{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T19:08:57Z","timestamp":1768072137368,"version":"3.49.0"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2018YFC0830804"],"award-info":[{"award-number":["2018YFC0830804"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"2018 Industrial Internet Innovation and Development Project of the MIIT of China","award":["IIIDP-9.1-2018"],"award-info":[{"award-number":["IIIDP-9.1-2018"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972018"],"award-info":[{"award-number":["61972018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932014"],"award-info":[{"award-number":["61932014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2967861","type":"journal-article","created":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T12:32:14Z","timestamp":1579609934000},"page":"17489-17499","source":"Crossref","is-referenced-by-count":38,"title":["An Evaluation of Uncle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined With an Eclipse Attack"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6129-3260","authenticated-orcid":false,"given":"Yizhong","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0794-9932","authenticated-orcid":false,"given":"Yiming","family":"Hei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0135-7226","authenticated-orcid":false,"given":"Tongge","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2965-3518","authenticated-orcid":false,"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"buterin","year":"2016","journal-title":"Eip-100 Change difficulty adjustment to target mean block time including uncles"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00013"},{"key":"ref12","author":"w\u00fcst","year":"2016","journal-title":"Ethereum eclipse attacks"},{"key":"ref13","first-page":"236","author":"marcus","year":"2018","journal-title":"Low-resource eclipse attacks on ethereum's peer-to-peer network"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229022"},{"key":"ref15","first-page":"106","article-title":"On scaling decentralized blockchains&#x2014;(A position paper)","author":"croman","year":"2016","journal-title":"Proc of Financial Cryptograpy and Data Security (FC)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/978-3-662-47854-7_33","article-title":"Inclusive block chain protocols","author":"lewenberg","year":"2015","journal-title":"Proc 16th Int Conf Financial Cryptogr Data Secur (FC)"},{"key":"ref18","article-title":"Accelerating bitcoin&#x2019;s transaction processing. Fast money grows on trees, not chains","author":"sompolinsky","year":"2013"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/978-3-662-47854-7_32","article-title":"Secure high-rate transaction processing in bitcoin","author":"sompolinsky","year":"2015","journal-title":"Proc 16th Int Conf Financial Cryptogr Data Secur (FC)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref5","first-page":"129","article-title":"Eclipse attacks on bitcoin&#x2019;s peer-to-peer network","author":"heilman","year":"2015","journal-title":"Proc 27th USENIX Secur Symp USENIX Secur"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21548-4_18"},{"key":"ref7","first-page":"164","article-title":"A survey of attacks on Ethereum smart contracts (SoK)","author":"atzei","year":"2017","journal-title":"Proc 6th Int Conf Princ Secur Trust (POST) Held as Part Eur Joint Conf Theory Pract Softw (ETAPS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECOS.2017.8167115"},{"key":"ref9","author":"lerner","year":"2016","journal-title":"Uncle mining an ethereum consensus protocol flaw"},{"key":"ref1","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/322374.322380"},{"key":"ref22","first-page":"357","article-title":"Ouroboros: A provably secure proof-of-stake blockchain protocol","author":"kiayias","year":"2017","journal-title":"Proc 37th Annu Int Cryptol Conf (CRYPTO)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1978.231496"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799854"},{"key":"ref23","author":"buterin","year":"2017","journal-title":"Casper the Friendly Finality Gadget"},{"key":"ref25","year":"2018","journal-title":"Ethereum Charts & Statistics"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08963680.pdf?arnumber=8963680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T10:53:32Z","timestamp":1643280812000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8963680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2967861","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}