Article
Computer Science, Artificial Intelligence
Zhifang Liao, Jincheng Ai, Shaoqiang Liu, Yan Zhang, Shengzong Liu
Summary: This paper presents a blockchain-based crowdsourcing model that ensures the confidentiality of tasks during transmission, reduces energy consumption of mobile devices, and optimizes task assignment results.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Chemistry, Multidisciplinary
Seth Larweh Kodjiku, Yili Fang, Tao Han, Kwame Omono Asamoah, Esther Stacy E. B. Aggrey, Collins Sey, Evans Aidoo, Victor Nonso Ejianya, Xun Wang
Summary: The application of blockchain technology in crowdsourcing systems faces key challenges such as biased reputation systems, high service fees, and unfair evaluation and reward distribution. This study introduces ExCrowd, a blockchain-based crowdsourcing system that addresses these issues by using smart contracts as a trusted authority, and demonstrates the efficiency and adaptability of the system through experimental results.
APPLIED SCIENCES-BASEL
(2022)
Review
Computer Science, Information Systems
Junting Gao, Chunrong Peng, Tsutomu Yoshinaga, Guorong Han, Siri Guleng, Celimuge Wu
Summary: Internet of Vehicles (IoV) is a network that connects vehicles and everything, sharing traffic data and bringing potential to people's life. The use of blockchains in IoV can build a safe and reliable vehicle network, solving resource consumption and security issues. Researches have investigated the application of blockchains in IoV, summarizing and comparing studies, and identifying future trends and opportunities.
Article
Computer Science, Information Systems
Yang Ming, Chenhao Wang, Hang Liu, Yi Zhao, Jie Feng, Ning Zhang, Weisong Shi
Summary: This article proposes an efficient dynamic cross-domain deduplication scheme in blockchain-enabled edge computing. The scheme utilizes smart contracts to achieve cross-domain deduplication and reduce storage pressure on edge nodes. It also introduces a hash proof system-based oblivious pseudorandom function to enhance security and adopts accumulators to prevent duplicate-faking attacks. Security analysis and performance evaluation demonstrate that the proposed scheme has higher security and lower computation cost and communication overhead.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Theory & Methods
Maha Kadadha, Hadi Otrok, Rabeb Mizouni, Shakti Singh, Anis Ouali
Summary: This study addresses the issue of behavior prediction for task allocation in blockchain-based crowdsourcing frameworks, proposing a novel on-chain behavior prediction ML model to enhance task allocation performance.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Computer Science, Theory & Methods
Maha Kadadha, Hadi Otrok, Rabeb Mizouni, Shakti Singh, Anis Ouali
Summary: This paper introduces an on-chain behavior prediction ML model for task allocation in a blockchain-based crowdsourcing framework, considering the impact of task context on worker behavior. The proposed task allocation mechanism takes into account workers' predicted behavior and Quality of Information metric, including task distance, completion time, and reputation. Evaluation results show that the proposed mechanism outperforms the benchmark in terms of task allocation percentage, workers' QoI, and reputation change.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Engineering, Electrical & Electronic
Dianting Liu, Dong Liang
Summary: Traditional crowdsourcing platforms are centralized, lack credibility, and are vulnerable to single point of failure. This paper proposes the use of decentralized blockchain technology to address these issues in crowdsourcing design. A method is introduced to manage and control the process of crowdsourcing design services using smart contracts. The implemented system is decentralized, tamper-proof, traceable, and protects user privacy to some extent. Experiment results demonstrate its feasibility and usability. Future work focuses on improving the algorithmic logic of smart contracts for stable and secure operation in complex node network environments.
Article
Telecommunications
Zheng Xu, Chaofan Liu, Peng Zhang, Tun Lu, Ning Gu
Summary: This article introduces an innovative blockchain-enabled wiki framework called DecWiki, which aims to build a transparent, truthful, collaborative, and autonomous encyclopedia. Through multiple design iterations, the detailed architecture and implementation of DecWiki are presented. Extensive experiments demonstrate its significant performance.
DIGITAL COMMUNICATIONS AND NETWORKS
(2022)
Article
Computer Science, Artificial Intelligence
Wenli Yang, Saurabh Garg, Quan Bai, Byeong Kang
Summary: This study explores the feasibility and effectiveness of knowledge fusion based on blockchain technology in conversation systems. A framework and a concrete scheme for decentralized knowledge fusion are designed and implemented using smart contracts. The proposed method is evaluated through a use case-based evaluation to demonstrate its effectiveness.
