{"id":"https://openalex.org/W3114683094","doi":"https://doi.org/10.1109/isncc49221.2020.9297209","title":"A Decentralized Tree-based Algorithm for Reliable Blockchain Communications","display_name":"A Decentralized Tree-based Algorithm for Reliable Blockchain Communications","publication_year":2020,"publication_date":"2020-10-20","ids":{"openalex":"https://openalex.org/W3114683094","doi":"https://doi.org/10.1109/isncc49221.2020.9297209","mag":"3114683094"},"language":"en","primary_location":{"id":"doi:10.1109/isncc49221.2020.9297209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc49221.2020.9297209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101726832","display_name":"Chih-Hao Lin","orcid":"https://orcid.org/0000-0001-8952-8028"},"institutions":[{"id":"https://openalex.org/I151221077","display_name":"Chung Yuan Christian University","ror":"https://ror.org/02w8ws377","country_code":"TW","type":"education","lineage":["https://openalex.org/I151221077"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chih-Hao Lin","raw_affiliation_strings":["Chung Yuan Christian University, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Chung Yuan Christian University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I151221077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101827049","display_name":"Wen\u2010Yuan Chen","orcid":"https://orcid.org/0000-0001-8652-7441"},"institutions":[{"id":"https://openalex.org/I151221077","display_name":"Chung Yuan Christian University","ror":"https://ror.org/02w8ws377","country_code":"TW","type":"education","lineage":["https://openalex.org/I151221077"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Wen-Yuan Chen","raw_affiliation_strings":["Chung Yuan Christian University, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Chung Yuan Christian University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I151221077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112593708","display_name":"Ping-Sheng Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ping-Sheng Lin","raw_affiliation_strings":["University of Waterloo, Waterloo, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, Ontario, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101726832"],"corresponding_institution_ids":["https://openalex.org/I151221077"],"apc_list":null,"apc_paid":null,"fwci":0.2781,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.69144124,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.833281397819519},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7531219124794006},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6282926797866821},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5988518595695496},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.5806664824485779},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5797083377838135},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5793260335922241},{"id":"https://openalex.org/keywords/overlay-network","display_name":"Overlay network","score":0.5525847673416138},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5468015074729919},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.5119065046310425},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4717346429824829},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.47062233090400696},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.4287121593952179},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4271078109741211},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28659531474113464},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2054779827594757},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0941997766494751}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.833281397819519},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7531219124794006},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6282926797866821},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5988518595695496},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.5806664824485779},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5797083377838135},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5793260335922241},{"id":"https://openalex.org/C169851745","wikidata":"https://www.wikidata.org/wiki/Q1331985","display_name":"Overlay network","level":3,"score":0.5525847673416138},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5468015074729919},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.5119065046310425},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4717346429824829},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.47062233090400696},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.4287121593952179},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4271078109741211},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28659531474113464},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2054779827594757},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0941997766494751},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isncc49221.2020.9297209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc49221.2020.9297209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309618","display_name":"Ministry of Science and Technology","ror":"https://ror.org/02b207r52"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1447726318","https://openalex.org/W1982700161","https://openalex.org/W2057248704","https://openalex.org/W2131903984","https://openalex.org/W2399830996","https://openalex.org/W2753701873","https://openalex.org/W2767976605","https://openalex.org/W2774231546","https://openalex.org/W6713022297"],"related_works":["https://openalex.org/W89955905","https://openalex.org/W1691715735","https://openalex.org/W1637847238","https://openalex.org/W2042060105","https://openalex.org/W2126533264","https://openalex.org/W2041341978","https://openalex.org/W2122565901","https://openalex.org/W2749656779","https://openalex.org/W4210965064","https://openalex.org/W2134691083"],"abstract_inverted_index":{"Blockchain":[0],"has":[1],"been":[2],"widely":[3],"used":[4,112],"in":[5,95,113,137],"monetary":[6],"systems,":[7],"hence":[8],"its":[9,92],"consistency":[10],"under":[11,49],"all":[12],"circumstances":[13],"is":[14,27,109],"a":[15,31,53,74,79,106,149],"serious":[16],"concern.":[17],"Since":[18],"it":[19,26],"can":[20],"be":[21],"damaged":[22],"physically":[23],"and":[24,38,90,129,147],"virtually,":[25],"crucial":[28],"to":[29,56,84,116],"develop":[30,78],"protection":[32],"mechanism":[33],"that":[34,133],"binds":[35],"both":[36,127],"overlay":[37],"underlay":[39],"networks.":[40],"This":[41],"paper":[42],"focuses":[43],"on":[44],"the":[45,58,68,71,86,96,100,124,143],"functionality":[46],"of":[47,60,70,81,102,145],"blockchain":[48,134,146],"attacks.":[50],"We":[51,77],"propose":[52],"heuristic":[54],"algorithm":[55],"enhance":[57],"reliability":[59],"information":[61],"propagation.":[62],"First,":[63],"for":[64,152],"underlay,":[65],"we":[66,98],"scrutinize":[67],"performance":[69],"network":[72],"during":[73],"partial":[75],"malfunction.":[76],"series":[80],"mathematical":[82],"formulas":[83],"construct":[85],"communication":[87],"tree":[88],"model":[89],"evaluate":[91],"delay.":[93],"Second,":[94],"overlay,":[97],"add":[99],"trustworthiness":[101],"each":[103],"node":[104],"as":[105],"parameter.":[107],"It":[108,140],"an":[110],"indicator":[111],"path":[114],"selection":[115],"avoid":[117],"malicious":[118],"tampering.":[119],"Our":[120],"purposed":[121],"method":[122],"strengthens":[123],"tie":[125],"between":[126],"physical":[128],"virtual":[130],"networks":[131],"so":[132],"thrives":[135],"even":[136],"abnormal":[138],"situations.":[139],"greatly":[141],"increases":[142],"resilience":[144],"provides":[148],"reliable":[150],"system":[151],"digital":[153],"transactions.":[154]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
