標(biāo)題: Titlebook: Blockchain and Web3.0 Technology Innovation and Application; First Conference, BW Gansen Zhao,Jian Weng,Zibin Zheng Conference proceedings [打印本頁(yè)] 作者: 公款 時(shí)間: 2025-3-21 18:44
書目名稱Blockchain and Web3.0 Technology Innovation and Application影響因子(影響力)
書目名稱Blockchain and Web3.0 Technology Innovation and Application影響因子(影響力)學(xué)科排名
書目名稱Blockchain and Web3.0 Technology Innovation and Application網(wǎng)絡(luò)公開度
書目名稱Blockchain and Web3.0 Technology Innovation and Application網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Blockchain and Web3.0 Technology Innovation and Application被引頻次
書目名稱Blockchain and Web3.0 Technology Innovation and Application被引頻次學(xué)科排名
書目名稱Blockchain and Web3.0 Technology Innovation and Application年度引用
書目名稱Blockchain and Web3.0 Technology Innovation and Application年度引用學(xué)科排名
書目名稱Blockchain and Web3.0 Technology Innovation and Application讀者反饋
書目名稱Blockchain and Web3.0 Technology Innovation and Application讀者反饋學(xué)科排名
作者: INCUR 時(shí)間: 2025-3-21 21:12
Buchanan-as-Artist: A Retrospective data attributes, thereby achieving a more favorable utility-privacy trade-off. Our comprehensive experimental evaluation demonstrates ANOM’s superior capability to balance utility and privacy. Across all defenses, ANOM results in the minimal accuracy reduction on public datasets when compared to th作者: Adj異類的 時(shí)間: 2025-3-22 02:30 作者: 蛛絲 時(shí)間: 2025-3-22 06:58
Scott R. Eliason,Robin Stryker,Eric Tranbypared it with conventional methods. The results demonstrate that our framework achieves higher prediction accuracy, greater sensitivity in anomaly detection, and more comprehensive detection results, thereby enhancing regulatory.作者: 背信 時(shí)間: 2025-3-22 08:54
Introduction of the PrOComp Method, attacks. Our security analysis and experimental results demonstrate that SEDDS not only enhances security against side-channel attacks but also significantly reduces communication and storage overheads compared to existing schemes.作者: integrated 時(shí)間: 2025-3-22 16:26 作者: 不滿分子 時(shí)間: 2025-3-22 17:38 作者: HERE 時(shí)間: 2025-3-23 01:06
https://doi.org/10.1007/978-3-642-56344-7alse positive rate. Based on this, this paper proposes a static analysis method based on the SSA form of Go’s intermediate representation, analyzing read-write control flow and introducing data flow features. This approach improves the detection accuracy of mainstream tools like Chaincode Analyzer, 作者: mediocrity 時(shí)間: 2025-3-23 02:32 作者: 激怒 時(shí)間: 2025-3-23 08:21 作者: demote 時(shí)間: 2025-3-23 10:11
Is Biology Methodologically Unique? select optimal clients that can maximize the social surplus. Finally, we employ blockchain for on-chain evidence storage of models to ensure the safety of the federated recommendation system. The experimental results show that our proposed incentive mechanism can attract clients with superior train作者: 誘拐 時(shí)間: 2025-3-23 14:14 作者: insular 時(shí)間: 2025-3-23 21:54
,Tailoring Noise to?Fit: An Adaptive Noise Optimization Mechanism Against Gradient Leakage, data attributes, thereby achieving a more favorable utility-privacy trade-off. Our comprehensive experimental evaluation demonstrates ANOM’s superior capability to balance utility and privacy. Across all defenses, ANOM results in the minimal accuracy reduction on public datasets when compared to th作者: 索賠 時(shí)間: 2025-3-24 00:22
Design of Privacy-Preserving Smart Contracts for Regional Equity Markets, contracts designed for the cross-market interconnectivity and interoperability business processes in the regional equity market, enabling the coordinated execution and verification of privacy computations across on-chain and off-chain environments. This approach effectively protects private data wh作者: 剛開始 時(shí)間: 2025-3-24 02:51 作者: Wallow 時(shí)間: 2025-3-24 10:07
,Secure and?Efficient Deduplication for?Encrypted Image Data in?Cloud Storage, attacks. Our security analysis and experimental results demonstrate that SEDDS not only enhances security against side-channel attacks but also significantly reduces communication and storage overheads compared to existing schemes.作者: 加入 時(shí)間: 2025-3-24 12:42
,Accountability Mechanism for?Reliable Mobile Crowdsourcing with?Efficient Blockchain,age nodes, mining candidate nodes, relay nodes, and verification nodes are mainly responsible for transaction retrieval, block generation, block forwarding and block verification, respectively. It reduces the latency of blockchain maintenance in a large-scale network. Finally, the experimental resul作者: etidronate 時(shí)間: 2025-3-24 17:01
,Who Will Be Hooked?: A Phishing Fraud Detection Model Based on?Dynamic Graph Temporal Feature Codin graph are used to obtain phishing or non-phishing node embeddings. Finally, the acquired node embeddings are trained to be fitted using the cross-entropy loss function to complete the prediction of the next fished node. The experimental results show that the phishing fraud detection model (PFD-TF) 作者: BUCK 時(shí)間: 2025-3-24 21:59
