The contract net protocol has developed to specify problem solving communication for nodes in a distributed problem solving. Task distribution is affected by a negotiation process,a discussion carried on between node...The contract net protocol has developed to specify problem solving communication for nodes in a distributed problem solving. Task distribution is affected by a negotiation process,a discussion carried on between nodes with tasks to he executed and nodes that may be able to execute those tasks. In contract net protocol,once negotiation successes,tbe task execution is assumed to success. However,in real world,even though a task is awarded to successfully bidding nodes,it may be delayed. Such delay may badly propagate in whole system. Here,we introduce real-time constraints into contract net protocol to manage task execution for avoiding the, task's delay,or even though being delayed,the railure cannot propagate to whole system. In this paper,we first present a real-time contract net protocol which is an extension of contract net protocol with real-time constraints for distributed computing. Our proposition extends the basic negotiation protocol to negotiation and controlling execution or task. The controlling process is based on task deadline time,we also present an extension of the internode language of contract net protocol specification with real-time constraints.展开更多
To provide a much more resilient transport scheme for tractor and trailer transportation systems,this paper explores the generation method of tractor and trailer transport schemes considering the influence of disrupte...To provide a much more resilient transport scheme for tractor and trailer transportation systems,this paper explores the generation method of tractor and trailer transport schemes considering the influence of disrupted events.Three states of tractors including towing loaded trailers,towing empty trailers,and idle driving are taken into account.Based on the disruption management theory,a scheduling model is constructed to minimize the total deviation cost including transportation time,transportation path,and number of used vehicles under the three states of tractors.A heuristics based on the contract net and simulated annealing algorithm is designed to solve the proposed model.Through comparative analysis of examples with different numbers of newly added transportation tasks and different types of road networks,the performance of the contract net algorithm in terms of deviations in idle driving paths,empty trailer paths,loaded trailer paths,time,number of used vehicles,and total deviation cost are analyzed.The results demonstrate the effectiveness of the model and algorithm,highlighting the superiority of the disruption management model and the contract net annealing algorithm.The study provides a reference for handling unexpected events in the tractor and trailer transportation industry.展开更多
As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security ...As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security threats to blockchain ecosystems.Although numerous detection techniques have been proposed,existing methods suffer from significant limitations,such as class imbalance and insufficient modeling of transaction-related semantic features.To address these challenges,this paper proposes an oversampling-based detection framework for Ponzi smart contracts.We enhance the Adaptive Synthetic Sampling(ADASYN)algorithm by incorporating sample proximity to decision boundaries and ensuring realistic sample distributions.This enhancement facilitates the generation of high-quality minority class samples and effectively mitigates class imbalance.In addition,we design a Contract Transaction Graph(CTG)construction algorithm to preserve key transactional semantics through feature extraction from contract code.A graph neural network(GNN)is then applied for classification.This study employs a publicly available dataset from the XBlock platform,consisting of 318 verified Ponzi contracts and 6498 benign contracts.Sourced from real Ethereum deployments,the dataset reflects diverse application scenarios and captures the varied characteristics of Ponzi schemes.Experimental results demonstrate that our approach achieves an accuracy of 96%,a recall of 92%,and an F1-score of 94%in detecting Ponzi contracts,outperforming state-of-the-art methods.展开更多
The practical engineering of satellite tracking telemetry and command(TT&C)is often disturbed by unpredictable external factors,including the temporary rise in a significant quantity of satellite TT&C tasks,te...The practical engineering of satellite tracking telemetry and command(TT&C)is often disturbed by unpredictable external factors,including the temporary rise in a significant quantity of satellite TT&C tasks,temporary failures and failures of some TT&C resources,and so on.To improve the adaptability and robustness of satellite TT&C systems when faced with uncertain dynamic disturbances,a hierarchical disturbance propagation mechanism and an improved contract network dynamic scheduling method for satellite TT&C resources were designed to address the dynamic scheduling problem of satellite TT&C resources.Firstly,the