Publications

  • H. Chu, P. Zhang, H. Dong, Y. Xiao, and S. Ji, "DeepFusion: Smart Contract Vulnerability Detection Via Deep Learning and Data Fusion," in IEEE Transactions on Reliability, 2025, doi: 10.1109/TR.2024.3480010.
    Keywords: Smart Contract Security
    We propose DeepFusion, a vulnerability detection method that fuses code representation information, including program slice information and abstraction syntax tree (AST) structured information.
  • J. Abdella, Z. Tari, and R. Mahmud, "MuLPP: A Multi-Level Privacy Preserving for Blockchain-Based Bilateral P2P Energy Trading," in Journal of Network and Computer Applications, vol. 237, p. 104141, 2025, doi: 10.1016/j.jnca.2025.104141.
    Keywords: Blockchain Applications
    This paper proposes a Multi-Level Privacy-Preserving system (MuLPP) for blockchain-based bilateral P2P-ET that provides user anonymity, energy price and energy amount privacy while protecting against fake energy offers.
  • F. Pakana, N. Sohrabi, H. Dong, and Z. Tari, "ERT: Data Placement based on Estimated Response Time for P2P Storage Systems," in Journal of Parallel and Distributed Computing, vol. 197, March 2025, doi: 10.1016/j.jpdc.2024.105022.
    Keywords: Blockchain Storage
    We devise a novel data placement method and corresponding data retrieval method that considers the heterogeneity of P2P storage nodes.
  • M. S. Rahman, I. Khalil, M. Atiquzzaman, and A. Bouras, "A Lightweight Practical Consensus Mechanism for Supply Chain Blockchain," in High-Confidence Computing, vol. 5, no. 1, p. 100253, 2025. doi: 10.1016/j.hcc.2024.100253
    Keywords: Consensus Algorithms
    We present a consensus mechanism specifically for supply chain blockchains, with a core focus on establishing trust among participating stakeholders through a novel reputation-based approach.
  • Z. Rehman, M. A. Gregory, I. Gondal, H. Dong, and M. Ge, "Eclipse Attacks in Blockchain Networks: Detection, Prevention, and Future Directions," in IEEE Access, vol. 13, January 2025, pp. 25918-25933, doi: 10.1109/ACCESS.2025.3538837.
    Keywords: Blockchain Security
    This paper presents a comprehensive study of eclipse attacks in blockchain networks by describing how eclipse attacks work, their effects, detection, and prevention.
  • N. Sohrabi, N. Rattanavipanon, and Z. Tari, "A Query Language to Enhance Security and Privacy of Blockchain as a Service (BaaS)," in Service-Oriented Computing. ICSOC 2024, Lecture Notes in Computer Science, vol. 15405, W. Gaaloul, M. Sheng, Q. Yu, and S. Yangui, Eds., Singapore: Springer, 2025, doi: 10.1007/978-981-96-0808-9_22.https://doi.org/10.1007/978-981-96-0808-9_22
    Keywords: Blockchain Security
    This paper proposes a query language, called QLB, for blockchain systems that ensure the confidentiality of query inputs and the integrity of query results.

  • P. Kalapaaking, I. Khalil, X. Yi, K. -Y. Lam, G. -B. Huang and N. Wang, "Auditable and Verifiable Federated Learning Based on Blockchain-Enabled Decentralization," in IEEE Transactions on Neural Networks and Learning Systems, vol. 36, no. 1, pp. 102-115, Jan. 2025, doi: 10.1109/TNNLS.2024.3407670.
    Keywords: Blockchain Application
    This article proposes an auditable and verifiable decentralized FL framework based on blockchain technologies.

  • Z. Zhen, X. Wang, X. Yang, J. Shu, J. Hu, H. Lin, and X. Yi, "SemantiChain: A Trust Retrieval Blockchain Based on Semantic Sharding," in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 10339-10354, 2024, doi: 10.1109/TIFS.2024.3488501.
    Keywords: Blockchain Sharding
    This paper introduces a brand-new blockchain sharding technique called Semantic Sharding, which enhances blockchain scalability through a hybrid on/off-chain approach.
  • P. Zhang, B. Wang, X. Luo, and H. Dong, "SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts," in IEEE Transactions on Software Engineering, vol. 50, no. 11, November 2024, pp. 2983-3006, doi: 10.1109/TSE.2024.3464539.
