[1] GIUNGATO P, RANA R, TARABELLA A, et al. Current trends in sustainability of bitcoins and related blockchain technology[J]. Sustainability, 2017, 9(12):1-11. [2] 喻辉,张宗洋,刘建伟.比特币区块链扩容技术研究[J].计算机研究与发展,2017,54(10):2390-2403.(YU H, ZHANG Z Y, LIU J W. Research on scaling technology of bitcoin blockchain[J]. Journal of Computer Research and Development, 2017, 54(10):2390-2403.) [3] 王继业,高灵超,董爱强,等.基于区块链的数据安全共享网络体系研究[J].计算机研究与发展,2017,54(4):742-749.(WANG J Y, GAO L C, DONG A Q, et al. Block chain based data security sharing network architecture research[J]. Journal of Computer Research and Development, 2017, 54(4):742-749.) [4] NAKAMOTO S. Bitcoin:a peer-to-peer electronic cash system[EB/OL]. (2008)[2018-05-03]. http://bitcoin.org/bitcoin.pdf. [5] DELGADO-SEGURA S, TANAS C, HERRERA-JOANCOMARTÍ J. Reputation and reward:two sides of the same bitcoin[J]. Sensors, 2016, 16(6):776. [6] GARDNER-STEPHEN P. Escalating the war on SPAM through practical PoW exchange[C]//Proceedings of the 200715th IEEE International Conference on Networks. Piscataway, NJ:IEEE, 2007:473-476. [7] GOBEL J, KRZESINSKI A E. Increased block size and bitcoin blockchain dynamics[C]//Proceedings of the 201727th International Telecommunication Networks and Applications Conference. Piscataway, NJ:IEEE, 2017:1-6. [8] COURTOIS N T, EMIRDAG P, WANG Z. On detection of bitcoin mining redirection attacks[C]//Proceedings of the 2015 International Conference on Information Systems Security and Privacy. Piscataway, NJ:IEEE, 2015:98-105. [9] VILIM M, DUWE H, KUMAR R. Approximate bitcoin mining[C]//Proceedings of the 53rd Annual Design Automation Conference. New York:ACM, 2016:Article No. 97. [10] KRAFT D. Difficulty control for blockchain-based consensus systems[J]. Peer-to-Peer Networking and Applications, 2016, 9(2):397-413. [11] LIU Y, CHEN X Y, ZHANG L, et al. An intelligent strategy to gain profit for bitcoin mining pools[C]//Proceedings of the 10th International Symposium on Computational Intelligence and Design. Piscataway, NJ:IEEE, 2017:427-430. [12] BAG S, RUJ S, SAKURAI K. Bitcoin block withholding attack:analysis and mitigation[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(8):1967-1978. [13] GÖBEL J, KRZESINSKI A E, KEELER H P, et al. Bitcoin blockchain dynamics:the selfish-mine strategy in the presence of propagation delay[J]. Performance Evaluation, 2016, 104:23-41. [14] LI J, KENDALL G, JOHN R. Computing Nash equilibria and evolutionarily stable states of evolutionary games[J]. IEEE Transactions on Evolutionary Computation, 2016, 20(3):460-469. [15] EYAL I. The miner's dilemma[C]//Proceedings of the 2015 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2015:89-103. [16] KENTER F, MEIGS E. Iterated prisoner's dilemma with extortionate zero-determinant strategies and random-memory opponents[C]//Proceedings of the 2016 IEEE Congress on Evolutionary Computation. Piscataway, NJ:IEEE, 2016:3499-3506. [17] KOSTYUK N. The digital prisoner's dilemma:challenges and opportunities for cooperation[EB/OL].[2018-07-11]. http://cybersummit.info/sites/cybersummit.info/files/The%20Digital%20Prisoner's%20Dilemma-Challenges%20and%20Opportunities%20for%20Cooperation_Nadiya%20Kostyuk%20.pdf. [18] CARBONELL-NICOLAU O, McLEAN R P. On the existence of Nash equilibrium in Bayesian games[J]. Mathematics of Operations Research, 2017, 60(S1/2):73-87. [19] BARLOW L A. The impact of Agent size and number of rounds on cooperation in the iterated prisoner's dilemma[C]//Proceedings of 2014 IEEE Symposium on Foundations of Computational Intelligence. Piscataway, NJ:IEEE, 2014:120-127. [20] FEHL K, van der POST D J, SEMMANN D. Co-evolution of behaviour and social network structure promotes human cooperation[J]. Ecology Letters, 2011, 14(6):546-551. [21] WANG J, SURI S, WATTS D J. Cooperation and assortativity with dynamic partner updating[J]. Proceedings of the National Academy of Sciences of the United States of America, 2012, 109(36):14363-14368. [22] 李勇.重复囚徒困境模型中零行列式策略的研究[D].苏州:苏州大学,2015:1-50.(LI Y. Study on zero-determinant strategies in Iterated prisoner's dilemma game[D]. Suzhou:Soochow University, 2015:1-50.) [23] XUE L, SUN C Y, WUNSCH D, et al. An adaptive strategy via reinforcement learning for the prisoner's dilemma game[J]. IEEE/CAA Journal of Automatica Sinica, 2018, 5(1):1-10. [24] PRESS W H, DYSON F J. Iterated prisoner's dilemma contains strategies that dominate any evolutionary opponent[J]. Proceedings of the National Academy of Sciences of the United States of America, 2012, 109(26):10409-10413. [25] BABA N, TAKAGAWARA Y. Application of temporal difference learning method to computer gaming[C]//Proceedings of the 19982nd International Conference on Knowledge-based Intelligent Electronic Systems. Piscataway, NJ:IEEE, 1998:36-39. |