標題: Titlebook: Blockchain and Trustworthy Systems; 5th International Co Jiachi Chen,Bin Wen,Ting Chen Conference proceedings 2024 The Editor(s) (if applic [打印本頁] 作者: 減輕 時間: 2025-3-21 19:08
書目名稱Blockchain and Trustworthy Systems影響因子(影響力)
書目名稱Blockchain and Trustworthy Systems影響因子(影響力)學科排名
書目名稱Blockchain and Trustworthy Systems網(wǎng)絡公開度
書目名稱Blockchain and Trustworthy Systems網(wǎng)絡公開度學科排名
書目名稱Blockchain and Trustworthy Systems被引頻次
書目名稱Blockchain and Trustworthy Systems被引頻次學科排名
書目名稱Blockchain and Trustworthy Systems年度引用
書目名稱Blockchain and Trustworthy Systems年度引用學科排名
書目名稱Blockchain and Trustworthy Systems讀者反饋
書目名稱Blockchain and Trustworthy Systems讀者反饋學科排名
作者: demote 時間: 2025-3-21 22:14 作者: CHANT 時間: 2025-3-22 03:39
Dynamic Computation Offloading Leveraging Horizontal Task Offloading and?Service Migration in?Edge N the intermediate node selection issue are expounded as a multi-faceted .arkov .ecision .rocess (.) realm, the boundaries of which are contingent on the burden placed upon the incumbent network. As a means of diminishing the expansiveness of the aforementioned . sphere and facilitating prompt judgme作者: 正式演說 時間: 2025-3-22 07:14 作者: 嗎啡 時間: 2025-3-22 11:54 作者: Cumbersome 時間: 2025-3-22 15:07
Securing Blockchain Using Propagation Chain Learningven the-state-of-art smart contract vulnerability detection methods on a large-scale smart contract dataset based on the Solidity language. The experimental results show that CuVuD’s effectiveness in detecting smart contract vulnerabilities is significantly higher than seven the-state-of-art smart c作者: animated 時間: 2025-3-22 19:24
Research on?Comprehensive Blockchain Regulation and?Anti-fraud Systemkchain transaction patterns and detecting illegal transaction behavior using new heuristic learning methods and graph neural network methods to detect frequent frauds. The system monitors and detects fraudulent activities such as phishing, ICO, price manipulation, money laundering, and illegal fundr作者: 厭倦嗎你 時間: 2025-3-22 22:02 作者: seduce 時間: 2025-3-23 03:41
Smart Contract Vulnerability Detection Methods: A Surveyanalysis are conducted on the input code categories, vulnerability types, and classification output formats of each method. Finally, based on the summary of existing research on smart contract vulnerability detection, the challenges in the field of smart contract vulnerability detection are discusse作者: 預測 時間: 2025-3-23 09:32
,Comments on “Law as a Capital Good”,acy?(over 90%). Through our large-scale study, we have identified 69,?148 highly suspicious scam messages, relating to 8,?247 blockchain addresses. By tracing the confirmed scam addresses, we further identify a cumulative illicit income of around 900 ETH. Our findings should help the blockchain comm作者: agenda 時間: 2025-3-23 12:23 作者: Pigeon 時間: 2025-3-23 15:49 作者: Clinch 時間: 2025-3-23 18:28 作者: Excise 時間: 2025-3-23 22:46 作者: Meander 時間: 2025-3-24 03:05
https://doi.org/10.1057/9780230511804ven the-state-of-art smart contract vulnerability detection methods on a large-scale smart contract dataset based on the Solidity language. The experimental results show that CuVuD’s effectiveness in detecting smart contract vulnerabilities is significantly higher than seven the-state-of-art smart c作者: HATCH 時間: 2025-3-24 07:38
A Mathematical Model of Lexical Diversitykchain transaction patterns and detecting illegal transaction behavior using new heuristic learning methods and graph neural network methods to detect frequent frauds. The system monitors and detects fraudulent activities such as phishing, ICO, price manipulation, money laundering, and illegal fundr作者: characteristic 時間: 2025-3-24 10:51
