期刊文献+
共找到1,371篇文章
< 1 2 69 >
每页显示 20 50 100
Annulus and Disk Complex Is Contractible and Quasi-convex
1
作者 Guo Qi-long Qiu Rui-feng +2 位作者 Zou Yan-qing Zhang Fa-ze Lei Feng-chun 《Communications in Mathematical Research》 CSCD 2013年第4期377-382,共6页
The annulus and disk complex is defined and researched. Especially, we prove that this complex is contractible and quasi-convex in the curve complex.
关键词 annulus and disk complex contractible quasi-convex
在线阅读 下载PDF
Actively contractible and antibacterial hydrogel for accelerated wound healing 被引量:2
2
作者 Zhaoxin Ji Ting Wei +11 位作者 Jiafei Zhu Jiaying Hu Zhisheng Xiao Boxiong Bai Xinying Lv Yu Miao Muchao Chen Cheng Wang Feng Pan Yang Yang Meng Li Qian Chen 《Nano Research》 SCIE EI CSCD 2024年第8期7394-7403,共10页
Adhesive hydrogel has drawn great attention for wide applications in wound healing owing to its excellent biocompatibility and lasting adhesiveness.However,traditional adhesive hydrogels only keep the wound moist to p... Adhesive hydrogel has drawn great attention for wide applications in wound healing owing to its excellent biocompatibility and lasting adhesiveness.However,traditional adhesive hydrogels only keep the wound moist to promote wound healing.It is still imperative to fabricate adhesive hydrogels that exhibit efficient antibacterial ability,active driving dynamic wound closure,and reactive oxygen species(ROS)scavenging together with excellent mechanical properties.Here,a novel hydrogel based on poly(N-isopropyl acrylamide)(PNIPAAm),a thermoresponsive polymer,and tannic acid(TA)-Ag nanoparticles(TA-Ag NPs)exhibiting active contraction,tissue adhesion,anti-inflammatory and antibacterial functions was developed.TA-Ag dispersed in the hydrogel not only functioned as the catalyst to polymerize the reaction but also provided additional anti-inflammatory and antibacterial properties.Besides,tannic acid containing catechol groups endowed the hydrogel with adhesive ability.More interestingly,the obtained hydrogel exhibited the thermoresponsive shrinkage ability,which could mechanically drive wound closure due to the presence of PNIPAAm network.In vivo mouse full-thickness skin defect model demonstrated that this actively contractible and antibacterial hydrogel is a promising dressing to improve wound healing process by accelerating tissue regeneration and preventing bacterial infection.Therefore,this multi-functional adhesive hydrogel developed here may provide a new possibility for wound healing. 展开更多
关键词 ANTI-INFLAMMATORY ANTIBACTERIAL active contraction hydrogel patch wound healing
原文传递
ON(η,d)-CONTRACTIBLE ORBITS OF VECTOR FIELDS 被引量:1
3
作者 廖山涛 《Systems Science and Mathematical Sciences》 SCIE EI CSCD 1989年第3期193-227,共35页
Let ■ be the linear space of all C<sup>1</sup> vector fields X on a compact n-dimensionalC<sup>∞</sup> Riemann manifold(n≥2),endowed with the C<sup>1</sup> norm ‖X‖<sub>... Let ■ be the linear space of all C<sup>1</sup> vector fields X on a compact n-dimensionalC<sup>∞</sup> Riemann manifold(n≥2),endowed with the C<sup>1</sup> norm ‖X‖<sub>1</sub>.Write θ(X)for the numberof contractible periodic orbits of X∈(?),which may be finite or infinite.Let (?)<sup>*</sup> be the set ofall X∈(?) possessing the property that X has a neighbourhood (?) such that every Y∈(?) hasonly a finite number of singularities and at most a countable number of periodic orbits.Inthis paper,it is shown that any given S∈(?) has a neighbourhood (?) in (?) together with anumber λ=λ(?)】0 such that θ(X)≤λfor all X∈(?). 展开更多
关键词 contractible periodic orbit d)-contractibility d)-sequence HYPERBOLIC SINGULARITY ERGODIC unstable manifold standard system of differential equations (*)-orbital stability
在线阅读 下载PDF
Investigating Solutions in Nonlinear Evolution Equations:A Focus on Local Existence in Mixed Types
4
作者 NAFFISA Toureche Trouba FAN Long ABDELGHANI Dahou 《应用数学》 北大核心 2025年第3期691-702,共12页
With the urgent need to resolve complex behaviors in nonlinear evolution equations,this study makes a contribution by establishing the local existence of solutions for Cauchy problems associated with equations of mixe... With the urgent need to resolve complex behaviors in nonlinear evolution equations,this study makes a contribution by establishing the local existence of solutions for Cauchy problems associated with equations of mixed types.Our primary contribution is the establishment of solution existence,illuminating the dynamics of these complex equations.To tackle this challenging problem,we construct an approximate solution sequence and apply the contraction mapping principle to rigorously prove local solution existence.Our results significantly advance the understanding of nonlinear evolution equations of mixed types.Furthermore,they provide a versatile,powerful approach for tackling analogous challenges across physics,engineering,and applied mathematics,making this work a valuable reference for researchers in these fields. 展开更多
关键词 Nonlinear evolution equation Contraction mapping principle Sobolev space Dissipative system
在线阅读 下载PDF
