{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:19:21Z","timestamp":1740122361555,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T00:00:00Z","timestamp":1664496000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T00:00:00Z","timestamp":1664496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71932002"],"award-info":[{"award-number":["71932002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10878-022-00910-w","type":"journal-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T02:03:26Z","timestamp":1664503406000},"page":"3663-3700","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Optimal dynamic mining policy of blockchain selfish mining through sensitivity-based optimization"],"prefix":"10.1007","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0396-1232","authenticated-orcid":false,"given":"Jing-Yu","family":"Ma","sequence":"first","affiliation":[]},{"given":"Quan-Lin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,30]]},"reference":[{"key":"910_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-69082-7","volume-title":"Stochastic learning and optimization\u2013a sensitivity-based approach","author":"XR Cao","year":"2007","unstructured":"Cao XR (2007) Stochastic learning and optimization\u2013a sensitivity-based approach. Springer, New York"},{"doi-asserted-by":"crossref","unstructured":"Carlsten M, Kalodner HA, Weinberg SM, et al. (2016) On the instability of bitcoin without the block reward. In: ACM SIGSAC conference on computer and communications security. Association for Computing Machinery, New York pp 154\u2013167","key":"910_CR2","DOI":"10.1145\/2976749.2978408"},{"issue":"1327","key":"910_CR3","first-page":"1","volume":"2019","author":"D Chang","year":"2019","unstructured":"Chang D, Hasan M, Jain P (2019) Spy based analysis of selfish mining attack on multi-stage blockchain. IACR Cryptol ePrint 2019(1327):1\u201334","journal-title":"IACR Cryptol ePrint"},{"doi-asserted-by":"crossref","unstructured":"Eyal I, Sirer EG (2014) Majority is not enough: bitcoin mining is vulnerable. International conference on financial cryptography and data security. Springer, Berlin pp 436\u2013454","key":"910_CR4","DOI":"10.1007\/978-3-662-45472-5_28"},{"issue":"2","key":"910_CR5","doi-asserted-by":"publisher","first-page":"160","DOI":"10.34306\/att.v2i2.97","volume":"2","author":"Z Fauziah","year":"2020","unstructured":"Fauziah Z, Latifah H, Omar X et al (2020) Application of blockchain technology in smart contracts: a systematic literature review. Aptisi Trans Technopreneurship 2(2):160\u2013166","journal-title":"Aptisi Trans Technopreneurship"},{"key":"910_CR6","first-page":"1306","volume-title":"The 39th international conference on distributed computing systems (ICDCS)","author":"C Feng","year":"2019","unstructured":"Feng C, Niu J (2019) Selfish mining in Ethereum. The 39th international conference on distributed computing systems (ICDCS). IEEE, Dallas, pp 1306\u20131316"},{"key":"910_CR7","first-page":"833","volume-title":"ACM SIGSAC conference on Computer and Communications Security","author":"S Gao","year":"2019","unstructured":"Gao S, Li Z, Peng Z et al (2019) Power adjusting and bribery racing: novel mining attacks in the bitcoin system. ACM SIGSAC conference on Computer and Communications Security. Association for Computing Machinery, New York, pp 833\u2013850"},{"key":"910_CR8","first-page":"3","volume-title":"ACM SIGSAC conference on computer and communications security","author":"A Gervais","year":"2016","unstructured":"Gervais A, Karame GO, W\u00fcst K et al (2016) On the security and performance of Proof of Work blockchains. ACM SIGSAC conference on computer and communications security. Association for Computing Machinery, New York, pp 3\u201316"},{"key":"910_CR9","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.peva.2016.07.001","volume":"104","author":"J G\u00f6bel","year":"2016","unstructured":"G\u00f6bel J, Keeler HP, Krzesinski