期刊文献+
共找到46,444篇文章
< 1 2 250 >
每页显示 20 50 100
Ponzi Scheme Detection for Smart Contracts Based on Oversampling
1
作者 Yafei Liu Yuling Chen +2 位作者 Xuewei Wang Yuxiang Yang Chaoyue Tan 《Computers, Materials & Continua》 2026年第1期1065-1085,共21页
As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security ... As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security threats to blockchain ecosystems.Although numerous detection techniques have been proposed,existing methods suffer from significant limitations,such as class imbalance and insufficient modeling of transaction-related semantic features.To address these challenges,this paper proposes an oversampling-based detection framework for Ponzi smart contracts.We enhance the Adaptive Synthetic Sampling(ADASYN)algorithm by incorporating sample proximity to decision boundaries and ensuring realistic sample distributions.This enhancement facilitates the generation of high-quality minority class samples and effectively mitigates class imbalance.In addition,we design a Contract Transaction Graph(CTG)construction algorithm to preserve key transactional semantics through feature extraction from contract code.A graph neural network(GNN)is then applied for classification.This study employs a publicly available dataset from the XBlock platform,consisting of 318 verified Ponzi contracts and 6498 benign contracts.Sourced from real Ethereum deployments,the dataset reflects diverse application scenarios and captures the varied characteristics of Ponzi schemes.Experimental results demonstrate that our approach achieves an accuracy of 96%,a recall of 92%,and an F1-score of 94%in detecting Ponzi contracts,outperforming state-of-the-art methods. 展开更多
关键词 Blockchain smart contracts Ponzi schemes class imbalance graph structure construction
在线阅读 下载PDF
ILRD:一种融合IPC_LDA和文本语义特征的专利推荐模型 被引量:2
2
作者 邓娜 林涵辉 +1 位作者 陈旭 刘树栋 《情报杂志》 北大核心 2025年第3期170-179,F0003,共11页
[研究目的]随着全球专利数量的持续增长,现有的专利推荐模型难以精准地理解专利文本中复杂的语义信息,忽视了专利的领域和主题信息,从而影响专利的准确推荐。因此,实现一个能够综合考虑多种因素的高效专利推荐模型具有重要意义。[研究方... [研究目的]随着全球专利数量的持续增长,现有的专利推荐模型难以精准地理解专利文本中复杂的语义信息,忽视了专利的领域和主题信息,从而影响专利的准确推荐。因此,实现一个能够综合考虑多种因素的高效专利推荐模型具有重要意义。[研究方法]提出了一种ILRD专利推荐模型,通过IPC语义结构化映射与LDA主题建模来表征专利的技术领域和核心主题。构建RoBERTa与DPCNN模型深入解析专利文本的复杂语义,以实现多因素融合的专利推荐。[研究结果/结论]实证研究显示,ILRD模型在半导体领域的专利推荐上,其准确率和F1得分显著超越常规模型,推荐准确率提高至86%。验证了本文方法的有效性,也为跨领域专利推荐提供了新思路。 展开更多
关键词 专利推荐 ipc LDA主题建模 预训练模型 RoBERTa DPCNN 半导体
在线阅读 下载PDF
基于IPC4共现网络的稀土技术领域中外专利布局差异分析
3
作者 曾国华 郑后远 吴雯雯 《科技管理研究》 2025年第12期171-184,共14页
为应对稀土技术“卡脖子”风险,识别出关键技术领域是第一步,故基于专利IPC4共现网络,展开中外稀土专利布局所涉及重要领域或重要领域群之间的差异分析。首先通过指数分析与中心性分析寻找中外稀土专利的关键领域间的差异,随后分别采用K... 为应对稀土技术“卡脖子”风险,识别出关键技术领域是第一步,故基于专利IPC4共现网络,展开中外稀土专利布局所涉及重要领域或重要领域群之间的差异分析。首先通过指数分析与中心性分析寻找中外稀土专利的关键领域间的差异,随后分别采用K-核过滤与边权重过滤从两个维度去简化网络并运用Leiden算法进行社团检测,前者通过最大完备子图寻找关键技术关联领域群,后者通过最大信息熵寻找关键技术协同领域群,最后经过匹配得到关键领域群中中外重复领域与差异领域。研究表明,中国是主要的稀土专利公开国,在合金领域的研究遥遥领先;中外专利涉及领域中起中介作用和具有特征重要性的领域极少,其中作业与运输、化学与冶金部领域技术关联壁垒较弱,多领域技术协同深度高;外国专利申请人(FPA)专利涉及领域广度高于中国专利申请人(CPA),前者倾向于研究跨部专利,后者重视部内跨领域专利。 展开更多
关键词 专利ipc4共现网络 CPA FPA 技术关联与协同 技术领域 Leiden算法
在线阅读 下载PDF
基于IPC分类号的新能源汽车技术专利分析 被引量:1
4
作者 沈思 朱冬梅 +2 位作者 赵文华 赵志枭 王东波 《数字通信世界》 2025年第9期157-159,共3页
基于IPC分类号,本文分析了能源管理、电机控制和车辆互联等领域的创新热点。结果表明,新能源汽车技术正向更加高效、智能化与可持续的方向转变。旨在为政策制定、企业研发和行业创新的相关方提供战略洞察,为引领新能源汽车领域的技术进... 基于IPC分类号,本文分析了能源管理、电机控制和车辆互联等领域的创新热点。结果表明,新能源汽车技术正向更加高效、智能化与可持续的方向转变。旨在为政策制定、企业研发和行业创新的相关方提供战略洞察,为引领新能源汽车领域的技术进步和竞争力提升奠定基础。 展开更多
关键词 专利 新能源汽车 ipc分类号
在线阅读 下载PDF
利用IPC分类号大组进行专利情报高效检索的策略研究
5
作者 熊翠娥 张耀祖 《中国发明与专利》 2025年第S1期241-247,共7页
[目的/意义]本文对已驳回案件所属的主分类号大组与其所引用的X类和/或Y类对比文件的分类号大组之间的关系进行研究,旨在提出利用IPC分类号大组进行专利情报高效检索的策略。[方法/过程]研究引入了“对比文件分类号相似度”的概念,明确... [目的/意义]本文对已驳回案件所属的主分类号大组与其所引用的X类和/或Y类对比文件的分类号大组之间的关系进行研究,旨在提出利用IPC分类号大组进行专利情报高效检索的策略。[方法/过程]研究引入了“对比文件分类号相似度”的概念,明确了其定义和计算方法;通过对某大组引用的对比文件的分类号大组及其出现的频次和频率进行分析,明确了“高频引用分类号”和“建议扩展分类号”的含义。进而以G01N小类为例,基于数据统计和计算结果评价了各大组采用分类号检索的效果,讨论了各大组的分类号高效检索策略;并结合具体案例分析,论证了对不同的分类号大组经过针对性地扩展至建议扩展分类号后可提高专利情报检索的有效性和全面性。[结果/结论]研究结果表明,本文提出的“对比文件分类号相似度”“高频引用分类号”和“建议扩展分类号”有助于进行专利情报高效检索。 展开更多
