Publications

  • X.Yng, H. Wang, Y. Huang, Z. Chen, X. Yi, H. Dong, X. Yang, "Estimation of Realized Volatility of Cryptocurrencies Using CEEMDAN-RF-LSTM," in Future Generation Computer Systems. vol. 158, September 2024, doi: 10.1016/j.future.2024.04.043
    Keywords: Cryptocurrency Volatility
    This study introduces the CEEMDAN-RF-LSTM hybrid model to accurately predict cryptocurrency volatility.
  • A. P. Kalapaaking, I. Khalil and X. Yi, "Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems," in IEEE Transactions on Emerging Topics in Computing, vol. 12, no. 1, March 2024, doi: 10.1109/TETC.2023.3268186.
    Keywords: Blockchain Applications
    This article proposed blockchain-based federated learning with SMPC model verification against poisoning attacks for healthcare systems.
  • A. Abid, S. Cheikhrouhou, S. Kallel, Z. Tari, M. Jmaiel, "A Smart Contract-Based Access Control Framework For Smart Healthcare Systems, " in The Computer Journal, Volume 67, Issue 2, February 2024, Pages 407–422, doi:10.1093/comjnl/bxac183
    Keywords: Blockchain Applications
    This paper proposes a smart contract-based access control framework for IoT smart healthcare systems.
  • J. A. Abdella, Z. Tari, N. Sohrabi and R. Mahmud, "MuLCOff: A multi-layer consensus and off-chain computation for efficient and privacy-aware blockchain-based peer-to-peer energy trading," in IEEE Network, January 2024, doi: 10.1109/MNET.2024.3355987
    Keywords: Consensus Algorithms
    We propose MuLCOff, a multi-layer consensus and off-chain computation-based P2P-ET system to address the challenges of blockchain performance, scalability and privacy.
  • S. Ji, C. Huang, H. Chu, X. Wang, H. Dong, P. Zhang, "Blockchain Scam Detection: State-of-the-Art, Challenges, and Future Directions," in Blockchain and Trustworthy Systems. BlockSys 2023. Communications in Computer and Information Science, vol 1896, November 2023, doi: 10.1007/978-981-99-8101-4_1
    Keywords: Blockchain Scam
    This paper provides a thorough survey on the detection methods for the mainstream types of scams, including Ponzi scheme, Phishing scam, Honeypot, and Pump and dump, in which 48 studies are investigated.
  • G. Zhang, S. Ji, H. Dong, P. Zhang, "An Improved PBFT Consensus Algorithm for Supply Chain Finance," in Blockchain and Trustworthy Systems. BlockSys 2023. Communications in Computer and Information Science, vol 1896, November 2023, doi: 10.1007/978-981-99-8104-5_25
    Keywords: Consensus Algorithms
    An improved PBFT consensus algorithm for Supply Chain Finance, called PBFT-SCF, is proposed in this paper. 
  • W. Issa, N. Moustafa, B. Turnbull, N. Sohrabi, and Z. Tari, "Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey, " ACM Computing Survey, 55, 9, Article 191, 43 pages, September 2023, doi: 10.1145/3560816
    Keywords: Blockchain Applications
    This study aims to review blockchain-based FL methods for securing IoT systems holistically.
  • Z. Rahman, X. Yi, I. Khalil, A. Anwar, and S. Pal. Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System. In Proceedings of the Third International Symposium on Advanced Security on Software and Systems (ASSS ‘23). July 2023, Article 3, doi: 0.1145/3591365.3592947
    Keywords: Blockchain Applications
    This work was motivated to address and demonstrate a blockchain and AI-enabled false data–detection and reputation preservation for the sensor-enabled, intelligent Cyber-physical system especially targeting IAVS.
  • S. Ji, C. Huang, P. Zhang, and H. Dong, "Ponzi Scheme Detection Based on Control Flow Graph Feature Extraction," in The 2023 IEEE International Conference on Web Services (IEEE ICWS 2023), July 2023, doi: 10.1109/ICWS60048.2023.00077
    Keywords: Smart Contract Security
    This study introduces a machine learning approach to identify Ponzi schemes by extracting features from smart contracts using the control flow graph.
  • P. Zhang, Q. Yu,  Y. Xiao, H. Dong, X. Luo, X. Wang and M. Zhang, "BiAn: Smart Contract Source Code Obfuscation," in IEEE Transactions on Software Engineering, July 2023, doi: https://doi.org/10.1109/TSE.2023.3298609
    Keywords: Smart Contract Security
    This is the first work in this field that focuses on smart contract source code obfuscation, which is expected to have broad application prospects in areas such as smart contract copyright protection, vulnerability protection, etc.
  • H. Chu, P. Zhang, H. Dong, Y. Xiao, S. Ji, and W. Li, "A survey on smart contract vulnerabilities: Data sources, detection and repair," in Information and Software Technology. vol. 159, 107221, July 2023, doi: 10.1016/j.infsof.2023.107221
    Keywords: Smart contract testing
    We explore smart contract security from the perspectives of vulnerability data sources, vulnerability detection, and vulnerability defence.
  • Z. Rahman, X. Yi and I. Khalil, "Blockchain-Based AI-Enabled Industry 4.0 CPS Protection Against Advanced Persistent Threat," in IEEE Internet of Things Journal, vol. 10, no. 8, April 2023, doi: 10.1109/JIOT.2022.3147186.
