Login / Signup
Defending Against Malicious Reorgs in Tezos Proof-of-Stake.
Michael Neuder
Daniel J. Moroz
Rithvik Rao
David C. Parkes
Published in:
CoRR (2020)
Keyphrases
</>
theorem prover
theorem proving
malicious users
information retrieval
case study
probabilistic model
data sets
neural network
malicious behavior