Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing C Dong, Y Wang, A Aldweesh, P McCorry, A Van Moorsel Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 183 | 2017 |
Rational protocols and attacks in blockchain system T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang Security and Communication Networks 2020, 1-11, 2020 | 69 | 2020 |
Randomness invalidates criminal smart contracts Y Wang, A Bracciali, T Li, F Li, X Cui, M Zhao Information Sciences 477, 291-301, 2019 | 49 | 2019 |
A game-theoretic method based on Q-learning to invalidate criminal smart contracts L Zhang, Y Wang, F Li, Y Hu, MH Au Information Sciences 498, 144-153, 2019 | 46 | 2019 |
Optimal mixed block withholding attacks based on reinforcement learning Y Wang, G Yang, T Li, L Zhang, Y Wang, L Ke, Y Dou, S Li, X Yu International Journal of Intelligent Systems 35 (12), 2032-2048, 2020 | 43 | 2020 |
Incentive compatible and anti-compounding of wealth in proof-of-stake Y Wang, G Yang, A Bracciali, H Leung, H Tian, L Ke, X Yu Information Sciences 530, 85-94, 2020 | 38 | 2020 |
Wireless communications and mobile computing blockchain-based trust management in distributed internet of things F Li, D Wang, Y Wang, X Yu, N Wu, J Yu, H Zhou Wireless Communications and Mobile Computing 2020, 1-12, 2020 | 31 | 2020 |
IPBSM: an optimal bribery selfish mining in the presence of intelligent and pure attackers G Yang, Y Wang, Z Wang, Y Tian, X Yu, S Li International Journal of Intelligent Systems 35 (11), 1735-1748, 2020 | 31 | 2020 |
Secure computation protocols under asymmetric scenarios in enterprise information system Y Wang, M Zhao, Y Hu, Y Gao, X Cui Enterprise Information Systems 15 (4), 492-512, 2021 | 30 | 2021 |
Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments X Yu, H Wang, X Zheng, Y Wang International Journal of Ad Hoc and Ubiquitous Computing 23 (3-4), 137-151, 2016 | 29 | 2016 |
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices Y Wang, G Yang, T Li, F Li, Y Tian, X Yu Journal of Network and Computer Applications 161, 102641, 2020 | 27 | 2020 |
Server aided ciphertext-policy attribute-based encryption H Wang, B Yang, Y Wang 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 24 | 2015 |
Social rational secure multi‐party computation Y Wang, Z Liu, H Wang, Q Xu Concurrency and Computation: Practice and Experience 26 (5), 1067-1083, 2014 | 21 | 2014 |
Impsuic: a quality updating rule in mixing coins with maximum utilities X Yu, Z Wang, Y Wang, F Li, T Li, Y Chen, Y Tian, X Yu International Journal of Intelligent Systems 36 (3), 1182-1198, 2021 | 20 | 2021 |
BSM-ether: Bribery selfish mining in blockchain-based healthcare systems Y Wang, Z Wang, M Zhao, X Han, H Zhou, X Wang, ASV Koe Information Sciences 601, 1-17, 2022 | 19 | 2022 |
Immunity-related genes and signaling pathways under hypoxic stresses in Haliotis diversicolor: a transcriptome analysis Y Sun, X Zhang, Y Wang, R Day, H Yang, Z Zhang Scientific Reports 9 (1), 19741, 2019 | 17 | 2019 |
A game‐theoretic approach of mixing different qualities of coins X Liu, X Yu, H Zhu, G Yang, Y Wang, X Yu International Journal of Intelligent Systems 35 (12), 1899-1911, 2020 | 16 | 2020 |
A brief survey on secure multi-party computing in the presence of rational parties Y Wang, T Li, H Qin, J Li, W Gao, Z Liu, Q Xu Journal of Ambient Intelligence and Humanized Computing 6, 807-824, 2015 | 15 | 2015 |
ForkDec: accurate detection for selfish mining attacks Z Wang, Q Lv, Z Lu, Y Wang, S Yue Security and Communication Networks 2021, 1-8, 2021 | 13 | 2021 |
Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature F Li, R Ge, H Zhou, Y Wang, Z Liu, X Yu Concurrency and Computation: Practice and Experience 34 (16), e5739, 2022 | 12 | 2022 |