoT system design | 0 | 0.34 | 2021 |
Performance analysis of Hyperledger Fabric platform: A hierarchical model approach | 4 | 0.40 | 2020 |
Numerical Evaluation of Job Finish Time Under MTD Environment | 1 | 0.36 | 2020 |
Exploring Function Call Graph Vectorization And File Statistical Features In Malicious Pe File Classification | 0 | 0.34 | 2020 |
Making Transaction Propagation More Efficient: Deferred Transaction Relay In Bitcoin | 0 | 0.34 | 2020 |
Multiple entry point PBFT for IoT systems. | 0 | 0.34 | 2020 |
Model-based Performance Evaluation of a Moving Target Defense System | 0 | 0.34 | 2020 |
Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks | 0 | 0.34 | 2020 |
Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks | 0 | 0.34 | 2020 |
Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach. | 1 | 0.35 | 2020 |
On The Combination Of Data Augmentation Method And Gated Convolution Model For Building Effective And Robust Intrusion Detection | 0 | 0.34 | 2020 |
Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing | 3 | 0.36 | 2020 |
Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views | 2 | 0.40 | 2020 |
PBFT-based ordering service for IoT domains | 0 | 0.34 | 2020 |
Performance of Bitcoin Network With Synchronizing Nodes and a Mix of Regular and Compact Blocks | 0 | 0.34 | 2020 |
Modeling of Bitcoin's Blockchain Delivery Network | 1 | 0.35 | 2020 |
Towards 6G Joint HAPS-MEC-Cloud 3C Resource Allocation for Delay-Aware Computation Offloading | 1 | 0.38 | 2020 |
Bla: Blockchain-Assisted Lightweight Anonymous Authentication For Distributed Vehicular Fog Services | 3 | 0.37 | 2019 |
Evaluating Performance of Active Containers on PaaS Fog under Batch Arrivals: A Modeling Approach | 0 | 0.34 | 2019 |