Shiping ChenThe Commonwealth Scientific and Industrial Research Organisation | CSIRO · Data61
Shiping Chen
PhD in CS | M.Eng | B.Eng | FIET
Blockchain/Web3/RWA, SE4AI, AI4SE
About
348
Publications
168,589
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,587
Citations
Introduction
Dr. Shiping Chen is an IT professional with over 20 years research experiences and combined R&D skills. He likes addressing real problems from real applications with scentific appraches and practical technologies. He enjoys writing papers, as well as coding. Here is his academic website for his R&D details:
https://www.cse.unsw.edu.au/~z9195738/
Skills and Expertise
Additional affiliations
Publications
Publications (348)
Although content sharing provides many benefits, content owners lose full control of their content once they are given away. Existing solutions provide limited capabilities of content access control as they are vendor-specific, non-structured and non-flexible. In this paper, we present an open and flexible software solution called SelfProtect Objec...
Trustworthy service recommendation has become indispensable for the success of the service ecosystem. However, traditional trustworthy methods somehow overlook the service equality which result into a " rich-get-richer " effect and become a barrier for the novice services to startup and grow. This paper addresses this problem through a novel equita...
In the paradigm of service oriented science, scientific computing applications and data are all wrapped as web accessible services. Scientific workflows further integrate these services to answer complex research questions. However, our earlier study conducted on myExperiment has revealed that although the sharing of service-based capabilities open...
This chapter describes a novel way of carrying out image analysis, reconstruction and processing tasks using cloud based service provided on the Australian National eResearch Collaboration Tools and Resources (NeCTAR) infrastructure. The toolbox allows users free access to a wide range of useful blocks of functionalities (imaging functions) that ca...
Smart contract vulnerabilities caused significant economic losses in blockchain applications. Large Language Models (LLMs) provide new possibilities for addressing this time-consuming task. However, state-of-the-art LLM-based detection solutions are often plagued by high false-positive rates. In this paper, we push the boundaries of existing resear...
Unmanned Aerial Vehicles (UAVs) have witnessed significant growth in various domains, such as agriculture, disaster management, and remote health management systems. However, the use of UAVs necessitates secure and efficient solutions that uphold privacy during task distribution. To address this challenge, this paper introduces a novel architecture...
BRC20 tokens are a type of non-fungible asset on the Bitcoin network. They allow users to embed customized content within Bitcoin satoshis. The related token frenzy has reached a market size of USD 3,650b over the past year (2023Q3-2024Q3). However, this intuitive design has not undergone serious security scrutiny. We present the first in-depth ana...
In this article, we explore the aftermath of the Silicon Valley Bank (SVB) collapse, with a particular focus on its impact on crypto markets. We conduct a multidimensional investigation, which includes a factual summary, analysis of user sentiment, and examination of market performance. We uncover a somewhat counterintuitive finding: the SVB collap...
Bitcoin is a cryptocurrency designed based on the concept of “decentralization,” and its price fluctuation is much larger than those of traditional financial assets, which has raised concerns about intentioned Bitcoin price manipulation. Most of the existing research on Bitcoin price manipulation is limited to the analysis of manipulation behaviors...
The Non-Fungible Tokens (NFTs) has the transformative impact on the visual arts industry by examining the nexus between empowering art practices and leveraging blockchain technology. First, we establish the context for this study by introducing some basic but critical technological aspects and affordances of the blockchain domain. Second, we revisi...
We present the first Systematization of Knowledge (SoK) on constructing Layer Two (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions (40 out of 335 extensively investigated cases) and provide a concise yet impactful identification of six classic design patterns through two approaches (i.e., modi...
Recent years have witnessed a surge in deep learning research, marked by the introduction of expansive generative models like OpenAI's SORA and GPT, Meta AI's LLAMA series, and Google's FLAN, BART, and Gemini models. However, the rapid advancement of large models (LM) has intensified the demand for computing resources, particularly GPUs, which are...
Stablecoin represents a unique subset of cryptocurrencies designed to offer price stability, achieved either through backing by specific assets or by employing algorithms that adjust their supply in response to market demand. In its landscape, algorithmic stablecoin is one special type that is not backed by any asset, and it stands to revolutionize...
As a new integrity authentication technology, subject-sensitive hashing has the ability to achieve subject-sensitive authentication for high-resolution remote sensing (HRRS) images and can provide a security guarantee for their subsequent use. However, existing research on subject-sensitive hashing focuses on improving the structure of the deep neu...
51% of Ethereum Blocks are OFAC Censored was one of the annual headlines in the year 2022. Short for Office of Foreign Assets Control, OFAC, as a division of the U.S. Treasury Department, made itself go on the stage of decentralized finance (DeFi). OFAC was originally established to impose economic sanctions on threats to the United States national...
