- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Privacy-Preserving Technologies in Data
- Advanced Graph Neural Networks
- FinTech, Crowdfunding, Digital Finance
- Software System Performance and Reliability
- Caching and Content Delivery
- Ethics and Social Impacts of AI
- Cloud Computing and Resource Management
- Adversarial Robustness in Machine Learning
- Stochastic Gradient Optimization Techniques
- Cryptography and Data Security
- Complex Network Analysis Techniques
- Spam and Phishing Detection
- Network Security and Intrusion Detection
- Software Engineering Research
- Anomaly Detection Techniques and Applications
- Data Stream Mining Techniques
- Advanced Data Storage Technologies
- Scientific Computing and Data Management
- Auction Theory and Applications
- Sparse and Compressive Sensing Techniques
- Recommender Systems and Techniques
- Imbalanced Data Classification Techniques
- Machine Learning and ELM
Sun Yat-sen University
2009-2025
Sun Yat-sen Memorial Hospital
2025
Fuzhou University
2024
Bridge University
2023
Guangzhou University
2023
Guangdong University of Technology
2022
Lyon College
2021
Université Claude Bernard Lyon 1
2021
City, University of London
2021
IBM (United States)
2021
Internet of Things (IoT) is reshaping the incumbent industry to smart featured with data-driven decision-making. However, intrinsic features IoT result in a number challenges, such as decentralization, poor interoperability, privacy, and security vulnerabilities. Blockchain technology brings opportunities addressing challenges IoT. In this paper, we investigate integration blockchain We name synthesis things (BCoT). This paper presents an in-depth survey BCoT discusses insights new paradigm....
Metaverse as the latest buzzword has attracted great attention from both industry and academia. seamlessly integrates real world with virtual allows avatars to carry out rich activities including creation, display, entertainment, social networking, trading. Thus, it is promising build an exciting digital transform a better physical through exploration of metaverse. In this survey, we dive into metaverse by discussing how Blockchain Artificial Intelligence (AI) fuse investigating...
Traffic flow prediction has received extensive attention recently, since it is a key step to prevent and mitigate traffic congestion in urban areas. However, most previous studies on fail capture fine-grained information (like link-level traffic) ignore the impacts from other factors, such as route structure weather conditions. In this paper, we propose deep embedding learning approach (DELA) that can help explicitly learn information, structure, particular, our DELA consists of an...
Blockchain-based cryptocurrencies have received extensive attention recently. Massive data has been stored on permission-less blockchains. The analysis of massive blockchain can bring huge business values. However, the absence well-processed up-to-date datasets impedes big analytics data. To fill this gap, we collect and process on-chain from Ethereum, which is one most popular We name such Ethereum as XBlock-ETH, consists transactions, smart contracts, (i.e., tokens). it non-trivial to...
With the continuous development of web technology, Web 3.0 has attracted a considerable amount attention due to its unique decentralized characteristics. The digital economy is an important driver high-quality economic and currently in rapid stage. In scenario, centralized nature Internet other characteristics usually bring about security issues such as infringement privacy leakage. Therefore, it necessary investigate how use technologies solve pain points encountered by fully exploring...
At present, the concept of metaverse has sparked widespread attention from public to major industries. With rapid development blockchain and Web3 technologies, decentralized ecology attracted a large influx users capital. Due lack industry standards regulatory rules, Web3-empowered ecosystem witnessed variety financial crimes, such as scams, code exploit, wash trading, money laundering, illegal services shops. To this end, it is especially urgent critical summarize classify security threats...
Offloading computation-intensive blockchain mining tasks to the edge servers (ESs) is a promising solution for blockchain-empowered Industrial Internet of Things (IIoT) because computing capabilities in IIoT are usually limited, whereas computationally intensive. However, computation offloading solutions data processing and have been studied separately. Moreover, most existing assume that all devices can directly connect ESs or cloud centers. To address these issues, this paper, we propose...
Anomaly detection is a critical task for maintaining the performance of cloud system. Using data-driven methods to address this issue mainstream in recent years. However, due lack labeled data training practice, it necessary enable an anomaly model trained on contaminated unsupervised way. Besides, with increasing complexity systems, effectively organizing collected from wide range components system and modeling spatiotemporal dependence among them become challenge. In article, we propose...
With the growing number of competing Web services that provide similar functionality, Quality-of-Service (QoS) prediction is becoming increasingly important for various QoS-aware approaches services. Collaborative filtering (CF), which among most successful personalized techniques recommender systems, has been widely applied to service QoS prediction. In addition using conventional CF techniques, a studies extend approach by incorporating additional information about and users, such as...
Decentralized Autonomous Organization (DAO) is believed to play a significant role in our future society governed decentralized way. In this article, we first explain the definitions and preliminaries of DAO. Then, conduct literature review existing studies DAO published recent few years. Through review, find out that comprehensive survey towards state-of-the-art still missing. To fill gap, perform such an overview by identifying classifying most valuable proposals perspectives closely...