EXPERT SYSTEMS WITH APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Weikun Zhang, Zicong Hong, Wuhui Chen
Summary: This study introduces a novel blockchain-enabled crowdsourcing platform and designs a dynamic hierarchical pricing mechanism to ensure financial stability and match task difficulty with worker ability. Experimental results confirm the correctness and feasibility of the platform.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Chaosheng Feng, Bin Liu, Zhen Guo, Keping Yu, Zhiguang Qin, Kim-Kwang Raymond Choo
Summary: This article proposes a blockchain-based cross-domain authentication scheme for intelligent 5G-enabled Internet of drones. By utilizing multiple signatures and smart contracts to establish an identity federation for collaborative domains, the scheme supports domain joining and exiting, and ensures reliable communication between cross-domain devices.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Immunology
Harsha Chauhan, Deepali Gupta, Sheifali Gupta, Aman Singh, Hani Moaiteq Aljahdali, Nitin Goyal, Irene Delgado Noya, Seifedine Kadry
Summary: The authors proposed a blockchain-based solution to enhance security and transparency in the tracing of COVID-19 vaccination vials, using smart contracts to monitor the supply and distribution of the vials. The proposed solution was implemented and tested on Ethereum test network, RinkeBy, MetaMask, and one-clicks DApp, showing promising results in terms of throughput and scalability.
Article
Chemistry, Analytical
Dragos Daniel Taralunga, Bogdan Cristian Florea
Summary: Modern technology is playing a significant role in transitioning from traditional healthcare to smart healthcare systems, where mHealth utilizes wearable sensors, telecommunications, and IoT to create a patient-centered healthcare concept. However, privacy and security concerns remain, with blockchain technology proving to be a potential solution, offering decentralization, immutability, traceability, and transparency. Our proposed mHealth system utilizes a private blockchain on the Ethereum platform for secure communication between wearable sensors and smart devices, with smart contracts enabling data queries, access to patient information, and alert notifications.
Article
Computer Science, Information Systems
Yihao Guo, Zhiguo Wan, Hui Cui, Xiuzhen Cheng, Falko Dressler
Summary: The Internet of Vehicles (IoV) enables vehicles to have more efficient, safer, and environmentally friendly transportation. However, preserving privacy for location-based service payments is a critical and challenging problem. This article proposes a decentralized privacy-preserving payment scheme called Vehicloak based on the blockchain technology to address this issue.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Green & Sustainable Science & Technology
Xugang Zhang, Xinbiao Feng, Zhigang Jiang, Qingshan Gong, Yan Wang
Summary: The production and sales of electric vehicles in China are increasing, leading to a forthcoming wave of scrap batteries. However, power battery recycling faces challenges such as disorganization, lack of standards, and low efficiency. Additionally, the power battery recycling supply chain encounters issues with transparency, data management, trustworthiness, and counterfeiting. Therefore, a blockchain-based PBRSC management integration framework is proposed to address these problems and improve the ecosystem.
JOURNAL OF CLEANER PRODUCTION
(2023)
Article
Computer Science, Artificial Intelligence
Liang Tan, Keping Yu, Ali Kashif Bashir, Xiaofan Cheng, Fangpeng Ming, Liang Zhao, Xiaokang Zhou
Summary: This paper proposes a real-time cardiovascular monitoring system using 5G and deep learning to predict the cardiovascular health of COVID-19 patients. Experimental results show that the proposed system can address technical limitations and improve the prediction accuracy of cardiovascular disease.
NEURAL COMPUTING & APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Zhiwen Jiang, Ziji Ma, Yaonan Wang, Xun Shao, Keping Yu, Alireza Jolfaei
Summary: With the rapid growth of population and urbanization, there is an increasing demand for higher-quality medical services. In this study, a classification method based on deep convolutional neural networks (CNNs) is proposed to address the issue of feature information loss. The newly proposed strategy of aggregation decentralized down-sampling prevents the loss of feature information and improves the accuracy of the classification system.
NEURAL COMPUTING & APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Xuhong Cheng, Zhiwei Guo, Yu Shen, Keping Yu, Xu Gao
Summary: This paper proposes a hybrid control and prediction system for wastewater treatment processes (WTP) called AS-CL, which combines the Activated Sludge model, Convolutional neural network, and Long short-term memory neural networks. The AS-CL model improves modeling efficiency and reduces the impact of fuzziness on WTP.
