- Blockchain Technology Applications and Security
- Higher Education and Teaching Methods
- Cryptography and Data Security
- Advanced Computational Techniques and Applications
- Caching and Content Delivery
- Internet Traffic Analysis and Secure E-voting
- Spam and Phishing Detection
- Educational Technology and Assessment
- Peer-to-Peer Network Technologies
- Cloud Data Security Solutions
- Evaluation Methods in Various Fields
- Ideological and Political Education
- IoT and Edge/Fog Computing
- Access Control and Trust
- Education and Work Dynamics
- Advanced Sensor and Control Systems
- Security and Verification in Computing
- Plant Molecular Biology Research
- Plant Virus Research Studies
- Media Studies and Communication
- Advanced Malware Detection Techniques
- Distributed systems and fault tolerance
- Innovative Educational Techniques
- Advanced oxidation water treatment
- Chromosomal and Genetic Variations
State Key Laboratory of Cryptology
2022-2024
Nanjing Tech University
2022-2024
Shenyang Agricultural University
2022-2023
Texas State University
2023
National University of Defense Technology
2023
University of Wollongong
2021-2022
KU Leuven
2014-2020
Imec the Netherlands
2019-2020
IMEC
2017-2019
Jiangsu Institute of Meteorological Sciences
2016
Following Bitcoin's Nakamoto Consensus protocol (NC), hundreds of cryptocurrencies utilize proofs work (PoW) to maintain their ledgers. However, research shows that NC fails achieve perfect chain quality, allowing malicious miners alter the public ledger in order launch several attacks, i.e., selfish mining, double-spending and feather-forking. Some later designs, represented by Ethereum, Bitcoin-NG, DECOR+, Byzcoin Publish or Perish, aim solve problem raising quality; other Fruitchains,...
First implemented in Bitcoin, Nakamoto Consensus (NC) is the most influential consensus protocol cryptocurrencies despite all alternative protocols designed afterward.Nevertheless, NC trapped by a security-performance tradeoff.While existing efforts mostly attempt to break this tradeoff via abandoning or adjusting NC's backbone protocol, we alternatively forward relevance of network layer.We identify and experimentally prove that crux resides with prolonged block propagation latency caused...
Proof-of-work (PoW) blockchain protocols based on directed acyclic graphs (DAGs) have demonstrated superior transaction confirmation performance compared to their chainbased predecessors.However, it is uncertain whether security deteriorates in high-throughput settings similar predecessors, because acceptance of simultaneous blocks and complex block dependencies presents challenges for rigorous analysis.We address these by analyzing DAG-based via a congestible model (CBM), general that...
To solve the problem of difficult hazelnut harvesting in mountainous areas Liaoning, China, a small pneumatic machine was designed, which can realize negative pressure when picking up mixtures and positive cleaning impurities. The key structure parameters were determined by constructing mechanical model whole combining theoretical analysis operational requirements. explore scavenging performance, Liaoning No. 3 with moisture content 7.47% used as experimental object. Firstly, terminal...
This paper presents an efficient solution for the booking and payments functionality of a car sharing system that allows individuals to share their personal, underused cars in completely decentralized manner, annulling the need intermediary. Our solution, named SC2Share, leverages smart contracts uses them carry out secure private payments. experiments on SC2Share Ethereum testnet guarantee high security privacy its users confirm that our system is cost-efficient ready for practical use.
Sharding is a promising approach to scale permissionless blockchains. In sharded blockchain, participants are split into groups, called shards, and each shard only executes part of the workloads. Despite its wide adoption in permissioned systems, transferring such success blockchains still an open problem. networks, may join leave system at any time, making load balancing challenging. addition, adversary networks can launch single-shard takeover attack by compromising single shard's...
Bitcoin has not only attracted many users but also been considered as a technical breakthrough by academia. However, the expanding potential of is largely untapped due to its limited throughput. The community now facing biggest crisis in history splits on how increase Among various proposals, Unlimited recently became most popular candidate, it allows miners collectively decide block size limit according real network capacity. security BU heatedly debated and no consensus reached issue...
