{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:52:42Z","timestamp":1762509162557,"version":"3.37.3"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272028"],"award-info":[{"award-number":["62272028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1109\/tsc.2024.3428329","type":"journal-article","created":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T18:11:29Z","timestamp":1721067089000},"page":"2488-2501","source":"Crossref","is-referenced-by-count":1,"title":["Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-Like Blockchains? Quantitative Analysis"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5630-9910","authenticated-orcid":false,"given":"Haoran","family":"Zhu","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2975-8857","authenticated-orcid":false,"given":"Xiaolin","family":"Chang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1251-3730","authenticated-orcid":false,"given":"Jelena","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[{"name":"Toronto Metropolitan University, Toronto, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7760-9920","authenticated-orcid":false,"given":"Vojislav B.","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[{"name":"Toronto Metropolitan University, Toronto, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5021-6469","authenticated-orcid":false,"given":"Lei","family":"Han","sequence":"additional","affiliation":[{"name":"Beijing Institute of Computer Technology and Application, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0311-6493","authenticated-orcid":false,"given":"Zhi","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing Institute of Computer Technology and Application, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"21260","article-title":"Bitcoin: A peer-to-peer electronic cash system","volume":"5","author":"Nakamoto","year":"2008","journal-title":"Decentralized Bus. Rev."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.12.093"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"ref8","article-title":"On the profitability of selfish mining against multiple difficulty adjustment algorithms","author":"Davidson","year":"2020","journal-title":"Cryptol. ePrint Arch."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2022.03.003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.05.051"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101956"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3073414"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3151083"},{"article-title":"On profitability of stubborn mining","year":"2018","author":"Grunspan","key":"ref14"},{"article-title":"Deep-dive analysis of selfish and stubborn mining in Bitcoin and Ethereum","year":"2021","author":"Yang","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101581"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967861"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278966"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243814"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.44"},{"issue":"37","key":"ref26","article-title":"A next-generation smart contract and decentralized application platform","volume":"3","author":"Buterin","year":"2014","journal-title":"White Paper"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013943"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/9781316163047"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2989215"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-022-01360-1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623588"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134019"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4629386\/10709786\/10598387.pdf?arnumber=10598387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T17:53:40Z","timestamp":1728496420000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10598387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":27,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2024.3428329","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"type":"electronic","value":"1939-1374"},{"type":"electronic","value":"2372-0204"}],"subject":[],"published":{"date-parts":[[2024,9]]}}}