FTX used to be the third-largest centralized exchange (CEX) in crypto space, managing over $10B in daily trading volume before its downfall. Such a giant, however, failed to avoid the fate of mania, panic, and crash. In this work, we revisit the FTX’s crash by telling it as a Ponzi story. In regards to why FTX could not sustain this Ponzi game, we...
Deep neural networks (DNNs) have widespread applications in industries such as image recognition, supply chain, medical diagnosis, and autonomous driving. However, prior work has shown the high accuracy of a DNN model does not imply high robustness (i.e., consistent performances on new and future datasets) because the input data and external enviro...
This paper centers around a simple yet crucial question for everyday users: How should one choose their delegated validators within proof-of-stake (PoS) protocols, particularly in the context of Ethereum 2.0? This has been a long-overlooked gap, as existing studies have primarily focused on inter-committee (validator set) behaviors and activities,...
p>In this paper, we explore the aftermath of the Silicon Valley Bank (SVB) collapse, with a particular focus on its impact on crypto markets. We conduct a multi-dimensional investigation, which includes a factual summary, analysis of user sentiment, and examination of market performance. Based on such efforts, we uncover a somewhat counterintuitive...
p>In this paper, we explore the aftermath of the Silicon Valley Bank (SVB) collapse, with a particular focus on its impact on crypto markets. We conduct a multi-dimensional investigation, which includes a factual summary, analysis of user sentiment, and examination of market performance. Based on such efforts, we uncover a somewhat counterintuitive...
The health of mobile software ecosystems is closely related to the interests of software developers, end‐users, and stakeholders. Therefore, it is crucial to maintain the mobile software ecosystem healthy and functioning. Researchers have done considerable research on mobile software ecosystems like Android and iOS. However, the evolution laws impl...
Ethereum recently unveiled its upcoming roadmap's \textit{Splurge} phase, highlighting the integration of EIP-\hlhref{https://eips.ethereum.org/EIPS/eip-3074}{4337} as a foundational standard for account abstraction (AA). AA aims to enhance user accessibility and facilitate the expansion of functionalities. Anticipatedly, the deployment of AA is po...
Stablecoin is a medium of exchange with stable value in the world of decentralized finance (DeFi). In which, algorithmic stablecoins are one special type of stablecoins that are not backed by any asset. They stand to revolutionize the way a sovereign fiat operates. As implemented, algorithmic stablecoins are poorly stabilized in most cases; their p...
Quantum computing systems depend on the principles of quantum mechanics to perform multiple challenging tasks more efficiently than their classical counterparts. In classical software engineering, the software life cycle is used to document and structure the processes of design, implementation, and maintenance of software applications. It helps sta...
It is important to minimize the energy consumption of large-scale, geographically distributed edge data centers (EDCs). While modern processing units (PUs) have energy-saving features like Dynamic Voltage and Frequency Scaling (DVFS) and Per-Core Power Gating (PCPG), optimization is still complex and requires a holistic approach. This paper present...
In recent years, edge-based intelligent UAV delivery systems have attracted significant interest from both the academic and industrial sectors. One key obstacle faced by these smart UAV delivery systems is data privacy, as they rely on vast amounts of data from users and UAVs for training machine learning models for person re-identification (ReID)...
Google AlphaGos win has significantly motivated and sped up machine learning (ML) research and development, which led to tremendous ML technical advances and wider adoptions in various domains (e.g., Finance, Health, Defense, and Education). These advances have resulted in numerous new concepts and technologies, which are too many for people to cat...
Various data-sharing platforms have emerged with the growing public demand for open data and legislation mandating certain data to remain open. Most of these platforms remain opaque, leading to many questions about data accuracy, provenance and lineage, privacy implications, consent management, and the lack of fair incentives for data providers. Wi...
The next-generation blockchain ecosystem is expected to integrate both homogeneous and heterogeneous distributed ledgers. These systems require operations across multiple blockchains to enrich advanced functionalities for future applications. However, the development of blockchain interoperability involves much more complexity regarding the variety...
The utilization of distributed generation units (DG) in power distribution systems has increased the complexity of system monitoring and operation. Numerous information and communication technologies have been adopted recently to overcome the challenges and complexities associated with the integration of DG units in distribution systems. However, t...
The implicit prerequisite for using HRRS images is that the images can be trusted. Otherwise, their value would be greatly reduced. As a new data security technology, subject-sensitive hashing overcomes the shortcomings of existing integrity authentication methods and could realize subject-sensitive authentication of HRRS images. However, shortcomi...
To address the issues of the bond market’s low transparency, information disclosure efficiency, and rating’s ability to reveal risks, this paper proposes a blockchain-based bond primary market issuance service system, for companies to issue bonds efficiently at low cost. This paper presents the architecture design of the next-generation decentralis...
Limitations on high latency and low scalability of classical blockchain systems retard their adoptions and applications. Reconstructed blockchain systems have been proposed to avoid the consumption of competitive transactions caused by linear sequenced blocks. These systems, instead, structure transactions/blocks in the form of Directed Acyclic Gra...