Peroxymonosulfate (PMS) oxidation is highly effective to degrade organic contaminants but may generate toxic transformation products (TPs). Recent studies have found the presence of surface-bound radicals (Surf-R) during heterogeneously catalyzed PMS, especially when catalyst carriers possess a high adsorption capacity. However, effects Surf-R on toxicity TPs are still not well elucidated. In this study, Co and Mn were loaded onto commonly used carriers: activated carbon alumina (CoMn@AC vs...
The literature remains divided on the impact of governance migration. This paper aims to contribute this debate by examining effect corruption, along with other qualities, brain drain using data from 130 countries. To address issue endogeneity, we utilize a machine learning approach select an optimal set instrumental variables. Our empirical results indicate that corruption is primary driver drain, outweighing effects qualities. We argue weakened property rights protection, unmet basic...
We examined the role gender plays in managerial stereotypes and changes that have occurred US for executive women workforce. also investigated factors personality traits affect advancement into upper management all executives those particular. Despite increased organisational sensitivity, public policies, equal rights legislation, continue to be underrepresented corporate America. Pay increases promotions females not kept pace with men. Study results indicate womenwho juggle jobs family life...
The vast majority of Internet users are relying on centralized search engine providers to conduct their web searches. However, results can be censored and queries recorded by these without the user's knowledge. Distributed engines based peer-to-peer networks have been proposed mitigate threats. In this paper we analyze three most popular real-world distributed engines: Faroo, Seeks Yacy, with respect censorship resistance privacy protection. We show that none them provides an adequate level...
Abstract Hairpin RNA (hpRNA) transgenes are the most successful interference (RNAi) method in plants. Here, we show that hpRNA invariably methylated inverted-repeat (IR) DNA and adjacent promoter, causing transcriptional self-silencing. Nucleotide substitutions sense sequence, disrupting IR structure, prevent intrinsic methylation resulting more uniform persistent RNAi. Substituting all cytosine with thymine nucleotides, a G:U design, prevents self-silencing but still allows for formation of...
The security aspect of Distributed Hash Tables (DHT-s), the principal model for structured P2P networks, has received considerable attention from research community, and eclipse attack is one most severe threats targeting DHTs. Most currently effective defense mechanisms suffer significant communication cost. In this paper we present a novel approach to address attacks - making such computationally infeasible. backbone our scheme generating node IDs, which requires user solve computational...
In recent years, global outsourcing has received a great deal of attention by both practitioners and academics throughout the world. Globalisation is forcing multinational companies to outsource their products services in order reduce cost, enhance competitive capability, satisfy shareholders. Before an organisation decides whether part its activities from either domestic or other countries, it crucial understand effectiveness organisational architecture market. This paper mainly focuses on...
Our main use case features multiple companies that iteratively optimize on the architectural properties of aircraft components in a decentralized manner. In each optimization step so-called multi-disciplinary (MDO) process, sensitive data is exchanged between organizations, and we require auditability traceability actions taken to assure compliance with signed legal agreements.
The design of zkSNARKs is increasingly complicated and requires familiarity with a broad class cryptographic algebraic tools. This complexity in zkSNARK also increases the difficulty implementation, analysis, optimization. To address this complexity, we develop new workflow for designing implementing zkSNARKs, called VOProof. In VOProof, designer only needs to construct Vector Oracle (VO) protocol that intuitive straightforward design, then feeds our VO compiler transform it into fully...
This paper describes a smart healthcare data management system based on hadoop. Aiming at the disadvantage of Traditional medical such as increasing cost consumption and limited availability data, in this introduces hybrid storage architecture including designs Structured which supported by RDBMS Non-structural Hadoop. has advantages low-cost, high fault tolerance, scalability, builds cloud platform applied healthcare.