Follow
yilei wang
yilei wang
School of Computer Science and Technology,Shandong University
Verified email at ldu.edu.cn
Title
Cited by
Cited by
Year
Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing
C Dong, Y Wang, A Aldweesh, P McCorry, A Van Moorsel
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1942017
Rational protocols and attacks in blockchain system
T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang
Security and Communication Networks 2020, 1-11, 2020
732020
A game-theoretic method based on Q-learning to invalidate criminal smart contracts
L Zhang, Y Wang, F Li, Y Hu, MH Au
Information Sciences 498, 144-153, 2019
492019
Randomness invalidates criminal smart contracts
Y Wang, A Bracciali, T Li, F Li, X Cui, M Zhao
Information Sciences 477, 291-301, 2019
492019
Optimal mixed block withholding attacks based on reinforcement learning
Y Wang, G Yang, T Li, L Zhang, Y Wang, L Ke, Y Dou, S Li, X Yu
International Journal of Intelligent Systems 35 (12), 2032-2048, 2020
432020
Incentive compatible and anti-compounding of wealth in proof-of-stake
Y Wang, G Yang, A Bracciali, H Leung, H Tian, L Ke, X Yu
Information Sciences 530, 85-94, 2020
412020
IPBSM: an optimal bribery selfish mining in the presence of intelligent and pure attackers
G Yang, Y Wang, Z Wang, Y Tian, X Yu, S Li
International Journal of Intelligent Systems 35 (11), 1735-1748, 2020
372020
Wireless communications and mobile computing blockchain-based trust management in distributed internet of things
F Li, D Wang, Y Wang, X Yu, N Wu, J Yu, H Zhou
Wireless Communications and Mobile Computing 2020, 1-12, 2020
352020
Secure computation protocols under asymmetric scenarios in enterprise information system
Y Wang, M Zhao, Y Hu, Y Gao, X Cui
Enterprise Information Systems 15 (4), 492-512, 2021
292021
Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments
X Yu, H Wang, X Zheng, Y Wang
International Journal of Ad Hoc and Ubiquitous Computing 23 (3-4), 137-151, 2016
292016
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices
Y Wang, G Yang, T Li, F Li, Y Tian, X Yu
Journal of Network and Computer Applications 161, 102641, 2020
282020
Server aided ciphertext-policy attribute-based encryption
H Wang, B Yang, Y Wang
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
242015
BSM-ether: Bribery selfish mining in blockchain-based healthcare systems
Y Wang, Z Wang, M Zhao, X Han, H Zhou, X Wang, ASV Koe
Information Sciences 601, 1-17, 2022
222022
Social rational secure multi‐party computation
Y Wang, Z Liu, H Wang, Q Xu
Concurrency and Computation: Practice and Experience 26 (5), 1067-1083, 2014
222014
Impsuic: a quality updating rule in mixing coins with maximum utilities
X Yu, Z Wang, Y Wang, F Li, T Li, Y Chen, Y Tian, X Yu
International Journal of Intelligent Systems 36 (3), 1182-1198, 2021
202021
Immunity-related genes and signaling pathways under hypoxic stresses in Haliotis diversicolor: a transcriptome analysis
Y Sun, X Zhang, Y Wang, R Day, H Yang, Z Zhang
Scientific Reports 9 (1), 19741, 2019
182019
A game‐theoretic approach of mixing different qualities of coins
X Liu, X Yu, H Zhu, G Yang, Y Wang, X Yu
International Journal of Intelligent Systems 35 (12), 1899-1911, 2020
162020
ForkDec: accurate detection for selfish mining attacks
Z Wang, Q Lv, Z Lu, Y Wang, S Yue
Security and Communication Networks 2021, 1-8, 2021
152021
A brief survey on secure multi-party computing in the presence of rational parties
Y Wang, T Li, H Qin, J Li, W Gao, Z Liu, Q Xu
Journal of Ambient Intelligence and Humanized Computing 6, 807-824, 2015
152015
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems
Y Wang, Z Wang, G Yang, S Ai, X Xiang, C Chen, M Zhao
Digital Communications and Networks 9 (5), 1053-1060, 2023
142023
The system can't perform the operation now. Try again later.
Articles 1–20