Follow
Junming Ke
Title
Cited by
Cited by
Year
Recent progress and trends in predictive visual analytics
J Lu, W Chen, Y Ma, J Ke, Z Li, F Zhang, R Maciejewski
Frontiers of Computer Science 11, 192-207, 2017
632017
Blockchain and privacy preserving mechanisms in cryptocurrency
H Wang, X Song, J Ke, Q Xu
Netinfo Security 7 (8), 32-39, 2017
202017
Accountable outsourcing location-based services with privacy preservation
Z Liu, L Wu, J Ke, W Qu, W Wang, H Wang
IEEE Access 7, 117258-117273, 2019
172019
Ibwh: an intermittent block withholding attack with optimal mining reward rate
J Ke, P Szalachowski, J Zhou, Q Xu, Z Yang
Information Security: 22nd International Conference, ISC 2019, New York City …, 2019
142019
Decentralization is vulnerable under the gap game
Y Liu, J Ke, Q Xu, H Jiang, H Wang
IEEE Access 7, 90999-91008, 2019
122019
Improvement of the pos consensus mechanism in blockchain based on shapley value
L Yiran, K Junming, J Han, S Xiangfu
J. Computer Res. Dev 55, 2208, 2018
122018
Laksa: A probabilistic proof-of-stake protocol
D Reijsbergen, P Szalachowski, J Ke, Z Li, J Zhou
arXiv preprint arXiv:2006.01427, 2020
112020
Analysis on the block reward of fork after withholding (FAW)
J Ke, H Jiang, X Song, S Zhao, H Wang, Q Xu
Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018
92018
Efficient delay minimization algorithm for cache-enabled NOMA systems
Y Fu, Z Shi, J Ke, H Wang, AKY Wong, TQS Quek
IEEE Wireless Communications Letters 10 (8), 1771-1775, 2021
52021
Optimal and suboptimal dynamic cache update algorithms for wireless cellular networks
Y Fu, J Liu, J Ke, JKT Chui, KKF Hung
IEEE Wireless Communications Letters 11 (12), 2610-2614, 2022
32022
If you can’t beat them, pay them: Bitcoin protection racket is profitable
Z Yang, C Yin, J Ke, TTA Dinh, J Zhou
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
22022
An efficient single server-aided k-out-of-n oblivious transfer protocol
S Zhao, H Jiang, X Wei, J Ke, M Zhao
22017
Formalizing Bitcoin Crashes with Universally Composable Security
J Ke, P Szalachowski, J Zhou, Q Xu
Information Security: 23rd International Conference, ISC 2020, Bali …, 2020
12020
Update and Repair Efficient Storage Codes with Availability via Finite Projective Planes
J Ke, AE Riet
2022 IEEE International Symposium on Information Theory (ISIT), 3268-3273, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–14