{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:14:12Z","timestamp":1774538052132,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030602475","type":"print"},{"value":"9783030602482","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60248-2_45","type":"book-chapter","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T09:03:14Z","timestamp":1601370194000},"page":"654-662","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Digital Currency Investment Strategy Framework Based on Ranking"],"prefix":"10.1007","author":[{"given":"Chuangchuang","family":"Dai","sequence":"first","affiliation":[]},{"given":"Xueying","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Meikang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Xiaobing","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Zhonghua","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Beifang","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"45_CR1","unstructured":"Long, B.: Political economy analysis of global digital currency competition: public digital RMB DC\/EP and private digital dollar Libra. J. Northeast Univ. Financ. Econ. 1\u201320 (2020). \n                    http:\/\/kns.cnki.net\/kcms\/detail\/21.1414.F.20200708.1137.002.html"},{"key":"45_CR2","unstructured":"Song, W.: Research on digital currency portfolio strategy. Nanjing University of Information Technology (2019)"},{"key":"45_CR3","unstructured":"Wu, C.: GBR and other six regression models to study the multi factor arbitrage of digital currency. Huazhong University of Science and Technology (2019)"},{"key":"45_CR4","unstructured":"Su, C.: Research on the application of multi factor model in digital money market. University of Electronic Science and Technology (2019)"},{"key":"45_CR5","unstructured":"Fu, S., Xu, H., Li, P., Ma, T.: Research on anonymity of digital currency. Acta Sinica Sinica 42(5), 1045\u20131062"},{"key":"45_CR6","unstructured":"Chaum, D.L.: Blind signatures for untraceable payments. In: International Cryptology Conference (2008)"},{"key":"45_CR7","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.ins.2019.04.011","volume":"491","author":"Z Tian","year":"2019","unstructured":"Tian, Z., Li, M., Qiu, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151\u2013165 (2019)","journal-title":"Inf. Sci."},{"key":"45_CR8","volume-title":"Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction","author":"A Narayanan","year":"2016","unstructured":"Narayanan, A., Bonneau, J., Felten, E.W.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016)"},{"key":"45_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-46766-1_27","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201991","author":"T Okamoto","year":"1992","unstructured":"Okamoto, T., Ohta, K.: Universal electronic cash. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 324\u2013337. Springer, Heidelberg (1992). \n                    https:\/\/doi.org\/10.1007\/3-540-46766-1_27"},{"issue":"10","key":"45_CR10","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.sysarc.2012.07.001","volume":"58","author":"M Qiu","year":"2012","unstructured":"Qiu, M., Ming, Z., Li, J., Liu, S., Wang, B., Lu, Z.: Three-phase time-aware energy minimization with DVFS and unrolling for chip multiprocessors. J. Syst. Archit. 58(10), 439\u2013445 (2012)","journal-title":"J. Syst. Archit."},{"key":"45_CR11","unstructured":"Zhang, N.: Research on e-cash payment system and its key technologies. Information Engineering University of PLA (2005)"},{"key":"45_CR12","unstructured":"Zwirlein, T.J., Reddy, V.K., Doyle, B.: Follow the winner: periodic investing strategies. J. Financ. Plann. 8(4) (1995)"},{"issue":"1","key":"45_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.11648\/j.ajtab.20190501.11","volume":"5","author":"T Jeong","year":"2019","unstructured":"Jeong, T., Kim, K.: Effectiveness of F-SCORE on the loser following online portfolio strategy in the Korean value stocks portfolio. Am. J. Theoret. Appl. Bus. 5(1), 1\u201313 (2019)","journal-title":"Am. J. Theoret. Appl. Bus."},{"issue":"4","key":"45_CR14","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1109\/TETC.2015.2398824","volume":"3","author":"M Qiu","year":"2015","unstructured":"Qiu, M., et al.: Data allocation for hybrid memory with genetic algorithm. IEEE Trans. Emerg. Top. Comput. 3(4), 544\u2013554 (2015)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"45_CR15","unstructured":"Finn, C., Abbeel, P., Levine, S.: Model-agnostic meta-learning for fast adaptation of deep networks. arXiv preprint \n                    arXiv:1703.03400\n                    \n                   (2017)"},{"issue":"1","key":"45_CR16","first-page":"77","volume":"7","author":"H Markowitz","year":"1952","unstructured":"Markowitz, H.: Portfolio selection. J. Financ. 7(1), 77\u201391 (1952)","journal-title":"J. Financ."