W
Weifeng Lu
Researcher at Nanjing University of Posts and Telecommunications
Publications - 9
Citations - 82
Weifeng Lu is an academic researcher from Nanjing University of Posts and Telecommunications. The author has contributed to research in topics: Reverse auction & Edge computing. The author has an hindex of 2, co-authored 9 publications receiving 12 citations.
Papers
More filters
Journal ArticleDOI
Edge Blockchain Assisted Lightweight Privacy-Preserving Data Aggregation for Smart Grid
TL;DR: This work integrates edge computing and blockchain to design a three-layer architecture data aggregation scheme for smart grid, which shows great superiority in terms of resisting network attacks, reducing system computation costs and communication overhead compared with existing schemes.
Journal ArticleDOI
Truthful Multi-Resource Transaction Mechanism for P2P Task Offloading Based on Edge Computing
TL;DR: In this article, the authors proposed two user models for the P2P task offloading system: honest user model and strategy user model, and formulated the resource allocation maximization problem with latency and energy consumption constraints as an Integer Linear Programming.
Journal ArticleDOI
Incentive Mechanism for Rational Miners in Bitcoin Mining Pool
TL;DR: This paper designs an incentive mechanism, called Mining game, using a Stackelberg game, and shows that Mining game is individually rational, profitable, and has the unique StACkelberg Equilibrium .
Journal ArticleDOI
Auction design for cross-edge task offloading in heterogeneous mobile edge clouds
TL;DR: Zhang et al. as mentioned in this paper designed the auction-based truthful incentive mechanisms for heavily loaded task offloading system in heterogeneous MECs, which can achieve desirable properties of computational efficiency, individual rationality, budget balance, truthfulness, and guaranteed approximation.
Journal ArticleDOI
Improving physical layer security and efficiency in D2D underlay communication
TL;DR: This paper investigates the security and efficiency problem of D2D underlay communication in a base station cell area with the presence of malicious eavesdroppers.