    Keywords: Blockchain Applications
    A blockchain-based AI-enabled APT detection system is proposed that protects Industrial IoT data from being forged.
  • F. Pakana, N. Sohrabi, C. Xu, Z. Tari, H. Dong, "RPDP: An Efficient Data Placement based on Residual Performance for P2P Storage Systems," arXiv preprint arXiv:2304.08692, April 2023.
    Keywords: Blockchain Applications
    This paper introduces Residual Performance-based Data Placement (RPDP), a novel data placement method based on dynamic temporal residual performance of data nodes.
  • Q. Xiong, N. Sohrabi, H. Dong, C. Xu, Z. Tari, "AICons: An AI-Enabled Consensus Algorithm Driven by Energy Preservation and Fairness," arXiv preprint arXiv:2304.08128, April 2023.
    Keywords: Green Consensus Algorithms
    This paper proposes an AI-enabled consensus algorithm (named AICons) driven by energy preservation and fairness of rewarding nodes based on their contribution.
  • A. P. Kalapaaking, I. Khalil, M. S. Rahman, M. Atiquzzaman, X. Yi and M. Almashor, "Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment for Internet-of-Things," in IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1703-1714, Feb. 2023, doi: 10.1109/TII.2022.3170348.
    Keywords: Blockchain Applications
    In this article, we propose a complete framework for FL that simultaneously safeguards the privacy of IoT data and ensures security during the generation of aggregated trained models.
  • S. Ji, S. Zhu, P. Zhang, H. Dong, "Data Flow Reduction Based Test Case Generation for Smart Contracts," in The 29th Asia-Pacific Software Engineering Conference (APSEC 2022), December 2022, doi: 10.1109/APSEC57359.2022.00027
    Keywords: Smart Contract Security
    This paper presents an approach named TCG-Re (Test Case Generation Combined with Data Flow Reduction) to generate test cases for data flow testing of smart contracts.
  • Q. Yu, P. Zhang, H. Dong, Y. Xiao, S. Ji, "Bytecode Obfuscation for Smart Contracts," in The 29th Asia-Pacific Software Engineering Conference (APSEC 2022), December 2022, doi: 10.1109/APSEC57359.2022.00083
    Keywords: Smart Contract Security
    This paper proposes a novel bytecode obfuscation approach called BOSC based on four kinds of bytecode obfuscation techniques, which is directed at solidity.
  • X. Yi , X. Yang , A. Kelarev , K. Y. Lam , Z. Tari, "Blockchain Foundations and Applications," Springer, 2022, doi: 10.1007/978-3-031-09670-9
    Keywords: Blockchain Foundations and Applications
    This book Introduces the underlying technologies of bitcoin and Ethereum, elaborates on both public and private blockchains, and provides an introduction to cryptocurrences and blockchain applications.
  • S. Ji, S. Zhu, P. Zhang, H. Dong and J. Yang, "Test Case Generation for Data Flow Testing of Smart Contracts Based on Improved Genetic Algorithm," in IEEE Transactions on Reliability, May 2022, doi: 10.1109/TR.2022.3173025.
    Keywords: Smart Contract Testing
    We propose an improved genetic algorithm-based test-case generation approach for smart contract data flow testing to more efficiently generate test cases with high coverage.
  • Z. Rahman, X. Yi, Sk. T. Mehedi, R. Islam, and A. Kelarev, "Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions," Electronics, vol. 11, no. 9, March 2022, doi: 10.3390/electronics11091416
    Keywords: Blockchain Applications
    This paper focuses on security challenges of the blockchain-IoT ecosystem through critical findings and applicable use cases.
  • B. Wang, H. Chu, P. Zhang, H. Dong, "Smart Contract Vulnerability Detection Using Code Representation Fusion," in The 28th Asia-Pacific Software Engineering Conference (APSEC 2021), December 2021, doi: 10.1109/APSEC53868.2021.00069
    Keywords: Smart Contract Security
    This paper proposes a novel way called AFS (AST Fuse program Slicing) to fuse code characteristic information. AFS can fuse the structured information of AST with program slicing information and detect vulnerabilities by learning new vulnerability characteristic information.
  • J. Abdella, Z. Tari, A. Anwar, A. Mahmood and F. Han, "An Architecture and Performance Evaluation of Blockchain-Based Peer-to-Peer Energy Trading," in IEEE Transactions on Smart Grid, vol. 12, no. 4, pp. 3364-3378, July 2021, doi: 10.1109/TSG.2021.3056147.
    Keywords: Blockchain application, Blockchain performance/scalability
    This article proposes a Unified permissioned blockchain-based P2P-ET Architecture that integrates three different types of energy markets and provides a unified energy trading and payment settlement model.
  • S. Islam, S. Badsha, S. Sengupta, H. La, I. Khalil and M. Atiquzzaman, "Blockchain-Enabled Intelligent Vehicular Edge Computing," in IEEE Network, vol. 35, no. 3, pp. 125-131, May/June 2021, doi: 10.1109/MNET.011.2000554.
