{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:21:42Z","timestamp":1764937302631,"version":"3.37.3"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019YJS034"],"award-info":[{"award-number":["2019YJS034"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836105"],"award-info":[{"award-number":["U1836105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science and Engineering Research Council"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2021,10,1]]},"DOI":"10.1109\/tnse.2021.3103558","type":"journal-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T20:28:53Z","timestamp":1628627333000},"page":"3073-3086","source":"Crossref","is-referenced-by-count":15,"title":["On Selfholding Attack Impact on Imperfect PoW Blockchain Networks"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7577-9632","authenticated-orcid":false,"given":"Runkai","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2975-8857","authenticated-orcid":false,"given":"Xiaolin","family":"Chang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1251-3730","authenticated-orcid":false,"given":"Jelena","family":"Misic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7760-9920","authenticated-orcid":false,"given":"Vojislav","family":"Misic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9908-347X","authenticated-orcid":false,"given":"Hongyue","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2973410"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623588"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134019"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops51409.2021.9431013"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011724"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-019-00746-2"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"ref35","article-title":"Broadcasting intermediate blocks as a defense mechanism against selfish-mine in bitcoin","author":"zhang","year":"2015","journal-title":"Proc IACR Cryptol ePrint Arch"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354203"},{"key":"ref10","article-title":"Analysis of bitcoin pooled mining reward systems","author":"rosenfeld","year":"2011","journal-title":"CoRR"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013943"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101584"},{"article-title":"Stochastic modeling approaches for analyzing blockchain: A survey","year":"0","author":"kang","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975999"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3004273"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2016.07.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761240"},{"year":"0","key":"ref19"},{"article-title":"On subversive miner strategies and block withholding attack in bitcoin digital currency","year":"0","author":"courtois","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3038943"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_5"},{"year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101581"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45871-7_11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00131"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3073414"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101956"},{"year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09368-6"},{"year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3050034"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00013"},{"year":"0","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"year":"0","key":"ref41"},{"key":"ref23","first-page":"515","article-title":"Optimal selfish mining strategies in bitcoin","author":"sapirshtein","year":"2016","journal-title":"Proc Int Conf Financial Cryptogr Data Secur"},{"year":"0","key":"ref44"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"year":"0","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/int.22375"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/9644929\/09511236.pdf?arnumber=9511236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:34Z","timestamp":1652194414000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9511236\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":44,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2021.3103558","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"type":"electronic","value":"2327-4697"},{"type":"electronic","value":"2334-329X"}],"subject":[],"published":{"date-parts":[[2021,10,1]]}}}