Recent progress and trends in predictive visual analytics J Lu, W Chen, Y Ma, J Ke, Z Li, F Zhang, R Maciejewski Frontiers of Computer Science 11, 192-207, 2017 | 68 | 2017 |
Blockchain and privacy preserving mechanisms in cryptocurrency H Wang, X Song, J Ke, Q Xu Netinfo Security 7 (8), 32-39, 2017 | 22 | 2017 |
Accountable outsourcing location-based services with privacy preservation Z Liu, L Wu, J Ke, W Qu, W Wang, H Wang IEEE Access 7, 117258-117273, 2019 | 21 | 2019 |
Laksa: A probabilistic proof-of-stake protocol D Reijsbergen, P Szalachowski, J Ke, Z Li, J Zhou arXiv preprint arXiv:2006.01427, 2020 | 17 | 2020 |
Ibwh: an intermittent block withholding attack with optimal mining reward rate J Ke, P Szalachowski, J Zhou, Q Xu, Z Yang Information Security: 22nd International Conference, ISC 2019, New York City …, 2019 | 15 | 2019 |
Improvement of the pos consensus mechanism in blockchain based on shapley value Y Liu, J Ke, H Jiang, X Song Journal of Computer Research and Development 55 (10), 2208-2218, 2018 | 15 | 2018 |
Decentralization is vulnerable under the gap game Y Liu, J Ke, Q Xu, H Jiang, H Wang IEEE Access 7, 90999-91008, 2019 | 14 | 2019 |
Analysis on the block reward of fork after withholding (FAW) J Ke, H Jiang, X Song, S Zhao, H Wang, Q Xu Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018 | 9 | 2018 |
If you can’t beat them, pay them: Bitcoin protection racket is profitable Z Yang, C Yin, J Ke, TTA Dinh, J Zhou Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 5 | 2022 |
Efficient delay minimization algorithm for cache-enabled NOMA systems Y Fu, Z Shi, J Ke, H Wang, AKY Wong, TQS Quek IEEE Wireless Communications Letters 10 (8), 1771-1775, 2021 | 5 | 2021 |
Optimal and suboptimal dynamic cache update algorithms for wireless cellular networks Y Fu, J Liu, J Ke, JKT Chui, KKF Hung IEEE Wireless Communications Letters 11 (12), 2610-2614, 2022 | 3 | 2022 |
An efficient single server-aided k-out-of-n oblivious transfer protocol S Zhao, H Jiang, X Wei, J Ke, M Zhao | 2 | 2017 |
Formalizing Bitcoin Crashes with Universally Composable Security J Ke, P Szalachowski, J Zhou, Q Xu Information Security: 23rd International Conference, ISC 2020, Bali …, 2020 | 1 | 2020 |
A Binary Linear Functional-Repair Regenerating Code on 72 Coding Spaces Related to PG (2, 8) K Junming, HDL Hollmann, AE Riet 2024 IEEE International Symposium on Information Theory (ISIT), 2335-2340, 2024 | | 2024 |
Update and Repair Efficient Storage Codes with Availability via Finite Projective Planes J Ke, AE Riet 2022 IEEE International Symposium on Information Theory (ISIT), 3268-3273, 2022 | | 2022 |