Qin Wang

Orcid: 0000-0003-2264-749X

Affiliations:
  • CSIRO, Data61, Eveleigh, Australia
  • Swinburne University of Technology, Hawthorn, VIC, Australia


According to our database1, Qin Wang authored at least 74 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Web3 Applications: Easing the Access and Transition.
IEEE Trans. Comput. Soc. Syst., October, 2024

Cryptocurrency in the Aftermath: Unveiling the Impact of the SVB Collapse.
IEEE Trans. Comput. Soc. Syst., October, 2024

Leveraging Ponzi-like designs in stablecoins.
Int. J. Netw. Manag., 2024

Covert communication via blockchain: Hiding patterns and communication patterns.
Comput. Stand. Interfaces, 2024

BRC20 Pinning Attack.
CoRR, 2024

Empowering Visual Artists with Tokenized Digital Assets with NFTs.
CoRR, 2024

SoK: Bitcoin Layer Two (L2).
CoRR, 2024

TDML - A Trustworthy Distributed Machine Learning Framework.
CoRR, 2024

Is Your AI Truly Yours? Leveraging Blockchain for Copyrights, Provenance, and Lineage.
CoRR, 2024

Maximizing NFT Incentives: References Make You Rich.
CoRR, 2024

Exploring the Market Dynamics of Liquid Staking Derivatives (LSDs).
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Bitcoin Inscriptions: Foundations and Beyond.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Bridging BRC-20 to Ethereum.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

A Responsibility Pillar: Exploring and Assessing Decentralized Intelligence.
Proceedings of the IEEE International Conference on Blockchain, 2024

2023
SoK: DAG-based Blockchain Systems.
ACM Comput. Surv., December, 2023

A Scalable Cross-Chain Access Control and Identity Authentication Scheme.
Sensors, February, 2023

How to Rationally Select Your Delegatee in PoS.
IACR Cryptol. ePrint Arch., 2023

Accountable Decryption made Formal and Practical.
IACR Cryptol. ePrint Arch., 2023

Accountable Decryption made Formal and Practical.
IACR Cryptol. ePrint Arch., 2023

Transaction Fairness in Blockchains, Revisited.
IACR Cryptol. ePrint Arch., 2023

Decentralized Finance (DeFi): A Survey.
IACR Cryptol. ePrint Arch., 2023

Transparent Registration-Based Encryption through Blockchain.
Distributed Ledger Technol. Res. Pract., 2023

Formal Security Analysis on dBFT Protocol of NEO.
Distributed Ledger Technol. Res. Pract., 2023

Exploring Blockchains Interoperability: A Systematic Survey.
ACM Comput. Surv., 2023

BRC-20: Hope or Hype.
CoRR, 2023

Bridging BRC-20 to Ethereum.
CoRR, 2023

Split Unlearning.
CoRR, 2023

Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges.
CoRR, 2023

IronForge: An Open, Secure, Fair, Decentralized Federated Learning.
CoRR, 2023

Time-manipulation Attack: Breaking Fairness against Proof of Authority Aura.
Proceedings of the ACM Web Conference 2023, 2023

BDTS: Blockchain-Based Data Trading System.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Leveraging Architectural Approaches in Web3 Applications - A DAO Perspective Focused.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Predicting NFT Classification with GNN: A Recommender System for Web3 Assets.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A First Look into Blockchain DAOs.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A Referable NFT Scheme.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

BDSP: A Fair Blockchain-enabled Framework for Privacy-Enhanced Enterprise Data Sharing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Rational Ponzi Game in Algorithmic Stablecoin.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A First Dive into OFAC in DeFi Space.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

FTX Collapse: A Ponzi Story.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

Evaluation of Contemporary Smart Contract Analysis Tools.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

Account Abstraction, Analysed.
Proceedings of the IEEE International Conference on Blockchain, 2023

SID: Service Identification and Discovery Framework for Decentralised Supply Chains.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023

2022
SoK: TEE-Assisted Confidential Smart Contract.
Proc. Priv. Enhancing Technol., 2022

Blockchain Enables Your Bill Safer.
IEEE Internet Things J., 2022

An Empirical Study on Snapshot DAOs.
CoRR, 2022

BDTS: A Blockchain-based Data Trading System with Fair Exchange.
CoRR, 2022

Rational Ponzi Games in Algorithmic Stablecoin.
CoRR, 2022

Towards Web3 Applications: Easing the Access and Transition.
CoRR, 2022

Exploring Web3 From the View of Blockchain.
CoRR, 2022

How Do Smart Contracts Benefit Security Protocols?
CoRR, 2022

Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment.
Proceedings of the IEEE International Conference on Trust, 2022

Frontrunning Block Attack in PoA Clique: A Case Study.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

PXCrypto: A Regulated Privacy-Preserving Cross-Chain Transaction Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Anonymous Blockchain-based System for Consortium.
ACM Trans. Manag. Inf. Syst., 2021

Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets.
IACR Cryptol. ePrint Arch., 2021

Non-Fungible Token (NFT): Overview, Evaluation, Opportunities and Challenges.
CoRR, 2021

A Weak Consensus Algorithm and Its Application to High-Performance Blockchain.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

An Offline Delegatable Cryptocurrency System.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

2020
Preserving transaction privacy in bitcoin.
Future Gener. Comput. Syst., 2020

Cecoin: A decentralized PKI mitigating MitM attacks.
Future Gener. Comput. Syst., 2020

SoK: Diving into DAG-based Blockchain Systems.
CoRR, 2020

An Accountable Decryption System Based on Privacy-Preserving Smart Contracts.
Proceedings of the Information Security - 23rd International Conference, 2020

Security Analysis on dBFT Protocol of NEO.
Proceedings of the Financial Cryptography and Data Security, 2020

PPM: A Provenance-Provided Data Sharing Model for Open Banking via Blockchain.
Proceedings of the Australasian Computer Science Week, 2020

Security Analysis on Tangle-Based Blockchain Through Simulation.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Bug Searching in Smart Contract.
CoRR, 2019

Improving the scalability of blockchain through DAG.
Proceedings of the 20th International Middleware Conference Doctoral Symposium, 2019

An Efficient Supply Chain Architecture Based on Blockchain for High-value Commodities.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

ArtChain: Blockchain-Enabled Platform for Art Marketplace.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Lightweight and Manageable Digital Evidence Preservation System on Bitcoin.
J. Comput. Sci. Technol., 2018

2017
Authenticity Protection in Outsourced Database.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Outsourcing Encrypted Excel Files.
Proceedings of the Information Security Practice and Experience, 2017


  Loading...