scispace - formally typeset
W

Weifeng Lu

Researcher at Nanjing University of Posts and Telecommunications

Publications -  9
Citations -  82

Weifeng Lu is an academic researcher from Nanjing University of Posts and Telecommunications. The author has contributed to research in topics: Reverse auction & Edge computing. The author has an hindex of 2, co-authored 9 publications receiving 12 citations.

Papers
More filters
Journal ArticleDOI

Edge Blockchain Assisted Lightweight Privacy-Preserving Data Aggregation for Smart Grid

TL;DR: This work integrates edge computing and blockchain to design a three-layer architecture data aggregation scheme for smart grid, which shows great superiority in terms of resisting network attacks, reducing system computation costs and communication overhead compared with existing schemes.
Journal ArticleDOI

Truthful Multi-Resource Transaction Mechanism for P2P Task Offloading Based on Edge Computing

TL;DR: In this article, the authors proposed two user models for the P2P task offloading system: honest user model and strategy user model, and formulated the resource allocation maximization problem with latency and energy consumption constraints as an Integer Linear Programming.
Journal ArticleDOI

Incentive Mechanism for Rational Miners in Bitcoin Mining Pool

TL;DR: This paper designs an incentive mechanism, called Mining game, using a Stackelberg game, and shows that Mining game is individually rational, profitable, and has the unique StACkelberg Equilibrium .
Journal ArticleDOI

Auction design for cross-edge task offloading in heterogeneous mobile edge clouds

TL;DR: Zhang et al. as mentioned in this paper designed the auction-based truthful incentive mechanisms for heavily loaded task offloading system in heterogeneous MECs, which can achieve desirable properties of computational efficiency, individual rationality, budget balance, truthfulness, and guaranteed approximation.
Journal ArticleDOI

Improving physical layer security and efficiency in D2D underlay communication

TL;DR: This paper investigates the security and efficiency problem of D2D underlay communication in a base station cell area with the presence of malicious eavesdroppers.