{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:30Z","timestamp":1750220070711,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T00:00:00Z","timestamp":1667433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,3]]},"DOI":"10.1145\/3571662.3571680","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T15:47:52Z","timestamp":1672760872000},"page":"112-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting and Punishing Mute Nodes in Shard-Based Permissionless Blockchains"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7194-1949","authenticated-orcid":false,"given":"Mufei","family":"Qiu","sequence":"first","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876,China; School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing 100876, China; National Engineering Research Center for Mobile Internet Security Technology,Beijing University of Posts and Telecommunications, Beijing 100876, China., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5916-3523","authenticated-orcid":false,"given":"Tianyu","family":"Kang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876,China; School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing 100876, China; National Engineering Research Center for Mobile Internet Security Technology,Beijing University of Posts and Telecommunications, Beijing 100876, China., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9723-3294","authenticated-orcid":false,"given":"Li","family":"Guo","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876,China; School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing 100876, China; National Engineering Research Center for Mobile Internet Security Technology,Beijing University of Posts and Telecommunications, Beijing 100876, China., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9005-7702","authenticated-orcid":false,"given":"Wenwei","family":"Huang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876,China; School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing 100876, China; National Engineering Research Center for Mobile Internet Security Technology,Beijing University of Posts and Telecommunications, Beijing 100876, China., China"}]}],"member":"320","published-online":{"date-parts":[[2023,1,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2009","unstructured":"S. Nakamoto , \u201c Bitcoin: A peer-to-peer electronic cash system ,\u201d bit-coin.org, 2009 . S. Nakamoto, \u201cBitcoin: A peer-to-peer electronic cash system,\u201d bit-coin.org, 2009."},{"volume-title":"Ethereum project","year":"2018","unstructured":"\u201c Ethereum project .\u201d https:\/\/ethereum.org\/, July 2018 . \u201cEthereum project.\u201d https:\/\/ethereum.org\/, July 2018.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.5555\/296806.296824"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_5_1","volume-title":"Consensus System[J]. arXiv","author":"Hanke T","year":"2018","unstructured":"Hanke T , Movahedi M , Williams D . DFINITY Technology Overview Series , Consensus System[J]. arXiv , 2018 . Hanke T , Movahedi M , Williams D . DFINITY Technology Overview Series, Consensus System[J]. arXiv, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/SP.2018.000-5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/3243734.3243853"},{"key":"e_1_3_2_1_8_1","volume-title":"Ethereum Sharding FAQ. Accessed","author":"Buterin V.","year":"2019","unstructured":"V. Buterin . (Apr. 2019). Ethereum Sharding FAQ. Accessed : Aug. 1, 2019 . [Online]. Available: https:\/\/github.com\/ethereum\/wiki\/wiki\/Sharding-FAQ. V. Buterin. (Apr. 2019). Ethereum Sharding FAQ. Accessed: Aug. 1, 2019. [Online]. Available: https:\/\/github.com\/ethereum\/wiki\/wiki\/Sharding-FAQ."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/ACCESS.2018.2884764"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_11_1","volume-title":"Proof of Reputation: A Reputation-Based Consensus Protocol for Peer-to-Peer Network[C]","author":"Gai F","year":"2018","unstructured":"F Gai , Wang B , Deng W , Proof of Reputation: A Reputation-Based Consensus Protocol for Peer-to-Peer Network[C] . Springer, Cham . Springer , Cham, 2018 . F Gai, Wang B , Deng W , Proof of Reputation: A Reputation-Based Consensus Protocol for Peer-to-Peer Network[C]. Springer, Cham. Springer, Cham, 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1109\/Blockchain.2019.00078","volume-title":"A Reputation Management Framework for Knowledge-Based and Probabilistic Blockchains,\" 2019 IEEE International Conference on Blockchain (Blockchain)","author":"Salman T.","year":"2019","unstructured":"T. Salman , R. Jain and L. Gupta , \" A Reputation Management Framework for Knowledge-Based and Probabilistic Blockchains,\" 2019 IEEE International Conference on Blockchain (Blockchain) , 2019 , pp. 520 - 527 . T. Salman, R. Jain and L. Gupta, \"A Reputation Management Framework for Knowledge-Based and Probabilistic Blockchains,\" 2019 IEEE International Conference on Blockchain (Blockchain), 2019, pp. 520-527."},{"key":"e_1_3_2_1_13_1","first-page":"604","volume-title":"Reputation-Based Byzantine Fault-Tolerance for Consortium Blockchain,\" 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)","author":"Lei K.","year":"2018","unstructured":"K. Lei , Q. Zhang , L. Xu and Z. Qi , \" Reputation-Based Byzantine Fault-Tolerance for Consortium Blockchain,\" 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS) , 2018 , pp. 604 - 611 . K. Lei, Q. Zhang, L. Xu and Z. Qi, \"Reputation-Based Byzantine Fault-Tolerance for Consortium Blockchain,\" 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), 2018, pp. 604-611."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/JIOT.2020.3029781"},{"key":"e_1_3_2_1_15_1","volume-title":"Khovratovich D . Guru: Universal Reputation Module for Distributed Consensus Protocols","author":"Biryukov A","year":"2017","unstructured":"Biryukov A , Feher D , Khovratovich D . Guru: Universal Reputation Module for Distributed Consensus Protocols . 2017 . Biryukov A , Feher D , Khovratovich D . Guru: Universal Reputation Module for Distributed Consensus Protocols. 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/JIOT.2020.3028449"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/3149.214121"}],"event":{"acronym":"ICCIP 2022","name":"ICCIP 2022: 2022 the 8th International Conference on Communication and Information Processing","location":"Beijing China"},"container-title":["Proceedings of the 8th International Conference on Communication and Information Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571662.3571680","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571662.3571680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:10Z","timestamp":1750183750000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571662.3571680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,3]]},"references-count":17,"alternative-id":["10.1145\/3571662.3571680","10.1145\/3571662"],"URL":"https:\/\/doi.org\/10.1145\/3571662.3571680","relation":{},"subject":[],"published":{"date-parts":[[2022,11,3]]},"assertion":[{"value":"2023-01-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}