,Static Analysis Detection of?Hyperledger Fabric Read-Write Logic Vulnerability,alse positive rate. Based on this, this paper proposes a static analysis method based on the SSA form of Go’s intermediate representation, analyzing read-write control flow and introducing data flow features. This approach improves the detection accuracy of mainstream tools like Chaincode Analyzer, 作者: POINT 時(shí)間: 2025-3-25 02:17
,A Dataset Quality Evaluation Algorithm for?Data Trading on?Blockchain,cted graph, namely dependency network. On this basis, according to the characteristics and quantity of data items that depend on fields, we propose the FieldRank algorithm. The algorithm objectively quantifies and evaluates the importance of each field, so that the field importance weight obtained b作者: 愛社交 時(shí)間: 2025-3-25 06:47
,DFADNet: A Diverse-Feature Adaptive Network for?Web3.0-Oriented Deep Forgery Detection,d videos. DFADnet comprises three essential components: TextureNoiseAdapt (TNA) for adaptive extraction of texture noise; SemanticGuidance (SG) for directing focus towards semantic inconsistencies indicative of tampering; and TemporalMultiscale (TMS) for analyzing temporal dynamics across video fram作者: Anthology 時(shí)間: 2025-3-25 08:44
,Blockchain-Based Federated Recommendation with?Incentive Mechanism, select optimal clients that can maximize the social surplus. Finally, we employ blockchain for on-chain evidence storage of models to ensure the safety of the federated recommendation system. The experimental results show that our proposed incentive mechanism can attract clients with superior train作者: 啜泣 時(shí)間: 2025-3-25 11:44 作者: 揉雜 時(shí)間: 2025-3-25 16:34 作者: 缺乏 時(shí)間: 2025-3-25 20:51 作者: superfluous 時(shí)間: 2025-3-26 03:40
,Tailoring Noise to?Fit: An Adaptive Noise Optimization Mechanism Against Gradient Leakage,transmitting model updates. However, the Gradient Leakage Attack (GLA) can reconstruct clients’ local data through transmitted gradients, posing a significant privacy threat to FL. Existing defense strategies against the GLA have the following limitations: (1) cryptography-based defenses impose high作者: ESO 時(shí)間: 2025-3-26 04:18 作者: 偏見 時(shí)間: 2025-3-26 12:20 作者: brother 時(shí)間: 2025-3-26 15:31
,A Blockchain-Based Framework for?Crowdsourcing Evaluation of?Large Language Models,al human and material resources. This work proposes a crowdsourcing evaluation framework based on blockchain to comprehensively evaluate the toxicity of the outputs from LLMs. The framework offers LLM service to users and collects their evaluation scores for the outputs from the LLM. The evaluation 作者: 跳動(dòng) 時(shí)間: 2025-3-26 17:32 作者: beta-cells 時(shí)間: 2025-3-27 00:46
,Secure and?Efficient Deduplication for?Encrypted Image Data in?Cloud Storage, and communication overheads. However, ensuring the confidentiality and security of deduplicated encrypted images presents significant challenges, particularly regarding side-channel attacks and the overhead associated with key transfer. This paper introduces SEDDS (Secure Encrypted Data Deduplicati作者: PHON 時(shí)間: 2025-3-27 01:24
,SolSecure: A Security Analyzer for?Integer Bugs in Smart Contracts,he chain, it cannot be modified or deleted. Smart contracts are intelligent protocols running at the application layer of blockchain, enabling trustworthy transactions without third parties. However, the openness and immutability of the architecture introduce various security risks. Integer bugs ari作者: 委屈 時(shí)間: 2025-3-27 07:31 作者: Hectic 時(shí)間: 2025-3-27 12:00
,Accountability Mechanism for?Reliable Mobile Crowdsourcing with?Efficient Blockchain,into MSC to reduce the service delay from a remote cloud, and enhance the quality of services (QoS) through preprocessing data. However, the profit-driven edge nodes (workers) may provide fake or low-quality answers for lowering their data processing cost, which results in serious QoS challenges. We作者: Monocle 時(shí)間: 2025-3-27 14:16
,Who Will Be Hooked?: A Phishing Fraud Detection Model Based on?Dynamic Graph Temporal Feature Codins. However, phishing fraud has become a major criminal offence that undermines the security of transactions in blockchain ecosystem. Phishing fraud detection has become one of the hot issues in blockchain field research. In this paper, we innovatively propose a .hishing .raud .etection model based o作者: enchant 時(shí)間: 2025-3-27 20:15
,Static Analysis Detection of?Hyperledger Fabric Read-Write Logic Vulnerability,ted trusted ledger among trusted organizations, has gained increasing support in fields such as supply chain finance and government platforms. Compared to domain-specific languages for public blockchains, Hyperledger Fabric recommends using general purpose languages in the industry to develop its sm作者: Definitive 時(shí)間: 2025-3-28 01:44
