Special Issue "Blockchain Security"

Submission Deadline: 15 May 2021
Submit to Special Issue
Guest Editors
Prof. Zhihong Tian, Guangzhou University, China
Prof. Yanhui Guo, University of Illinois Springfield, USA
Prof. Shen Su, Guangzhou University, China
Prof. Hui Lu, Guangzhou University, China


Motivated by the fast evolvement of blockchain technology, cloud-edge platforms, intelligent transportation systems, smart grid, vehicular networks, location based services, and other IoT applications have achieved significant breakthrough during recent years. Nowadays, blockchain based researches and projects are super-hot topics and focuses for both research and industrial communities. However, most of the current blockchain projects still suffer from insufficient security concerns. The defects of the underlying protocol make the node communication vulnerable to be hijacked, and further exacerbate the fork problem; smart contracts can hardly be fully tested before deployment because of the evolving blockchain platforms, while the smart contracts updating is impossible (or very complicated); current data privacy protection techniques are either inefficient or inaccurate; sharing and cross-chain schemes brought new security problems together with its TPS promotion. The intrinsic security vulnerabilities make the current blockchain based systems and architectures prone to be assaulted, and further do harm to the confidence of the investment on the blockchain industrial. Worse still, blockchain turns out to play a critical role in a lot of existing security solutions, which would be useless if the blockchain is insecure.


This special issue aims to bring together researchers, engineers, students in both academic and industrial communities to share and present their recent insights and emerging results of the blockchain security technologies.

Potential topics include but are not limited to:
• Key management schemes for blockchain
• Theoretical model for blockchain
• Transaction anonymization techniques
• Smart contract vulnerability mining and formal verification methods
• Online transaction protection for smart contract
• Supervisory control and governance in blockchain networks
• Security solutions for cross-chain communication and multi-chain technology
• Security solutions for sharding techniques
• Network security of blockchain
• Data privacy protection scheme for blockchain data and network
• Security solutions for external data collection
• Security of consensus protocol
• Initialization and reconstruction schemes for blockchain
• Defense mechanism for blockchain cyber attacks
• Blockchain-based security reinforcement solutions

Published Papers
  • Stereo Matching Method Based on Space-Aware Network Model
  • Abstract The stereo matching method based on a space-aware network is proposed, which divides the network into three sections: Basic layer, scale layer, and decision layer. This division is beneficial to integrate residue network and dense network into the space-aware network model. The vertical splitting method for computing matching cost by using the space-aware network is proposed for solving the limitation of GPU RAM. Moreover, a hybrid loss is brought forward to boost the performance of the proposed deep network. In the proposed stereo matching method, the space-aware network is used to calculate the matching cost and then cross-based cost aggregation… More
  •   Views:126       Downloads:84        Download PDF