characteristics of the dynamic scheduling problem of satellite TT&C resources are analyzed,and a mathematical model is established with the weighted optimization objectives of maximizing the revenue from task completion and minimizing the degree of plan disturbance.Then,a bottom-up distributed dynamic collaborative scheduling framework for satellite TT&C resources is proposed,which includes a task layer,a resource layer,a central internal collaboration layer,and a central external collaboration layer.Dynamic disturbances are propagated layer by layer from the task layer to the central external collaboration layer in a bottom-up manner,using efficient heuristic strategies in the task layer and the resource layer,respectively.We use improved contract network algorithms in the center internal collaboration layer and the center external collaboration layer,the original scheduling plan is quickly adjusted to minimize the impact of disturbances while effectively completing dynamic task requirements.Finally,a large number of simulation experiments were carried out and compared with various comparative algorithms.The results show that the proposed algorithm can effectively improve the solution effect of satellite TT&C resource dynamic scheduling problems,and has good application prospects.展开更多
Contract is a common and effective mechanism for supply chain coordination,which has been studied extensively in recent years.For a supply chain network model,contracts can be used to coordinate it because it is too i...Contract is a common and effective mechanism for supply chain coordination,which has been studied extensively in recent years.For a supply chain network model,contracts can be used to coordinate it because it is too ideal to obtain the network equilibrium state in practical market competition.In order to achieve equilibrium,we introduce revenue sharing contract into a supply chain network equilibrium model with random demand in this paper.Then,we investigate the influence on this network equilibrium state from demand disruptions caused by unexpected emergencies.When demand disruptions happen,the supply chain network equilibrium state will be broken and change to a new one,so the decision makers need to adjust the contract parameters to achieve the new coordinated state through bargaining.Finally,a numerical example with a sudden demand increase as a result of emergent event is provided for illustrative purposes.展开更多
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability ...Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.展开更多
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi...In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.展开更多
In this paper,a trusted multi-task distribution mechanism for Internet of Vehicles based on smart contract is proposed to improve the security and efficiency for the task distribution in Internet of Vehicles.Firstly,a...In this paper,a trusted multi-task distribution mechanism for Internet of Vehicles based on smart contract is proposed to improve the security and efficiency for the task distribution in Internet of Vehicles.Firstly,a three-tier trusted multi-task distribution framework is presented based on smart contract.The smart contract will be triggered by the task request.As the important part of the smart contract,the task distribution algorithm is stored on the blockchain and run automatically.In the process of the task distribution,the cost of the task distribution and the system stability play a critical role.Therefore,the task distribution problem is formulated to minimize the cost of the task distribution whilst maintaining the stability of the system based on Lyapunov theorem.Unfortunately,this problem is a mixed integer nonlinear programming problem with NP-hard characteristics.To tackle this,the optimization problem is decomposed into two sub problems of computing resource allocation and task distribution decision,and an effective task distribution algorithm is proposed.Simulation results show that the proposed algorithm can effectively improves system performance.展开更多
Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart...Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart contract is the key to ensure the security of blockchain system.Oriented to Ethereum smart contract,the study solves the problems of redundant input and low coverage in the smart contract fuzz.In this paper,a taint analysis method based on EVM is proposed to reduce the invalid input,a dangerous operation database is designed to identify the dangerous input,and genetic algorithm is used to optimize the code coverage of the input,which construct the fuzzing framework for smart contract together.Finally,by comparing Oyente and ContractFuzzer,the performance and efficiency of the framework are proved.展开更多
