Real name: 
First Name: 
Xiaohan
Last Name: 
Hao

Datasets & Competitions

We propose a blockchain-enabled zero trust information sharing protocol. The proposed protocol supports the filtering of fabricated information, and protect participant privacy during information sharing. We then evaluate its performance using a series of experiments. 

Categories:
366 Views

In online shopping, consumers often rely on information such as sales, reviews or ratings to inform their decision making. Such preferences or user behaviors can be subjected to manipulation. For example, a merchant can artificially inflate product sales by paying a click farm. Specifically, the click farm will recruit a number of non-genuine buyers to purchase the products. After the purchases have been made, the buyers will either refund the product minus the commission or no product exchange actually takes place and these buyers are paid a commission for their role in the activity.

Categories:
475 Views

Digital signature is an encryption mechanism used to verify the authenticity and integrity of message, which has higher complexity and security than traditional handwritten signature. However, the two main challenges of digital signature are security and computing speed. It then imposes a problem - how to quickly verify and sign digital signatures under the premise of ensuring security.

Categories:
388 Views

We test the consumed time of the three steps of the exchange model in order to show that our scheme is feasible.

 

Categories:
102 Views

Blockchain is currently envisioned as a promising technology for enabling new applications, e.g., authenticity of diploma, supplying chain finance, and automatical transaction. Smart contract is a key function in blockchain to enable fair exchanges for values within de-centralized trust. However, as the smart contract can be automatically executed together with token transferring, hackers usually exploit vulnerabilities in smart contracts for gain possible profits in terms of digital currencies.SVM is employed for detecting unknown vulnerabilities to improve the recognition rate.

Categories:
643 Views

Blockchain is a kind of distributed account book. It uses many cryptographic techniques to ensure the data security and not tampered with. In our uploaded dataset file, the block chain structure code is included.

Categories:
221 Views

Key is the core element of constructing Bitcoin trust network. The key usually consists of private key and public key. The private key is used to generate signatures and the public key is used to generate addresses. Bitcoin keys are generated by the elliptic curve algorithm SECP256k1. This data set contains the core code to generate the key.

Categories:
211 Views