A metaverse breaks the boundaries of time and space between people, real...
Blockchain has attracted significant attention in recent years due to it...
Both Byzantine resilience and communication efficiency have attracted
tr...
Sequential recommendations aim to capture users' preferences from their
...
With the continuous improvement of information infrastructures, academia...
Side information is being used extensively to improve the effectiveness ...
Decentralized Storage Networks (DSNs) can gather storage resources from
...
Cross-chain technology facilitates the interoperability among isolated
b...
With the increasing popularity of voice-based applications, acoustic
eav...
Although proof of work (PoW) consensus dominates the current blockchain-...
Metaverse has rekindled human beings' desire to further break space-time...
A large amount of high-dimensional and heterogeneous data appear in prac...
Payment channel network (PCN) is a layer-two scaling solution that enabl...
Decentralized learning involves training machine learning models over re...
Mobile crowdsensing (MCS) counting on the mobility of massive workers he...
The explosive amount of data generated at the network edge makes mobile ...
Recent years have witnessed an increasing interest in the blockchain
tec...
This paper studies decentralized federated learning algorithms in wirele...
Malware is a piece of software that was written with the intent of doing...
Blockchain creates a secure environment on top of strict cryptographic
a...
Blockchain technologies can enable secure computing environments among
m...
Natural forking in blockchain refers to a phenomenon that there are a se...
Many real-world IoT systems comprising various internet-connected sensor...
Known as a distributed ledger technology (DLT), blockchain has attracted...
This paper presents 𝑤𝐶ℎ𝑎𝑖𝑛, a blockchain protocol specifically
designed ...
Bitcoin has witnessed a prevailing transition that employing transaction...
With the prevalence of Internet of Things (IoT) applications, IoT device...
Deep learning is a thriving field currently stuffed with many practical
...
Differential privacy is effective in sharing information and preserving
...
The growing threat of personal data breach in data trading pinpoints an
...
Quality control plays a critical role in crowdsourcing. The state-of-the...
Social dilemmas exist in various fields and give rise to the so-called
f...
Proof of work (PoW), the most popular consensus mechanism for Blockchain...
The pool-hopping attack casts down the expected profits of both the mini...
Matrix factorization (MF) techniques have been shown to be effective for...