000
|
|
nam5i |
001
|
|
2210080933433 |
003
|
|
DE-He213 |
005
|
|
20250321102054 |
007
|
|
cr nn 008mamaa |
008
|
|
231124s2024 si | s |||| 0|eng d |
020
|
|
▼a9789819981014▼9978-981-99-8101-4 |
024
|
|
▼a10.1007/978-981-99-8101-4▼2doi |
040
|
|
▼a221008 |
050
|
|
▼aQA76.9.A25 |
050
|
|
▼aJC596-596.2 |
072
|
|
▼aURD▼2bicssc |
072
|
|
▼aCOM060040▼2bisacsh |
072
|
|
▼aURD▼2thema |
082
|
|
▼a005.8▼223 |
082
|
|
▼a323.448▼223 |
245
|
00 |
▼aBlockchain and Trustworthy Systems▼h[electronic resource] :▼b5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part I /▼cedited by Jiachi Chen, Bin Wen, Ting Chen. |
250
|
|
▼a1st ed. 2024. |
264
|
|
▼aSingapore :▼bSpringer Nature Singapore :▼bImprint: Springer,▼c2024. |
300
|
|
▼aXIX, 299 p. 80 illus., 69 illus. in color.▼bonline resource. |
336
|
|
▼atext▼btxt▼2rdacontent |
337
|
|
▼acomputer▼bc▼2rdamedia |
338
|
|
▼aonline resource▼bcr▼2rdacarrier |
347
|
|
▼atext file▼bPDF▼2rda |
490
|
|
▼aCommunications in Computer and Information Science,▼x1865-0937 ;▼v1896 |
505
|
|
▼aAnomaly detection on blockchain -- Blockchain Scam Detection: State-of-the-art, Challenges, and Future Directions -- ScamRadar: Identifying Blockchain Scams When They are Promoting -- Based on Financial Characteristics to Capture the Source of Funds of the Ponzi Scheme on Ethereum with Graph Traversal Technology -- Based on Financial Characteristics to Capture the Source of Funds of the Ponzi Scheme on Ethereum with Graph Traversal Technology -- Edge Intelligence and Metaverse Services -- Dynamic Computation Offloading Leveraging Horizontal Task Offloading and Service Migration in Edge Networks -- Blockchain-Assisted Authentication and Key Agreement Protocol for Cloud-Edge Collaboration -- Towards Efficient and Privacy-preserving Hierarchical Federated Learning for Distributed Edge Network -- Blockchain System Security -- Securing Blockchain Using Propagation Chain Learning -- Privacy Protection Multi-copy Provable Data Possession supporting Data Reliability -- Research On Comprehensive Blockchain Regulation And Antifraud System -- Analysis of Peeling Chain Model in Bitcoin Mixing Service -- A Blockchain-based On-chain and Off-chain Dual-trusted Carbon Emission Trading System with Reputation Mechanism -- Empirical Study and Surveys -- Smart Contract Vulnerability Detection Methods: A Survey -- Who Needs the Most Research Effort? Investigating the Importance of Smart Contract Weaknesses -- A Survey on Blockchain Abnormal Transaction Detection -- A Systematic Literature Review on Smart Contract Vulnerability Detection by Symbolic Execution -- Sharding Technologies in Blockchain: Basics, State of the Art, and Challenges -- Federated Learning for Blockchain -- A Blockchain-enabled Decentralized Federated Learning System with Transparent and Open Incentive and Audit Contracts -- Blockchain-based Federated Learning for IoT Sharing: Incentive Scheme with Reputation Mechanism -- An Optimized Scheme of Federated Learning Based on Differential Privacy. |
520
|
|
▼aThe two-volume set CCIS 1896 and 1897 constitutes the refereed post-conference proceedings of the 5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China during August 8–10, 2023. The 45 revised full papers presented in these proceedings were carefully reviewed and selected from 93 submissions. The papers are organized in the following topical sections: Part I: Anomaly detection on blockchain; edge intelligence and metaverse services; blockchain system security; empirical study and surveys; federated learning for blockchain. Part II: AI for blockchain; blockchain applications; blockchain architecture and optimization; protocols and consensus. |
650
|
|
▼aData protection▼xLaw and legislation. |
650
|
|
▼aArtificial intelligence. |
650
|
|
▼aData structures (Computer science). |
650
|
|
▼aInformation theory. |
650
|
|
▼aOperating systems (Computers). |
650
|
|
▼aComputers, Special purpose. |
650
|
|
▼aPrivacy. |
650
|
|
▼aArtificial Intelligence. |
650
|
|
▼aData Structures and Information Theory. |
650
|
|
▼aOperating Systems. |
650
|
|
▼aSpecial Purpose and Application-Based Systems. |
700
|
|
▼aChen, Jiachi.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aWen, Bin.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aChen, Ting.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
710
|
|
▼aSpringerLink (Online service) |
773
|
|
▼tSpringer Nature eBook |
776
|
|
▼iPrinted edition:▼z9789819981007 |
776
|
|
▼iPrinted edition:▼z9789819981021 |
830
|
|
▼aCommunications in Computer and Information Science,▼x1865-0937 ;▼v1896 |
856
|
|
▼uhttps://doi.org/10.1007/978-981-99-8101-4 |
912
|
|
▼aZDB-2-SCS |
912
|
|
▼aZDB-2-SXCS |
950
|
|
▼aComputer Science (SpringerNature-11645) |
950
|
|
▼aComputer Science (R0) (SpringerNature-43710) |