    Keywords: Smart Contract Testing
    We propose an approach called SCAnoGenerator that supports Solidity 0.5.x, 0.6.x, 0.7.x and enables automatic anomaly injection for Ethereum smart contracts via analysing the contracts’ control and data flows.
  • S. Ji, J. Gong, H. Dong, P. Zhang, and S. Zhu, "IABC-TCG: Improved Artificial Bee Colony Algorithm Based Test Case Generation for Smart Contracts," in Journal of Software: Evolution and Process, vol. 36, no. 12, August 2024, e2719, doi: 10.1002/smr.2712.
    Keywords: Smart Contract Testing
    We propose an approach named IABC-TCG (Improved Artificial Bee Colony-Test Case Generation) to generate test cases for the data flow testing of smart contracts.
  • H. Chu, P. Zhang, H. Dong, Y. Xiao, and S. Ji, "SGDL: Smart Contract Vulnerability Generation via Deep Learning," in Journal of Software: Evolution and Process, vol. 36, no. 12, July 2024, e2712, doi: 10.1002/smr.2712.
    Keywords: Smart Contract Testing
    This paper proposes a Deep Learning-based Smart contract vulnerability Generation approach (SGDL) to generate authentic smart contract vulnerability datasets.
  • A. P. Kalapaaking, I. Khalil, and M. Atiquzzaman, "Blockchain-Enabled and Multisignature-Powered Verifiable Model for Securing Federated Learning Systems," in IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21410-21420, December 15, 2023, doi: 10.1109/JIOT.2023.3289832.
    Keywords: Blockchain Applications
    This article proposes a blockchain-enabled, verifiable model for securing Federated Learning within IoT systems.
  • M. Kerr, F. Han, X. Yi, A. Kelarev, and R. Van Schyndel, "A Non-Invasive Method for the Cataloguing and Authentication of Surveillance Video Using On-Camera Blockchain Participation, Machine Learning, and Signal Analysis," in Forensic Science International: Digital Investigation, vol. 46, p. 301573, 2023, doi: 10.1016/j.fsidi.2023.301573.
    Keywords: Smart Contract Application
    This paper proposes a blockchain-based method to bulk verify large volumes of video data without user intervention.
  • X.Yng, H. Wang, Y. Huang, Z. Chen, X. Yi, H. Dong, X. Yang, "Estimation of Realized Volatility of Cryptocurrencies Using CEEMDAN-RF-LSTM," in Future Generation Computer Systems. vol. 158, September 2024, doi: 10.1016/j.future.2024.04.043
    Keywords: Cryptocurrency Volatility
    This study introduces the CEEMDAN-RF-LSTM hybrid model to accurately predict cryptocurrency volatility.
  • A. P. Kalapaaking, I. Khalil and X. Yi, "Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems," in IEEE Transactions on Emerging Topics in Computing, vol. 12, no. 1, March 2024, doi: 10.1109/TETC.2023.3268186.
    Keywords: Blockchain Applications
    This article proposed blockchain-based federated learning with SMPC model verification against poisoning attacks for healthcare systems.
  • A. Abid, S. Cheikhrouhou, S. Kallel, Z. Tari, M. Jmaiel, "A Smart Contract-Based Access Control Framework For Smart Healthcare Systems, " in The Computer Journal, Volume 67, Issue 2, February 2024, Pages 407–422, doi:10.1093/comjnl/bxac183
    Keywords: Blockchain Applications
    This paper proposes a smart contract-based access control framework for IoT smart healthcare systems.
  • J. A. Abdella, Z. Tari, N. Sohrabi and R. Mahmud, "MuLCOff: A multi-layer consensus and off-chain computation for efficient and privacy-aware blockchain-based peer-to-peer energy trading," in IEEE Network, January 2024, doi: 10.1109/MNET.2024.3355987
    Keywords: Consensus Algorithms
    We propose MuLCOff, a multi-layer consensus and off-chain computation-based P2P-ET system to address the challenges of blockchain performance, scalability and privacy.