https://doi.org/10.1057/978-1-137-37262-8have a high priority in carbon emission trading. To ensure that BoodCET does not disrupt carbon markets, we introduce a trading rationality review mechanism to review the rationality of carbon emission trading on the consortium chain. In this work, we implement a prototype of BoodCET and conduct a c作者: PRE 時間: 2025-3-24 17:51 作者: 搜尋 時間: 2025-3-24 22:28 作者: 清洗 時間: 2025-3-25 01:00
ScamRadar: Identifying Blockchain Scams When They are Promotingh as Telegram and Twitter. This new way of promotion also introduces an additional attack surface on the blockchain community, with a number of recently-identified scam projects distributed via this channel. Despite prior efforts on detecting scams, no existing works systematically study such promot作者: cushion 時間: 2025-3-25 07:18
Based on Financial Characteristics to Capture the Source of Funds of the Ponzi Scheme on Ethereum wi are difficult to identify. The high returns promised by Ponzi schemes lure more and more people into the fraud. To prevent further economic losses, this paper proposes a detection method based on the financial features of Ponzi schemes and graph theory. By constructing a transaction subgraph of the作者: adhesive 時間: 2025-3-25 07:54
IntelliCon: Confidence-Based Approach for Fine-Grained Vulnerability Analysis in?Smart Contractsrious types of vulnerabilities that can affect their security and functionality. In this paper, we present ., a novel framework that leverages a pre-trained identifier-aware encoder-decoder CodeT5 model and confident learning to detect seven types of vulnerabilities in Ethereum smart contracts. Conf作者: 帶子 時間: 2025-3-25 12:53
Dynamic Computation Offloading Leveraging Horizontal Task Offloading and?Service Migration in?Edge Nbeacon of promise, epitomizing multifaceted dexterity and sound service delivery methodologies. Given the finite resource allocation of . devices, it is plausible to assert that those . devices that are burdened with arduous workloads might fail to adequately address latency-sensitive requests from 作者: MILL 時間: 2025-3-25 16:40 作者: 樂器演奏者 時間: 2025-3-25 20:18
Towards Efficient and Privacy-Preserving Hierarchical Federated Learning for Distributed Edge Networy. However, when oriented to distributed resource-constrained edge devices, existing federated learning schemes still suffer from heterogeneity challenge. Hierarchical federated learning divides devices into clusters based on their resources to enhance training efficiency. In addition, there are als作者: Frenetic 時間: 2025-3-26 03:06
Securing Blockchain Using Propagation Chain Learning losses. Vulnerability detection and repair are necessary to ensure the security of the blockchain. Currently, the-state-of-art smart contract vulnerability detection methods (e.g. Oyente and Securify) use heuristics based on human-designed algorithms, which have certain shortcomings in different ap作者: Obstruction 時間: 2025-3-26 04:27 作者: 人造 時間: 2025-3-26 12:22 作者: Pcos971 時間: 2025-3-26 12:41 作者: 言外之意 時間: 2025-3-26 18:43 作者: inscribe 時間: 2025-3-26 23:42 作者: Abrupt 時間: 2025-3-27 01:38 作者: ARCHE 時間: 2025-3-27 05:26
A Survey on?Blockchain Abnormal Transaction Detectionand Ethereum, are rapidly increasing in number. However, with the large volume of transactions, a variety of scams such as phishing and Ponzi schemes have become more prevalent and are often hidden among legitimate transactions. To combat these anomalies and fraudulent activities, it is necessary to作者: 大廳 時間: 2025-3-27 09:32
1865-0929 n and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China during August 8–10, 2023. The 45 revised full papers presented in these proceedings were carefully reviewed and selected from 93 submissions. The papers are organized in the following topical sections:?.Part I: Anomaly detec作者: 館長 時間: 2025-3-27 14:16 作者: Ventricle 時間: 2025-3-27 21:43