AE et al (2016) Bitcoin blockchain dynamics: the selfish-mine strategy in the presence of propagation delay. Perform Eval 104:23\u201341","journal-title":"Perform Eval"},{"unstructured":"Jain P (2019) Revenue generation strategy through selfish mining focusing multiple mining pools. Bachelor Thesis, Computer Science & Applied Mathematics, Indraprastha Institute of Information Technology, India","key":"910_CR10"},{"key":"910_CR11","doi-asserted-by":"publisher","first-page":"45360","DOI":"10.1109\/ACCESS.2019.2902501","volume":"7","author":"JA Jaoude","year":"2019","unstructured":"Jaoude JA, Saade RG (2019) Blockchain applications\u2013Usage in different domains. IEEE Access 7:45360\u201345381","journal-title":"IEEE Access"},{"issue":"2","key":"910_CR12","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1080\/15326349.2020.1761390","volume":"36","author":"K Javier","year":"2020","unstructured":"Javier K, Fralix B (2020) A further study of some Markovian bitcoin models from G\u00f6bel et al. Stoch Models 36(2):223\u2013250","journal-title":"Stoch Models"},{"key":"910_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11492-2","volume-title":"Constructive computation in stochastic models with applications: the RG factorizations","author":"QL Li","year":"2010","unstructured":"Li QL (2010) Constructive computation in stochastic models with applications: the RG factorizations. Springer, Heidelberg"},{"key":"910_CR14","first-page":"25","volume-title":"International conference on computational social networks","author":"QL Li","year":"2018","unstructured":"Li QL, Ma JY, Chang YX (2018) Blockchain queue theory. International conference on computational social networks. Springer, Cham, pp 25\u201340"},{"issue":"1","key":"910_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40649-019-0066-1","volume":"6","author":"QL Li","year":"2019","unstructured":"Li QL, Ma JY, Chang YX et al (2019) Markov processes in blockchain systems. Comput Soc Netw 6(1):1\u201328","journal-title":"Comput Soc Netw"},{"doi-asserted-by":"crossref","unstructured":"Li QL, Li YM, Ma JY et al (2022) The optimal dynamic rationing policy in the stock-rationing queue. In: The 16th international conference on algorithmic aspects in information and management (AAIM). Springer, Guangzhou, pp 66\u201382","key":"910_CR16","DOI":"10.1007\/978-3-031-16081-3_7"},{"doi-asserted-by":"crossref","unstructured":"Li QL, Chang YX, Wu X, et al (2021) A new theoretical framework of pyramid Markov processes for blockchain selfish mining. J Syst Sci Syst Eng 1\u201345","key":"910_CR17","DOI":"10.1007\/s11518-021-5515-3"},{"doi-asserted-by":"crossref","unstructured":"Li QL, Chang YX, Zhang C (2022) Tree representation, growth rate of blockchain and reward allocation in Ethereum with multiple mining pools. IEEE Trans Netw Serv 1\u201319","key":"910_CR18","DOI":"10.1109\/TNSM.2022.3195292"},{"doi-asserted-by":"crossref","unstructured":"Ma JY, Li QL (2021) Sensitivity-based optimization for blockchain selfish mining. arXiv: 2111.07070","key":"910_CR19","DOI":"10.1007\/978-3-030-93176-6_28"},{"key":"910_CR20","first-page":"329","volume-title":"The 15th international conference on algorithmic applications in management (AAIM)","author":"JY Ma","year":"2021","unstructured":"Ma JY, Li QL (2021) Sensitivity-based optimization for blockchain selfish mining. The 15th international conference on algorithmic applications in management (AAIM). Springer, Dallas, pp 329\u2013343"},{"issue":"4","key":"910_CR21","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/s10626-019-00293-x","volume":"29","author":"JY Ma","year":"2019","unstructured":"Ma JY, Xia L, Li QL (2019) Optimal energy-efficient policies for data centers through sensitivity-based optimization. Discrete Event Dyn Syst 29(4):567\u2013606","journal-title":"Discrete Event Dyn Syst"},{"issue":"2","key":"910_CR22","doi-asserted-by":"publisher","first-page":"27","DOI":"10.3390\/systems10020027","volume":"10","author":"JY