Ren Zhang

ORCID: 0000-0003-2063-1769
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Higher Education and Teaching Methods
  • Cryptography and Data Security
  • Advanced Computational Techniques and Applications
  • Caching and Content Delivery
  • Internet Traffic Analysis and Secure E-voting
  • Spam and Phishing Detection
  • Educational Technology and Assessment
  • Peer-to-Peer Network Technologies
  • Cloud Data Security Solutions
  • Evaluation Methods in Various Fields
  • Ideological and Political Education
  • IoT and Edge/Fog Computing
  • Access Control and Trust
  • Education and Work Dynamics
  • Advanced Sensor and Control Systems
  • Security and Verification in Computing
  • Plant Molecular Biology Research
  • Plant Virus Research Studies
  • Media Studies and Communication
  • Advanced Malware Detection Techniques
  • Distributed systems and fault tolerance
  • Innovative Educational Techniques
  • Advanced oxidation water treatment
  • Chromosomal and Genetic Variations

State Key Laboratory of Cryptology
2022-2024

Nanjing Tech University
2022-2024

Shenyang Agricultural University
2022-2023

Texas State University
2023

National University of Defense Technology
2023

University of Wollongong
2021-2022

KU Leuven
2014-2020

Imec the Netherlands
2019-2020

IMEC
2017-2019

Jiangsu Institute of Meteorological Sciences
2016

Following Bitcoin's Nakamoto Consensus protocol (NC), hundreds of cryptocurrencies utilize proofs work (PoW) to maintain their ledgers. However, research shows that NC fails achieve perfect chain quality, allowing malicious miners alter the public ledger in order launch several attacks, i.e., selfish mining, double-spending and feather-forking. Some later designs, represented by Ethereum, Bitcoin-NG, DECOR+, Byzcoin Publish or Perish, aim solve problem raising quality; other Fruitchains,...

10.1109/sp.2019.00086 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2019-05-01

First implemented in Bitcoin, Nakamoto Consensus (NC) is the most influential consensus protocol cryptocurrencies despite all alternative protocols designed afterward.Nevertheless, NC trapped by a security-performance tradeoff.While existing efforts mostly attempt to break this tradeoff via abandoning or adjusting NC's backbone protocol, we alternatively forward relevance of network layer.We identify and experimentally prove that crux resides with prolonged block propagation latency caused...

10.14722/ndss.2022.24370 article EN 2022-01-01

Proof-of-work (PoW) blockchain protocols based on directed acyclic graphs (DAGs) have demonstrated superior transaction confirmation performance compared to their chainbased predecessors.However, it is uncertain whether security deteriorates in high-throughput settings similar predecessors, because acceptance of simultaneous blocks and complex block dependencies presents challenges for rigorous analysis.We address these by analyzing DAG-based via a congestible model (CBM), general that...

10.14722/ndss.2024.24685 article EN 2024-01-01

To solve the problem of difficult hazelnut harvesting in mountainous areas Liaoning, China, a small pneumatic machine was designed, which can realize negative pressure when picking up mixtures and positive cleaning impurities. The key structure parameters were determined by constructing mechanical model whole combining theoretical analysis operational requirements. explore scavenging performance, Liaoning No. 3 with moisture content 7.47% used as experimental object. Firstly, terminal...

10.3390/agriculture12122115 article EN cc-by Agriculture 2022-12-09

This paper presents an efficient solution for the booking and payments functionality of a car sharing system that allows individuals to share their personal, underused cars in completely decentralized manner, annulling the need intermediary. Our solution, named SC2Share, leverages smart contracts uses them carry out secure private payments. experiments on SC2Share Ethereum testnet guarantee high security privacy its users confirm that our system is cost-efficient ready for practical use.

10.5220/0007703601630171 article EN cc-by-nc-nd 2019-01-01

Sharding is a promising approach to scale permissionless blockchains. In sharded blockchain, participants are split into groups, called shards, and each shard only executes part of the workloads. Despite its wide adoption in permissioned systems, transferring such success blockchains still an open problem. networks, may join leave system at any time, making load balancing challenging. addition, adversary networks can launch single-shard takeover attack by compromising single shard's...

10.1145/3558535.3559783 preprint EN 2022-09-19

Bitcoin has not only attracted many users but also been considered as a technical breakthrough by academia. However, the expanding potential of is largely untapped due to its limited throughput. The community now facing biggest crisis in history splits on how increase Among various proposals, Unlimited recently became most popular candidate, it allows miners collectively decide block size limit according real network capacity. security BU heatedly debated and no consensus reached issue...