NEURAL COMPUTING & APPLICATIONS
(2023)
Article
Engineering, Multidisciplinary
Peiran Li, Haoran Zhang, Wenjing Li, Keping Yu, Ali Kashif Bashir, Ahmad Ali Alzubi, Jinyu Chen, Xuan Song, Ryosuke Shibasaki
Summary: Tracking demographic dynamics is important for smart city development. We proposed a reliable approach based on the Industrial Internet of Things to track the demographic dynamics in the built environment, and inferred demographic data based on life-pattern features.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Article
Engineering, Electrical & Electronic
Siyuan Liang, Weiyue Zhu, Chinmay Chakraborty, Jianbo Du, Keping Yu
Summary: This paper introduces a method for detecting protective measures using unmanned devices based on SLAM and fusion technology, which is more efficient, economical and safe than traditional manual detection. By enhancing the visual feature extraction of SLAM with the gyroscope of the IMU, a high-precision visual inertial system for joint position and pose estimation is achieved. The proposed method recovers missing point features from line features and adds residuals to optimize the point-line features in real time, improving the tracking and matching accuracy.
IEEE SENSORS JOURNAL
(2023)
Article
Automation & Control Systems
Yinzhi Lu, Liu Yang, Simon X. Yang, Qiaozhi Hua, Arun Kumar Sangaiah, Tan Guo, Keping Yu
Summary: The edge-enabled Industrial Internet of Things (IIoT) platform is crucial in the acceleration of smart industry development. However, as real-time IIoT applications increase, it becomes challenging to achieve fast response time, low latency, and efficient bandwidth utilization. To address this issue, researchers have recently studied time-sensitive network (TSN) to enable low latency communication through deterministic scheduling. This article analyzes the combinability problem and proposes the noncollision theory-based deterministic scheduling (NDS) method for achieving ultralow latency communication for time-sensitive flows. Additionally, a dynamic queue scheduling (DQS) method is presented to improve bandwidth utilization for best-effort flows. Experimental results demonstrate the effectiveness of NDS/DQS in supporting deterministic ultralow latency services and efficient bandwidth utilization.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Bingxian Lu, Lei Wang, Wei Wang, Keping Yu, Sahil Garg, Md. Jalil Piran, Atif Alamri
Summary: The ability to identify which wireless devices belong to the same person from Wi-Fi access point (AP) enables various IoT applications. Existing cryptographic-based solutions are not suitable for IoT devices with limited power and computing capabilities. This article proposes an on-body device clustering (OBDC) scheme that extracts trajectory and gait patterns from wireless signals and utilizes a hierarchical clustering algorithm to measure the similarity between devices. Experimental results show that about 90% of users' devices can be accurately clustered, with a low 0.7% misclustering rate.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Zhiwei Guo, Keping Yu, Neeraj Kumar, Wei Wei, Shahid Mumtaz, Mohsen Guizani
Summary: With the rapid development of edge intelligence in wireless communication networks, mobile-edge networks (MENs) have been widely discussed in academia. The article proposes a deep distributed-learning-based POI recommendation (Deep-PR) method for MENs, which effectively considers both internal and latent external features of users. Experimental results on real-world data sets show that Deep-PR outperforms seven typical baselines in terms of overall performance.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Automation & Control Systems
Feng Ding, Bing Fan, Zhangyi Shen, Keping Yu, Gautam Srivastava, Kapal Dev, Shaohua Wan
Summary: Falsified faces generated by DeepFake pose severe threats to our community, especially to smart systems relying on bioinformation authentication. Despite promising results on DeepFake forensics, new security challenges arise from antiforensics attacks. To protect biometric data, particularly facial information, a countermeasure against DeepFake antiforensics attacks is proposed.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Engineering, Civil
Li Zhen, Yue Wang, Keping Yu, Guangyue Lu, Zahid Mumtaz, Wei Wei
Summary: This paper proposes an efficient timing advance update approach to maintain reliable uplink synchronization in the satellite-ground integrated vehicular network. The proposed approach achieves low signaling overhead, increased correlation length, and improved performance in terms of class distance, multi-path effect, and carrier frequency offset.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Engineering, Civil
Xinqiang Chen, Zichuang Wang, Qiaozhi Hua, Wen-Long Shang, Qiang Luo, Keping Yu
Summary: Automated container terminals are the future of the port industry, and accurate kinematic data is crucial for improving efficiency and safety. Analyzing vehicle trajectories and speeds from port surveillance videos can provide valuable information. This study proposes an ensemble framework that uses computer vision and AI techniques to extract vehicle speeds from port videos, helping participants in port traffic make more informed decisions. Experimental results show that the framework achieves accurate vehicle kinematic data in typical port traffic scenarios.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Computer Science, Cybernetics
Qiang He, Wei Qiao, Ali Kashif Bashir, Yuliang Cai, Laisen Nie, Yasser D. Al-Otaibi, Keping Yu
Summary: Rumors in the healthcare system are characterized by fast spread and severe social influence, which can lead to the collapse of medical services and the death of many patients. To prevent its serious impact on society, the objective of rumor suppression is to restrain the spread of negative opinions and maximize the spread of positive opinions.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS
(2023)
Article
Computer Science, Cybernetics
Zhiwei Guo, Dian Meng, Chinmay Chakraborty, Xing-Rong Fan, Arpit Bhardwaj, Keping Yu