  • S. Ji, C. Huang, H. Chu, X. Wang, H. Dong, P. Zhang, "Blockchain Scam Detection: State-of-the-Art, Challenges, and Future Directions," in Blockchain and Trustworthy Systems. BlockSys 2023. Communications in Computer and Information Science, vol 1896, November 2023, doi: 10.1007/978-981-99-8101-4_1
    Keywords: Blockchain Scam
    This paper provides a thorough survey on the detection methods for the mainstream types of scams, including Ponzi scheme, Phishing scam, Honeypot, and Pump and dump, in which 48 studies are investigated.
  • G. Zhang, S. Ji, H. Dong, P. Zhang, "An Improved PBFT Consensus Algorithm for Supply Chain Finance," in Blockchain and Trustworthy Systems. BlockSys 2023. Communications in Computer and Information Science, vol 1896, November 2023, doi: 10.1007/978-981-99-8104-5_25
    Keywords: Consensus Algorithms
    An improved PBFT consensus algorithm for Supply Chain Finance, called PBFT-SCF, is proposed in this paper. 
  • W. Issa, N. Moustafa, B. Turnbull, N. Sohrabi, and Z. Tari, "Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey, " ACM Computing Survey, 55, 9, Article 191, 43 pages, September 2023, doi: 10.1145/3560816
    Keywords: Blockchain Applications
    This study aims to review blockchain-based FL methods for securing IoT systems holistically.
  • Z. Rahman, X. Yi, I. Khalil, A. Anwar, and S. Pal. Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System. In Proceedings of the Third International Symposium on Advanced Security on Software and Systems (ASSS ‘23). July 2023, Article 3, doi: 0.1145/3591365.3592947
    Keywords: Blockchain Applications
    This work was motivated to address and demonstrate a blockchain and AI-enabled false data–detection and reputation preservation for the sensor-enabled, intelligent Cyber-physical system especially targeting IAVS.
  • S. Ji, C. Huang, P. Zhang, and H. Dong, "Ponzi Scheme Detection Based on Control Flow Graph Feature Extraction," in The 2023 IEEE International Conference on Web Services (IEEE ICWS 2023), July 2023, doi: 10.1109/ICWS60048.2023.00077
    Keywords: Smart Contract Security
    This study introduces a machine learning approach to identify Ponzi schemes by extracting features from smart contracts using the control flow graph.
  • P. Zhang, Q. Yu,  Y. Xiao, H. Dong, X. Luo, X. Wang and M. Zhang, "BiAn: Smart Contract Source Code Obfuscation," in IEEE Transactions on Software Engineering, July 2023, doi: https://doi.org/10.1109/TSE.2023.3298609
    Keywords: Smart Contract Security
    This is the first work in this field that focuses on smart contract source code obfuscation, which is expected to have broad application prospects in areas such as smart contract copyright protection, vulnerability protection, etc.
  • H. Chu, P. Zhang, H. Dong, Y. Xiao, S. Ji, and W. Li, "A survey on smart contract vulnerabilities: Data sources, detection and repair," in Information and Software Technology. vol. 159, 107221, July 2023, doi: 10.1016/j.infsof.2023.107221
    Keywords: Smart contract testing
    We explore smart contract security from the perspectives of vulnerability data sources, vulnerability detection, and vulnerability defence.
  • Z. Rahman, X. Yi and I. Khalil, "Blockchain-Based AI-Enabled Industry 4.0 CPS Protection Against Advanced Persistent Threat," in IEEE Internet of Things Journal, vol. 10, no. 8, April 2023, doi: 10.1109/JIOT.2022.3147186.
    Keywords: Blockchain Applications
    A blockchain-based AI-enabled APT detection system is proposed that protects Industrial IoT data from being forged.
  • F. Pakana, N. Sohrabi, C. Xu, Z. Tari, H. Dong, "RPDP: An Efficient Data Placement based on Residual Performance for P2P Storage Systems," arXiv preprint arXiv:2304.08692, April 2023.
    Keywords: Blockchain Applications
    This paper introduces Residual Performance-based Data Placement (RPDP), a novel data placement method based on dynamic temporal residual performance of data nodes.
  • Q. Xiong, N. Sohrabi, H. Dong, C. Xu, Z. Tari, "AICons: An AI-Enabled Consensus Algorithm Driven by Energy Preservation and Fairness," arXiv preprint arXiv:2304.08128, April 2023.