Twelve novel transition-rare-earth metal clusters,formulated as [Ni_(18)Pr_(14)(μ_(3)OH)_(14)(dmpa)_(10)(mmt)_(10)(SO_(4))_(4)(CH_(3)COO)_(16)]·9CH_(3)OH·5H_(2)O(1,H_(3)dmpa=dimethylolpropionic acid,and Hmm...Twelve novel transition-rare-earth metal clusters,formulated as [Ni_(18)Pr_(14)(μ_(3)OH)_(14)(dmpa)_(10)(mmt)_(10)(SO_(4))_(4)(CH_(3)COO)_(16)]·9CH_(3)OH·5H_(2)O(1,H_(3)dmpa=dimethylolpropionic acid,and Hmmt=2-me rcapto-5-methyl-1,3,4-thiadiazole) [Ni_(36)RE_(102)(OH)_(138)(mmt)_(18)(Hdmpa)_(30)(H_(2)dmpa)_(12)(CH_(3)COO)_(72)(NO_(3))_(36)(SO_(4))_(18)(H_(2)O)_(30)]·Br_(6)(RE=Nd(2),Sm(3),Eu(4) and Gd(5))[Ni_(12)RE_(10)(μ_(3)-OH)_(10)(dmpa)_(8)(mmt)_(8)(S(_(4))2(CH_(3)COO)_(8)(H_(2)O)_(4)]·8CH_(3)OH·7H_(2)O(RE = Tb(6),Dy(7),Ho(8),Er(9) and Y(10)) [Ni_(8)Pr_(8)(μ_(3)-OH)_(8)(mmt)_(8)(Hdpga)_(16)(CH3COO)_(8)]·8CH_(3)OH(11,H_(2)dpga=diphe nyl-glycolic acid),and [Ni_(16)Tb_(6)(μ_(3)-OH)_(24)(mmt)_(8)(Hdpga)_(4)(dpga)_(4)(CH_(3)COO)_(2)(NO_(3))_(4)(H_(2)O)_(2)]·12CH_(3)OH·5H_(2)O(12),were synthesized solvothermally by using different ligand combinations and rare earth nitrates.X-ray crystal structure analyses reveal that complexes 1 and 12 possess sandwich-like structure.Compounds 2-5 are isostructural and feature a hexagonal structure,shaped like a "Star of David".Isostructural 6-10 present ring-like structure,as well as the cluster 11.The structural variations of these complexes can be attributed to the effect of lanthanide contraction.Moreover,the template effect of SO_(4)^(2-) anion derived from the slow decomposition of Hmmt ligand also plays a significant role in the formation of cluster skeletons.The insitu mechanism for the generation of sulfate anion is briefly discussed.Meanwhile,the magnetic properties of complexes 2-11 were studied which show typical antiferromagnetic interactions.展开更多
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced techno...The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks.展开更多
With the increasing popularity of Ethereum,smart contracts have become a prime target for fraudulent activities such as Ponzi,honeypot,gambling,and phishing schemes.While some researchers have studied intelligent frau...With the increasing popularity of Ethereum,smart contracts have become a prime target for fraudulent activities such as Ponzi,honeypot,gambling,and phishing schemes.While some researchers have studied intelligent fraud detection,most research has focused on identifying Ponzi contracts,with little attention given to detecting and preventing gambling or phishing contracts.There are three main issues with current research.Firstly,there exists a severe data imbalance between fraudulent and non-fraudulent contracts.Secondly,the existing detection methods rely on diverse raw features that may not generalize well in identifying various classes of fraudulent contracts.Lastly,most prior studies have used contract source code as raw features,but many smart contracts only exist in bytecode.To address these issues,we propose a fraud detection method that utilizes Efficient Channel Attention EfficientNet(ECA-EfficientNet)and data enhancement.Our method begins by converting bytecode into Red Green Blue(RGB)three-channel images and then applying channel exchange data enhancement.We then use the enhanced ECA-EfficientNet approach to classify fraudulent smart contract RGB images.Our proposed method achieves high F1-score and Recall on both publicly available Ponzi datasets and self-built multi-classification datasets that include Ponzi,honeypot,gambling,and phishing smart contracts.The results of the experiments demonstrate that our model outperforms current methods and their variants in Ponzi contract detection.Our research addresses a significant problem in smart contract security and offers an effective and efficient solution for detecting fraudulent contracts.展开更多
Evidences indicate that,due to the limited caching capacity or inaccurate estimation on users’preferences,the requested files may not be fully cached in the network edge.The transmissions of the un-cached files will ...Evidences indicate that,due to the limited caching capacity or inaccurate estimation on users’preferences,the requested files may not be fully cached in the network edge.The transmissions of the un-cached files will also lead to duplicated transmissions on backhaul channels.Buffer-aided relay has been proposed to improve the transmission performance of the un-cached files.Because of the limited buffer capacity and the information asymmetric environment,how to allocate the limited buffer capacity and how to incentivize users in participating buffer-aided relay have become critical issues.In this work,an incentive scheme based on the contract theory is proposed.Specifically,the backlog violation probability,i.e.,the buffer overflow probability,is provided based on the martingale theory.Next,based on the backlog violation probability,the utility functions of the relay node and users are constructed.With the purpose to maximize the utility of the relay node,the optimal contract problem is formulated.Then,the feasibility of the contract is also demonstrated,and the optimal solution can be obtained by the interior point method.Finally,numerical results are presented to demonstrate effectiveness of the proposed contract theory scheme.展开更多
