{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:02:58Z","timestamp":1774990978175,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB2704700"],"award-info":[{"award-number":["2023YFB2704700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472276"],"award-info":[{"award-number":["62472276"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010098","name":"Shanghai Committee of Science and Technology, China","doi-asserted-by":"publisher","award":["23511101000"],"award-info":[{"award-number":["23511101000"]}],"id":[{"id":"10.13039\/100010098","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010098","name":"Shanghai Committee of Science and Technology, China","doi-asserted-by":"publisher","award":["24BC3200400"],"award-info":[{"award-number":["24BC3200400"]}],"id":[{"id":"10.13039\/100010098","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tce.2025.3648529","type":"journal-article","created":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T18:26:00Z","timestamp":1766687160000},"page":"1974-1981","source":"Crossref","is-referenced-by-count":0,"title":["Collapsing the Miner\u2019s Dilemma: A Novel Attack Forging Incentive-Compatible Coalitions via Algorithmic Bribery"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5915-7410","authenticated-orcid":false,"given":"Tianzhu","family":"Han","sequence":"first","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Chuhua","family":"Lin","sequence":"additional","affiliation":[{"name":"CNOOC Information Technology Company Ltd., Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3100-0534","authenticated-orcid":false,"given":"Jiashui","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Yaoguang","family":"Chen","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8524-9070","authenticated-orcid":false,"given":"Junjie","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Na","family":"Ruan","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3273222"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3319544"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3223370"},{"key":"ref4","volume-title":"Bitcoin","year":"2024"},{"key":"ref5","volume-title":"Bitcoin: A Peer-to-peer Electronic Cash System","author":"Nakamoto","year":"2008"},{"key":"ref6","volume-title":"Bitinfocharts","year":"2024"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_28"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"ref9","article-title":"On subversive miner strategies and block withholding attack in Bitcoin digital currency","author":"Courtois","year":"2014","journal-title":"arXiv:1402.1718"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354203"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"ref13","first-page":"1","article-title":"BM-PAW: A profitable mining attack in the pow-based Blockchain system","volume-title":"Proc. Int. Conf. Blockchain, Artif. Intell., Trustworthy Syst.","author":"Hu"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/int.22428"},{"key":"ref16","article-title":"Timestamp manipulation: Timestamp-based Nakamoto-style blockchains are vulnerable","author":"Hu","year":"2025","journal-title":"arXiv:2505.05328"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/int.22656"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.34"},{"key":"ref19","article-title":"Larger scale offers better security in the nakamoto-style blockchain","author":"Hu","year":"2025","journal-title":"arXiv:2509.05708"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623588"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22832-2_2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3594185"},{"key":"ref26","first-page":"19","article-title":"Why buy when you can rent? bribery attacks on Bitcoin-style consensus","volume-title":"Proc. Int. Conf. Financial Cryptogr. Data Secur.","author":"Bonneau"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8_1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/int.22270"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567983"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/int.22282"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670330"},{"key":"ref33","volume-title":"Antpool","year":"2024"},{"key":"ref34","volume-title":"Poolin","year":"2024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_24"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68711-7_2"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1155\/2024\/9998126"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2025.3605826"},{"key":"ref39","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","volume-title":"Proc. 13th USENIX Symp. Networked Syst. Design Implement.","author":"Eyal"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"ref43","article-title":"A next-generation smart contract and decentralized application platform","author":"Buterin","year":"2014"},{"key":"ref44","first-page":"910","article-title":"Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges","volume-title":"Proc. IEEE Symp. Secur. Privacy (S&P)","author":"Daian"},{"key":"ref45","volume-title":"The Flashbots Team: Flashbots: Frontrunning the MEV Crisis","year":"2025"},{"key":"ref46","volume-title":"Proposer\/Block Builder Separation-Friendly Fee Market Designs","author":"Buterin","year":"2025"},{"key":"ref47","first-page":"1","article-title":"The economics of Bitcoin mining, or Bitcoin in the presence of adversaries","volume-title":"Proc. Workshop Econ. Inf. Secur.","author":"Kroll"},{"key":"ref48","volume-title":"GHash Commits To 40% Hashrate Cap At Bitcoin Mining Summit","year":"2014"},{"key":"ref49","volume-title":"The Blockchain Data Platform","year":"2025"},{"key":"ref50","volume-title":"On-Chain Market Intelligence","year":"2025"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11456295\/11316192.pdf?arnumber=11316192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T19:52:42Z","timestamp":1774986762000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11316192\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":50,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tce.2025.3648529","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}