A Binary Linear Functional-Repair Regenerating Code on 72 Coding Spaces Related to PG(2, 8).
Proceedings of the IEEE International Symposium on Information Theory, 2024
Optimal and Suboptimal Dynamic Cache Update Algorithms for Wireless Cellular Networks.
IEEE Wirel. Commun. Lett., 2022
Update and Repair Efficient Storage Codes with Availability via Finite Projective Planes.
Proceedings of the IEEE International Symposium on Information Theory, 2022
If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable.
Proceedings of the Annual Computer Security Applications Conference, 2022
Efficient Delay Minimization Algorithm for Cache-Enabled NOMA Systems.
IEEE Wirel. Commun. Lett., 2021
LaKSA: A Probabilistic Proof-of-Stake Protocol.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Formalizing Bitcoin Crashes with Universally Composable Security.
IACR Cryptol. ePrint Arch., 2020
ProPoS: A Probabilistic Proof-of-Stake Protocol.
CoRR, 2020
Accountable Outsourcing Location-Based Services With Privacy Preservation.
IEEE Access, 2019
Decentralization is Vulnerable Under the Gap Game.
IEEE Access, 2019
IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate.
Proceedings of the Information Security - 22nd International Conference, 2019
Analysis on the Block Reward of Fork After Withholding (FAW).
Proceedings of the Network and System Security - 12th International Conference, 2018
Recent progress and trends in predictive visual analytics.
Frontiers Comput. Sci., 2017