关键词 分类号大组 对比文件分类号相似度 高频引用分类号 建议扩展分类号
在线阅读 下载PDF
复合材料与层状材料在IPC分类体系中的相关性研究
6
作者 熊军 王志贤 +1 位作者 范维 苏甜 《中阿科技论坛(中英文)》 2025年第4期66-71,共6页
在国际专利分类(IPC)体系中,复合材料成型技术是以树脂材料为基体,通过多层材料堆积复合而成的技术,涵盖原料、工艺和产品,而层状材料则是由扁平或非扁平薄层构成的产品。在实际专利检索过程中,复合材料与层状材料在产品形貌结构、原料... 在国际专利分类(IPC)体系中,复合材料成型技术是以树脂材料为基体,通过多层材料堆积复合而成的技术,涵盖原料、工艺和产品,而层状材料则是由扁平或非扁平薄层构成的产品。在实际专利检索过程中,复合材料与层状材料在产品形貌结构、原料来源以及制作工艺等方面存在诸多相似性,导致相关专利案件的分类号出现大量交叉融合现象,增加了检索难度。为了提高相关专利案件检索的效率与准确性,文章深入研究了复合材料与层状材料在IPC分类体系中的相关性,分析了二者在分类号上的交叉点及其成因,并提出了相应的检索策略与建议。 展开更多
关键词 复合材料 层状材料 国际专利分类(ipc) 专利案件 检索
在线阅读 下载PDF
基于ADS协议的倍福IPC之间无线通信技术研究 被引量:1
7
作者 童硕 《自动化应用》 2025年第8期266-269,共4页
倍福工业控制计算机(IPC)被广泛应用于烟草机械行业,IPC之间的数据大多采用有线传输,但在IPC之间有相对位移或距离较远的环境下,有线传输存在局限性。针对此问题,提出运用无线通信技术,使基于自动化设备规范(ADS)协议的倍福IPC之间通过... 倍福工业控制计算机(IPC)被广泛应用于烟草机械行业,IPC之间的数据大多采用有线传输,但在IPC之间有相对位移或距离较远的环境下,有线传输存在局限性。针对此问题,提出运用无线通信技术,使基于自动化设备规范(ADS)协议的倍福IPC之间通过无线传输方式进行通信。采用TwinCAT软件编写通信程序和界面程序,硬件采用双“无线模块WLAN1100+工控机CX2020”的交互模式,以对数据传输进行实验验证。结果显示,无论是IPC主站还是IPC从站,其发送与接收的数据均准确无误,没有出现丢失、损坏、错误的情况,同时,数据在传输速度、实时性等方面均能满足实际应用中的需求。该方法弥补了传统有线传输的不足,使得IPC之间的连接更加灵活便捷,为工业自动化领域的数据通信提供了一种可靠的解决方案。 展开更多
关键词 工业控制计算机 烟草机械 数据传输 无线通信技术 ADS协议 工控机CX2020
在线阅读 下载PDF
Robust Detection and Analysis of Smart Contract Vulnerabilities with Large Language Model Agents
8
作者 Nishank P. Kuppa Vijay K. Madisetti 《Journal of Information Security》 2025年第1期197-226,共30页
Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart cont... Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart contracts for personal financial gain, which undermines the integrity of the Ethereum blockchain. This paper proposes a computer program called SADA (Static and Dynamic Analyzer), a novel approach to smart contract vulnerability detection using multiple Large Language Model (LLM) agents to analyze and flag suspicious Solidity code for Ethereum smart contracts. SADA not only improves upon existing vulnerability detection methods but also paves the way for more secure smart contract development practices in the rapidly evolving blockchain ecosystem. 展开更多
关键词 Blockchain Ethereum Smart contracts Security Decentralized Applications WEB3 Cryptocurrency Large Language Models
在线阅读 下载PDF
双波长IPC法同时测定复方锌铁钙口服溶液中抑菌剂苯甲酸钠与维生素B_(2)含量
9
作者 李琦 李晓燕 +1 位作者 舒森 李钰鑫 《广东化工》 2025年第13期128-130,103,共4页
目的:采用双波长IPC法同时测定复方锌铁钙口服溶液中抑菌剂苯甲酸钠与维生素B_(2)含量。方法:色谱柱为Xtimate C18(250 mm×4.6 mm,5μm);流动相为含0.01 mol/L庚烷磺酸钠的0.5%冰醋酸溶液-乙腈-甲醇(85∶10∶5);流速为1.0 m L/min... 目的:采用双波长IPC法同时测定复方锌铁钙口服溶液中抑菌剂苯甲酸钠与维生素B_(2)含量。方法:色谱柱为Xtimate C18(250 mm×4.6 mm,5μm);流动相为含0.01 mol/L庚烷磺酸钠的0.5%冰醋酸溶液-乙腈-甲醇(85∶10∶5);流速为1.0 m L/min;双波长分别为444 nm与274 nm;柱温为40℃;进样量:20μL。结果:阴性样品不干扰测定,维生素B_(2)在12.30μg/mL~61.52μg/mL浓度范围内线性关系良好(r=1),平均回收率为100.46%(n=9,RSD为0.28%);苯甲酸钠在0.04765 mg/mL~0.38125 mg/mL浓度范围内线性关系良好(r=0.9999),平均回收率为100.51%(n=6,RSD为0.81%)。结论:本法专属性强、操作简便,能准确测定复方锌铁钙口服溶液中维生素B_(2)与苯甲酸钠含量。 展开更多
关键词 复方锌铁钙口服溶液 ipc 维生素B_(2) 抑菌剂 苯甲酸钠
暂未订购
Smart Contract-Aided Attribute-Based Signature Algorithm with Non-Monotonic Access Structures
10
作者 Xin Xu Zhen Yang Yongfeng Huang 《Computers, Materials & Continua》 2025年第6期5019-5035,共17页
Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained envi... Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained environments,and traditional monotonic access structures are inadequate for handling increasingly complex access policies.In this paper,we propose a novel smart contract-assisted ABS(SC-ABS)algorithm that supports nonmonotonic access structures,aiming to reduce client computing overhead while providingmore expressive and flexible access control.The SC-ABS scheme extends the monotonic access structure by introducing the concept of negative attributes,allowing for more complex and dynamic access policies.By utilizing smart contracts,the algorithmsupports distributed trusted assisted computation,and the computation code is transparent and auditable.Importantly,this design allows information about user attributes to be deployed on smart contracts for computation,both reducing the risk of privacy abuse by semi-honest servers and preventing malicious users from attribute concealment to forge signatures.We prove that SC-ABS satisfies unforgeability and anonymity under a random oracle model,and test the scheme’s cost.Comparedwith existing schemes,this scheme has higher efficiency in client signature and authentication.This scheme reduces the computing burden of users,and the design of smart contracts improves the security of aided computing further,solves the problem of attribute concealment,and expresses a more flexible access structure.The solution enables permission control applications in resource-constrained distributed scenarios,such as the Internet of Things(IoT)and distributed version control systems,where data security and flexible access control are critical. 展开更多
关键词 Attribute-based signature non-monotone smart contract
在线阅读 下载PDF
CEO political orientation and loan contract
11
作者 Chune Young Chung Changhwan Choi Do Thi Thanh Nhan 《Financial Innovation》 2025年第1期333-368,共36页
Banks rely on soft information when assessing loan applications,making it crucial to evaluate the trustworthiness of potential borrowers in order to set loan conditions,even in a legal environment where contractual ri... Banks rely on soft information when assessing loan applications,making it crucial to evaluate the trustworthiness of potential borrowers in order to set loan conditions,even in a legal environment where contractual rights are straightforwardly enforced.Given the common belief that certain personality traits—such as trustworthiness,reliability,loyalty,thriftiness,and stinginess—are more often linked to conservatives(Republicans)than to liberals(Democrats),we investigate whether companies with conservative chief executive officers(CEOs)secure more advantageous loan terms compared to others.Our findings indicate that firms with conservative CEOs are able to negotiate bank loans with lower interest spreads and upfront fees.While we do not observe a direct impact of CEO overconfidence on loan pricing,we reveal that the combined influence of CEO conservatism and overconfidence contributes to our primary findings.Additionally,we discovered that conservative CEOs tend to receive more favorable non-price conditions(fewer covenants)and are less inclined to offer collateral. 展开更多
关键词 CEO characteristics Conservative CEO Trustworthiness Loan contract
在线阅读 下载PDF
A Path to Recognizing Intellectual Property Contracts as Nominate Contracts in the Post-Civil Code Era
12
作者 Li Hao 《科技与法律(中英文)》 2025年第6期124-137,共14页
The Book on Contracts of the Civil Code does not recognize"intellectual property contracts"as nominate contracts.Owing to both substantive and structural shortcomings,the Chapter on Technology Contracts fall... The Book on Contracts of the Civil Code does not recognize"intellectual property contracts"as nominate contracts.Owing to both substantive and structural shortcomings,the Chapter on Technology Contracts falls short of providing comprehensive regulation of transactions involving intellectual property,and its Article 876 linking clause has given rise to legal controversies over application by reference and priority of application.There is therefore an urgent need to recognize intellectual property contracts as a nominate category.The rules on such contracts that are dispersed across standalone intellectual property