Kinetics and mechanism of oxidation induced contraction of MgAl2O4 spinel carbon composites reinforced by Al4C3 in situ reaction were researched in air using vertical high temperature thermal dilatometer from 25℃to 1...Kinetics and mechanism of oxidation induced contraction of MgAl2O4 spinel carbon composites reinforced by Al4C3 in situ reaction were researched in air using vertical high temperature thermal dilatometer from 25℃to 1400℃.It is shown that oxidation induced contraction of MgAl2O4 spinel carbon composites reinforced Al4C3 in situ reaction is the common logarithm of oxidation time t and the oxygen partial pressure P inside MgAl2O4 spinel carbon composites reinforced by Al4C3 in situ reaction in air at 1400℃is as follows:P=F(-2.75×10^-4A+2.13×10^-3)lnt.The nonsteady diffusion kinetic equation of O2 at 1400℃inside the composites is as follows:J=De lnt.Acceleration of the total diffusional?flux of oxygen inside the composites at 1400℃is in inverse proportion to the oxidation time.The nonsteady state effective diffusion coefficient De of O2(g)inside the composites decreases in direct proportional to the increase of the amount of metallic aluminium.The method of preventing the oxidation induced contraction of MgAl2O4 spinel carbon composites reinforced by Al4C3 in situ reaction is to increase the amount of Al.The slag erosion index of MgO-Al2O3 spinel carbon composite reinforced by Al4C3 in situ reaction is 0.47 times that of MgO-CaO brick used in the lining above slag line area of a VOD stainless steel-making vessel.HMOR of MgO-Al2O3 spinel carbon composite reinforced by Al4C3 in situ reaction is 26.7 MPa,HMOR of the composite is 3.6 times the same as that of MgO-CaO brick used in the lining above slag line area of a VOD vessel.Its service life is two times as many as that of MgO-CaO brick.展开更多
Biomagnetic techniques were used to measure motility in various parts of the gastrointestinal(GI) tract,particularly a new technique for detecting magnetic markers and tracers.A coil was used to enhance the signal fro...Biomagnetic techniques were used to measure motility in various parts of the gastrointestinal(GI) tract,particularly a new technique for detecting magnetic markers and tracers.A coil was used to enhance the signal from a magnetic tracer in the GI tract and the signal was detected using a fluxgate magnetometer or a magnetoresistor in an unshielded room.Estimates of esophageal transit time were affected by the position of the subject.The reproducibility of estimates derived using the new biomagnetic technique was greater than 85% and it yielded estimates similar to those obtained using scintigraphy.This technique is suitable for studying the effect of emotional state on GI physiology and for measuring GI transit time.The biomagnetic technique can be used to evaluate digesta transit time in the esophagus,stomach and colon,peristaltic frequency and gastric emptying and is easy to use in the hospital setting.展开更多
An incompressible flow in a porous channel with expanding or contacting walls in the presence of a transverse magnetic field is considered. Using similarity transformations, the governing equations are reduced to the ...An incompressible flow in a porous channel with expanding or contacting walls in the presence of a transverse magnetic field is considered. Using similarity transformations, the governing equations are reduced to the nonlinear ordinary differential equations. The exact similar solutions for the different cases of the expansion ratio and the Hartmann number are obtained with a singular perturbation method, and the associated behavior is discussed in detail.展开更多
Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart...Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart contract is the key to ensure the security of blockchain system.Oriented to Ethereum smart contract,the study solves the problems of redundant input and low coverage in the smart contract fuzz.In this paper,a taint analysis method based on EVM is proposed to reduce the invalid input,a dangerous operation database is designed to identify the dangerous input,and genetic algorithm is used to optimize the code coverage of the input,which construct the fuzzing framework for smart contract together.Finally,by comparing Oyente and ContractFuzzer,the performance and efficiency of the framework are proved.展开更多
The current Internet web trust system is based on the traditional PKI system, to achieve the purpose of secure communication through the trusted third party. However, with the increase of network nodes, various proble...The current Internet web trust system is based on the traditional PKI system, to achieve the purpose of secure communication through the trusted third party. However, with the increase of network nodes, various problems appear in the centralization system of public key infrastructure (PKI). In recent years, in addition to cryptographic problems, attacks against PKI have focused on the single point of failure of certificate authority (CA). Although there are many reasons for a single point of failure, the purpose of the attack is to invalidate the CA. Thus a distributed authentication system is explored to provide a feasible solution to develop distributed PKI with the rise of the blockchain. Due to the automation and economic penalties of smart contracts, a PKI system is proposed based on smart contracts. The certificate chain was constructed in the blockchain, and a mechanism was adopted for auditing access to CA nodes in the blockchain. Experimental results show that security requirements of CA are met in this system.展开更多
