Junliang Luo’s research while affiliated with McGill University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (9)


Toward Resilient Airdrop Mechanisms: Empirical Measurement of Hunter Profits and Airdrop Game Theory Modeling
  • Preprint

March 2025

·

1 Read

Junliang Luo

·

Hong Kang

·

·

Xue Liu

Airdrops issued by platforms are to distribute tokens, drive user adoption, and promote decentralized services. The distributions attract airdrop hunters (attackers), who exploit the system by employing Sybil attacks, i.e., using multiple identities to manipulate token allocations to meet eligibility criteria. While debates around airdrop hunting question the potential benefits to the ecosystem, exploitative behaviors like Sybil attacks clearly undermine the system's integrity, eroding trust and credibility. Despite the increasing prevalence of these tactics, a gap persists in the literature regarding systematic modeling of airdrop hunters' costs and returns, alongside the theoretical models capturing the interactions among all roles for airdrop mechanism design. Our study first conducts an empirical analysis of transaction data from the Hop Protocol and LayerZero, identifying prevalent attack patterns and estimating hunters' expected profits. Furthermore, we develop a game-theory model that simulates the interactions between attackers, organizers, and bounty hunters, proposing optimal incentive structures that enhance detection while minimizing organizational costs.







Towards Improved Illicit Node Detection with Positive-Unlabelled Learning

March 2023

·

13 Reads

Detecting illicit nodes on blockchain networks is a valuable task for strengthening future regulation. Recent machine learning-based methods proposed to tackle the tasks are using some blockchain transaction datasets with a small portion of samples labeled positive and the rest unlabelled (PU). Albeit the assumption that a random sample of unlabeled nodes are normal nodes is used in some works, we discuss that the label mechanism assumption for the hidden positive labels and its effect on the evaluation metrics is worth considering. We further explore that PU classifiers dealing with potential hidden positive labels can have improved performance compared to regular machine learning models. We test the PU classifiers with a list of graph representation learning methods for obtaining different feature distributions for the same data to have more reliable results.


Understanding NFT Price Moves through Social Media Keywords Analysis

September 2022

·

63 Reads

Non-Fungible Token (NFT) is evolving with the rise of the cryptocurrency market and the development of blockchain techniques, which leads to an emerging NFT market that has become prosperous rapidly. The overall rise procedure of the NFT market has not been well understood. To this end, we consider that social media communities evolving alongside the market growth, are worth exploring and reasoning about, as the mineable information might unveil the market behaviors. We explore the procedure from the perspective of NFT social media communities and its impact on the NFT price moves with two experiments. We perform a Granger causality test on the number of tweets and the NFT price time series and find that the number of tweets has a positive impact on (Granger-causes) the price or reversely for more than half of the 19 top authentic NFT projects but seldom copycat projects. Besides, to investigate the price moves predictability using social media features, we conduct an experiment of predicting Markov normalized NFT price (representing the direction and magnitude of price moves) given social-media-extracted word features and interpret the feature importance to find insights into the NFT communities. Our results show that social media words as the predictors result in all 19 top projects having a testing accuracy above the random baseline. Based on the feature importance analysis, we find that both general market-related words and NFT event-related words have a markedly positive contribution in predicting price moves.


Figure 1. Graphical User Interface (GUI) Design of SPENDER Platform.
SPENDER BACK-END MESSAGES. "SC" STANDS FOR SMART CONTRACT.
SPENDER: A Platform for Secure and Privacy-Preserving Decentralized P2P E-Commerce
  • Preprint
  • File available

June 2022

·

92 Reads

·

1 Citation

The blockchain technology empowers secure, trustless, and privacy-preserving trading with cryptocurrencies. However, existing blockchain-based trading platforms only support trading cryptocurrencies with digital assets (e.g., NFTs). Although several payment service providers have started to accept cryptocurrency as a payment method for tangible goods (e.g., Visa, PayPal), customers still need to trust and hand over their private information to centralized E-commerce platforms (e.g., Amazon, eBay). To enable trustless and privacy-preserving trading between cryptocurrencies and real goods, we propose SPENDER, a smart-contract-based platform for Secure and Privacy-PresErviNg Decentralized P2P E-commeRce. The design of our platform enables various advantageous features and brings unlimited future potential. Moreover, our platform provides a complete paradigm for designing real-world Web3 infrastructures on the blockchain, which broadens the application scope and exploits the intrinsic values of cryptocurrencies. The platform has been built and tested on the Terra ecosystem, and we plan to open-source the code later.

Download

Citations (4)


... This work also emphasizes the efficiency of algorithms in terms of computational costs. In article [16], methods for automatic digital identity verification are presented where identities based on JSON are issued. Users can authenticate themselves with these certificates at external service providers without needing to refer back to the issuer. ...

Reference:

Identity Chain
IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON
  • Citing Conference Paper
  • May 2024

... Registre-se que o termo "metaverso" aparece explicitamente em chamada SBIE apenas a partir de 2022, em um movimento típico responsivo aos trabalhos raros porém significativos que têm atendido [Machado et al. 2023, Damasceno et al. 2023 A arquitetura do Decentralandé composta por três elementos principais: a rede Catalyst, que representa um conjunto de servidores distribuídos que fornecem serviços essenciais por Application Programming Interface (API); o Command Line Interface (CLI), ferramenta de linha de comando utilizada por criadores para construção e execução de novos projetos; e o World Explorer, cliente Web ou desktop pelo qual os jogadores podem ingressar e explorar o metaverso. Por conta de sua natureza descentralizada, a plataforma também disponibiliza, de forma transparente, serviços que fornecem informações sobre o tráfego de transações, viabilizando análises sobre o comportamento dos usuários, atividades econômicas e engajamento da comunidade, como amplamente explorado em [Luo et al. 2023]. ...

Unveiling social aggregation in the Decentraland metaverse platform
  • Citing Conference Paper
  • September 2023

... Among the social media platforms, Twitter is the most commonly used for promoting NFT projects, where both Discord and external promotional websites also serve as important secondary channels. Prior research [46], [47] has demonstrated that Twitter and Discord are particu-larly effective for NFT promotion due to their real-time interaction capabilities and community-driven dynamics. In this part, we will characterize the role of social media in cybersquatting NFT collections. ...

Understanding NFT Price Moves through Tweets Keywords Analysis
  • Citing Conference Paper
  • September 2023

... Following the approaches of previous studies [6,23,25,27,40,43], we proposed a random-walk-based approach for its parallelism ability across nodes, offering improved efficiency potentials. We first incorporated the strategy of Unbiased Update proposed by Sajjad et al. [36] to adjust node representations without full graph retraining by trimming random walks at affected nodes and then continuing the walks, considering the graph's updated structure. ...

Towards Improved Illicit Node Detection with Positive-Unlabelled Learning
  • Citing Conference Paper
  • May 2023