Space-marching inverse design of subsonic,transonic,and supersonic internal flowfields
5
作者 Bo ZHANG Shihe YI +3 位作者 Yuxin ZHAO Rui YANG Ziyuan ZHU Ruitong ZENG 《Chinese Journal of Aeronautics》 2025年第2期15-30,共16页
Flowfield inverse design can obtain the desired flow and contour with high design efficiency,short design cycle,and small modification need.In this study,the Euler equations are formulated in the stream-function coord... Flowfield inverse design can obtain the desired flow and contour with high design efficiency,short design cycle,and small modification need.In this study,the Euler equations are formulated in the stream-function coordinates and combined with the given boundary conditions to derive a gridless space-marching method for the inverse design of subsonic,transonic,and supersonic flowfields.Designers can prescribe the flow parameters along the reference streamline to design flowfields and aerodynamic contours.The method is validated by the theoretical transonic solution,computational fluid dynamics,and experimental data,respectively.The method supports the fabrication of a Mach 2.0 single expansion tunnel.The calibration data agree well with the prescribed pressure distribution.The method is successfully applied to inverse design of contractions,nozzles,and asymmetric channels.Compared to classical analytic contractions,the contractions designed by the space-marching method provide a more accurate transonic flow.Compared to the classical Sivells’nozzle,the nozzle designed by the space-marching method provides a smaller workload,a more flexible velocity distribution,a 20%reduction in length,and an equally uniform flow.Additionally,the space-marching method is applied to design the asymmetric channels under various Mach numbers.These asymmetric channels perfectly eliminate Mach waves,achieving the shock-free flow turning and high flow uniformity.These results validate the feasibility of the space-marching method,making it a good candidate for the inverse design of subsonic,transonic,and supersonic internal flowfields and aerodynamic contours. 展开更多
关键词 Flowfield Inverse design Compressible flow CONTRACTION Nozzle Asymmetric channel
原文传递
Computer Modeling Approaches for Blockchain-Driven Supply Chain Intelligence:A Review on Enhancing Transparency,Security,and Efficiency
6
作者 Puranam Revanth Kumar Gouse Baig Mohammad +4 位作者 Pallati Narsimhulu Dharnisha Narasappa Lakshmana Phaneendra Maguluri Subhav Singh Shitharth Selvarajan 《Computer Modeling in Engineering & Sciences》 2025年第9期2779-2818,共40页
Blockchain Technology(BT)has emerged as a transformative solution for improving the efficacy,security,and transparency of supply chain intelligence.Traditional Supply Chain Management(SCM)systems frequently have probl... Blockchain Technology(BT)has emerged as a transformative solution for improving the efficacy,security,and transparency of supply chain intelligence.Traditional Supply Chain Management(SCM)systems frequently have problems such as data silos,a lack of visibility in real time,fraudulent activities,and inefficiencies in tracking and traceability.Blockchain’s decentralized and irreversible ledger offers a solid foundation for dealing with these issues;it facilitates trust,security,and the sharing of data in real-time among all parties involved.Through an examination of critical technologies,methodology,and applications,this paper delves deeply into computer modeling based-blockchain framework within supply chain intelligence.The effect of BT on SCM is evaluated by reviewing current research and practical applications in the field.As part of the process,we delved through the research on blockchain-based supply chain models,smart contracts,Decentralized Applications(DApps),and how they connect to other cutting-edge innovations like Artificial Intelligence(AI)and the Internet of Things(IoT).To quantify blockchain’s performance,the study introduces analytical models for efficiency improvement,security enhancement,and scalability,enabling computational assessment and simulation of supply chain scenarios.These models provide a structured approach to predicting system performance under varying parameters.According to the results,BT increases efficiency by automating transactions using smart contracts,increases security by using cryptographic techniques,and improves transparency in the supply chain by providing immutable records.Regulatory concerns,challenges with interoperability,and scalability all work against broad adoption.To fully automate and intelligently integrate blockchain with AI and the IoT,additional research is needed to address blockchain’s current limitations and realize its potential for supply chain intelligence. 展开更多
关键词 Blockchain supply chain management TRANSPARENCY SECURITY smart contracts DECENTRALIZATION EFFICIENCY
在线阅读 下载PDF
Effect of food value-chain connections on land-use change
7
作者 P.M.Post Y.Dou A.Nelson 《Geography and Sustainability》 2025年第1期130-142,共13页