10.1145/3143361.3143389 article EN 2017-11-22

Peroxymonosulfate (PMS) oxidation is highly effective to degrade organic contaminants but may generate toxic transformation products (TPs). Recent studies have found the presence of surface-bound radicals (Surf-R) during heterogeneously catalyzed PMS, especially when catalyst carriers possess a high adsorption capacity. However, effects Surf-R on toxicity TPs are still not well elucidated. In this study, Co and Mn were loaded onto commonly used carriers: activated carbon alumina (CoMn@AC vs...

10.2139/ssrn.4724341 preprint EN 2024-01-01

The literature remains divided on the impact of governance migration. This paper aims to contribute this debate by examining effect corruption, along with other qualities, brain drain using data from 130 countries. To address issue endogeneity, we utilize a machine learning approach select an optimal set instrumental variables. Our empirical results indicate that corruption is primary driver drain, outweighing effects qualities. We argue weakened property rights protection, unmet basic...

10.2139/ssrn.4372122 article EN SSRN Electronic Journal 2023-01-01

We examined the role gender plays in managerial stereotypes and changes that have occurred US for executive women workforce. also investigated factors personality traits affect advancement into upper management all executives those particular. Despite increased organisational sensitivity, public policies, equal rights legislation, continue to be underrepresented corporate America. Pay increases promotions females not kept pace with men. Study results indicate womenwho juggle jobs family life...

10.1108/02610150310787351 article EN Equal Opportunities International 2003-03-01

The vast majority of Internet users are relying on centralized search engine providers to conduct their web searches. However, results can be censored and queries recorded by these without the user's knowledge. Distributed engines based peer-to-peer networks have been proposed mitigate threats. In this paper we analyze three most popular real-world distributed engines: Faroo, Seeks Yacy, with respect censorship resistance privacy protection. We show that none them provides an adequate level...

10.1109/p2p.2014.6934312 article EN 2014-09-01

Abstract Hairpin RNA (hpRNA) transgenes are the most successful interference (RNAi) method in plants. Here, we show that hpRNA invariably methylated inverted-repeat (IR) DNA and adjacent promoter, causing transcriptional self-silencing. Nucleotide substitutions sense sequence, disrupting IR structure, prevent intrinsic methylation resulting more uniform persistent RNAi. Substituting all cytosine with thymine nucleotides, a G:U design, prevents self-silencing but still allows for formation of...

10.1038/s41467-022-31641-5 article EN cc-by Nature Communications 2022-07-07

The security aspect of Distributed Hash Tables (DHT-s), the principal model for structured P2P networks, has received considerable attention from research community, and eclipse attack is one most severe threats targeting DHTs. Most currently effective defense mechanisms suffer significant communication cost. In this paper we present a novel approach to address attacks - making such computationally infeasible. backbone our scheme generating node IDs, which requires user solve computational...

10.1109/pccc.2011.6108091 article EN 2011-11-01

In recent years, global outsourcing has received a great deal of attention by both practitioners and academics throughout the world. Globalisation is forcing multinational companies to outsource their products services in order reduce cost, enhance competitive capability, satisfy shareholders. Before an organisation decides whether part its activities from either domestic or other countries, it crucial understand effectiveness organisational architecture market. This paper mainly focuses on...

10.1504/ijsom.2005.006496 article EN International Journal of Services and Operations Management 2005-01-01

Our main use case features multiple companies that iteratively optimize on the architectural properties of aircraft components in a decentralized manner. In each optimization step so-called multi-disciplinary (MDO) process, sensitive data is exchanged between organizations, and we require auditability traceability actions taken to assure compliance with signed legal agreements.

10.1145/3341105.3373957 article EN 2020-03-29

The design of zkSNARKs is increasingly complicated and requires familiarity with a broad class cryptographic algebraic tools. This complexity in zkSNARK also increases the difficulty implementation, analysis, optimization. To address this complexity, we develop new workflow for designing implementing zkSNARKs, called VOProof. In VOProof, designer only needs to construct Vector Oracle (VO) protocol that intuitive straightforward design, then feeds our VO compiler transform it into fully...

10.1145/3548606.3559387 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

This paper describes a smart healthcare data management system based on hadoop. Aiming at the disadvantage of Traditional medical such as increasing cost consumption and limited availability data, in this introduces hybrid storage architecture including designs Structured which supported by RDBMS Non-structural Hadoop. has advantages low-cost, high fault tolerance, scalability, builds cloud platform applied healthcare.

10.4028/www.scientific.net/amr.998-999.1121 article EN Advanced materials research 2014-07-01
Coming Soon ...