Qin Wang

Orcid: 0000-0003-2264-749X

Affiliations:
  • CSIRO, Data61, Eveleigh, Australia
  • Swinburne University of Technology, Hawthorn, VIC, Australia


According to our database1, Qin Wang authored at least 96 papers between 2017 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
TDML - A Trustworthy Distributed Machine Learning Framework.
Future Gener. Comput. Syst., 2026

2025
Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges.
ACM Comput. Surv., August, 2025

Understanding NFTs from EIP Standards.
CoRR, August, 2025

Prompt to Pwn: Automated Exploit Generation for Smart Contracts.
CoRR, August, 2025

Are NFTs Ready to Keep Australian Artists Engaged?
CoRR, July, 2025

SoK: Semantic Privacy in Large Language Models.
CoRR, June, 2025

Talking Transactions: Decentralized Communication through Ethereum Input Data Messages (IDMs).
CoRR, May, 2025

PoLO: Proof-of-Learning and Proof-of-Ownership at Once with Chained Watermarking.
CoRR, May, 2025

Accountability and Reliability in 6G O-RAN: Who is Responsible When it Fails?
IEEE Wirel. Commun., April, 2025

IronForge: An Open, Secure, Fair, Decentralized Federated Learning.
IEEE Trans. Neural Networks Learn. Syst., January, 2025

Large Language Models for Cryptocurrency Transaction Analysis: A Bitcoin Case Study.
CoRR, January, 2025

BRC20 Snipping Attack.
CoRR, January, 2025

RandFlash: Breaking the Quadratic Barrier in Large-Scale Distributed Randomness Beacons.
IEEE Trans. Inf. Forensics Secur., 2025

Bringing Smart Contract Confidentiality via Trusted Hardware: Fact and Fiction.
IEEE Trans. Inf. Forensics Secur., 2025

Accountable Decryption Made Formal and Practical.
IEEE Trans. Inf. Forensics Secur., 2025

Dm 2: Decision-making market for DApps.
Comput. Electr. Eng., 2025

The Privacy Pillar - A Conceptual Framework for Foundation Model-Based Systems.
Proceedings of the IEEE/ACM International Workshop on Responsible AI Engineering, 2025

Logic Meets Magic: LLMs Cracking Smart Contract Vulnerabilities.
Proceedings of the 2025 IEEE International Conference on Blockchain and Cryptocurrency, 2025

FluxLayer: High-Performance Design for Cross-chain Fragmented Liquidity.
Proceedings of the 2025 IEEE International Conference on Blockchain and Cryptocurrency, 2025

FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
Toward Web3 Applications: Easing the Access and Transition.
IEEE Trans. Comput. Soc. Syst., October, 2024

Cryptocurrency in the Aftermath: Unveiling the Impact of the SVB Collapse.
IEEE Trans. Comput. Soc. Syst., October, 2024

Leveraging Ponzi-like designs in stablecoins.
Int. J. Netw. Manag., 2024

Covert communication via blockchain: Hiding patterns and communication patterns.
Comput. Stand. Interfaces, 2024

BRC20 Pinning Attack.
CoRR, 2024

Empowering Visual Artists with Tokenized Digital Assets with NFTs.
CoRR, 2024

SoK: Bitcoin Layer Two (L2).
CoRR, 2024

Is Your AI Truly Yours? Leveraging Blockchain for Copyrights, Provenance, and Lineage.
CoRR, 2024

Maximizing NFT Incentives: References Make You Rich.
CoRR, 2024

PDTS: Practical Data Trading Scheme in Distributed Environments.
Proceedings of the Provable and Practical Security, 2024

Juno: Aggregated Vector Consensus for Optimal Asynchronous Common Subset.
Proceedings of the 29th IEEE Pacific Rim International Symposium on Dependable Computing, 2024

Exploring the Market Dynamics of Liquid Staking Derivatives (LSDs).
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Bitcoin Inscriptions: Foundations and Beyond.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Bridging BRC-20 to Ethereum.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

An Empirical Case Study of Meta-IP Chain DAO: The Pioneer Tokenless DAO.
Proceedings of the 9th IEEE International Conference on Data Science in Cyberspace, 2024

A Responsibility Pillar: Exploring and Assessing Decentralized Intelligence.
Proceedings of the IEEE International Conference on Blockchain, 2024

Janus: Enhancing Asynchronous Common Subset with Trusted Hardware.
Proceedings of the Annual Computer Security Applications Conference, 2024

2023
SoK: DAG-based Blockchain Systems.
ACM Comput. Surv., December, 2023

A Scalable Cross-Chain Access Control and Identity Authentication Scheme.
Sensors, February, 2023