Changes in food production,often driven by distant demand,have a significant influence on sustainable man agement and use of land and water,and are in turn a driving factor of biodiversity change.While the connection ... Changes in food production,often driven by distant demand,have a significant influence on sustainable man agement and use of land and water,and are in turn a driving factor of biodiversity change.While the connection between land use and demand through value chains is increasingly understood,there is no comprehensive concep tualisation of this relationship.To address this gap,we propose a conceptual framework and use it as a basis for a systematic review to characterise value-chain connection and explore its influence on land-use and-cover change.Our search in June 2022 onWeb of Science and Scopus yielded 198 documents,describing studies completed after the year 2000 that provide information on both value-chain connection and land-use or-cover change.In total,we used 531 distinct cases to assess how frequently particular types of land-use or-cover change and value-chain connections co-occurred,and synthesized findings on their relations.Our findings confirm that 1)market inte gration is associated with intensification;2)land managers with environmental standards more frequently adopt environmentally friendly practices;3)physical and value-chain distances to consumers play a crucial role,with shorter distances associated with environmentally friendly practices and global chains linked to intensification and expansion.Incorporating these characteristics in existing theories of land-system change,would significantly advance understanding of land managers’decision-making,ultimately guiding more environmentally responsible production systems and contributing to global sustainability goals. 展开更多
关键词 LUCC Contract farming Alternative food network CERTIFICATION Supply chain DEFORESTATION
在线阅读 下载PDF
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
8
作者 Xueshuo Xie Haolong Wang +3 位作者 Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li 《Digital Communications and Networks》 2025年第1期1-12,共12页
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on Ethereum.Effective vulnerability detection of large-scale smart contracts is critical,as attack... Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on Ethereum.Effective vulnerability detection of large-scale smart contracts is critical,as attacks on smart contracts often cause huge economic losses.Since it is difficult to repair and update smart contracts,it is necessary to find the vulnerabilities before they are deployed.However,code analysis,which requires traversal paths,and learning methods,which require many features to be trained,are too time-consuming to detect large-scale on-chain contracts.Learning-based methods will obtain detection models from a feature space compared to code analysis methods such as symbol execution.But the existing features lack the interpretability of the detection results and training model,even worse,the large-scale feature space also affects the efficiency of detection.This paper focuses on improving the detection efficiency by reducing the dimension of the features,combined with expert knowledge.In this paper,a feature extraction model Block-gram is proposed to form low-dimensional knowledge-based features from bytecode.First,the metadata is separated and the runtime code is converted into a sequence of opcodes,which are divided into segments based on some instructions(jumps,etc.).Then,scalable Block-gram features,including 4-dimensional block features and 8-dimensional attribute features,are mined for the learning-based model training.Finally,feature contributions are calculated from SHAP values to measure the relationship between our features and the results of the detection model.In addition,six types of vulnerability labels are made on a dataset containing 33,885 contracts,and these knowledge-based features are evaluated using seven state-of-the-art learning algorithms,which show that the average detection latency speeds up 25×to 650×,compared with the features extracted by N-gram,and also can enhance the interpretability of the detection model. 展开更多
关键词 Smart contract Bytecode&opcode Knowledgeable features Vulnerability detection Feature contribution
在线阅读 下载PDF
Robust Detection and Analysis of Smart Contract Vulnerabilities with Large Language Model Agents
9
作者 Nishank P. Kuppa Vijay K. Madisetti 《Journal of Information Security》 2025年第1期197-226,共30页
Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart cont... Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart contracts for personal financial gain, which undermines the integrity of the Ethereum blockchain. This paper proposes a computer program called SADA (Static and Dynamic Analyzer), a novel approach to smart contract vulnerability detection using multiple Large Language Model (LLM) agents to analyze and flag suspicious Solidity code for Ethereum smart contracts. SADA not only improves upon existing vulnerability detection methods but also paves the way for more secure smart contract development practices in the rapidly evolving blockchain ecosystem. 展开更多
