Publications

  • S. Ji, C. Huang, P. Zhang, and H. Dong, " Ponzi Scheme Detection Based on Control Flow Graph Feature Extraction," in The 2023 IEEE International Conference on Web Services (IEEE ICWS 2023), July 2023, doi: 10.1109/ICWS60048.2023.00077
    Keywords: Smart Contract Security
    This study introduces a machine learning approach to identify Ponzi schemes by extracting features from smart contracts using the control flow graph.
  • P. Zhang, Q. Yu,  Y. Xiao, H. Dong, X. Luo, X. Wang and M. Zhang, "BiAn: Smart Contract Source Code Obfuscation," in IEEE Transactions on Software Engineering, July 2023, doi: https://doi.org/10.1109/TSE.2023.3298609
    Keywords: Smart Contract Security
    This is the first work in this field that focuses on smart contract source code obfuscation, which is expected to have broad application prospects in areas such as smart contract copyright protection, vulnerability protection, etc.
  • H. Chu, P. Zhang, H. Dong, Y. Xiao, S. Ji, and W. Li, "A survey on smart contract vulnerabilities: Data sources, detection and repair," in Information and Software Technology. vol. 159, 107221, July 2023, doi: 10.1016/j.infsof.2023.107221
    Keywords: Smart contract testing
    We explore smart contract security from the perspectives of vulnerability data sources, vulnerability detection, and vulnerability defence.
  • S. Ji, S. Zhu, P. Zhang, H. Dong and J. Yang, "Test Case Generation for Data Flow Testing of Smart Contracts Based on Improved Genetic Algorithm," in IEEE Transactions on Reliability, May 2022, doi: 10.1109/TR.2022.3173025.
    Keywords: Smart contract testing
    We propose an improved genetic algorithm-based test-case generation approach for smart contract data flow testing to more efficiently generate test cases with high coverage.
  • J. Abdella, Z. Tari, A. Anwar, A. Mahmood and F. Han, "An Architecture and Performance Evaluation of Blockchain-Based Peer-to-Peer Energy Trading," in IEEE Transactions on Smart Grid, vol. 12, no. 4, pp. 3364-3378, July 2021, doi: 10.1109/TSG.2021.3056147.
    Keywords: Blockchain application, Blockchain performance/scalability
    This article proposes a Unified permissioned blockchain-based P2P-ET Architecture that integrates three different types of energy markets and provides a unified energy trading and payment settlement model.
  • S. Islam, S. Badsha, S. Sengupta, H. La, I. Khalil and M. Atiquzzaman, "Blockchain-Enabled Intelligent Vehicular Edge Computing," in IEEE Network, vol. 35, no. 3, pp. 125-131, May/June 2021, doi: 10.1109/MNET.011.2000554.
    Keywords: Blockchain application
    This paper proposes a blockchain-based decentralized architecture to enhance transparency in intelligent vehicular edge computing resource management and leverage edge consumers (e.g., vehicles) with a computation verification option.
  • Z. Rahman, I. Khalil, X. Yi and M. Atiquzzaman, "Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System," in IEEE Communications Magazine, vol. 59, no. 5, pp. 128-134, May 2021, doi: 10.1109/MCOM.001.2000679.
    Keywords: Blockchain application, Blockchain security
    This paper motivates demonstrating a framework to solve the existing security challenges (i.e., multi-party consents, the centralized trust of trusted certificate authority, etc.) for the Industry 4.0 Cyber-physical System.  
  • M. S. Rahman, I. Khalil and M. Atiquzzaman, "Blockchain-Powered Policy Enforcement for Ensuring Flight Compliance in Drone-Based Service Systems," in IEEE Network, vol. 35, no. 1, pp. 116-123, January/February 2021, doi: 10.1109/MNET.011.2000219.
    Keywords: Blockchain application
    We propose a blockchain-based policy enforcement mechanism in the drone-based delivery service systems to solve the issues of drone collision and unauthorized access to private and restricted areas.
  • S. Kudva, S. Badsha, S. Sengupta, I.Khalil, A. Zomaya, "Towards secure and practical consensus for blockchain based VANET, " in Information Sciences, vol. 545, 2021, pp. 170-187, doi:10.1016/j.ins.2020.07.060.
    Keywords: Blockchain application, Blockchain security
    In this paper, we propose a new technique called Proof of Driving (PoD), to randomize the selection of honest miners for generating the blocks efficiently for blockchain-based VANET applications
  • X. Yang, X. Yang, X, Yi, I. Khalil, X. Zhou, D. He, X. Huang, and S. Nepal, "Blockchain-Based Secure and Lightweight Authentication for Internet of Things," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3098007.
    Keywords: Blockchain application, Blockchain security
    In this paper, we proposed a new blockchain-based authentication scheme to meet the challenge of IoT devices' authenticity, privacy and security insurance.
  • M. A. Uddin, A. Stranieri, I. Gondal, and V. Balasubramanian, "A survey on the adoption of blockchain in IoT: challenges and solutions", in Blockchain: Research and Applications, 2021, 100006, doi: 10.1016/j.bcra.2021.100006.
    Keywords: Blockchain application
    In this paper, recent state-of-the-arts advances in blockchain for IoT, blockchain for Cloud IoT and blockchain for Fog IoT in the context of eHealth, smart cities, intelligent transport and other applications are analysed.
  • N. Sohrabi and Z. Tari, "ZyConChain: A Scalable Blockchain for General Applications," in IEEE Access, vol. 8, pp. 158893-158910, 2020, doi: 10.1109/ACCESS.2020.3020319.
    Keywords: Blockchain performance/scalability
    This work proposes a scalable blockchain protocol for general applications (i.e., not restricted to Cryptocurrencies). 
  • H. Cui, Z. Wan, X. Wei, S. Nepal and X. Yi, "Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3227-3238, 2020, doi: 10.1109/TIFS.2020.2973864.
    Keywords: Blockchain application, Blockchain security
    In this paper, we aim to design Functional Encryption with payable outsourced decryption schemes by leveraging the transactions on cryptocurrencies supported by the blockchain technology.
  • R. Yang, R. Wakefield, S. Lyu, S. Jayasuriya, F. Han, X. Yi, X. Yang, G. Amarasinghe, and S. Chen, Public and private blockchain in construction business process and information integration," in Automation in Construction, vol.118, 2020, 103276, doi: 10.1016/j.autcon.2020.103276.
    Keywords: Blockchain application
    In this paper, we aim to explore the feasibility of applying both public blockchain and private blockchain technologies in the construction industry using two industry cases.
aboriginal flag
torres strait flag

Acknowledgement of Country

RMIT University acknowledges the people of the Woi wurrung and Boon wurrung language groups of the eastern Kulin Nation on whose unceded lands we conduct the business of the University. RMIT University respectfully acknowledges their Ancestors and Elders, past and present. RMIT also acknowledges the Traditional Custodians and their Ancestors of the lands and waters across Australia where we conduct our business - Artwork 'Luwaytini' by Mark Cleaver, Palawa.

aboriginal flag
torres strait flag

Acknowledgement of Country

RMIT University acknowledges the people of the Woi wurrung and Boon wurrung language groups of the eastern Kulin Nation on whose unceded lands we conduct the business of the University. RMIT University respectfully acknowledges their Ancestors and Elders, past and present. RMIT also acknowledges the Traditional Custodians and their Ancestors of the lands and waters across Australia where we conduct our business.