소장자료

>>
소장자료
>
000 nam5i
001 2210080935722
003 DE-He213
005 20250321105624
007 cr nn 008mamaa
008 250127s2025 si | s |||| 0|eng d
020 a97898196141109978-981-96-1411-0
024 a10.1007/978-981-96-1411-02doi
040 a221008
050 aQA76.9.A25
050 aJC596-596.2
072 aURD2bicssc
072 aCOM0600402bisacsh
072 aURD2thema
082 a005.8223
082 a323.448223
245 00 aBlockchain, Metaverse and Trustworthy Systemsh[electronic resource] :b6th International Conference, BlockSys 2024, Hangzhou, China, July 12–14, 2024, Revised Selected Papers, Part I /cedited by Debiao He, Jiajing Wu, Chen Wang, Huawei Huang.
250 a1st ed. 2025.
264 aSingapore :bSpringer Nature Singapore :bImprint: Springer,c2025.
300 aXII, 246 p. 80 illus., 58 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
490 aCommunications in Computer and Information Science,x1865-0937 ;v2264
505 a -- Blockchain and Data Mining. -- Intrusion Anomaly Detection with Multi-Transformer. -- A Federated Learning Method Based on Linear Probing and Fine-Tuning. -- Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection. -- A Secure Hierarchical Federated Learning Framework based on FISCO Group Mechanism. -- Research on Network Traffic Anomaly Detection Method Based on Deep Learning. -- Hyper-parameter Optimization and Proxy Re-encryption for Federated Learning. -- Data Security and Anomaly Detection. -- Exploring Embedded Content in the Ethereum Blockchain: Data Restoration and Analysis. -- Task Allocation and Process Optimization of Data, Information, Knowledge, and Wisdom (DIKW)-based Workflow Engine. -- Location Data Sharing Method Based on Blockchain and Attribute-Based Encryption. -- Implicit White-Box Implementations of Efficient Double-Block-Length MAC. -- A Survey on Blockchain Scalability. -- Supply Chain Financing Model Embedded with “Full-Process” Blockchain. -- Blockchain Performance Optimization. -- ReCon: Faster Smart Contract Vulnerability Detection by Reusable Symbolic Execution Tree. -- SVD-SESDG: Smart Contract Vulnerability Detection Technology via Symbol Execution and State Variable Dependency Graph. -- Dual-view Aware Smart Contract Vulnerability Detection for Ethereum. -- Blockchain Layered Sharding Algorithm Based on Transaction Characteristics. -- An Empirical Study on the Performance of EVMs and Wasm VMs for Smart Contract Execution. -- Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph.
520 aThis two-volume set CCIS 2264 and CCIS 2265 constitutes the refereed proceedings of the 6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024, held in Hangzhou, China, during July 12–14, 2024. The 34 full papers presented in these two volumes were carefully reviewed and selected from 74 submissions. The papers are organized in the following topical sections: Part I: Blockchain and Data Mining; Data Security and Anomaly Detection; Blockchain Performance Optimization. Part II: Frontier Technology Integration; Trustworthy System and Cryptocurrencies; Blockchain Applications.
650 aData protectionxLaw and legislation.
650 aArtificial intelligence.
650 aData structures (Computer science).
650 aInformation theory.
650 aOperating systems (Computers).
650 aComputers, Special purpose.
650 aPrivacy.
650 aArtificial Intelligence.
650 aData Structures and Information Theory.
650 aOperating Systems.
650 aSpecial Purpose and Application-Based Systems.
700 aHe, Debiao.eeditor.0(orcid)0000-0002-2446-74361https://orcid.org/0000-0002-2446-74364edt4http://id.loc.gov/vocabulary/relators/edt
700 aWu, Jiajing.eeditor.0(orcid)0000-0001-5155-85471https://orcid.org/0000-0001-5155-85474edt4http://id.loc.gov/vocabulary/relators/edt
700 aWang, Chen.eeditor.0(orcid)0000-0002-3951-31591https://orcid.org/0000-0002-3951-31594edt4http://id.loc.gov/vocabulary/relators/edt
700 aHuang, Huawei.eeditor.0(orcid)0000-0002-7035-64461https://orcid.org/0000-0002-7035-64464edt4http://id.loc.gov/vocabulary/relators/edt
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9789819614103
776 iPrinted edition:z9789819614127
830 aCommunications in Computer and Information Science,x1865-0937 ;v2264
856 uhttps://doi.org/10.1007/978-981-96-1411-0
912 aZDB-2-SCS
912 aZDB-2-SXCS
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Blockchain, Metaverse and Trustworthy Systems[electronic resource] :6th International Conference, BlockSys 2024, Hangzhou, China, July 12–14, 2024, Revised Selected Papers, Part I /edited by Debiao He, Jiajing Wu, Chen Wang, Huawei Huang
종류
전자책
서명
Blockchain, Metaverse and Trustworthy Systems[electronic resource] :6th International Conference, BlockSys 2024, Hangzhou, China, July 12–14, 2024, Revised Selected Papers, Part I /edited by Debiao He, Jiajing Wu, Chen Wang, Huawei Huang
저자명
판 사항
1st ed. 2025.
형태사항
XII, 246 p 80 illus, 58 illus in color online resource.
주기사항
This two-volume set CCIS 2264 and CCIS 2265 constitutes the refereed proceedings of the 6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024, held in Hangzhou, China, during July 12–14, 2024. The 34 full papers presented in these two volumes were carefully reviewed and selected from 74 submissions. The papers are organized in the following topical sections: Part I: Blockchain and Data Mining; Data Security and Anomaly Detection; Blockchain Performance Optimization. Part II: Frontier Technology Integration; Trustworthy System and Cryptocurrencies; Blockchain Applications.
내용주기
/ Blockchain and Data Mining. / Intrusion Anomaly Detection with Multi-Transformer. / A Federated Learning Method Based on Linear Probing and Fine-Tuning. / Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection. / A Secure Hierarchical Federated Learning Framework based on FISCO Group Mechanism. / Research on Network Traffic Anomaly Detection Method Based on Deep Learning. / Hyper-parameter Optimization and Proxy Re-encryption for Federated Learning. / Data Security and Anomaly Detection. / Exploring Embedded Content in the Ethereum Blockchain: Data Restoration and Analysis. / Task Allocation and Process Optimization of Data, Information, Knowledge, and Wisdom (DIKW)-based Workflow Engine. / Location Data Sharing Method Based on Blockchain and Attribute-Based Encryption. / Implicit White-Box Implementations of Efficient Double-Block-Length MAC. / A Survey on Blockchain Scalability. / Supply Chain Financing Model Embedded with “Full-Process” Blockchain. / Blockchain Performance Optimization. / ReCon: Faster Smart Contract Vulnerability Detection by Reusable Symbolic Execution Tree. / SVD-SESDG: Smart Contract Vulnerability Detection Technology via Symbol Execution and State Variable Dependency Graph. / Dual-view Aware Smart Contract Vulnerability Detection for Ethereum. / Blockchain Layered Sharding Algorithm Based on Transaction Characteristics. / An Empirical Study on the Performance of EVMs and Wasm VMs for Smart Contract Execution. / Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph.
관련 URL

소장정보

도서예약
서가부재도서 신고
보존서고신청
캠퍼스대출
우선정리신청
검색지인쇄
등록번호 청구기호 별치기호 소장위치 대출상태 반납예정일 서비스
전자자료는 소장사항이 존재하지 않습니다

책소개

전체 메뉴 보기