Xueming Si
YOU?
Author Swipe
View article: An Efficient Cross-Shard Smart Contract Execution Framework Leveraging Off-Chain Computation and Genetic Algorithm-Optimized Migration
An Efficient Cross-Shard Smart Contract Execution Framework Leveraging Off-Chain Computation and Genetic Algorithm-Optimized Migration Open
Blockchain sharding is a promising approach to improving system scalability. However, traditional designs rely on lock-based cross-shard commit protocols, which introduce significant performance bottlenecks due to repeated on-chain communi…
View article: A Multimodal Fake News Detection Model Based on Bidirectional Semantic Enhancement and Adversarial Network Under Web3.0
A Multimodal Fake News Detection Model Based on Bidirectional Semantic Enhancement and Adversarial Network Under Web3.0 Open
Web3.0 aims to foster a trustworthy environment enabling user trust and content verifiability. However, the proliferation of fake news undermines this trust and disrupts social ecosystems, making the effective alignment of visual-textual s…
View article: A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing
A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing Open
With the rapid development of artificial intelligence, multi-party collaboration based on data sharing has become an inevitable trend. However, in practical applications, shared data often originate from multiple providers. Therefore, achi…
View article: A Data Sharing Model for Blockchain Trusted Sensor Leveraging Mimic Hash Mechanism
A Data Sharing Model for Blockchain Trusted Sensor Leveraging Mimic Hash Mechanism Open
Blockchain, as a distributed trust database, has been widely applied in the field of trustworthy sharing of Internet of Things (IoT) sensor data. A single hash mechanism has achieved, to some extent, the trustworthy on-chain storage of blo…
View article: A secure and highly efficient blockchain PBFT consensus algorithm for microgrid power trading
A secure and highly efficient blockchain PBFT consensus algorithm for microgrid power trading Open
There are a series of challenges in microgrid transactions, and blockchain technology holds the promise of addressing these challenges. However, with the increasing number of users in microgrid transactions, existing blockchain systems may…
View article: An Efficient and Secure Blockchain Consensus Protocol for Internet of Vehicles
An Efficient and Secure Blockchain Consensus Protocol for Internet of Vehicles Open
Conventional blockchain consensus protocols tailored for the Internet of Vehicles (IoV) usually face low transaction throughput, high latency, and elevated communication overhead issues. To address these issues, in this paper, we propose E…
View article: MD-S3C3
MD-S3C3 Open
In medical data sharing, the data access control authorities of the sharing entities and computing capabilities of the sharing platforms are asymmetric. This asymmetry leads to poor patient control over their data, privacy disclosure, and …
View article: Three-Stage Cross-Chain Protocol Based on Notary Group
Three-Stage Cross-Chain Protocol Based on Notary Group Open
With the continuous development of blockchain technology and economy, blockchain applications have been well developed in multiple key areas. The demand for interoperability between different blockchains is also increasing. Cross-chain pro…
View article: MDS2-C3PF: A Medical Data Sharing Scheme with Cloud-Chain Cooperation and Policy Fusion in IoT
MDS2-C3PF: A Medical Data Sharing Scheme with Cloud-Chain Cooperation and Policy Fusion in IoT Open
The Internet of Things (IoT) and cloud technologies have significantly facilitated healthcare. In such a context, medical data are collected by the terminals from the patients, manipulated, and stored on the cloud by hospitals (doctors). T…
View article: Data processing scheme based on blockchain
Data processing scheme based on blockchain Open
In the white paper written on Bitcoin, a chain of blocks was proposed by Satoshi Nakamoto. Since then, blockchain has been rapidly developed. Blockchain is not only limited to the field of cryptocurrency but also has been extensively appli…
View article: Data Processing Scheme Based on Blockchain
Data Processing Scheme Based on Blockchain Open
In the white paper written on Bitcoin, a chain of blocks was proposed by Satoshi Nakamoto. Since then, blockchain has been rapidly developed. Blockchain is not only limited to the field of cryptocurrency but also has been extensively appli…
View article: A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA
A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA Open
Blockchain is widely used in encrypted currency, Internet of Things (IoT), supply chain finance, data sharing, and other fields. However, there are security problems in blockchains to varying degrees. As an important component of blockchai…
View article: Data Processing Scheme Based on Blockchain
Data Processing Scheme Based on Blockchain Open
In the white paper written on Bitcoin, a chain of blocks was proposed by Satoshi Nakamoto. Since then, blockchain has been rapidly developed. Blockchain is not only limited to the field of cryptocurrency but also has been extensively appli…
View article: Data Processing Scheme Based on Blockchain
Data Processing Scheme Based on Blockchain Open
In the whitepaper of Bitcoin, a chain of block was proposed by Satoshi Nakamoto. And then blockchain has been rapidly developed. Blockchain is not only limited to the field of cryptocurrency, but also has been well applied in the Internet …
View article: A Survey on Challenges and Progresses in Blockchain Technologies: A Performance and Security Perspective
A Survey on Challenges and Progresses in Blockchain Technologies: A Performance and Security Perspective Open
Blockchain naturally fits multiple industry sectors due its characteristics of decentralization, enhanced security, tamper-proof, improved traceability and transparency. However, there is a significant concern of blockchain’s performance, …
View article: Mimic Encryption System for Network Security
Mimic Encryption System for Network Security Open
With the rapid development of the Internet, increasingly more attention has been paid to network security problems. A network security defense technology has become a very important research field. Currently, most network equipment transmi…
View article: Research on a New Signature Scheme on Blockchain
Research on a New Signature Scheme on Blockchain Open
With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unr…