statutes,specialized regulations,adjudicated cases,and judicial interpretations have already produced decodification and should be integrated in the course of enacting the Intellectual Property Code,so as to achieve the recodification of contracts concerning intellectual property.Specifically,the Chapter on Contracts should consist of two parts,General Provisions and Nominate Contracts,to articulate the common features and specific rules of the various contract types while confirming the applicability of the General Provisions in the Book on Contracts.In this way,systemic disorder from mechanically adding nominate contracts to the Civil Code and unnecessary complexity from creating a separate sectoral contract code can both be avoided,and the status of the Book on Contracts as the basic law in the field of contract can be preserved. 展开更多
关键词 contract section decodification re-codification intellectual property code
在线阅读 下载PDF
Data Elements and Trustworthy Circulation:A Clearing and Settlement Architecture for Element Market Transactions Integrating Privacy Computing and Smart Contracts
13
作者 Huanjing Huang 《Journal of Electronic Research and Application》 2025年第5期86-92,共7页
This article explores the characteristics of data resources from the perspective of production factors,analyzes the demand for trustworthy circulation technology,designs a fusion architecture and related solutions,inc... This article explores the characteristics of data resources from the perspective of production factors,analyzes the demand for trustworthy circulation technology,designs a fusion architecture and related solutions,including multi-party data intersection calculation,distributed machine learning,etc.It also compares performance differences,conducts formal verification,points out the value and limitations of architecture innovation,and looks forward to future opportunities. 展开更多
关键词 Data elements Privacy computing Smart contracts
在线阅读 下载PDF
Smart Contract Vulnerability Detection Using Large Language Models and Graph Structural Analysis
14
作者 Ra-Yeon Choi Yeji Song +3 位作者 Minsoo Jang Taekyung Kim Jinhyun Ahn Dong-Hyuk Im 《Computers, Materials & Continua》 2025年第4期785-801,共17页
Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity.However,their immutability after deployment makes programming errors particularly critical,... Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity.However,their immutability after deployment makes programming errors particularly critical,as such errors can be exploited to compromise blockchain security.Existing vulnerability detection methods often rely on fixed rules or target specific vulnerabilities,limiting their scalability and adaptability to diverse smart contract scenarios.Furthermore,natural language processing approaches for source code analysis frequently fail to capture program flow,which is essential for identifying structural vulnerabilities.To address these limitations,we propose a novel model that integrates textual and structural information for smart contract vulnerability detection.Our approach employs the CodeBERT NLP model for textual analysis,augmented with structural insights derived from control flow graphs created using the abstract syntax tree and opcode of smart contracts.Each graph node is embedded using Sent2Vec,and centrality analysis is applied to highlight critical paths and nodes within the code.The extracted features are normalized and combined into a prompt for a large language model to detect vulnerabilities effectivel.Experimental results demonstrate the superiority of our model,achieving an accuracy of 86.70%,a recall of 84.87%,a precision of 85.24%,and an F1-score of 84.46%.These outcomes surpass existing methods,including CodeBERT alone(accuracy:81.26%,F1-score:79.84%)and CodeBERT combined with abstract syntax tree analysis(accuracy:83.48%,F1-score:79.65%).The findings underscore the effectiveness of incorporating graph structural information alongside text-based analysis,offering improved scalability and performance in detecting diverse vulnerabilities. 展开更多