关键词 Blockchain Ethereum Smart Contracts Security Decentralized Applications WEB3 Cryptocurrency Large Language Models
在线阅读 下载PDF
Transmutation of zonal twinning dislocations during non-cozone{1011}twin-twin interaction in magnesium
10
作者 Peng Chen Bin Li 《Journal of Magnesium and Alloys》 2025年第2期681-696,共16页
Theoretically,a twinning dislocation must stay on the twinning plane which is the first invariant plane of a twinning mode,because the glide of twinning dislocation linearly transforms the parent lattice to the twin l... Theoretically,a twinning dislocation must stay on the twinning plane which is the first invariant plane of a twinning mode,because the glide of twinning dislocation linearly transforms the parent lattice to the twin lattice.However,recent experimental observations showed that a{1011}{1012}twin variant could cross another variant during twin-twin interaction.It is well known that{1011}twinning is mediated by zonal twinning dislocations.Thus,how the zonal twinning dislocations transmute during twin-twin interaction is of great interest but not well understood.In this work,atomistic simulation is performed to investigate interaction between{1011}twin variants.Our results show that when an incoming twin variant impinges on the other which acts as a barrier,surprisingly,the barrier twin can grow at the expense of the incoming twin.Eventually one variant consumes the other.Structural analysis shows that the twinning dislocations of the barrier variant are able to penetrate the zone of twin-twin intersection,by plowing through the lattice of one variant and transform its lattice into the lattice of the other.Careful lattice correspondence analysis reveals that,the lattice transformation from one variant to the other is close to{1012}{1011}twinning,but the orientation relationship deviates by a minor lattice rotation.This deviation presents a significant energy barrier to the lattice transformation,and thus it is expected such a twin-twin interaction will increase the stress for twin growth. 展开更多
关键词 MAGNESIUM Contraction twinning Atomistic simulation Lattice transformation
在线阅读 下载PDF
IncEFL:a sharing incentive mechanism for edge-assisted federated learning in industrial IoT
11
作者 Jiewei Chen Shaoyong Guo +3 位作者 Tao Shen Yan Feng Jian Gao Xuesong Qiu 《Digital Communications and Networks》 2025年第1期106-115,共10页
As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artific... As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artificial Intelligence(AI)applications.However,most users are reluctant to disclose their data due to network bandwidth limitations,device energy consumption,and privacy requirements.To address this issue,this paper introduces an Edge-assisted Federated Learning(EFL)framework,along with an incentive mechanism for lightweight industrial data sharing.In order to reduce the information asymmetry between data owners and users,an EFL model-sharing incentive mechanism based on contract theory is designed.In addition,a weight dispersion evaluation scheme based on Wasserstein distance is proposed.This study models an optimization problem of node selection and sharing incentives to maximize the EFL model consumers'profit and ensure the quality of training services.An incentive-based EFL algorithm with individual rationality and incentive compatibility constraints is proposed.Finally,the experimental results verify the effectiveness of the proposed scheme in terms of positive incentives for contract design and performance analysis of EFL systems. 展开更多
关键词 Federated learning Data sharing Edge intelligence INCENTIVES Contract theory
在线阅读 下载PDF
Study on the Philosophical Implications of Faust
12
作者 FEI Yujie ZHOU Lei 《Sino-US English Teaching》 2025年第4期147-152,共6页
Faust,as a classic image in Western literature and philosophy,has been endowed with profound philosophical connotations in Johann Wolfgang von Goethe’s epic reconstruction.This article starts from Faust’s dual ident... Faust,as a classic image in Western literature and philosophy,has been endowed with profound philosophical connotations in Johann Wolfgang von Goethe’s epic reconstruction.This article starts from Faust’s dual identity as a“seeker”and a“paradoxical person”,revealing the dialectical unity of his philosophical meaning:In the dynamic process of“infinite pursuit”and“self denial”,Faust not only embodies humanity’s eternal questioning of the essence of existence,but also reflects the struggle and transcendence of human spirit in the dilemma of modernity.Through in-depth analysis of the five stages of Faust’s soul conflict and his contractual relationship with the devil,this article clarifies that Faust is not only a spiritual symbol of the Renaissance to the Age of Enlightenment,but also a mirror of modern society under the guidance of technological rationality. 展开更多
关键词 FAUST philosophical meaning soul conflict devil’s contract modernity
在线阅读 下载PDF
The Application of Blockchain Technology in the Financial Field
13
