Jiajing Wu

ORCID: 0000-0001-5155-8547
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Complex Network Analysis Techniques
  • Spam and Phishing Detection
  • Opinion Dynamics and Social Influence
  • FinTech, Crowdfunding, Digital Finance
  • Advanced Graph Neural Networks
  • Cybercrime and Law Enforcement Studies
  • Crime, Illicit Activities, and Governance
  • Imbalanced Data Classification Techniques
  • Complex Systems and Time Series Analysis
  • Smart Grid Security and Resilience
  • Opportunistic and Delay-Tolerant Networks
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Graph theory and applications
  • Infrastructure Resilience and Vulnerability Analysis
  • Caching and Content Delivery
  • Network Traffic and Congestion Control
  • IoT and Edge/Fog Computing
  • Nonlinear Optical Materials Research
  • Advanced Optical Network Technologies
  • Crystal Structures and Properties
  • Adversarial Robustness in Machine Learning
  • Ethics and Social Impacts of AI
  • Web Data Mining and Analysis

Sun Yat-sen University
2017-2025

Yangzhou University
2023-2025

University of Electronic Science and Technology of China
2024

Changzhou City Planning and Design Institute
2023-2024

Hangzhou City University
2023-2024

Stomatology Hospital
2024

Zunyi Medical University
2023-2024

Beijing VDJBio (China)
2024

The First Affiliated Hospital, Sun Yat-sen University
2024

Nanjing University of Aeronautics and Astronautics
2022-2024

In this brief, by considering realistic network operational settings, we propose a novel model to investigate the cascading failures in interdependent power grids and communication networks. We perform critical node analysis on single networks identify vital nodes from perspective of robustness. Moreover, assess robustness an system composed Internet AS-level IEEE 118 Bus. Our simulation results show that assortative coupling destructiveness is more robust for densely coupled networks,...

10.1109/tcsii.2017.2705758 article EN IEEE Transactions on Circuits & Systems II Express Briefs 2017-05-18

As the first decentralized peer-to-peer (P2P) cryptocurrency system allowing people to trade with pseudonymous addresses, Bitcoin has become increasingly popular in recent years. However, P2P and nature of make transactions on this platform very difficult track, thus triggering emergence various illegal activities ecosystem. Particularly, mixing services Bitcoin, originally designed enhance transaction anonymity, have been widely employed for money laundry complicate trailing illicit fund....

10.1109/tsmc.2021.3049278 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2021-01-21

In this paper, we propose a secure and efficient blockchain-based data trading approach for the Internet of Vehicles (IoV). First, apply consortium blockchain technologies to ensure truthful trading, general framework IoV. Second, improve efficiency encourage more participants trade data, an iterative double auction mechanism with purpose achieving social welfare maximization, in which pricing rules buyers sellers are designed induce submit bids decide amount traded its price among sellers....

10.1109/tvt.2019.2927533 article EN IEEE Transactions on Vehicular Technology 2019-07-09

Blockchain-based cryptocurrencies have received extensive attention recently. Massive data has been stored on permission-less blockchains. The analysis of massive blockchain can bring huge business values. However, the absence well-processed up-to-date datasets impedes big analytics data. To fill this gap, we collect and process on-chain from Ethereum, which is one most popular We name such Ethereum as XBlock-ETH, consists transactions, smart contracts, (i.e., tokens). it non-trivial to...

10.1109/ojcs.2020.2990458 article EN cc-by IEEE Open Journal of the Computer Society 2020-01-01

Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud systems are developed for mitigating data corruption risk. While auditing scheme still needed in help confirm integrity their outsourced data. Unfortunately, most corresponding schemes rely on trusted institutions such as centralized third-party auditor (TPA) cloud...

10.1109/tcc.2021.3057771 article EN IEEE Transactions on Cloud Computing 2021-02-09

With the continuous development of web technology, Web 3.0 has attracted a considerable amount attention due to its unique decentralized characteristics. The digital economy is an important driver high-quality economic and currently in rapid stage. In scenario, centralized nature Internet other characteristics usually bring about security issues such as infringement privacy leakage. Therefore, it necessary investigate how use technologies solve pain points encountered by fully exploring...

10.1109/ojcs.2022.3217565 article EN cc-by IEEE Open Journal of the Computer Society 2022-01-01

At present, the concept of metaverse has sparked widespread attention from public to major industries. With rapid development blockchain and Web3 technologies, decentralized ecology attracted a large influx users capital. Due lack industry standards regulatory rules, Web3-empowered ecosystem witnessed variety financial crimes, such as scams, code exploit, wash trading, money laundering, illegal services shops. To this end, it is especially urgent critical summarize classify security threats...

10.1109/ojcs.2023.3245801 article EN cc-by-nc-nd IEEE Open Journal of the Computer Society 2023-01-01

Offloading computation-intensive blockchain mining tasks to the edge servers (ESs) is a promising solution for blockchain-empowered Industrial Internet of Things (IIoT) because computing capabilities in IIoT are usually limited, whereas computationally intensive. However, computation offloading solutions data processing and have been studied separately. Moreover, most existing assume that all devices can directly connect ESs or cloud centers. To address these issues, this paper, we propose...

