000 | 05166nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-981-99-8101-4 | ||
003 | DE-He213 | ||
005 | 20240423130229.0 | ||
007 | cr nn 008mamaa | ||
008 | 231124s2024 si | s |||| 0|eng d | ||
020 |
_a9789819981014 _9978-981-99-8101-4 |
||
024 | 7 |
_a10.1007/978-981-99-8101-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
050 | 4 | _aJC596-596.2 | |
072 | 7 |
_aURD _2bicssc |
|
072 | 7 |
_aCOM060040 _2bisacsh |
|
072 | 7 |
_aURD _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
082 | 0 | 4 |
_a323.448 _223 |
245 | 1 | 0 |
_aBlockchain and Trustworthy Systems _h[electronic resource] : _b5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part I / _cedited by Jiachi Chen, Bin Wen, Ting Chen. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2024. |
|
300 |
_aXIX, 299 p. 80 illus., 69 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1896 |
|
505 | 0 | _aAnomaly detection on blockchain -- Blockchain Scam Detection: State-of-the-art, Challenges, and Future Directions -- ScamRadar: Identifying Blockchain Scams When They are Promoting -- Based on Financial Characteristics to Capture the Source of Funds of the Ponzi Scheme on Ethereum with Graph Traversal Technology -- Based on Financial Characteristics to Capture the Source of Funds of the Ponzi Scheme on Ethereum with Graph Traversal Technology -- Edge Intelligence and Metaverse Services -- Dynamic Computation Offloading Leveraging Horizontal Task Offloading and Service Migration in Edge Networks -- Blockchain-Assisted Authentication and Key Agreement Protocol for Cloud-Edge Collaboration -- Towards Efficient and Privacy-preserving Hierarchical Federated Learning for Distributed Edge Network -- Blockchain System Security -- Securing Blockchain Using Propagation Chain Learning -- Privacy Protection Multi-copy Provable Data Possession supporting Data Reliability -- Research On Comprehensive Blockchain Regulation And Antifraud System -- Analysis of Peeling Chain Model in Bitcoin Mixing Service -- A Blockchain-based On-chain and Off-chain Dual-trusted Carbon Emission Trading System with Reputation Mechanism -- Empirical Study and Surveys -- Smart Contract Vulnerability Detection Methods: A Survey -- Who Needs the Most Research Effort? Investigating the Importance of Smart Contract Weaknesses -- A Survey on Blockchain Abnormal Transaction Detection -- A Systematic Literature Review on Smart Contract Vulnerability Detection by Symbolic Execution -- Sharding Technologies in Blockchain: Basics, State of the Art, and Challenges -- Federated Learning for Blockchain -- A Blockchain-enabled Decentralized Federated Learning System with Transparent and Open Incentive and Audit Contracts -- Blockchain-based Federated Learning for IoT Sharing: Incentive Scheme with Reputation Mechanism -- An Optimized Scheme of Federated Learning Based on Differential Privacy. | |
520 | _aThe two-volume set CCIS 1896 and 1897 constitutes the refereed post-conference proceedings of the 5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China during August 8–10, 2023. The 45 revised full papers presented in these proceedings were carefully reviewed and selected from 93 submissions. The papers are organized in the following topical sections: Part I: Anomaly detection on blockchain; edge intelligence and metaverse services; blockchain system security; empirical study and surveys; federated learning for blockchain. Part II: AI for blockchain; blockchain applications; blockchain architecture and optimization; protocols and consensus. | ||
650 | 0 |
_aData protection _xLaw and legislation. |
|
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aInformation theory. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aComputers, Special purpose. | |
650 | 1 | 4 | _aPrivacy. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aData Structures and Information Theory. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aSpecial Purpose and Application-Based Systems. |
700 | 1 |
_aChen, Jiachi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aWen, Bin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aChen, Ting. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819981007 |
776 | 0 | 8 |
_iPrinted edition: _z9789819981021 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1896 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-99-8101-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c186426 _d186426 |