    Keywords: Green Consensus Algorithms
    This paper proposes an AI-enabled consensus algorithm (named AICons) driven by energy preservation and fairness of rewarding nodes based on their contribution.
  • A. P. Kalapaaking, I. Khalil, M. S. Rahman, M. Atiquzzaman, X. Yi and M. Almashor, "Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment for Internet-of-Things," in IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1703-1714, Feb. 2023, doi: 10.1109/TII.2022.3170348.
    Keywords: Blockchain Applications
    In this article, we propose a complete framework for FL that simultaneously safeguards the privacy of IoT data and ensures security during the generation of aggregated trained models.
  • S. Ji, S. Zhu, P. Zhang, H. Dong, "Data Flow Reduction Based Test Case Generation for Smart Contracts," in The 29th Asia-Pacific Software Engineering Conference (APSEC 2022), December 2022, doi: 10.1109/APSEC57359.2022.00027
    Keywords: Smart Contract Security
    This paper presents an approach named TCG-Re (Test Case Generation Combined with Data Flow Reduction) to generate test cases for data flow testing of smart contracts.
  • Q. Yu, P. Zhang, H. Dong, Y. Xiao, S. Ji, "Bytecode Obfuscation for Smart Contracts," in The 29th Asia-Pacific Software Engineering Conference (APSEC 2022), December 2022, doi: 10.1109/APSEC57359.2022.00083
    Keywords: Smart Contract Security
    This paper proposes a novel bytecode obfuscation approach called BOSC based on four kinds of bytecode obfuscation techniques, which is directed at solidity.
  • X. Yi , X. Yang , A. Kelarev , K. Y. Lam , Z. Tari, "Blockchain Foundations and Applications," Springer, 2022, doi: 10.1007/978-3-031-09670-9
    Keywords: Blockchain Foundations and Applications
    This book Introduces the underlying technologies of bitcoin and Ethereum, elaborates on both public and private blockchains, and provides an introduction to cryptocurrences and blockchain applications.
  • S. Ji, S. Zhu, P. Zhang, H. Dong and J. Yang, "Test Case Generation for Data Flow Testing of Smart Contracts Based on Improved Genetic Algorithm," in IEEE Transactions on Reliability, May 2022, doi: 10.1109/TR.2022.3173025.
    Keywords: Smart Contract Testing
    We propose an improved genetic algorithm-based test-case generation approach for smart contract data flow testing to more efficiently generate test cases with high coverage.
  • Z. Rahman, X. Yi, Sk. T. Mehedi, R. Islam, and A. Kelarev, "Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions," Electronics, vol. 11, no. 9, March 2022, doi: 10.3390/electronics11091416
    Keywords: Blockchain Applications
    This paper focuses on security challenges of the blockchain-IoT ecosystem through critical findings and applicable use cases.
  • B. Wang, H. Chu, P. Zhang, H. Dong, "Smart Contract Vulnerability Detection Using Code Representation Fusion," in The 28th Asia-Pacific Software Engineering Conference (APSEC 2021), December 2021, doi: 10.1109/APSEC53868.2021.00069
    Keywords: Smart Contract Security
    This paper proposes a novel way called AFS (AST Fuse program Slicing) to fuse code characteristic information. AFS can fuse the structured information of AST with program slicing information and detect vulnerabilities by learning new vulnerability characteristic information.
  • J. Abdella, Z. Tari, A. Anwar, A. Mahmood and F. Han, "An Architecture and Performance Evaluation of Blockchain-Based Peer-to-Peer Energy Trading," in IEEE Transactions on Smart Grid, vol. 12, no. 4, pp. 3364-3378, July 2021, doi: 10.1109/TSG.2021.3056147.
    Keywords: Blockchain application, Blockchain performance/scalability
    This article proposes a Unified permissioned blockchain-based P2P-ET Architecture that integrates three different types of energy markets and provides a unified energy trading and payment settlement model.
  • S. Islam, S. Badsha, S. Sengupta, H. La, I. Khalil and M. Atiquzzaman, "Blockchain-Enabled Intelligent Vehicular Edge Computing," in IEEE Network, vol. 35, no. 3, pp. 125-131, May/June 2021, doi: 10.1109/MNET.011.2000554.