},{"key":"45_CR17","unstructured":"Xu, X., He, F.: Interval quadratic programming of portfolio without short selling. China Manage. Sci. (3), 57\u201362 (2012)"},{"issue":"1","key":"45_CR18","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s11771-016-3061-9","volume":"23","author":"SM Seyedhosseini","year":"2016","unstructured":"Seyedhosseini, S.M., Esfahani, M.J., Ghaffari, M.: A novel hybrid algorithm based on a harmony search and artificial bee colony for solving a portfolio optimization problem using a mean-semi variance approach. J. Central South Univ. 23(1), 181\u2013188 (2016)","journal-title":"J. Central South Univ."},{"key":"45_CR19","first-page":"44","volume":"2","author":"J Zhao","year":"2015","unstructured":"Zhao, J., Yang, Y., Zhao, L.: Research on portfolio problem based on improved factor analysis. Pract. Underst. Math. 2, 44\u201349 (2015)","journal-title":"Pract. Underst. Math."},{"key":"45_CR20","unstructured":"Gu, R.: A series of risk portfolio models with multiple indexes and its application. Yunnan University of Finance and Economics (2020)"},{"issue":"4","key":"45_CR21","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TC.2006.59","volume":"55","author":"Z Shao","year":"2006","unstructured":"Shao, Z., Xue, C., Zhuge, Q., Qiu, M., Xiao, B., Sha, E.H.M.: Security protection and checking for embedded system integration against buffer overflow attacks via hardware\/software. IEEE Trans. Comput. 55(4), 443\u2013453 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"45_CR22","unstructured":"Xue, H.: Research on multi factor stock selection strategy based on Shanghai and Shenzhen 300 component stocks. Hebei University of Economics and Trade (2020)"},{"key":"45_CR23","first-page":"81","volume":"20","author":"D Jiao","year":"2018","unstructured":"Jiao, D.: Research on fund performance evaluation based on improved sharp ratio. Financ. Econ. 20, 81\u201383 (2018)","journal-title":"Financ. Econ."},{"key":"45_CR24","volume-title":"Value at Risk: The New Benchmark for Controlling Market Risk","author":"P Jorion","year":"1997","unstructured":"Jorion, P.: Value at Risk: The New Benchmark for Controlling Market Risk. Irwin Professional Publishing, Chicago (1997)"},{"issue":"01","key":"45_CR25","first-page":"1","volume":"21","author":"Z Kang","year":"2017","unstructured":"Kang, Z., Li, Z.: CVaR robust mean CVaR portfolio model and its solution. J. Oper. Res. 21(01), 1\u201312 (2017)","journal-title":"J. Oper. Res."},{"issue":"10","key":"45_CR26","first-page":"79","volume":"39","author":"M Chen","year":"2018","unstructured":"Chen, M., Zhao, X.: Mean var portfolio optimization based on declu algorithm. Software 39(10), 79\u201386 (2018)","journal-title":"Software"},{"issue":"02","key":"45_CR27","first-page":"82","volume":"25","author":"X Song","year":"2012","unstructured":"Song, X., Han, L.: Research on currency allocation of foreign exchange reserve based on mean CVaR model. J. Beijing Univ. Aeronautics Astronaut. (Soc. Sci. Ed.) 25(02), 82\u201387 (2012)","journal-title":"J. Beijing Univ. Aeronautics Astronaut. (Soc. Sci. Ed.)"},{"key":"45_CR28","unstructured":"Lu, D.: Portfolio strategy analysis based on mean crvar model. Shandong University of Finance and Economics (2018)"},{"key":"45_CR29","doi-asserted-by":"crossref","unstructured":"Qiu, H., Noura, H., Qiu, M.: A user-centric data protection method for cloud storage based on invertible DWT. IEEE Trans. Cloud Comput. 1\u20131 (2019)","DOI":"10.1109\/TCC.2019.2911679"},{"key":"45_CR30","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Zhao, H.: Security-aware efficient mass distributed storage approach for cloud systems in big data. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS). IEEE, pp. 140\u2013145 (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.68"},{"issue":"1","key":"45_CR31","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11265-006-0002-0","volume":"46","author":"M Qiu","year":"2007","unstructured":"Qiu, M., Xue, C., Sha, H.M., et al.: Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. J. VLSI Sig. Proc. 46(1), 55\u201373 (2007)","journal-title":"J. VLSI Sig. Proc."},{"key":"45_CR32","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Zhao, H.: Privacy-preserving data encryption strategy for big data in mobile cloud computing. IEEE Trans. Big Data 1\u20131 (2017)","DOI":"10.1109\/TBDATA.2017.2705807"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60248-2_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T11:04:13Z","timestamp":1601636653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-60248-2_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030602475","9783030602482"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60248-2_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/ica3pp2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"495","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"142","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"305","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}