关键词 Blockchain smart contract vulnerability detection large language model
在线阅读 下载PDF
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
15
作者 Xueshuo Xie Haolong Wang +3 位作者 Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li 《Digital Communications and Networks》 2025年第1期1-12,共12页
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on Ethereum.Effective vulnerability detection of large-scale smart contracts is critical,as attack... Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on Ethereum.Effective vulnerability detection of large-scale smart contracts is critical,as attacks on smart contracts often cause huge economic losses.Since it is difficult to repair and update smart contracts,it is necessary to find the vulnerabilities before they are deployed.However,code analysis,which requires traversal paths,and learning methods,which require many features to be trained,are too time-consuming to detect large-scale on-chain contracts.Learning-based methods will obtain detection models from a feature space compared to code analysis methods such as symbol execution.But the existing features lack the interpretability of the detection results and training model,even worse,the large-scale feature space also affects the efficiency of detection.This paper focuses on improving the detection efficiency by reducing the dimension of the features,combined with expert knowledge.In this paper,a feature extraction model Block-gram is proposed to form low-dimensional knowledge-based features from bytecode.First,the metadata is separated and the runtime code is converted into a sequence of opcodes,which are divided into segments based on some instructions(jumps,etc.).Then,scalable Block-gram features,including 4-dimensional block features and 8-dimensional attribute features,are mined for the learning-based model training.Finally,feature contributions are calculated from SHAP values to measure the relationship between our features and the results of the detection model.In addition,six types of vulnerability labels are made on a dataset containing 33,885 contracts,and these knowledge-based features are evaluated using seven state-of-the-art learning algorithms,which show that the average detection latency speeds up 25×to 650×,compared with the features extracted by N-gram,and also can enhance the interpretability of the detection model. 展开更多
关键词 Smart contract Bytecode&opcode Knowledgeable features Vulnerability detection Feature contribution
在线阅读 下载PDF
Analysis of the Application of Contract Settlement Accounts for Insurance Companies Under the New Revenue Standard
16
作者 Ji Shu'an Zhang Tiantian 《Journal of Humanities and Nature》 2025年第2期73-77,共5页
The implementation of the new revenue standard has a far-reaching impact on the accounting treatment of insurance enterprises,and the application of contract settlement accounts,as the key to connect business and fina... The implementation of the new revenue standard has a far-reaching impact on the accounting treatment of insurance enterprises,and the application of contract settlement accounts,as the key to connect business and financial accounting,needs to be standardized.This paper analyzes the core requirements of the new revenue standard,combines the special characteristics of insurance contracts with both service and financial attributes,and explains the logic of setting up and accounting methods of secondary accounts,such as insurance service income and investment component apportionment.In view of the practical pain points such as variable consideration apportionment and reclassification of inter-period contracts,the paper proposes strategies for system upgrading and internal control strengthening.The study shows that standardizing the application of accounts can help enterprises implement the requirements of the standard and improve the quality of financial information. 展开更多