As the first blockchain platform supporting smart contracts, Ethereum has become increasingly popular in recent years and generates a massive number of transaction records. Nowadays, millions accounts have been reported to participate variety businesses, some them found be involved illegal behaviors or even cyber-crimes by exploiting pseudonymous nature blockchain. Therefore, there is an urgent need for effective method conduct account classification audit each account. In this paper, we...
Blockchain-based decentralized applications (DApp) draw more attention with the increasing development and wide application of blockchain technologies. A wealth funds are invested into crowd-funding various types DApp. As reported in August 2022, there than 5,000 DApps 1.67 million daily Unique Active Wallets (users). However, definition, architectures, classifications still not cleared up till now. This survey aims to provide a comprehensive overview for further research. First, definitions...
Security incidents such as scams and hacks have become a major threat to the health of blockchain ecosystem, resulting in billions dollars losses users each year. To reveal real-world entities behind pseudonymous accounts recover stolen funds from massive transaction data, much effort has recently been put into tracing illicit financial flows by academia industry. However, most current fund methods are heuristics taint analysis that designed on basis expert experience specific events, which...
As one of the most typical cybercrime types, phishing scams have extended devil's hand to emerging blockchain ecosystem in recent years. Especially, huge economic losses been caused by Ethereum, second-largest system. Existing approaches for Ethereum detection, however, typically use machine learning or transaction graph embedding methods identify phishers isolation and do not effectively uncover group accounts linked (which we term a "gang"). Since are pseudonymous these undisclosed...
The Smart Contract Weakness Classification Registry (SWC Registry) is a widely recognized list of smart contract weaknesses specific to the Ethereum platform. Despite SWC not being updated with new entries since 2020, sustained development analysis tools for detecting SWC-listed highlights their ongoing significance in field. However, evaluating these has proven challenging due absence large, unbiased, real-world dataset. To address this problem, we aim build large-scale weakness dataset...
Computation offloading is a promising solution to extend the capacity of robot swarms for computation-intensive applications because it allows benefit from powerful computing resources modern data centers. However, existing computation-offloading approaches still face challenges: 1) multi-hop cooperative computation offloading, 2) joint and routing, 3) task slicing. In this paper, we propose quality service (QoS)-aware scheme using game theory. We analyze communication model in investigate...
Blockchain has attracted lots of attention in recent years. However, the performance blockchain cannot meet requirement massive Internet Things (IoT) devices. One important bottlenecks is limited computing resources on a single server while executing transactions. To address this issue, we propose Aeolus to achieve distributed execution There are two key challenges achieving for IoT blockchain: transaction structure and state consistency. Facing these challenges, first structure, which...
Sharding has been considered as a prominent approach to enhance the limited performance of blockchain. However, most sharding systems leverage non-cooperative design, which lowers fault tolerance resilience due decreased mining power consensus execution is each separated shard. To this end, we present Benzene, novel system that enhances by cooperation-based while defending per-shard security. First, establish double-chain architecture for function decoupling. This separates...
Blockchain performance cannot meet the requirement nowadays. One of crucial ways to improve is sharding. However, most blockchain sharding research focuses on public blockchain. As for consortium blockchain, previous studies support high cross-shard efficiency, multiple-shard contract calling, strict transaction atomicity, and shard availability, which are essential requirements but also challenges in systems. Facing these challenges, we propose Meepo, a systematic study sharded Meepo...
Recently, the microservice becomes a popular architecture to construct cloud native systems due its agility. In systems, autoscaling is key enabling technique adapt workload changes by acquiring or releasing right amount of computing resources. However, it challenging problem in applications, since such an application usually comprises large number different microservices with complex interactions. When performance decreases unpredictable peak, difficult pinpoint scaling-needed services...
Unmanned aerial vehicles (UAVs) can be leveragedin mobile crowdsensing (MCS) to conduct sensing tasks at remote or rural areas through computation offloading and data sensing. Nonetheless, both have been separately investigated in most existing studies. In this paper, we propose a novel cooperative scheme for the UAV-assisted MCS system with an aim maximize overall utility. First, multi-objective function is formulated evaluate utility by jointly considering flight direction, distance, task...
Much of the current research in Ethereum transaction records focuses on statistical analysis and measurements existing data; however, evolution mechanism transactions is an important, yet seldom discussed issue. In this work, we first collect data build network models from a microlevel view then use link-prediction-based framework to quantify impact characteristics evolution. Next, explore graph structure properties driving factors newly generated relationships. Experimental results show...
In this brief, we conduct a complex-network analysis of the Bitcoin transaction network. particular, design new sampling method, namely random walk with flying-back (RWFB), to effective data sampling. We then comprehensive network in terms degree distribution, clustering coefficient, shortest-path length, connected component, centrality, assortativity, and rich-club coefficient. obtain several important observations including small-world phenomenon, multi-center status, preferential...