Measuring Recognition Vocabulary Sizet only 10 SWC weaknesses lead to security events, causing a total loss of USD 74 Billion. Moreover, . exhibits the highest frequency. Our results provide guidance for research efforts allocated in the academic community.作者: DOLT 時間: 2025-3-28 00:33 作者: 善于騙人 時間: 2025-3-28 02:09
Who Needs the?Most Research Effort? Investigating the?Importance of?Smart Contract Weaknessest only 10 SWC weaknesses lead to security events, causing a total loss of USD 74 Billion. Moreover, . exhibits the highest frequency. Our results provide guidance for research efforts allocated in the academic community.作者: ascend 時間: 2025-3-28 09:42
1865-0929 in.?.Part II:?AI for blockchain; blockchain applications; blockchain architecture and optimization; protocols and consensus..978-981-99-8100-7978-981-99-8101-4Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Breach 時間: 2025-3-28 10:59 作者: Vulnerary 時間: 2025-3-28 17:59 作者: TATE 時間: 2025-3-28 20:54
Lexical Priming in Spoken English Usageaction, and classification algorithms. Additionally, we discuss the potential of applying graph convolutional networks (GCN) to the domain of blockchain anomaly detection and predict that GCN will likely become a mainstream approach in the near future.作者: insolence 時間: 2025-3-29 00:10 作者: 注意到 時間: 2025-3-29 05:07
Privacy Protection Multi-copy Provable Data Possession Supporting Data Reliability. Furthermore, our approach uses random masking techniques to develop unique replica blocks and safeguard privacy. We’ve also ensured data reliability by enabling PMPDP-R to locate damaged data blocks to aid recovery. The experimental analysis proves that our scheme is both practical and effective.作者: 兇殘 時間: 2025-3-29 10:21
A Survey on?Blockchain Abnormal Transaction Detectionaction, and classification algorithms. Additionally, we discuss the potential of applying graph convolutional networks (GCN) to the domain of blockchain anomaly detection and predict that GCN will likely become a mainstream approach in the near future.作者: 休戰(zhàn) 時間: 2025-3-29 13:40 作者: 漸變 時間: 2025-3-29 16:51 作者: 他日關稅重重 時間: 2025-3-29 20:55 作者: Confirm 時間: 2025-3-30 03:48
Lexical Diversity and Language Developmentribution transactions. Additionally, a peeling chain search algorithm is proposed to detect distribution transactions in the chain, and its validity is demonstrated through experiments. The findings of this study have implications for other Bitcoin mixing services.作者: 預知 時間: 2025-3-30 07:07
Communications in Computer and Information Sciencehttp://image.papertrans.cn/b/image/189230.jpg作者: Anticlimax 時間: 2025-3-30 09:15 作者: 夜晚 時間: 2025-3-30 13:15
978-981-99-8100-7The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: 抵消 時間: 2025-3-30 20:00
Vom Ewigen Gesetz zum Naturgesetz,domains. However, various scams exist in the cryptocurrency transactions on the blockchain platforms, which has seriously obstructed the development of blockchain. Therefore, many researchers have studied the detection methods for blockchain scams. On the basis of introducing the mainstream types of作者: 貪婪的人 時間: 2025-3-30 21:23 作者: 老人病學 時間: 2025-3-31 03:58
Rosa María Jiménez Catalán,Tess Fitzpatrick are difficult to identify. The high returns promised by Ponzi schemes lure more and more people into the fraud. To prevent further economic losses, this paper proposes a detection method based on the financial features of Ponzi schemes and graph theory. By constructing a transaction subgraph of the作者: miracle 時間: 2025-3-31 06:34 作者: 輕打 時間: 2025-3-31 12:32
Rosa María Jiménez Catalán,Tess Fitzpatrickbeacon of promise, epitomizing multifaceted dexterity and sound service delivery methodologies. Given the finite resource allocation of . devices, it is plausible to assert that those . devices that are burdened with arduous workloads might fail to adequately address latency-sensitive requests from