Author of the publication

Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities.

, , , , , and . IEEE Open J. Comput. Soc., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic congestion in interconnected complex networks., , , and . CoRR, (2014)Accelerating DES and AES Algorithms for a Heterogeneous Many-core Processor., , , , , and . Int. J. Parallel Program., 49 (3): 463-486 (2021)An Adaptive Semi-local Algorithm for Node Ranking in Large Complex Networks., , , , and . ICSOC, volume 11236 of Lecture Notes in Computer Science, page 505-514. Springer, (2018)Sequential Node Attack of Complex Networks Based on Q-Learning Method., , and . ISCAS, page 1-5. IEEE, (2021)Portraits of Typical Accounts in Ethereum Transaction Network., , , , and . BlockSys, volume 1490 of Communications in Computer and Information Science, page 44-56. Springer, (2021)Optimal design of coupling preferences to mitigate traffic congestion in interconnected networks., , , and . ISCAS, page 1-4. IEEE, (2017)Analysis of Cryptocurrency Transactions from a Network Perspective: An Overview., , , and . CoRR, (2020)Cooperative and Distributed Computation Offloading for Blockchain-Empowered Industrial Internet of Things., , , , , , , and . IEEE Internet Things J., 6 (5): 8433-8446 (2019)Sequential Attacker-Defender Game on Complex Networks Considering the Cascading Failure Process., , , and . IEEE Trans. Comput. Soc. Syst., 9 (2): 518-529 (2022)Does Money Laundering on Ethereum Have Traditional Traits?, , , and . ISCAS, page 1-5. IEEE, (2023)