How to Rationally Select Your Delegatee in PoS.
IACR Cryptol. ePrint Arch., 2023

Accountable Decryption made Formal and Practical.
IACR Cryptol. ePrint Arch., 2023

Transaction Fairness in Blockchains, Revisited.
IACR Cryptol. ePrint Arch., 2023

Decentralized Finance (DeFi): A Survey.
IACR Cryptol. ePrint Arch., 2023

Transparent Registration-Based Encryption through Blockchain.
Distributed Ledger Technol. Res. Pract., 2023

Formal Security Analysis on dBFT Protocol of NEO.
Distributed Ledger Technol. Res. Pract., 2023

Exploring Blockchains Interoperability: A Systematic Survey.
ACM Comput. Surv., 2023

BRC-20: Hope or Hype.
CoRR, 2023

Bridging BRC-20 to Ethereum.
CoRR, 2023

Split Unlearning.
CoRR, 2023

Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges.
CoRR, 2023

IronForge: An Open, Secure, Fair, Decentralized Federated Learning.
CoRR, 2023

Time-manipulation Attack: Breaking Fairness against Proof of Authority Aura.
Proceedings of the ACM Web Conference 2023, 2023

BDTS: Blockchain-Based Data Trading System.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Leveraging Architectural Approaches in Web3 Applications - A DAO Perspective Focused.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Predicting NFT Classification with GNN: A Recommender System for Web3 Assets.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A First Look into Blockchain DAOs.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A Referable NFT Scheme.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

BDSP: A Fair Blockchain-enabled Framework for Privacy-Enhanced Enterprise Data Sharing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Rational Ponzi Game in Algorithmic Stablecoin.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A First Dive into OFAC in DeFi Space.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

FTX Collapse: A Ponzi Story.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

Evaluation of Contemporary Smart Contract Analysis Tools.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

Account Abstraction, Analysed.
Proceedings of the IEEE International Conference on Blockchain, 2023

SID: Service Identification and Discovery Framework for Decentralised Supply Chains.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023

2022
SoK: TEE-Assisted Confidential Smart Contract.
Proc. Priv. Enhancing Technol., 2022

Blockchain Enables Your Bill Safer.
IEEE Internet Things J., 2022

An Empirical Study on Snapshot DAOs.
CoRR, 2022

BDTS: A Blockchain-based Data Trading System with Fair Exchange.
CoRR, 2022

Rational Ponzi Games in Algorithmic Stablecoin.
CoRR, 2022

Towards Web3 Applications: Easing the Access and Transition.
CoRR, 2022

Exploring Web3 From the View of Blockchain.
CoRR, 2022

How Do Smart Contracts Benefit Security Protocols?
CoRR, 2022

Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment.
Proceedings of the IEEE International Conference on Trust, 2022

Frontrunning Block Attack in PoA Clique: A Case Study.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

PXCrypto: A Regulated Privacy-Preserving Cross-Chain Transaction Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Anonymous Blockchain-based System for Consortium.
ACM Trans. Manag. Inf. Syst., 2021

Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets.
IACR Cryptol. ePrint Arch., 2021

Non-Fungible Token (NFT): Overview, Evaluation, Opportunities and Challenges.
CoRR, 2021

A Weak Consensus Algorithm and Its Application to High-Performance Blockchain.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

An Offline Delegatable Cryptocurrency System.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

2020
Preserving transaction privacy in bitcoin.
Future Gener. Comput. Syst., 2020

Cecoin: A decentralized PKI mitigating MitM attacks.
Future Gener. Comput. Syst., 2020

SoK: Diving into DAG-based Blockchain Systems.
CoRR, 2020

An Accountable Decryption System Based on Privacy-Preserving Smart Contracts.
Proceedings of the Information Security - 23rd International Conference, 2020

Security Analysis on dBFT Protocol of NEO.
Proceedings of the Financial Cryptography and Data Security, 2020

PPM: A Provenance-Provided Data Sharing Model for Open Banking via Blockchain.
Proceedings of the Australasian Computer Science Week, 2020

Security Analysis on Tangle-Based Blockchain Through Simulation.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Bug Searching in Smart Contract.
CoRR, 2019

Improving the scalability of blockchain through DAG.
Proceedings of the 20th International Middleware Conference Doctoral Symposium, 2019

An Efficient Supply Chain Architecture Based on Blockchain for High-value Commodities.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

ArtChain: Blockchain-Enabled Platform for Art Marketplace.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Lightweight and Manageable Digital Evidence Preservation System on Bitcoin.
J. Comput. Sci. Technol., 2018

2017
Authenticity Protection in Outsourced Database.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Outsourcing Encrypted Excel Files.
Proceedings of the Information Security Practice and Experience, 2017


  Loading...