    Keywords: Blockchain application
    This paper proposes a blockchain-based decentralized architecture to enhance transparency in intelligent vehicular edge computing resource management and leverage edge consumers (e.g., vehicles) with a computation verification option.
  • Z. Rahman, I. Khalil, X. Yi and M. Atiquzzaman, "Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System," in IEEE Communications Magazine, vol. 59, no. 5, pp. 128-134, May 2021, doi: 10.1109/MCOM.001.2000679.
    Keywords: Blockchain application, Blockchain security
    This paper motivates demonstrating a framework to solve the existing security challenges (i.e., multi-party consents, the centralized trust of trusted certificate authority, etc.) for the Industry 4.0 Cyber-physical System.
  • M. S. Rahman, I. Khalil and M. Atiquzzaman, "Blockchain-Powered Policy Enforcement for Ensuring Flight Compliance in Drone-Based Service Systems," in IEEE Network, vol. 35, no. 1, pp. 116-123, January/February 2021, doi: 10.1109/MNET.011.2000219.
    Keywords: Blockchain application
    We propose a blockchain-based policy enforcement mechanism in the drone-based delivery service systems to solve the issues of drone collision and unauthorized access to private and restricted areas.
  • S. Kudva, S. Badsha, S. Sengupta, I.Khalil, A. Zomaya, "Towards secure and practical consensus for blockchain based VANET, " in Information Sciences, vol. 545, 2021, pp. 170-187, doi:10.1016/j.ins.2020.07.060.
    Keywords: Blockchain application, Blockchain security
    In this paper, we propose a new technique called Proof of Driving (PoD), to randomize the selection of honest miners for generating the blocks efficiently for blockchain-based VANET applications
  • X. Yang, X. Yang, X, Yi, I. Khalil, X. Zhou, D. He, X. Huang, and S. Nepal, "Blockchain-Based Secure and Lightweight Authentication for Internet of Things," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3098007.
    Keywords: Blockchain application, Blockchain security
    In this paper, we proposed a new blockchain-based authentication scheme to meet the challenge of IoT devices' authenticity, privacy and security insurance.
  • M. A. Uddin, A. Stranieri, I. Gondal, and V. Balasubramanian, "A survey on the adoption of blockchain in IoT: challenges and solutions", in Blockchain: Research and Applications, 2021, 100006, doi: 10.1016/j.bcra.2021.100006.
    Keywords: Blockchain application
    In this paper, recent state-of-the-arts advances in blockchain for IoT, blockchain for Cloud IoT and blockchain for Fog IoT in the context of eHealth, smart cities, intelligent transport and other applications are analysed
  • N. Sohrabi and Z. Tari, "ZyConChain: A Scalable Blockchain for General Applications," in IEEE Access, vol. 8, pp. 158893-158910, 2020, doi: 10.1109/ACCESS.2020.3020319. Keywords: Blockchain performance/scalability
    This work proposes a scalable blockchain protocol for general applications (i.e., not restricted to Cryptocurrencies).
  • H. Cui, Z. Wan, X. Wei, S. Nepal and X. Yi, "Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3227-3238, 2020, doi: 10.1109/TIFS.2020.2973864.
    Keywords: Blockchain application, Blockchain security
    In this paper, we aim to design Functional Encryption with payable outsourced decryption schemes by leveraging the transactions on cryptocurrencies supported by the blockchain technology.
  • R. Yang, R. Wakefield, S. Lyu, S. Jayasuriya, F. Han, X. Yi, X. Yang, G. Amarasinghe, and S. Chen, Public and private blockchain in construction business process and information integration," in Automation in Construction, vol.118, 2020, 103276, doi: 10.1016/j.autcon.2020.103276.
    Keywords: Blockchain application
    In this paper, we aim to explore the feasibility of applying both public blockchain and private blockchain technologies in the construction industry using two industry cases.
aboriginal flag
torres strait flag

Acknowledgement of Country

RMIT University acknowledges the people of the Woi wurrung and Boon wurrung language groups of the eastern Kulin Nation on whose unceded lands we conduct the business of the University. RMIT University respectfully acknowledges their Ancestors and Elders, past and present. RMIT also acknowledges the Traditional Custodians and their Ancestors of the lands and waters across Australia where we conduct our business - Artwork 'Sentient' by Hollie Johnson, Gunaikurnai and Monero Ngarigo.