{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:44:37Z","timestamp":1775011477582,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T00:00:00Z","timestamp":1597622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Natural Science Foundation of Guangdong","award":["2018A030313005"],"award-info":[{"award-number":["2018A030313005"]}]},{"name":"the National Key Research and Development Plan","award":["2018YFB1003803"],"award-info":[{"award-number":["2018YFB1003803"]}]},{"name":"the National Natural Science Foundation of China","award":["61802450"],"award-info":[{"award-number":["61802450"]}]},{"name":"the Program for Guangdong Introducing Innovative and Entrepreneurial Teams","award":["2017ZT07X355"],"award-info":[{"award-number":["2017ZT07X355"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,17]]},"DOI":"10.1145\/3404397.3404460","type":"proceedings-article","created":{"date-parts":[[2020,8,9]],"date-time":"2020-08-09T03:54:26Z","timestamp":1596945266000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":63,"title":["SkyChain: A Deep Reinforcement Learning-Empowered Dynamic Blockchain Sharding System"],"prefix":"10.1145","author":[{"given":"Jianting","family":"Zhang","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Zicong","family":"Hong","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Xiaoyu","family":"Qiu","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Yufeng","family":"Zhan","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, China"}]},{"given":"Song","family":"Guo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, China"}]},{"given":"Wuhui","family":"Chen","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]}],"member":"320","published-online":{"date-parts":[[2020,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319889"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_1_6_1","volume-title":"Majority Is Not Enough: Bitcoin Mining Is Vulnerable","author":"Eyal Ittay","unstructured":"Ittay Eyal and Emin\u00a0G\u00fcn Sirer . 2014. Majority Is Not Enough: Bitcoin Mining Is Vulnerable . In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 436\u2013454. Ittay Eyal and Emin\u00a0G\u00fcn Sirer. 2014. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 436\u2013454."},{"key":"e_1_3_2_1_7_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kogias Eleftherios\u00a0Kokoris","year":"2016","unstructured":"Eleftherios\u00a0Kokoris Kogias , Philipp Jovanovic , Nicolas Gailly , Ismail Khoffi , Linus Gasser , and Bryan Ford . 2016 . Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 279\u2013296. Eleftherios\u00a0Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 279\u2013296."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0347-x"},{"key":"e_1_3_2_1_10_1","unstructured":"Timothy\u00a0P Lillicrap Jonathan\u00a0J Hunt Alexander Pritzel Nicolas Heess Tom Erez Yuval Tassa David Silver and Daan Wierstra. 2015. Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971(2015).  Timothy\u00a0P Lillicrap Jonathan\u00a0J Hunt Alexander Pritzel Nicolas Heess Tom Erez Yuval Tassa David Silver and Daan Wierstra. 2015. Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971(2015)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"e_1_3_2_1_12_1","volume-title":"Human-level control through deep reinforcement learning. Nature 518, 7540","author":"Mnih Volodymyr","year":"2015","unstructured":"Volodymyr Mnih , Koray Kavukcuoglu , David Silver , Andrei\u00a0 A Rusu , Joel Veness , Marc\u00a0 G Bellemare , Alex Graves , Martin Riedmiller , Andreas\u00a0 K Fidjeland , Georg Ostrovski , 2015. Human-level control through deep reinforcement learning. Nature 518, 7540 ( 2015 ), 529. Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei\u00a0A Rusu, Joel Veness, Marc\u00a0G Bellemare, Alex Graves, Martin Riedmiller, Andreas\u00a0K Fidjeland, Georg Ostrovski, 2015. Human-level control through deep reinforcement learning. Nature 518, 7540 (2015), 529."},{"key":"e_1_3_2_1_13_1","unstructured":"Satoshi Nakamoto 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).  Satoshi Nakamoto 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_14_1","volume-title":"Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004. 259\u2013268","author":"Newsome J.","year":"2004","unstructured":"J. Newsome , E. Shi , D. Song , and A. Perrig . 2004. The Sybil attack in sensor networks: analysis defenses . In Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004. 259\u2013268 . https:\/\/doi.org\/10.1109\/IPSN. 2004 .239019 10.1109\/IPSN.2004.239019 J. Newsome, E. Shi, D. Song, and A. Perrig. 2004. The Sybil attack in sensor networks: analysis defenses. In Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004. 259\u2013268. https:\/\/doi.org\/10.1109\/IPSN.2004.239019"},{"key":"e_1_3_2_1_15_1","volume-title":"OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 525\u2013535","author":"Nguyen N","year":"2019","unstructured":"Lan\u00a0 N Nguyen , Truc\u00a0 DT Nguyen , Thang\u00a0 N Dinh , and My\u00a0 T Thai . 2019 . OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 525\u2013535 . Lan\u00a0N Nguyen, Truc\u00a0DT Nguyen, Thang\u00a0N Dinh, and My\u00a0T Thai. 2019. OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 525\u2013535."},{"key":"e_1_3_2_1_16_1","volume-title":"31st International Symposium on Distributed Computing (DISC","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi . 2017 . Hybrid consensus: Efficient consensus in the permissionless model . In 31st International Symposium on Distributed Computing (DISC 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Rafael Pass and Elaine Shi. 2017. Hybrid consensus: Efficient consensus in the permissionless model. In 31st International Symposium on Distributed Computing (DISC 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2146382.2146389"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355457"},{"key":"e_1_3_2_1_19_1","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Wang Jiaping","year":"2019","unstructured":"Jiaping Wang and Hao Wang . 2019 . Monoxide: Scale out Blockchains with Asynchronous Consensus Zones . In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) . USENIX Association, Boston, MA, 95\u2013112. Jiaping Wang and Hao Wang. 2019. Monoxide: Scale out Blockchains with Asynchronous Consensus Zones. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). USENIX Association, Boston, MA, 95\u2013112."},{"key":"e_1_3_2_1_20_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 , 2014 (2014), 1\u201332. Gavin Wood 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1\u201332."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"}],"event":{"name":"ICPP '20: 49th International Conference on Parallel Processing","location":"Edmonton AB Canada","acronym":"ICPP '20"},"container-title":["49th International Conference on Parallel Processing - ICPP"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404397.3404460","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404397.3404460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:43Z","timestamp":1750195903000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404397.3404460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,17]]},"references-count":21,"alternative-id":["10.1145\/3404397.3404460","10.1145\/3404397"],"URL":"https:\/\/doi.org\/10.1145\/3404397.3404460","relation":{},"subject":[],"published":{"date-parts":[[2020,8,17]]},"assertion":[{"value":"2020-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}