Y Chen, H Chen, Z Xiong, B Liu, Z Wang… - Digital Communications …, 2022 - Elsevier
The malicious mining pool can sacrifice part of its revenue to employ the computing power of
blockchain network. The employed computing power carries out the pool mining attacks on …