,A Dataset Quality Evaluation Algorithm for?Data Trading on?Blockchain,ion metric, plays a key role in facilitating data trading on the blockchain. In the process of comprehensively evaluating the quality of multi-field datasets, it is crucial to determine the importance coefficient of each data item. The importance evaluation methods of data items include subjective m作者: 盤旋 時(shí)間: 2025-3-28 05:19 作者: forecast 時(shí)間: 2025-3-28 08:39
Design and Validation of a Hyper-converged Blockchain Hardware and Software System Based on Domestioperating system, X86 architecture Hygon processors, and ARM architecture Phytium processors, combined with servers, storage, network, and independently controllable blockchain technologies, the system achieves integrated hardware and software optimization. This significantly improves performance an作者: Prostatism 時(shí)間: 2025-3-28 13:32 作者: ATP861 時(shí)間: 2025-3-28 15:14
Privacy Protection Model of International Cold Chain Trade Blockchain Platform Based on Zero-Knowleng comprehensive services such as cross-border procurement, supply chain finance and warehousing logistics. However, the current centralized operating model of the trade platform faces trust issues, as data is typically managed and controlled by the platform operator, making it difficult to ensure t作者: 審問(wèn) 時(shí)間: 2025-3-28 21:06 作者: 無(wú)彈性 時(shí)間: 2025-3-29 01:46 作者: Culpable 時(shí)間: 2025-3-29 05:30
https://doi.org/10.1007/978-3-658-43799-2buted digital identity, and two selective disclosure mechanisms with verifiable credentials are designed to realize authorization management. Zero-knowledge proof technology is used to ensure the safety and reliability of authorization process and the privacy security of data sharing.作者: 注視 時(shí)間: 2025-3-29 07:43
Trusted Data Authorization and Sharing Method Based on Distributed Digital Identity,buted digital identity, and two selective disclosure mechanisms with verifiable credentials are designed to realize authorization management. Zero-knowledge proof technology is used to ensure the safety and reliability of authorization process and the privacy security of data sharing.作者: geometrician 時(shí)間: 2025-3-29 15:21 作者: 變形 時(shí)間: 2025-3-29 17:06 作者: 下船 時(shí)間: 2025-3-29 19:44 作者: creatine-kinase 時(shí)間: 2025-3-30 00:02
https://doi.org/10.1007/978-3-642-37070-0d scalability. Experimental results demonstrate that the system performs excellently in various high-security application scenarios, providing reliable solutions for government, finance, taxation, transportation, energy, and telecommunications sectors.作者: 澄清 時(shí)間: 2025-3-30 06:53
William F. Shughart,Robert D. Tollisoneidentify users from the anonymized social behavior metadata, achieving a unicity of .. This indicates that the current widespread collection of social behavior metadata brings a high risk of privacy breaches.作者: 混沌 時(shí)間: 2025-3-30 09:51 作者: CESS 時(shí)間: 2025-3-30 15:48
Springer Series in Computational Mathematicsead to substantial financial losses. This paper describes SolSecure, a framework based on abstract interpretation theory [., .], designed to find integer bugs in Ethereum smart contracts. Experimental results show that SolSecure can effectively detect integer vulnerabilities in Solidity smart contracts.作者: Constituent 時(shí)間: 2025-3-30 16:47
Second-Order Differential Inclusions,emely popular at present. In our scheme, it is applied to secret sharing, so that the secret sharing group has a high comprehensive computational efficiency in the cases of distributing secrets, recovering secrets, and dynamically changing threshold value.作者: Conflagration 時(shí)間: 2025-3-30 20:51 作者: Diatribe 時(shí)間: 2025-3-31 02:52
,Behavioral Unicity: On the?Limits of?Anonymized Social Behavior Metadata,eidentify users from the anonymized social behavior metadata, achieving a unicity of .. This indicates that the current widespread collection of social behavior metadata brings a high risk of privacy breaches.作者: Kaleidoscope 時(shí)間: 2025-3-31 05:24 作者: Thymus 時(shí)間: 2025-3-31 12:09
,SolSecure: A Security Analyzer for?Integer Bugs in Smart Contracts,ead to substantial financial losses. This paper describes SolSecure, a framework based on abstract interpretation theory [., .], designed to find integer bugs in Ethereum smart contracts. Experimental results show that SolSecure can effectively detect integer vulnerabilities in Solidity smart contracts.作者: remission 時(shí)間: 2025-3-31 13:22 作者: Jingoism 時(shí)間: 2025-3-31 19:16
Privacy Protection Model of International Cold Chain Trade Blockchain Platform Based on Zero-Knowles such as homomorphic encryption and zero-knowledge proofs to ensure data immutability while guaranteeing the authenticity and privacy of platform data. We analyzed the performance and security of the proposed system. The experimental results show that the scheme proposed in this paper is feasible.作者: 產(chǎn)生 時(shí)間: 2025-4-1 01:07
Differential and Difference Potentialspropose a blockchain-based system named BBP, which can trace biological asset original and adduction samples. Our research provides a new direction for biological asset information management and improves the security of biological asset management.