作者 Yanling Liu Yun Li 《Proceedings of Business and Economic Studies》 2025年第2期191-197,共7页
Blockchain technology,as a revolutionary tool,is profoundly changing the way the financial field works.Its application has expanded from digital currency to many fields,such as smart contracts,cross-border payments,tr... Blockchain technology,as a revolutionary tool,is profoundly changing the way the financial field works.Its application has expanded from digital currency to many fields,such as smart contracts,cross-border payments,trade finance,and digital identity management,providing important support for simplifying financial service processes,reducing costs,and improving efficiency.However,the widespread application of blockchain technology still faces challenges such as scalability,regulatory compliance,and cybersecurity,limiting its full integration in the financial industry.This study systematically reviews the status quo,development history,and future trends of blockchain technology application in the financial sector,analyzes its key role in capital markets,decentralized finance(DeFi),and other fields,and explores the potential of emerging solutions such as hybrid blockchain and dynamic regulatory frameworks. 展开更多
关键词 Blockchain Decentralized finance Smart contracts Cross-border payments
在线阅读 下载PDF
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation
14
作者 Yunhua He Yigang Yang +4 位作者 Chao Wang Anke Xie Li Ma Bin Wu Yongdong Wu 《Digital Communications and Networks》 2025年第2期432-441,共10页
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,com... The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,complex functions such as matrix operations are difficult to implement on Ethereum Virtual Machine(EVM)-based smart contract platforms due to their distributed security environment limitations.Existing off-chain methods often result in a significant reduction in contract execution efficiency,thus a platform software development kit interface implementation method has become a feasible way to reduce overheads,but this method cannot verify operation correctness and may leak sensitive user data.To solve the above problems,we propose a verifiable EVM-based smart contract cross-language implementation scheme for complex operations,especially matrix operations,which can guarantee operation correctness and user privacy while ensuring computational efficiency.In this scheme,a verifiable interaction process is designed to verify the computation process and results,and a matrix blinding technology is introduced to protect sensitive user data in the calculation process.The security analysis and performance tests show that the proposed scheme can satisfy the correctness and privacy of the cross-language implementation of smart contracts at a small additional efficiency cost. 展开更多
关键词 Smart contract Blockchain Cross-language programming Bilinear pairing Publicly verifiable computation
在线阅读 下载PDF
Smart Contract Vulnerability Detection Using Large Language Models and Graph Structural Analysis
15
作者 Ra-Yeon Choi Yeji Song +3 位作者 Minsoo Jang Taekyung Kim Jinhyun Ahn Dong-Hyuk Im 《Computers, Materials & Continua》 2025年第4期785-801,共17页
Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity.However,their immutability after deployment makes programming errors particularly critical,... Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity.However,their immutability after deployment makes programming errors particularly critical,as such errors can be exploited to compromise blockchain security.Existing vulnerability detection methods often rely on fixed rules or target specific vulnerabilities,limiting their scalability and adaptability to diverse smart contract scenarios.Furthermore,natural language processing approaches for source code analysis frequently fail to capture program flow,which is essential for identifying structural vulnerabilities.To address these limitations,we propose a novel model that integrates textual and structural information for smart contract vulnerability detection.Our approach employs the CodeBERT NLP model for textual analysis,augmented with structural insights derived from control flow graphs created using the abstract syntax tree and opcode of smart contracts.Each graph node is embedded using Sent2Vec,and centrality analysis is applied to highlight critical paths and nodes within the code.The extracted features are normalized and combined into a prompt for a large language model to detect vulnerabilities effectivel.Experimental results demonstrate the superiority of our model,achieving an accuracy of 86.70%,a recall of 84.87%,a precision of 85.24%,and an F1-score of 84.46%.These outcomes surpass existing methods,including CodeBERT alone(accuracy:81.26%,F1-score:79.84%)and CodeBERT combined with abstract syntax tree analysis(accuracy:83.48%,F1-score:79.65%).The findings underscore the effectiveness of incorporating graph structural information alongside text-based analysis,offering improved scalability and performance in detecting diverse vulnerabilities. 展开更多