Summary: In future smart cities, autonomous behavioral decision for vehicular agents supported by cyber-physical social intelligence is in demand. However, the existing works are only suitable for short-distance decision scenarios and cannot meet the challenges of long-distance decision tasks in realistic cyber-physical environments. This article proposes an autonomous behavioral decision framework using social intelligence and an iterative search algorithm to find optimal solutions. Simulation models demonstrate the effectiveness of the proposed method, which is compared with a universal optimization search algorithm.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS
(2023)
Article
Computer Science, Cybernetics
Zhangyi Shen, Feng Ding, Ye Yao, Arpit Bhardwaj, Zhiwei Guo, Keping Yu
Summary: Currently, there is a general demand for health management driven by intelligent means in social systems. Researchers have mainly focused on improving the performance of intelligent algorithms, which are mostly based on the central computing mode. However, this poses a threat to personal privacy. To address this challenge, this work proposes a privacy-preserving social computing framework using federated learning, where user data are stored in different terminals to prevent exposure. The proposed approach shows promising overall performance according to experiments conducted on a real-world dataset.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS
(2023)
Article
Engineering, Civil
Tingting Yang, Zhengqi Cui, Asma Hassan Alshehri, Miao Wang, Kun Gao, Keping Yu
Summary: This article introduces an IoT-enabled maritime transport communication system that addresses network security and reliability issues using blockchain technology, while also improving energy efficiency and performance through edge computing.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Computer Science, Hardware & Architecture
Mengqi Feng, Chao Lin, Wei Wu, Debiao He
Summary: Digital signature provides resistance against information tampering and identity impersonation, but lacks specific anonymity requirement for scenarios such as voting and whistle-blowing. Ring signature was introduced for achieving anonymity, but existing schemes face size limitations. In this paper, a novel construction paradigm called DualRing is proposed for logarithmic-sized ring signature. The SM2 digital signature is transformed into Type-T and integrated with DualRing technology, proving unforgeability and anonymity. Optimized and linkable schemes are proposed, and the performance in communication and computation costs are demonstrated.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
B. Meenakshi, D. Karunkuzhali
Summary: Wireless Sensor Network (WSN) is a crucial component of the cyber physical system, consisting of fixed or moving sensors that collectively sense, gather, analyze, and transfer data of detected objects. Intrusion detection schemes in WSNs often suffer from poor identification rate, high computation overhead, and higher false alarm rate. This study proposes an innovative approach that combines advanced techniques such as self-attention, provisional learning, and generative adversarial networks to improve security and adaptability in WSNs.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Jose Luis de la Vara, Hector Bahamonde, Clara Ayora
Summary: Most safety-critical systems undergo rigorous assurance processes to ensure dependability, often in compliance with standards like DO-178C for aerospace software. However, following these standards can be challenging due to issues in their text, such as imprecision and ambiguity. This study introduces an approach using RQA - Quality Studio for evaluating the text quality of safety standards, identifying common issues like passive voice and imprecise modal verbs in DO-178C.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Ruben Grande, Aurora Vizcaino, Felix O. Garcia
Summary: The adoption of DevOps in global and distributed settings can bring several advantages to software companies, but it also presents challenges that need to be overcome.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Haibo Tian, Yanchuan Wen, Fangguo Zhang, Yunfeng Shao, Bingshuai Li
Summary: In this paper, a lattice-based distributed threshold additive homomorphic encryption (DTAHE) scheme is proposed and its applications in federated learning are demonstrated. The DTAHE scheme saves communication bandwidth compared to other lattice-based DTAHE schemes. Two secure aggregation protocols are obtained when embedding the scheme into federated learning, one against semi-honest adversary and the other against active adversary using a smart contract in a ledger.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
Summary: This paper investigates a specific family of enhanced substitution boxes for the Advanced Encryption Standard. These modified S-boxes have the maximal periodicity property, with each input having the maximum orbit length of 256. The parameters for achieving this maximal periodicity property are completely determined. The new enhanced S-boxes also exhibit improved bit avalanche property.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Lifei Wei, Jihai Liu, Lei Zhang, Qin Wang, Wuji Zhang, Xiansong Qian
Summary: Private set intersection (PSI) is widely studied for preserving privacy in collaborative data analytics. However, existing multi-party PSI (MP-PSI) protocols often face performance and scalability issues when the number of participants increases. To address this, we propose two efficient MP-PSI protocols for scenarios with a large number of participants and small set size.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
A. Noorian
Summary: This paper proposes a novel personalized sequential recommendation model, BERTSeqHybrid, which utilizes Bidirectional Encoder Representations from Transformers (BERT) to improve user-user similarity model. The model also employs asymmetric schemas and topic modeling to enhance contextual data from Points of Interest (POIs). Furthermore, a novel method for evaluating user preferences utilizing explicit demographic data is proposed to solve the cold start problem. Experimental evaluation demonstrates the superiority of the developed methodology in terms of RMSE, F-Score, MAP, and NDCG indexes on two different datasets (Yelp and Flickr).