10.1109/jiot.2019.2918296 article EN IEEE Internet of Things Journal 2019-05-22

10.1016/j.compeleceng.2019.106526 article EN Computers & Electrical Engineering 2019-12-02

Traffic congestion in isolated complex networks has been investigated extensively over the last decade. Coupled network models have recently developed to facilitate further understanding of real systems. Analysis traffic coupled networks, however, is still relatively unexplored. In this paper, we try explore effect interconnections on interconnected BA scale-free networks. We find that assortative coupling can alleviate more readily than disassortative and random when node processing...

10.1103/physreve.89.062813 article EN Physical Review E 2014-06-25

In this brief, we propose a stochastic model based on state transition theory to investigate the dynamics of cascading failures in communication networks. We describe failure events nodes network as node transitions. Taking probabilistic perspective, focus two uncertain conditions propagation process: which will fail next and how long it last before takes place. The gives each overloaded element probability failing, rate is relevant degree overloading. Moreover, time dimension considered...

10.1109/tcsii.2018.2822049 article EN IEEE Transactions on Circuits & Systems II Express Briefs 2018-04-02

Recently, graph embedding techniques have been widely used in the analysis of various networks, but most existing methods omit network dynamics and multiplicity edges, so it is difficult to accurately describe detailed characteristics transaction networks. Ethereum a blockchain-based platform supporting smart contracts. The open nature blockchain makes data on completely public, also brings unprecedented opportunities for analysis. By taking realistic rules features networks into...

10.3389/fphy.2020.00204 article EN cc-by Frontiers in Physics 2020-06-30

Recently, blockchain technology has become a topic in the spotlight but also hotbed of various cybercrimes. Among them, phishing scams on have been found to make notable amount money, thus emerging as serious threat trading security ecosystem. In order create favorable environment for investment, an effective method detecting is urgently needed To this end, article proposes approach detect Ethereum by mining its transaction records. Specifically, we first crawl labeled addresses from two...

10.1109/tsmc.2020.3016821 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2020-09-02

With the increasing popularity of blockchain technology, it has also become a hotbed various cybercrimes. As traditional way scam, phishing scam new means in scenario and swindles lot money from users. In order to create safe environment for investors, an efficient method detection is urgently needed. this paper, we propose three steps framework detect scams on Ethereum by mining transaction records. First, obtain labeled accounts corresponding records two authorized websites. According...

10.1109/iscas45731.2020.9180815 article EN 2022 IEEE International Symposium on Circuits and Systems (ISCAS) 2020-09-29

Blockchain technology has the characteristics of decentralization, traceability and tamper-proof, which creates a reliable decentralized trust mechanism, further accelerating development blockchain finance. However, anonymization hinders market regulation, resulting in increasing illegal activities such as money laundering, gambling phishing fraud on financial platforms. Thus, security become top priority ecosystem, calling for effective regulation. In this paper, we consider identifying...

10.1109/tifs.2022.3208471 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

As the first blockchain platform supporting smart contracts, Ethereum has become increasingly popular in recent years and generates a massive number of transaction records. Nowadays, millions accounts have been reported to participate variety businesses, some them found be involved illegal behaviors or even cyber-crimes by exploiting pseudonymous nature blockchain. Therefore, there is an urgent need for effective method conduct account classification audit each account. In this paper, we...

10.1109/tnse.2022.3166655 article EN IEEE Transactions on Network Science and Engineering 2022-04-12

Blockchain-based decentralized applications (DApp) draw more attention with the increasing development and wide application of blockchain technologies. A wealth funds are invested into crowd-funding various types DApp. As reported in August 2022, there than 5,000 DApps 1.67 million daily Unique Active Wallets (users). However, definition, architectures, classifications still not cleared up till now. This survey aims to provide a comprehensive overview for further research. First, definitions...

10.1109/ojcs.2023.3251854 article EN cc-by IEEE Open Journal of the Computer Society 2023-01-01

Security incidents such as scams and hacks have become a major threat to the health of blockchain ecosystem, resulting in billions dollars losses users each year. To reveal real-world entities behind pseudonymous accounts recover stolen funds from massive transaction data, much effort has recently been put into tracing illicit financial flows by academia industry. However, most current fund methods are heuristics taint analysis that designed on basis expert experience specific events, which...

10.1109/tifs.2023.3266162 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Designing and synthesizing multifunctional hybrid copper halides with near ultraviolet (NUV) light-excited high-energy emission (<500 nm) remains challenging. Here, a pair of broadband-excited emitting isomers, namely, α-/β-(MePh

10.1002/anie.202407074 article EN Angewandte Chemie International Edition 2024-08-23

As one of the most typical cybercrime types, phishing scams have extended devil's hand to emerging blockchain ecosystem in recent years. Especially, huge economic losses been caused by Ethereum, second-largest system. Existing approaches for Ethereum detection, however, typically use machine learning or transaction graph embedding methods identify phishers isolation and do not effectively uncover group accounts linked (which we term a "gang"). Since are pseudonymous these undisclosed...

10.1109/tifs.2024.3359000 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

In this paper we study the performance of communication networks from a network science perspective. Our analysis and simulation results reveal effects structure, resource allocation routing algorithm on performance. Performance parameters, including packet drop rate, time delay, critical generation are considered. For efficient data transmission, traffic load should be as uniformly distributed possible in average distance it short. We propose to use node usage probability, which depends...

10.1109/tcsi.2013.2264697 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2013-06-10
Coming Soon ...