Cited By
View all- Nikhalat-Jahromi ASaghiri AMeybodi M(2025)Asymmetric variable depth learning automaton and its application in defending against selfish mining attacks on bitcoinApplied Soft Computing10.1016/j.asoc.2024.112416170(112416)Online publication date: Feb-2025
- Bhattacharyya RDave PDey PNath SDastani MSichman JAlechina NDignum V(2024)Optimal Referral Auction DesignProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3662867(198-206)Online publication date: 6-May-2024
- Ferreira MGanesh AHourigan JHuh HWeinberg SYu CKleinberg RSaban DBergemann D(2024)Computing Optimal Manipulations in Cryptographic Self-Selection Proof-of-Stake ProtocolsProceedings of the 25th ACM Conference on Economics and Computation10.1145/3670865.3673602(676-702)Online publication date: 8-Jul-2024
- Show More Cited By