{"id":"https://openalex.org/W4405785973","doi":"https://doi.org/10.1109/imeta62882.2024.10808133","title":"Eden: An Edge Computing Empowered Proof-of-Personhood Protocol for Anti-Sybil in Blockchain-based Metaverse","display_name":"Eden: An Edge Computing Empowered Proof-of-Personhood Protocol for Anti-Sybil in Blockchain-based Metaverse","publication_year":2024,"publication_date":"2024-11-26","ids":{"openalex":"https://openalex.org/W4405785973","doi":"https://doi.org/10.1109/imeta62882.2024.10808133"},"language":"en","primary_location":{"id":"doi:10.1109/imeta62882.2024.10808133","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imeta62882.2024.10808133","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Intelligent Metaverse Technologies &amp;amp; Applications (iMETA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016974454","display_name":"Yinfeng Cao","orcid":"https://orcid.org/0000-0003-1048-3299"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Yinfeng Cao","raw_affiliation_strings":["Hong Kong Polytechnic University,Department of Computing"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University,Department of Computing","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100740023","display_name":"Jiannong Cao","orcid":"https://orcid.org/0000-0002-2725-2529"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Jiannong Cao","raw_affiliation_strings":["Hong Kong Polytechnic University,Department of Computing"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University,Department of Computing","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039907870","display_name":"Hongbo Liu","orcid":"https://orcid.org/0000-0001-9296-9975"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Hongbo Liu","raw_affiliation_strings":["Hong Kong Polytechnic University,Department of Computing"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University,Department of Computing","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103117973","display_name":"Zeyang Cui","orcid":"https://orcid.org/0000-0003-0838-9594"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Zeyang Cui","raw_affiliation_strings":["Hong Kong Polytechnic University,Department of Computing"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University,Department of Computing","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100698206","display_name":"Long Wen","orcid":"https://orcid.org/0009-0009-3515-1814"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Long Wen","raw_affiliation_strings":["Hong Kong Polytechnic University,Department of Computing"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University,Department of Computing","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5016974454"],"corresponding_institution_ids":["https://openalex.org/I14243506"],"apc_list":null,"apc_paid":null,"fwci":0.8142,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82314983,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"182","last_page":"189"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9739000201225281,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7615904211997986},{"id":"https://openalex.org/keywords/personhood","display_name":"Personhood","score":0.691886842250824},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6542534232139587},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6527979969978333},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5272573232650757},{"id":"https://openalex.org/keywords/metaverse","display_name":"Metaverse","score":0.5236891508102417},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.4391835331916809},{"id":"https://openalex.org/keywords/proof-of-concept","display_name":"Proof of concept","score":0.43539857864379883},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3298071026802063},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32750529050827026},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.29800257086753845},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2751615047454834},{"id":"https://openalex.org/keywords/virtual-reality","display_name":"Virtual reality","score":0.2687039375305176},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16625431180000305},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.1609330177307129},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13571110367774963},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.11197784543037415}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7615904211997986},{"id":"https://openalex.org/C548836952","wikidata":"https://www.wikidata.org/wiki/Q7170675","display_name":"Personhood","level":2,"score":0.691886842250824},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6542534232139587},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6527979969978333},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5272573232650757},{"id":"https://openalex.org/C53332860","wikidata":"https://www.wikidata.org/wiki/Q2632041","display_name":"Metaverse","level":3,"score":0.5236891508102417},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.4391835331916809},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.43539857864379883},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3298071026802063},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32750529050827026},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.29800257086753845},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2751615047454834},{"id":"https://openalex.org/C194969405","wikidata":"https://www.wikidata.org/wiki/Q170519","display_name":"Virtual reality","level":2,"score":0.2687039375305176},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16625431180000305},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.1609330177307129},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13571110367774963},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.11197784543037415},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/imeta62882.2024.10808133","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imeta62882.2024.10808133","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Intelligent Metaverse Technologies &amp;amp; Applications (iMETA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2977921325","https://openalex.org/W2978259753","https://openalex.org/W3001873791","https://openalex.org/W3124855037","https://openalex.org/W3161687493","https://openalex.org/W3210167118","https://openalex.org/W4288073028","https://openalex.org/W4312320759","https://openalex.org/W4313546630","https://openalex.org/W4324290234","https://openalex.org/W4387415069","https://openalex.org/W4388039894","https://openalex.org/W4388039910","https://openalex.org/W4388039916","https://openalex.org/W4388039943","https://openalex.org/W4388039958","https://openalex.org/W4404102434","https://openalex.org/W6677618333","https://openalex.org/W6720494550","https://openalex.org/W6842615131","https://openalex.org/W6868642155"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W4304136894","https://openalex.org/W2989851257"],"abstract_inverted_index":{"The":[0,88],"blockchain-based":[1,194],"metaverse":[2,36,170,195],"has":[3],"achieved":[4],"great":[5],"success":[6],"through":[7],"decentralized":[8,154],"ownership":[9],"of":[10,16,23,57,62,149,159],"digital":[11],"assets.":[12],"However,":[13],"the":[14,21,68,73,86,116,125,138,147,186],"prevalence":[15],"Sybil":[17,83],"attacks":[18,84],"seriously":[19],"threatens":[20],"security":[22,182],"assets,":[24],"where":[25],"attackers":[26],"create":[27],"multiple":[28],"fake":[29],"wallets":[30],"to":[31,81,107,145],"gain":[32],"illegal":[33],"benefits":[34],"from":[35],"activities":[37],"such":[38],"as":[39],"token":[40],"airdrops.":[41],"Existing":[42],"anti-Sybil":[43],"mechanisms":[44],"either":[45],"rely":[46],"on":[47,163],"expensive":[48],"specialised":[49],"biometric":[50],"devices":[51,161],"or":[52],"use":[53],"imprecise":[54],"empirical":[55],"analysis":[56,106,183],"historical":[58],"transaction":[59],"behaviour,":[60],"both":[61],"which":[63],"are":[64],"less":[65],"effective":[66],"in":[67,85,115,152,193],"metaverse.":[69,87],"This":[70],"paper":[71],"presents":[72],"Eden":[74,89,126,160,187],"protocol,":[75],"a":[76,92,109,113,120,132,142,150,153,169],"novel":[77],"proof-of-personhood":[78],"protocol":[79,90,127,188],"designed":[80],"counter":[82],"uses":[91],"hybrid":[93],"approach":[94],"that":[95,172,185],"combines":[96],"edge":[97],"computing-based":[98],"personhood":[99,143,148],"video":[100],"recognition":[101],"with":[102,168,175],"on-chain":[103],"transactional":[104],"activity":[105],"ensure":[108],"unique":[110],"link":[111],"between":[112],"user":[114],"physical":[117],"world":[118],"and":[119,181],"wallet":[121,151],"address.":[122],"To":[123],"make":[124],"trustworthy,":[128],"we":[129],"also":[130],"introduce":[131],"consensus":[133],"mechanism,":[134],"Proof-of-Trustworthiness.":[135],"It":[136],"aggregates":[137],"above":[139],"procedures":[140],"into":[141],"score":[144],"reflect":[146],"way.":[155],"We":[156],"develop":[157],"prototypes":[158],"based":[162],"low-cost":[164],"generic":[165],"hardware":[166],"together":[167],"campus":[171],"provides":[173],"avatars":[174],"trustworthy":[176],"identities.":[177],"Intensive":[178],"performance":[179],"evaluation":[180],"show":[184],"is":[189],"practical":[190],"for":[191],"anti-sybil":[192],"scenarios.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