FTX used to be the third-largest centralised exchange (CEX) in crypto markets, managing over \$10B in daily trading volume before its downfall. Such a giant, however, failed to avoid the fate of mania, panic, and crash. In this work, we revisit the FTX's crash by telling it as a Ponzi story. In regards to why FTX could not sustain this Ponzi game,...
Across industries, there is an ever-increasing rate of data sharing for collaboration and innovation between organizations and their customers, partners, suppliers, and internal teams. However, many enterprises are restricted from freely sharing data due to regulatory restrictions across different regions, performance issues in moving large volume...
Architectural design contexts contain a set of factors that influence software application development. Among them, \textit{\textbf{organizational}} design contexts consist of high-level company concerns and how it is structured, for example, stakeholders and development schedule, heavily impacting design considerations. Decentralized Autonomous Or...
Since the outbreak of COVID-19, an alternative way to keep students on the track, meanwhile, prevent them from being at the risk of infection is in highly demand. Many education providers had made a move in trial of delivering knowledge and learning materials remotely. Along with this trend, learning management systems, open educational resources (...
Decentralized Autonomous Organization (DAO) is an organization constructed by automatically executed rules such as via smart contracts, holding features of the permissionless committee, transparent proposals, and fair contribution by stakeholders. As of Nov 2022, DAO has impacted over \$11.2B market caps. However, there are no substantial studies f...
Deep neural networks (DNNs), are widely used in many industries such as image recognition, supply chain, medical diagnosis, and autonomous driving. However, prior work has shown the high accuracy of a DNN model does not imply high robustness (i.e., consistent performances on new and future datasets) because the input data and external environment (...
Algorithmic stablecoins (AS) are one special type of stablecoins that are not backed by any asset (equiv. without collateral). They stand to revolutionize the way a sovereign fiat operates. As implemented, these coins are poorly stabilized in most cases, easily deviating from the price target or even falling into a catastrophic collapse (a.k.a. Dea...
Garg et al. (TCC 2018) defined the notion of registration-based encryption (RBE) where the private key generator (PKG) is decoupled from key management and replaced by a key curator (KC). KC does not possess any cryptographic secrets and only plays the role of aggregating the public keys of all the registered users and updating the public parameter...
Existing NFTs confront restrictions of \textit{one-time incentive} and \textit{product isolation}. Creators cannot obtain benefits once having sold their NFT products due to the lack of relationships across different NFTs, which results in controversial possible profit sharing. This work proposes a referable NFT scheme to extend the incentive susta...
NEO is one of the top public chains worldwide. It adopts a new consensus algorithm called delegated Byzantine Fault Tolerance (dBFT). In this paper, we formalize dBFT via the state machine replication model and point out its potential issues. Our theoretical analysis indicates that dBFT could guarantee neither liveness nor safety , even if the numb...
With the characteristics of anonymity, trust, tamper-proof, etc., blockchain technology can effectively solve some problems faced by the financial market, such as trust issues and information asymmetry issues. To deeply understand the application scenarios of blockchain in the financial market, the issue of securities issuance and trading in the pr...
Federated Learning (FL) presents a privacy-compliant approach by sharing model parameters instead of raw data. However, how to motivate data owners to participate in and stay within an FL ecosystem by continuously contributing their data to the FL model remains a challenge. In this article, we propose a hybrid incentive mechanism based on blockchai...
With the gradual application of central bank digital currency (CBDC) in China, it brings new payment methods, but also potentially derives new money laundering paths. Two typical application scenarios of CBDC are considered, namely the anonymous transaction scenario and real-name transaction scenario. First, starting from the interaction network of...
Aiming at the deficiency that blockchain technology is too sensitive to the binary-level changes of high resolution remote sensing (HRRS) images, we propose a new subject-sensitive hashing algorithm specially for HRRS image blockchains. To implement this subject-sensitive hashing algorithm, we designed and implemented a deep neural network model Mu...
Web3 is the most hyped concept from 2020 to date, greatly motivating the prosperity of the Internet of Value and Metaverse. However, no solid evidence stipulates the exact definition, criterion, or standard in the sense of such a buzzword. To fill the gap, we aim to clarify the term in this work. We narrow down the connotation of Web3 by separating...
Since the emergence of blockchain technology, its application in the financial market has always been an area of focus and exploration by all parties. With the characteristics of anonymity, trust, tamper-proof, etc., blockchain technology can effectively solve some problems faced by the financial market, such as trust issues and information asymmet...
The Coronavirus disease 2019 (COVID-19) outbreak quickly spread around the world, resulting in over 240 million infections and 4 million deaths by Oct 2021. While the virus is spreading from person to person silently, fear has also been spreading around the globe. The COVID-19 information from the Australian Government is convincing but not timely...