文摘The contract net protocol has developed to specify problem solving communication for nodes in a distributed problem solving. Task distribution is affected by a negotiation process,a discussion carried on between nodes with tasks to he executed and nodes that may be able to execute those tasks. In contract net protocol,once negotiation successes,tbe task execution is assumed to success. However,in real world,even though a task is awarded to successfully bidding nodes,it may be delayed. Such delay may badly propagate in whole system. Here,we introduce real-time constraints into contract net protocol to manage task execution for avoiding the, task's delay,or even though being delayed,the railure cannot propagate to whole system. In this paper,we first present a real-time contract net protocol which is an extension of contract net protocol with real-time constraints for distributed computing. Our proposition extends the basic negotiation protocol to negotiation and controlling execution or task. The controlling process is based on task deadline time,we also present an extension of the internode language of contract net protocol specification with real-time constraints.
基金support provided by the National Natural Science Foundation of China(Grant No.52362055)the Science and Technology Plan Project of Guangxi Zhuang Autonomous Region(Grant No.2021AC19334)Guangxi Science and Technology Major Program(Grant No.AA23062053).
文摘To provide a much more resilient transport scheme for tractor and trailer transportation systems,this paper explores the generation method of tractor and trailer transport schemes considering the influence of disrupted events.Three states of tractors including towing loaded trailers,towing empty trailers,and idle driving are taken into account.Based on the disruption management theory,a scheduling model is constructed to minimize the total deviation cost including transportation time,transportation path,and number of used vehicles under the three states of tractors.A heuristics based on the contract net and simulated annealing algorithm is designed to solve the proposed model.Through comparative analysis of examples with different numbers of newly added transportation tasks and different types of road networks,the performance of the contract net algorithm in terms of deviations in idle driving paths,empty trailer paths,loaded trailer paths,time,number of used vehicles,and total deviation cost are analyzed.The results demonstrate the effectiveness of the model and algorithm,highlighting the superiority of the disruption management model and the contract net annealing algorithm.The study provides a reference for handling unexpected events in the tractor and trailer transportation industry.
基金supported by the Key Project of Joint Fund of the National Natural Science Foundation of China“Research on Key Technologies and Demonstration Applications for Trusted and Secure Data Circulation and Trading”(U24A20241)the National Natural Science Foundation of China“Research on Trusted Theories and Key Technologies of Data Security Trading Based on Blockchain”(62202118)+4 种基金the Major Scientific and Technological Special Project of Guizhou Province([2024]014)Scientific and Technological Research Projects from the Guizhou Education Department(Qian jiao ji[2023]003)the Hundred-Level Innovative Talent Project of the Guizhou Provincial Science and Technology Department(Qiankehe Platform Talent-GCC[2023]018)the Major Project of Guizhou Province“Research and Application of Key Technologies for Trusted Large Models Oriented to Public Big Data”(Qiankehe Major Project[2024]003)the Guizhou Province Computational Power Network Security Protection Science and Technology Innovation Talent Team(Qiankehe Talent CXTD[2025]029).
文摘As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security threats to blockchain ecosystems.Although numerous detection techniques have been proposed,existing methods suffer from significant limitations,such as class imbalance and insufficient modeling of transaction-related semantic features.To address these challenges,this paper proposes an oversampling-based detection framework for Ponzi smart contracts.We enhance the Adaptive Synthetic Sampling(ADASYN)algorithm by incorporating sample proximity to decision boundaries and ensuring realistic sample distributions.This enhancement facilitates the generation of high-quality minority class samples and effectively mitigates class imbalance.In addition,we design a Contract Transaction Graph(CTG)construction algorithm to preserve key transactional semantics through feature extraction from contract code.A graph neural network(GNN)is then applied for classification.This study employs a publicly available dataset from the XBlock platform,consisting of 318 verified Ponzi contracts and 6498 benign contracts.Sourced from real Ethereum deployments,the dataset reflects diverse application scenarios and captures the varied characteristics of Ponzi schemes.Experimental results demonstrate that our approach achieves an accuracy of 96%,a recall of 92%,and an F1-score of 94%in detecting Ponzi contracts,outperforming state-of-the-art methods.