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Amjad Rehman, Ibrahim Abunadi, Khalid Haseeb, Tanzila Saba, Jaime Lloret
Summary: Artificial intelligence (AI) is experiencing significant growth in the areas of smart cities, agriculture, food management, and weather forecasting, primarily due to the limitations of computing power on sensing devices. The integration of AI with IoT and ubiquitous sensors has led to improvements in the agricultural sector and reduced management costs. However, optimizing resource management and data load for forwarding nodes near edge boundaries remains a challenging issue due to limited wireless technology resources.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Leixiao Cheng, Jing Qin, Fei Meng
Summary: This paper analyzes the vulnerability of existing CLPASE schemes to frequency analysis, which compromises user's search privacy. A concrete CLPASE scheme against frequency analysis is proposed, which provides higher guarantee for user's search privacy with comparable efficiency compared to previous schemes.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen
Summary: Deniable encryption (DE) allows private communication even when adversaries force participants to reveal their secret keys. However, existing DE systems do not consider potential abuse by malicious users. This paper proposes an abuse-resistant DE scheme and provides formal definitions and security analysis. The proposed scheme outperforms existing work in terms of functionality and ciphertext rate.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Xiaoyi Yang, Yanqi Zhao, Sufang Zhou, Lianhai Wang
Summary: This paper proposes a lightweight delegated PSI-CA protocol based on multi-point oblivious pseudorandom function and collision-resistant hash function, and utilizes it to build a privacy-preserving contact tracing system. Experimental results show that our system is more practical and advantageous for densely populated areas.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Kaifeng Xiao, Xinjian Chen, Jianye Huang, Hongbo Li, Qiong Huang
Summary: Ordinary encryption techniques cannot meet the needs of comparing, sharing, and classifying data hidden in ciphertexts in the face of growing threats to data security. The advent of the quantum computing era has brought unprecedented challenges to traditional cryptography. Fortunately, a lattice-based PKEET scheme can solve these problems by providing satisfying anti-quantum computing security and resisting OMRA attacks. This paper presents a lattice-based PKE-DET scheme that supports delegated tester function and demonstrates security under the LWE hardness assumption in the standard model. The scheme offers advantages such as high security, delegated tester authorization, and small storage space compared to existing schemes.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang
Summary: This paper introduces public key encryption with equality test (PKEET) and identity-based encryption with equality test (IBEET) to address the problem of determining whether two ciphertexts contain the same message encrypted with different public keys, without decryption. The proposed IBEET scheme resists offline message recovery attacks (OMRA) and does not require the dual-tester setting or group mechanism. Security is demonstrated through mathematical assumptions, and experiment results show the efficiency of the scheme. From a usability perspective, the paper explains why the scheme is more suitable for healthcare social Apps compared to other OMRA-resistant schemes.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Kuan-Ching Li
Summary: Stablecoins have facilitated the growth of decentralized payments and the emergence of a new generation of payment systems using cryptocurrencies and Blockchain technology. However, the existing research lacks a comprehensive overview of Stablecoins that focuses on their full context, stabilization mechanisms, and payment applicability. This paper provides a thorough summary of the definition, current state, and ecosystem of Stablecoins. It discusses the system structure, stability mechanisms, and their applicability in payment scenarios. The study identifies asset-backed Stablecoins as the most efficient and widely used, while cryptocurrency-backed Stablecoins are more balanced in relation to the original concept. Algorithm-backed Stablecoins show significant potential for development but are hesitant due to the lack of collateral or deposit reserves, making them prone to collapse. The paper concludes by presenting possible future trends for Stablecoins.
COMPUTER STANDARDS & INTERFACES
(2024)