    Keywords: Blockchain application
    This paper proposes a blockchain-based decentralized architecture to enhance transparency in intelligent vehicular edge computing resource management and leverage edge consumers (e.g., vehicles) with a computation verification option.
  • Z. Rahman, I. Khalil, X. Yi and M. Atiquzzaman, "Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System," in IEEE Communications Magazine, vol. 59, no. 5, pp. 128-134, May 2021, doi: 10.1109/MCOM.001.2000679.
    Keywords: Blockchain application, Blockchain security
    This paper motivates demonstrating a framework to solve the existing security challenges (i.e., multi-party consents, the centralized trust of trusted certificate authority, etc.) for the Industry 4.0 Cyber-physical System.
  • M. S. Rahman, I. Khalil and M. Atiquzzaman, "Blockchain-Powered Policy Enforcement for Ensuring Flight Compliance in Drone-Based Service Systems," in IEEE Network, vol. 35, no. 1, pp. 116-123, January/February 2021, doi: 10.1109/MNET.011.2000219.
    Keywords: Blockchain application
    We propose a blockchain-based policy enforcement mechanism in the drone-based delivery service systems to solve the issues of drone collision and unauthorized access to private and restricted areas.
  • S. Kudva, S. Badsha, S. Sengupta, I.Khalil, A. Zomaya, "Towards secure and practical consensus for blockchain based VANET, " in Information Sciences, vol. 545, 2021, pp. 170-187, doi:10.1016/j.ins.2020.07.060.
    Keywords: Blockchain application, Blockchain security
    In this paper, we propose a new technique called Proof of Driving (PoD), to randomize the selection of honest miners for generating the blocks efficiently for blockchain-based VANET applications
  • X. Yang, X. Yang, X, Yi, I. Khalil, X. Zhou, D. He, X. Huang, and S. Nepal, "Blockchain-Based Secure and Lightweight Authentication for Internet of Things," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3098007.
    Keywords: Blockchain application, Blockchain security
    In this paper, we proposed a new blockchain-based authentication scheme to meet the challenge of IoT devices' authenticity, privacy and security insurance.
  • M. A. Uddin, A. Stranieri, I. Gondal, and V. Balasubramanian, "A survey on the adoption of blockchain in IoT: challenges and solutions", in Blockchain: Research and Applications, 2021, 100006, doi: 10.1016/j.bcra.2021.100006.
    Keywords: Blockchain application
    In this paper, recent state-of-the-arts advances in blockchain for IoT, blockchain for Cloud IoT and blockchain for Fog IoT in the context of eHealth, smart cities, intelligent transport and other applications are analysed
  • N. Sohrabi and Z. Tari, "ZyConChain: A Scalable Blockchain for General Applications," in IEEE Access, vol. 8, pp. 158893-158910, 2020, doi: 10.1109/ACCESS.2020.3020319. Keywords: Blockchain performance/scalability
    This work proposes a scalable blockchain protocol for general applications (i.e., not restricted to Cryptocurrencies).
  • H. Cui, Z. Wan, X. Wei, S. Nepal and X. Yi, "Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3227-3238, 2020, doi: 10.1109/TIFS.2020.2973864.
    Keywords: Blockchain application, Blockchain security
    In this paper, we aim to design Functional Encryption with payable outsourced decryption schemes by leveraging the transactions on cryptocurrencies supported by the blockchain technology.
  • R. Yang, R. Wakefield, S. Lyu, S. Jayasuriya, F. Han, X. Yi, X. Yang, G. Amarasinghe, and S. Chen, Public and private blockchain in construction business process and information integration," in Automation in Construction, vol.118, 2020, 103276, doi: 10.1016/j.autcon.2020.103276.
    Keywords: Blockchain application
    In this paper, we aim to explore the feasibility of applying both public blockchain and private blockchain technologies in the construction industry using two industry cases.
aboriginal flag
torres strait flag

Acknowledgement of Country

RMIT University acknowledges the people of the Woi wurrung and Boon wurrung language groups of the eastern Kulin Nation on whose unceded lands we conduct the business of the University. RMIT University respectfully acknowledges their Ancestors and Elders, past and present. RMIT also acknowledges the Traditional Custodians and their Ancestors of the lands and waters across Australia where we conduct our business - Artwork 'Sentient' by Hollie Johnson, Gunaikurnai and Monero Ngarigo.

aboriginal flag
torres strait flag

Acknowledgement of Country

RMIT University acknowledges the people of the Woi wurrung and Boon wurrung language groups of the eastern Kulin Nation on whose unceded lands we conduct the business of the University. RMIT University respectfully acknowledges their Ancestors and Elders, past and present. RMIT also acknowledges the Traditional Custodians and their Ancestors of the lands and waters across Australia where we conduct our business.