基金This work was supported in part by the National Natural Science Foundation of China(No.62373380).
文摘The practical engineering of satellite tracking telemetry and command(TT&C)is often disturbed by unpredictable external factors,including the temporary rise in a significant quantity of satellite TT&C tasks,temporary failures and failures of some TT&C resources,and so on.To improve the adaptability and robustness of satellite TT&C systems when faced with uncertain dynamic disturbances,a hierarchical disturbance propagation mechanism and an improved contract network dynamic scheduling method for satellite TT&C resources were designed to address the dynamic scheduling problem of satellite TT&C resources.Firstly,the characteristics of the dynamic scheduling problem of satellite TT&C resources are analyzed,and a mathematical model is established with the weighted optimization objectives of maximizing the revenue from task completion and minimizing the degree of plan disturbance.Then,a bottom-up distributed dynamic collaborative scheduling framework for satellite TT&C resources is proposed,which includes a task layer,a resource layer,a central internal collaboration layer,and a central external collaboration layer.Dynamic disturbances are propagated layer by layer from the task layer to the central external collaboration layer in a bottom-up manner,using efficient heuristic strategies in the task layer and the resource layer,respectively.We use improved contract network algorithms in the center internal collaboration layer and the center external collaboration layer,the original scheduling plan is quickly adjusted to minimize the impact of disturbances while effectively completing dynamic task requirements.Finally,a large number of simulation experiments were carried out and compared with various comparative algorithms.The results show that the proposed algorithm can effectively improve the solution effect of satellite TT&C resource dynamic scheduling problems,and has good application prospects.
基金supported by the National Key Technology R&D Program of China (No. 2006BAH02A06)"333 Engineering"Project of Jiangsu Province
文摘Contract is a common and effective mechanism for supply chain coordination,which has been studied extensively in recent years.For a supply chain network model,contracts can be used to coordinate it because it is too ideal to obtain the network equilibrium state in practical market competition.In order to achieve equilibrium,we introduce revenue sharing contract into a supply chain network equilibrium model with random demand in this paper.Then,we investigate the influence on this network equilibrium state from demand disruptions caused by unexpected emergencies.When demand disruptions happen,the supply chain network equilibrium state will be broken and change to a new one,so the decision makers need to adjust the contract parameters to achieve the new coordinated state through bargaining.Finally,a numerical example with a sudden demand increase as a result of emergent event is provided for illustrative purposes.
文摘Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.
基金funded by the Major PublicWelfare Special Fund of Henan Province(No.201300210200)the Major Science and Technology Research Special Fund of Henan Province(No.221100210400).
文摘In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.
基金supported in part by Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2022-1-15)in part by the Future Network Scientific Research Fund Project under Grant FNSRFP-2021-YB-7+5 种基金in part by the Provincial Water Science and Technology Program of Jiangsu under Grant 2020028in part by Social and People's Livelihood Technology in Nantong City under Grant MS22021042in part by the Fundamental Research Funds for the Central Universities under Grant B200205007in part by the Provincial Key Research and Development Program of Jiangsu under Grant BE2019017in part by the Open Research Fund Key Laboratory of Wireless Sensor Network and Communication,Chinese Academy of Sciences,under Grant 20190914in part by the Project of National Natural Science Foundation of China 62271190。
文摘In this paper,a trusted multi-task distribution mechanism for Internet of Vehicles based on smart contract is proposed to improve the security and efficiency for the task distribution in Internet of Vehicles.Firstly,a three-tier trusted multi-task distribution framework is presented based on smart contract.The smart contract will be triggered by the task request.As the important part of the smart contract,the task distribution algorithm is stored on the blockchain and run automatically.In the process of the task distribution,the cost of the task distribution and the system stability play a critical role.Therefore,the task distribution problem is formulated to minimize the cost of the task distribution whilst maintaining the stability of the system based on Lyapunov theorem.Unfortunately,this problem is a mixed integer nonlinear programming problem with NP-hard characteristics.To tackle this,the optimization problem is decomposed into two sub problems of computing resource allocation and task distribution decision,and an effective task distribution algorithm is proposed.Simulation results show that the proposed algorithm can effectively improves system performance.
