default search action
Junming Ke
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c7]Junming Ke, Henk D. L. Hollmann, Ago-Erik Riet:
A Binary Linear Functional-Repair Regenerating Code on 72 Coding Spaces Related to PG(2, 8). ISIT 2024: 2335-2340 - 2022
- [j5]Yaru Fu, Jianqing Liu, Junming Ke, Kwok Tai Chui, Kevin King Fai Hung:
Optimal and Suboptimal Dynamic Cache Update Algorithms for Wireless Cellular Networks. IEEE Wirel. Commun. Lett. 11(12): 2610-2614 (2022) - [c6]Zheng Yang, Chao Yin, Junming Ke, Tien Tuan Anh Dinh, Jianying Zhou:
If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable. ACSAC 2022: 727-741 - [c5]Junming Ke, Ago-Erik Riet:
Update and Repair Efficient Storage Codes with Availability via Finite Projective Planes. ISIT 2022: 3268-3273 - 2021
- [j4]Yaru Fu, Zheng Shi, Junming Ke, Hong Wang, Angus K. Y. Wong, Tony Q. S. Quek:
Efficient Delay Minimization Algorithm for Cache-Enabled NOMA Systems. IEEE Wirel. Commun. Lett. 10(8): 1771-1775 (2021) - [c4]Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou:
LaKSA: A Probabilistic Proof-of-Stake Protocol. NDSS 2021 - 2020
- [c3]Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. ISC 2020: 334-351 - [i2]Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou:
ProPoS: A Probabilistic Proof-of-Stake Protocol. CoRR abs/2006.01427 (2020) - [i1]Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. IACR Cryptol. ePrint Arch. 2020: 1098 (2020)
2010 – 2019
- 2019
- [j3]Yiran Liu, Junming Ke, Qiuliang Xu, Han Jiang, Hao Wang:
Decentralization is Vulnerable Under the Gap Game. IEEE Access 7: 90999-91008 (2019) - [j2]Zhaoman Liu, Lei Wu, Junming Ke, Wenlei Qu, Wei Wang, Hao Wang:
Accountable Outsourcing Location-Based Services With Privacy Preservation. IEEE Access 7: 117258-117273 (2019) - [c2]Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu, Zheng Yang:
IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate. ISC 2019: 3-24 - 2018
- [c1]Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu:
Analysis on the Block Reward of Fork After Withholding (FAW). NSS 2018: 16-31 - 2017
- [j1]Junhua Lu, Wei Chen, Yuxin Ma, Junming Ke, Zongzhuang Li, Fan Zhang, Ross Maciejewski:
Recent progress and trends in predictive visual analytics. Frontiers Comput. Sci. 11(2): 192-207 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 22:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint