{"id":"https://openalex.org/W7082651203","doi":"https://doi.org/10.1109/tnsm.2025.3612386","title":"Quality and Diversity Balanced Neighbor Selection Against Eclipse Attack in Blockchain System","display_name":"Quality and Diversity Balanced Neighbor Selection Against Eclipse Attack in Blockchain System","publication_year":2025,"publication_date":"2025-09-22","ids":{"openalex":"https://openalex.org/W7082651203","doi":"https://doi.org/10.1109/tnsm.2025.3612386"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2025.3612386","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3612386","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Liang Feng","orcid":"https://orcid.org/0000-0001-9144-9919"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liang Feng","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Cunqing Hua","orcid":"https://orcid.org/0000-0003-0243-805X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cunqing Hua","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Lingya Liu","orcid":"https://orcid.org/0000-0002-4877-5951"},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingya Liu","raw_affiliation_strings":["College of Information Engineering, Shanghai Maritime University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shanghai Maritime University, Shanghai, China","institution_ids":["https://openalex.org/I96733725"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jianan Hong","orcid":"https://orcid.org/0009-0000-1452-5252"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianan Hong","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.68692154,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"6","first_page":"6037","last_page":"6047"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6687999963760376,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6687999963760376,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13067","display_name":"Geological Modeling and Analysis","score":0.02889999933540821,"subfield":{"id":"https://openalex.org/subfields/1906","display_name":"Geochemistry and Petrology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14311","display_name":"Electrical and Electromagnetic Research","score":0.018699999898672104,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eclipse","display_name":"Eclipse","score":0.6421999931335449},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.6233999729156494},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5717999935150146},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4781000018119812},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.43380001187324524},{"id":"https://openalex.org/keywords/k-nearest-neighbors-algorithm","display_name":"k-nearest neighbors algorithm","score":0.4291999936103821},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42340001463890076},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.3716000020503998}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8468000292778015},{"id":"https://openalex.org/C2778505590","wikidata":"https://www.wikidata.org/wiki/Q141022","display_name":"Eclipse","level":2,"score":0.6421999931335449},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.6233999729156494},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5717999935150146},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5331000089645386},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4781000018119812},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.43380001187324524},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.4291999936103821},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42340001463890076},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.3716000020503998},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3504999876022339},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.34049999713897705},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.30410000681877136},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.2906000018119812},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.26809999346733093},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.25380000472068787},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25200000405311584},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3612386","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3612386","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1274132208","display_name":null,"funder_award_id":"62171278","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G649695974","display_name":null,"funder_award_id":"62202290","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7904373282","display_name":null,"funder_award_id":"2022YFB2702302","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2138779671","https://openalex.org/W2611050176","https://openalex.org/W2744533984","https://openalex.org/W2807841289","https://openalex.org/W2969915801","https://openalex.org/W2971532963","https://openalex.org/W2979341164","https://openalex.org/W2996914656","https://openalex.org/W2998395527","https://openalex.org/W3003070882","https://openalex.org/W3003594639","https://openalex.org/W3015486462","https://openalex.org/W3040649972","https://openalex.org/W3042070225","https://openalex.org/W3087802308","https://openalex.org/W3090297697","https://openalex.org/W3097022228","https://openalex.org/W3148392649","https://openalex.org/W3165076188","https://openalex.org/W4310050354","https://openalex.org/W4312808404","https://openalex.org/W4375854063"],"related_works":[],"abstract_inverted_index":{"Blockchain":[0],"technology":[1],"has":[2],"gained":[3],"widespread":[4],"adoption":[5],"across":[6],"diverse":[7,39,121],"applications;":[8],"however,":[9,47],"its":[10],"peer-to-peer":[11],"network":[12,129],"architecture":[13],"remains":[14],"susceptible":[15],"to":[16,32,42,63,113],"eclipse":[17,145],"attacks":[18,34],"via":[19],"malicious":[20],"neighbor":[21,40,83,139],"infiltration.":[22],"Existing":[23],"defense":[24],"mechanisms":[25],"typically":[26],"rely":[27],"either":[28],"on":[29,38],"historical":[30],"data":[31,77,130],"detect":[33],"post":[35],"hoc":[36],"or":[37],"selection":[41,58,84,140],"prevent":[43],"them.":[44],"These":[45],"approaches,":[46],"exhibit":[48],"critical":[49],"limitations:":[50],"detection-based":[51],"strategies":[52],"are":[53],"inherently":[54],"reactive,":[55],"while":[56],"diversity-based":[57],"lacks":[59],"rigorous":[60],"quantitative":[61],"models":[62],"characterize":[64],"the":[65,82,87,106,133],"differences":[66,99],"between":[67],"neighbors.":[68,124],"To":[69],"bridge":[70],"this":[71,73],"gap,":[72],"paper":[74],"proposes":[75],"integrating":[76],"analysis":[78],"techniques":[79],"directly":[80],"into":[81],"process.":[85],"Specifically,":[86],"proposed":[88,134],"method":[89],"dynamically":[90],"evaluates":[91],"peers\u2019":[92],"block":[93],"propagation":[94],"performance":[95],"and":[96,120,141],"quantifies":[97],"inter-peer":[98],"using":[100],"Wasserstein":[101],"distance":[102],"metrics.":[103],"This":[104],"enables":[105],"application":[107],"of":[108,118],"determinantal":[109],"point":[110],"processes":[111],"(DPPs)":[112],"select":[114],"an":[115],"optimal":[116],"set":[117],"high-performing":[119],"peers":[122],"as":[123],"Empirical":[125],"evaluation":[126],"utilizing":[127],"Bitcoin":[128],"demonstrates":[131],"that":[132],"scheme":[135],"simultaneously":[136],"achieves":[137],"adaptive":[138],"robust":[142],"protection":[143],"against":[144],"attacks.":[146]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
