Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Key-Based Transaction Reordering: An Optimized Approach for Concurrency Control in Hyperledger Fabric

    As blockchain technology garners increased adoption, permissioned blockchains like Hyperledger Fabric emerge as a popular blockchain system for develo** scalable decentralized applications. Nonetheless, para...

    Haoliang Ma, Peichang Shi, **ang Fu in Algorithms and Architectures for Parallel … (2024)

  2. No Access

    Article

    Ensemble machine learning to evaluate the in vivo acute oral toxicity and in vitro human acetylcholinesterase inhibitory activity of organophosphates

    Organophosphates (OPs) are hazardous chemicals widely used in industry and agriculture. Distribution of their residues in nature causes serious risks to humans, animals, and plants. To reduce hazards from OPs,...

    Liangliang Wang, Junjie Ding, Peichang Shi, Li Fu, Li Pan in Archives of Toxicology (2021)

  3. No Access

    Article

    Teegraph: trusted execution environment and directed acyclic graph-based consensus algorithm for IoT blockchains

    **ang Fu, Huaimin Wang, Peichang Shi, **ngkong Ma in Science China Information Sciences (2021)

  4. No Access

    Chapter and Conference Paper

    Asycome: A JointCloud Data Asynchronous Collaboration Mechanism Based on Blockchain

    In the Internet of Everything (IoE), due to its issues of complexity and heterogeneity, message delay cannot be guaranteed, and it is not enough to leverage a centralized model for data collaboration. By leveragi...

    Linhui Li, Peichang Shi, **ang Fu, Shengtian Zhang in Blockchain and Trustworthy Systems (2021)

  5. No Access

    Chapter and Conference Paper

    Ladder: A Blockchain Model of Low-Overhead Storage

    Emerging blockchain accounting mechanism allow mutually distributed parties to transport trusted information and ensure the correctness of data. Every blockchain node stores the complete block locally. Althoug...

    Peng Chen, Xunhui Zhang, Hui Liu, Liangliang **ang in Blockchain and Trustworthy Systems (2021)

  6. No Access

    Article

    A survey of Blockchain consensus algorithms: mechanism, design and applications

    In 2008, Blockchain was introduced to the world as the underlying technology of the Bitcoin system. After more than a decade of development, various Blockchain systems have been proposed by both academia and i...

    **ang Fu, Huaimin Wang, Peichang Shi in Science China Information Sciences (2020)

  7. No Access

    Chapter and Conference Paper

    BBCPS: A Blockchain Based Open Source Contribution Protection System

    In the current open source ecosystem, developers rely on internal factors, such as ideology, interesting, and other external factors, such as reputation, learning, to participate in the contribution of open so...

    Qiubing Zeng, Xunhui Zhang, Tao Wang, Peichang Shi in Blockchain and Trustworthy Systems (2020)

  8. No Access

    Chapter and Conference Paper

    Model the Influence of Sybil Nodes in P2P Botnets

    Sybil attacks are suitable to mitigate P2P botnets, and the effects depend on the influences of Sybil nodes. However, the problem of how to evaluate the influences of Sybil nodes is rarely studied. Considering...

    Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi in Network and System Security (2013)