关键词 New Revenue Standards Insurance Companies contract Settlement Accounts ACCOUNTING
在线阅读 下载PDF
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation
17
作者 Yunhua He Yigang Yang +4 位作者 Chao Wang Anke Xie Li Ma Bin Wu Yongdong Wu 《Digital Communications and Networks》 2025年第2期432-441,共10页
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,com... The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,complex functions such as matrix operations are difficult to implement on Ethereum Virtual Machine(EVM)-based smart contract platforms due to their distributed security environment limitations.Existing off-chain methods often result in a significant reduction in contract execution efficiency,thus a platform software development kit interface implementation method has become a feasible way to reduce overheads,but this method cannot verify operation correctness and may leak sensitive user data.To solve the above problems,we propose a verifiable EVM-based smart contract cross-language implementation scheme for complex operations,especially matrix operations,which can guarantee operation correctness and user privacy while ensuring computational efficiency.In this scheme,a verifiable interaction process is designed to verify the computation process and results,and a matrix blinding technology is introduced to protect sensitive user data in the calculation process.The security analysis and performance tests show that the proposed scheme can satisfy the correctness and privacy of the cross-language implementation of smart contracts at a small additional efficiency cost. 展开更多
关键词 Smart contract Blockchain Cross-language programming Bilinear pairing Publicly verifiable computation
在线阅读 下载PDF
GMS:A Novel Method for Detecting Reentrancy Vulnerabilities in Smart Contracts
18
作者 Dawei Xu Fan Huang +3 位作者 Jiaxin Zhang Yunfang Liang Baokun Zheng Jian Zhao 《Computers, Materials & Continua》 2025年第5期2207-2220,共14页
With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly important.Blockchain and smart contract technologies,with their decentralized nature,provide ... With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly important.Blockchain and smart contract technologies,with their decentralized nature,provide strong security guarantees for IoT.However,at the same time,smart contracts themselves face numerous security challenges,among which reentrancy vulnerabilities are particularly prominent.Existing detection tools for reentrancy vulnerabilities often suffer from high false positive and false negative rates due to their reliance on identifying patterns related to specific transfer functions.To address these limitations,this paper proposes a novel detection method that combines pattern matching with deep learning.Specifically,we carefully identify and define three common patterns of reentrancy vulnerabilities in smart contracts.Then,we extract key vulnerability features based on these patterns.Furthermore,we employ a Graph Attention Neural Network to extract graph embedding features from the contract graph,capturing the complex relationships between different components of the contract.Finally,we use an attention mechanism to fuse these two sets of feature information,enhancing the weights of effective information and suppressing irrelevant information,thereby significantly improving the accuracy and robustness of vulnerability detection.Experimental results demonstrate that our proposed method outperforms existing state-ofthe-art techniques,achieving a 3.88%improvement in accuracy compared to the latest vulnerability detection model AME(Attentive Multi-Encoder Network).This indicates that our method effectively reduces false positives and false negatives,significantly enhancing the security and reliability of smart contracts in the evolving IoT ecosystem. 展开更多