关键词 Blockchain smart contract vulnerability detection large language model
在线阅读 下载PDF
Machine Learning on Blockchain (MLOB): A New Paradigm for Computational Security in Engineering
16
作者 Zhiming Dong Weisheng Lu 《Engineering》 2025年第4期250-263,共14页
Machine learning(ML)has been increasingly adopted to solve engineering problems with performance gauged by accuracy,efficiency,and security.Notably,blockchain technology(BT)has been added to ML when security is a part... Machine learning(ML)has been increasingly adopted to solve engineering problems with performance gauged by accuracy,efficiency,and security.Notably,blockchain technology(BT)has been added to ML when security is a particular concern.Nevertheless,there is a research gap that prevailing solutions focus primarily on data security using blockchain but ignore computational security,making the traditional ML process vulnerable to off-chain risks.Therefore,the research objective is to develop a novel ML on blockchain(MLOB)framework to ensure both the data and computational process security.The central tenet is to place them both on the blockchain,execute them as blockchain smart contracts,and protect the execution records on-chain.The framework is established by developing a prototype and further calibrated using a case study of industrial inspection.It is shown that the MLOB framework,compared with existing ML and BT isolated solutions,is superior in terms of security(successfully defending against corruption on six designed attack scenario),maintaining accuracy(0.01%difference with baseline),albeit with a slightly compromised efficiency(0.231 second latency increased).The key finding is MLOB can significantly enhances the computational security of engineering computing without increasing computing power demands.This finding can alleviate concerns regarding the computational resource requirements of ML-BT integration.With proper adaption,the MLOB framework can inform various novel solutions to achieve computational security in broader engineering challenges. 展开更多
关键词 Engineering computing Machine learning Blockchain Blockchain smart contract Deployable framework
在线阅读 下载PDF
A Hybrid Machine Learning and Blockchain Framework for IoT DDoS Mitigation
17
作者 Singamaneni Krishnapriya Sukhvinder Singh 《Computer Modeling in Engineering & Sciences》 2025年第8期1849-1881,共33页
The explosive expansion of the Internet of Things(IoT)systems has increased the imperative to have strong and robust solutions to cyber Security,especially to curtail Distributed Denial of Service(DDoS)attacks,which c... The explosive expansion of the Internet of Things(IoT)systems has increased the imperative to have strong and robust solutions to cyber Security,especially to curtail Distributed Denial of Service(DDoS)attacks,which can cripple critical infrastructure.The proposed framework presented in the current paper is a new hybrid scheme that induces deep learning-based traffic classification and blockchain-enabledmitigation tomake intelligent,decentralized,and real-time DDoS countermeasures in an IoT network.The proposed model fuses the extracted deep features with statistical features and trains them by using traditional machine-learning algorithms,which makes them more accurate in detection than statistical features alone,based on the Convolutional Neural Network(CNN)architecture,which can extract deep features.A permissioned blockchain will be included to record the threat cases immutably and automatically execute mitigation measures through smart contracts to provide transparency and resilience.When tested on two test sets,BoT-IoT and IoT-23,the framework obtains a maximum F1-score at 97.5 percent and only a 1.8 percent false positive rate,which compares favorably to other solutions regarding effectiveness and the amount of time required to respond.Our findings support the feasibility of our method as an extensible and secure paradigm of nextgeneration IoT security,which has constrictive utility in mission-critical or resource-constrained settings.The work is a substantial milestone in autonomous and trustful mitigation against DDoS attacks through intelligent learning and decentralized enforcement. 展开更多
关键词 IoT security DDoS mitigation machine learning CNN random forest blockchain smart contracts cyberattack detection
在线阅读 下载PDF
A Federated Learning Incentive Mechanism for Dynamic Client Participation:Unbiased Deep Learning Models
18
作者 Jianfeng Lu Tao Huang +2 位作者 Yuanai Xie Shuqin Cao Bing Li 《Computers, Materials & Continua》 2025年第4期619-634,共16页
