Double-spending with a sybil attack in the bitcoin decentralized network

S Zhang, JH Lee - IEEE transactions on Industrial Informatics, 2019‏ - ieeexplore.ieee.org
A double-spend attack is one of the major security issues in most blockchain systems, but it
is difficult to successfully launch unless an adversary has massive computing power. In this …

Peer-to-peer federated continual learning for naturalistic driving action recognition

L Yuan, Y Ma, L Su, Z Wang - Proceedings of the IEEE/CVF …, 2023‏ - openaccess.thecvf.com
Naturalistic driving action recognition (NDAR) has proven to be an effective method for
detecting driver distraction and reducing the risk of traffic accidents. However, the intrusive …

A survey on network coordinates systems, design, and security

B Donnet, B Gueye, MA Kaafar - … Communications Surveys & …, 2010‏ - ieeexplore.ieee.org
During the last decade, a new class of large-scale globally-distributed network services and
applications have emerged. Those systems are flexible in the sense that they can select …

Security and privacy issues in P2P streaming systems: A survey

G Gheorghe, R Lo Cigno, A Montresor - Peer-to-Peer Networking and …, 2011‏ - Springer
Abstract Streaming applications over Peer-To-Peer (P2P) systems have gained an
enormous popularity. Success always implies increased concerns about security, protection …

[PDF][PDF] Exploring Link Correlation for Efficient Flooding in Wireless Sensor Networks.

T Zhu, Z Zhong, T He, ZL Zhang - NSDI, 2010‏ - usenix.org
Existing flooding algorithms have demonstrated their effectiveness in achieving
communication efficiency and reliability in wireless sensor networks. However, further …

Decentralized utility-and locality-aware replication for heterogeneous DHT-based P2P cloud storage systems

Y Hassanzadeh-Nazarabadi, A Küpçü… - IEEE Transactions on …, 2019‏ - ieeexplore.ieee.org
As a Distributed Hash Table (DHT), Skip Graph routing overlays are exploited in several
peer-to-peer (P2P) services, including P2P cloud storage. The fully decentralized replication …

Achieving efficient flooding by utilizing link correlation in wireless sensor networks

T Zhu, Z Zhong, T He, ZL Zhang - IEEE/ACM transactions on …, 2012‏ - ieeexplore.ieee.org
Although existing flooding protocols can provide efficient and reliable communication in
wireless sensor networks on some level, further performance improvement has been …

Sok: understanding BFT consensus in the age of blockchains

G Wang - Cryptology ePrint Archive, 2021‏ - eprint.iacr.org
Blockchain as an enabler to current Internet infrastructure has provided many unique
features and revolutionized current distributed systems into a new era. Its decentralization …

Self-stabilizing byzantine resilient topology discovery and message delivery

S Dolev, O Liba, EM Schiller - International Conference on Networked …, 2013‏ - Springer
Traditional Byzantine resilient algorithms use 2 f+ 1 vertex-disjoint paths to ensure message
delivery in the presence of up to f Byzantine nodes. The question of how these paths are …

On optimizing overlay topologies for search in unstructured peer-to-peer networks

HC Hsiao, HW Su - IEEE Transactions on Parallel and …, 2011‏ - ieeexplore.ieee.org
Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As
the peers participating in unstructured networks interconnect randomly, they rely on flooding …