关键词 Smart contract Internet of Things reentrancy vulnerabilities graph neural network
在线阅读 下载PDF
Detecting Ethereum Ponzi Scheme Based on Hybrid Sampling for Smart Contract
19
作者 Yuanjun Qu Xiameng Si +1 位作者 Haiyan Kang Hanlin Zhou 《Computers, Materials & Continua》 2025年第2期3111-3130,共20页
With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, i... With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, its anonymity has provided new ways for Ponzi schemes to commit fraud, posing significant risks to investors. Current research still has some limitations, for example, Ponzi schemes are difficult to detect in the early stages of smart contract deployment, and data imbalance is not considered. In addition, there is room for improving the detection accuracy. To address the above issues, this paper proposes LT-SPSD (LSTM-Transformer smart Ponzi schemes detection), which is a Ponzi scheme detection method that combines Long Short-Term Memory (LSTM) and Transformer considering the time-series transaction information of smart contracts as well as the global information. Based on the verified smart contract addresses, account features, and code features are extracted to construct a feature dataset, and the SMOTE-Tomek algorithm is used to deal with the imbalanced data classification problem. By comparing our method with the other four typical detection methods in the experiment, the LT-SPSD method shows significant performance improvement in precision, recall, and F1-score. The results of the experiment confirm the efficacy of the model, which has some application value in Ethereum Ponzi scheme smart contract detection. 展开更多
关键词 Blockchain smart contract detection Ponzi scheme long short-term memory hybrid sampling
在线阅读 下载PDF
Numerical simulation of size contraction of Typhoon Cempaka(2021)
20
作者 Lingfeng Sun Qingqing Li 《Atmospheric and Oceanic Science Letters》 2025年第2期29-35,共7页
In 2021,Cempaka,a tiny tropical cyclone,made landfall in China.As the TC intensified prior to landfall,the tropical cyclone size measured with precipitation decreased significantly.A numerical simulation was conducted... In 2021,Cempaka,a tiny tropical cyclone,made landfall in China.As the TC intensified prior to landfall,the tropical cyclone size measured with precipitation decreased significantly.A numerical simulation was conducted to examine the possible processes modulating the storm size.Azimuthally mean potential vorticity(PV)was found to decrease mainly in the middle to upper troposphere between 50-and 80-km radii.The PV budget results indicate that the advection and generation of mean PV associated with asymmetric processes,rather than the symmetric processes,primarily contributed to the decrease in mean PV.These asymmetric processes leading to a negative PV tendency were likely associated with inactive outer rainbands.In contrast,the tangential winds simultaneously expanded radially outward,possibly related to inner-core diabatic heating.The findings here emphasize the importance of outer rainband activity in tropical cyclone size change. 展开更多
关键词 Typhoon cempaka Vortex size contraction Potential vorticity budget Asymmetric structure Outer rainband
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部