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and identification.However,traditional DL methods compromise client pr... The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and identification.However,traditional DL methods compromise client privacy by collecting sensitive data,underscoring the necessity for privacy-preserving solutions like Federated Learning(FL).FL effectively addresses escalating privacy concerns by facilitating collaborative model training without necessitating the sharing of raw data.Given that FL clients autonomously manage training data,encouraging client engagement is pivotal for successful model training.To overcome challenges like unreliable communication and budget constraints,we present ENTIRE,a contract-based dynamic participation incentive mechanism for FL.ENTIRE ensures impartial model training by tailoring participation levels and payments to accommodate diverse client preferences.Our approach involves several key steps.Initially,we examine how random client participation impacts FL convergence in non-convex scenarios,establishing the correlation between client participation levels and model performance.Subsequently,we reframe model performance optimization as an optimal contract design challenge to guide the distribution of rewards among clients with varying participation costs.By balancing budget considerations with model effectiveness,we craft optimal contracts for different budgetary constraints,prompting clients to disclose their participation preferences and select suitable contracts for contributing to model training.Finally,we conduct a comprehensive experimental evaluation of ENTIRE using three real datasets.The results demonstrate a significant 12.9%enhancement in model performance,validating its adherence to anticipated economic properties. 展开更多
关键词 Federated learning deep learning non-IID data dynamic client participation non-convex optimization CONTRACT
在线阅读 下载PDF
Detecting Ethereum Ponzi Scheme Based on Hybrid Sampling for Smart Contract
19
作者 Yuanjun Qu Xiameng Si +1 位作者 Haiyan Kang Hanlin Zhou 《Computers, Materials & Continua》 2025年第2期3111-3130,共20页
With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, i... With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, its anonymity has provided new ways for Ponzi schemes to commit fraud, posing significant risks to investors. Current research still has some limitations, for example, Ponzi schemes are difficult to detect in the early stages of smart contract deployment, and data imbalance is not considered. In addition, there is room for improving the detection accuracy. To address the above issues, this paper proposes LT-SPSD (LSTM-Transformer smart Ponzi schemes detection), which is a Ponzi scheme detection method that combines Long Short-Term Memory (LSTM) and Transformer considering the time-series transaction information of smart contracts as well as the global information. Based on the verified smart contract addresses, account features, and code features are extracted to construct a feature dataset, and the SMOTE-Tomek algorithm is used to deal with the imbalanced data classification problem. By comparing our method with the other four typical detection methods in the experiment, the LT-SPSD method shows significant performance improvement in precision, recall, and F1-score. The results of the experiment confirm the efficacy of the model, which has some application value in Ethereum Ponzi scheme smart contract detection. 展开更多
关键词 Blockchain smart contract detection Ponzi scheme long short-term memory hybrid sampling
在线阅读 下载PDF
Smart Contract-Aided Attribute-Based Signature Algorithm with Non-Monotonic Access Structures
20
作者 Xin Xu Zhen Yang Yongfeng Huang 《Computers, Materials & Continua》 2025年第6期5019-5035,共17页
Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained envi... Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained environments,and traditional monotonic access structures are inadequate for handling increasingly complex access policies.In this paper,we propose a novel smart contract-assisted ABS(SC-ABS)algorithm that supports nonmonotonic access structures,aiming to reduce client computing overhead while providingmore expressive and flexible access control.The SC-ABS scheme extends the monotonic access structure by introducing the concept of negative attributes,allowing for more complex and dynamic access policies.By utilizing smart contracts,the algorithmsupports distributed trusted assisted computation,and the computation code is transparent and auditable.Importantly,this design allows information about user attributes to be deployed on smart contracts for computation,both reducing the risk of privacy abuse by semi-honest servers and preventing malicious users from attribute concealment to forge signatures.We prove that SC-ABS satisfies unforgeability and anonymity under a random oracle model,and test the scheme’s cost.Comparedwith existing schemes,this scheme has higher efficiency in client signature and authentication.This scheme reduces the computing burden of users,and the design of smart contracts improves the security of aided computing further,solves the problem of attribute concealment,and expresses a more flexible access structure.The solution enables permission control applications in resource-constrained distributed scenarios,such as the Internet of Things(IoT)and distributed version control systems,where data security and flexible access control are critical. 展开更多
关键词 Attribute-based signature non-monotone smart contract
在线阅读 下载PDF
上一页 1 2 69 下一页 到第
使用帮助 返回顶部