Ma","year":"2021","unstructured":"Ma JY, Li QL, Xia L (2021) Optimal asynchronous dynamic policies in energy-efficient data centers. Systems 10(2):27","journal-title":"Systems"},{"key":"910_CR23","first-page":"305","volume-title":"IEEE European symposium on security and privacy","author":"K Nayak","year":"2016","unstructured":"Nayak K, Kumar S, Miller A et al (2016) Stubborn mining: generalizing selfish mining and combining with an eclipse attack. IEEE European symposium on security and privacy. IEEE, Saarbruecken, pp 305\u2013320"},{"key":"910_CR24","volume-title":"Markov decision processes: discrete stochastic dynamic programming","author":"ML Puterman","year":"2014","unstructured":"Puterman ML (2014) Markov decision processes: discrete stochastic dynamic programming. Wiley, New York"},{"key":"910_CR25","first-page":"515","volume-title":"The 20th international conference on financial cryptography and data security","author":"A Sapirshtein","year":"2016","unstructured":"Sapirshtein A, Sompolinsky Y, Zohar A (2016) Optimal selfish mining strategies in Bitcoin. The 20th international conference on financial cryptography and data security. Springer, Berlin, pp 515\u2013532"},{"issue":"4","key":"910_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3403954","volume":"53","author":"P Sharma","year":"2020","unstructured":"Sharma P, Jindal R, Borah MD (2020) Blockchain technology for cloud storage: a systematic literature review. ACM Comput Surv 53(4):1\u201332","journal-title":"ACM Comput Surv"},{"unstructured":"W\u00fcst K (2016) Security of blockchain technologies. Master Thesis, Department of Computer Science, ETH Z\u00fcrich, Switzerland","key":"910_CR27"},{"doi-asserted-by":"crossref","unstructured":"Xia L, Zhang ZG, Li QL A (2021) $$c\/\\mu $$-rule for job assignment in heterogeneous group-server queues. Prod Oper Manag 31(3):1191\u20131215","key":"910_CR28","DOI":"10.1111\/poms.13605"},{"issue":"3","key":"910_CR29","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.ejor.2014.10.063","volume":"242","author":"L Xia","year":"2015","unstructured":"Xia L, Shihada B (2015) A Jackson network model and threshold policy for joint optimization of energy and delay in multi-hop wireless networks. Eur J Oper Res 242(3):778\u2013787","journal-title":"Eur J Oper Res"},{"issue":"12","key":"910_CR30","doi-asserted-by":"publisher","first-page":"2808","DOI":"10.1111\/poms.13252","volume":"29","author":"L Xia","year":"2020","unstructured":"Xia L (2020) Risk-sensitive Markov decision processes with combined metrics of mean and variance. Prod Oper Manag 29(12):2808\u20132827","journal-title":"Prod Oper Manag"},{"key":"910_CR31","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1145\/3419614.3423264","volume-title":"The 2nd ACM conference on advances in financial technologies","author":"RB Zur","year":"2020","unstructured":"Zur RB, Eyal I, Tamar A (2020) Efficient MDP analysis for selfish-mining in blockchains. The 2nd ACM conference on advances in financial technologies. Association for Computing Machinery, New York, pp 113\u2013131"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-022-00910-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10878-022-00910-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-022-00910-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,29]],"date-time":"2022-10-29T09:40:58Z","timestamp":1667036458000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10878-022-00910-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,30]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["910"],"URL":"https:\/\/doi.org\/10.1007\/s10878-022-00910-w","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"type":"print","value":"1382-6905"},{"type":"electronic","value":"1573-2886"}],"subject":[],"published":{"date-parts":[[2022,9,30]]},"assertion":[{"value":"15 September 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interests"}}]}}