Table of Links
1.3 Our Work and Contributions and 1.4 Organization
-
Related Work
-
Prosecutor Design
-
OS2a: Objective Service Assessment for Mobile AIGC
-
OS2A on Prosecutor: Two-Phase Interaction for Mobile AIGC
-
Implementation and Evaluation
7.1 Implementation and Experimental Setup
7.2 Prosecutor Performance Evaluation
7.4 Security Analysis
TABLE 2 summarizes the defenses of ProSecutor against potential security issues. Firstly, the attacks aiming to destroy ProSecutor in terms of the consistency, identity, and liveness [39] can be effectively defended by DPoS, SHA256- based cryptography scheme, and transaction fee scheme, respectively. Since these defenses are theoretically proven [32], [33], we omit the detailed explanations. Secondly, during the opinion collection and reputation calculation, the attackers can adopt diverse ways to tamper with the values. Leveraging MWSL [16], we calibrate the reputation by Familiarity, Freshness, and Market worth factors, which are proven to defend flooding, long-range, and dusting attacks effectively. Furthermore, the contract theoretic payment scheme and duplex transfer channels are proven to defend the moral hazard and repudiation, respectively.
Authors:
(1) Yinqiu Liu, School of Computer Science and Engineering, Nanyang Technological University, Singapore ([email protected]);
(2) Hongyang Du, School of Computer Science and Engineering, Nanyang Technological University, Singapore ([email protected]);
(3) Dusit Niyato, School of Computer Science and Engineering, Nanyang Technological University, Singapore ([email protected]);
(4) Jiawen Kang, School of Automation, Guangdong University of Technology, China ([email protected]);
(5) Zehui Xiong, Pillar of Information Systems Technology and Design, Singapore University of Technology and Design, Singapore ([email protected]);
(6) Abbas Jamalipour, School of Electrical and Information Engineering, University of Sydney, Australia ([email protected]);
(7) Xuemin (Sherman) Shen, Department of Electrical and Computer Engineering, University of Waterloo, Canada ([email protected]).
This paper is