Security and privacy issues in deep reinforcement learning: Threats and countermeasures

K Mo, P Ye, X Ren, S Wang, W Li, J Li - ACM Computing Surveys, 2024 - dl.acm.org
Deep Reinforcement Learning (DRL) is an essential subfield of Artificial Intelligence (AI),
where agents interact with environments to learn policies for solving complex tasks. In recent …

A novel classification of attacks on blockchain layers: Vulnerabilities, attacks, mitigations, and research directions

K Dwivedi, A Agrawal, A Bhatia, K Tiwari - arxiv preprint arxiv:2404.18090, 2024 - arxiv.org
The widespread adoption of blockchain technology has amplified the spectrum of potential
threats to its integrity and security. The ongoing quest to exploit vulnerabilities emphasizes …

[HTML][HTML] A survey on blockchain systems: Attacks, defenses, and privacy preservation

Y Chen, H Chen, Y Zhang, M Han, M Siddula… - High-Confidence …, 2022 - Elsevier
Owing to the incremental and diverse applications of cryptocurrencies and the continuous
development of distributed system technology, blockchain has been broadly used in fintech …

Semi‐selfish mining based on hidden Markov decision process

T Li, Z Wang, G Yang, Y Cui, Y Chen… - International Journal of …, 2021 - Wiley Online Library
Selfish mining attacks sabotage the blockchain systems by utilizing the vulnerabilities of
consensus mechanism. The attackers' main target is to obtain higher revenues compared …

Is semi‐selfish mining available without being detected?

T Li, Z Wang, Y Chen, C Li, Y Jia… - International Journal of …, 2022 - Wiley Online Library
Selfish mining attacks get a high prize due to the additional rewards unproportionate to their
mining power (mining pools have particular advantages). Generally, this category of attacks …

BSM-ether: Bribery selfish mining in blockchain-based healthcare systems

Y Wang, Z Wang, M Zhao, X Han, H Zhou, X Wang… - Information …, 2022 - Elsevier
Blockchain-enabled distributed networks present a new infrastructure for building reliable
and privacy-preserving healthcare utilities. Among them, Ethereum networks have gained …

[HTML][HTML] A review on deep anomaly detection in blockchain

O Mounnan, O Manad, L Boubchir… - Blockchain: Research …, 2024 - Elsevier
The last few years have witnessed the widespread use of blockchain technology in several
works, due to its effectiveness in terms of privacy, security, and trustworthiness. However, the …

Dual attention guided multi-scale CNN for fine-grained image classification

X Liu, L Zhang, T Li, D Wang, Z Wang - Information Sciences, 2021 - Elsevier
For the classification of fine-grained images, the subtle differences among the subclasses of
the main category must be distinguished. Intuitively, the key to realizing the fine-grained …

Dynamic application partitioning and task-scheduling secure schemes for biosensor healthcare workload in mobile edge cloud

A Lakhan, J Li, TM Groenli, AH Sodhro, NA Zardari… - Electronics, 2021 - mdpi.com
Currently, the use of biosensor-enabled mobile healthcare workflow applications in mobile
edge-cloud-enabled systems is increasing progressively. These applications are …

Wireless communications and mobile computing blockchain‐based trust management in distributed internet of things

F Li, D Wang, Y Wang, X Yu, N Wu… - … and Mobile Computing, 2020 - Wiley Online Library
The development of Internet of Things (IoT) and Mobile Edge Computing (MEC) has led to
close cooperation between electronic devices. It requires strong reliability and …