基金This work is supported by the National Key R&D Program of China(2017YFB0802703)Major Scientific and Technological Special Project of Guizhou Province(20183001)+2 种基金Open Foundation of Guizhou Provincial Key VOLUME XX,2019 Laboratory of Public Big Data(2018BDKFJJ014)Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ019)Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ022).
文摘Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart contract is the key to ensure the security of blockchain system.Oriented to Ethereum smart contract,the study solves the problems of redundant input and low coverage in the smart contract fuzz.In this paper,a taint analysis method based on EVM is proposed to reduce the invalid input,a dangerous operation database is designed to identify the dangerous input,and genetic algorithm is used to optimize the code coverage of the input,which construct the fuzzing framework for smart contract together.Finally,by comparing Oyente and ContractFuzzer,the performance and efficiency of the framework are proved.
基金Project supported by the National Natural Science Foundation of China (21971203)Support Plan of Shaanxi Province for Young Topnotch TalentFundamental Research Funds for Central Universities。
文摘Twelve novel transition-rare-earth metal clusters,formulated as [Ni_(18)Pr_(14)(μ_(3)OH)_(14)(dmpa)_(10)(mmt)_(10)(SO_(4))_(4)(CH_(3)COO)_(16)]·9CH_(3)OH·5H_(2)O(1,H_(3)dmpa=dimethylolpropionic acid,and Hmmt=2-me rcapto-5-methyl-1,3,4-thiadiazole) [Ni_(36)RE_(102)(OH)_(138)(mmt)_(18)(Hdmpa)_(30)(H_(2)dmpa)_(12)(CH_(3)COO)_(72)(NO_(3))_(36)(SO_(4))_(18)(H_(2)O)_(30)]·Br_(6)(RE=Nd(2),Sm(3),Eu(4) and Gd(5))[Ni_(12)RE_(10)(μ_(3)-OH)_(10)(dmpa)_(8)(mmt)_(8)(S(_(4))2(CH_(3)COO)_(8)(H_(2)O)_(4)]·8CH_(3)OH·7H_(2)O(RE = Tb(6),Dy(7),Ho(8),Er(9) and Y(10)) [Ni_(8)Pr_(8)(μ_(3)-OH)_(8)(mmt)_(8)(Hdpga)_(16)(CH3COO)_(8)]·8CH_(3)OH(11,H_(2)dpga=diphe nyl-glycolic acid),and [Ni_(16)Tb_(6)(μ_(3)-OH)_(24)(mmt)_(8)(Hdpga)_(4)(dpga)_(4)(CH_(3)COO)_(2)(NO_(3))_(4)(H_(2)O)_(2)]·12CH_(3)OH·5H_(2)O(12),were synthesized solvothermally by using different ligand combinations and rare earth nitrates.X-ray crystal structure analyses reveal that complexes 1 and 12 possess sandwich-like structure.Compounds 2-5 are isostructural and feature a hexagonal structure,shaped like a "Star of David".Isostructural 6-10 present ring-like structure,as well as the cluster 11.The structural variations of these complexes can be attributed to the effect of lanthanide contraction.Moreover,the template effect of SO_(4)^(2-) anion derived from the slow decomposition of Hmmt ligand also plays a significant role in the formation of cluster skeletons.The insitu mechanism for the generation of sulfate anion is briefly discussed.Meanwhile,the magnetic properties of complexes 2-11 were studied which show typical antiferromagnetic interactions.
文摘The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks.
基金supported by the National Natural Science Foundation of China,Grant Number:U1603115Science and Technology Project of Autonomous Region,Grant Number:2020A02001-1Research on Short-Term and Impending Precipitation Prediction Model and Accuracy Evaluation in Northern Xinjiang Based on Deep Learning,Grant Number:2021D01C080.
文摘With the increasing popularity of Ethereum,smart contracts have become a prime target for fraudulent activities such as Ponzi,honeypot,gambling,and phishing schemes.While some researchers have studied intelligent fraud detection,most research has focused on identifying Ponzi contracts,with little attention given to detecting and preventing gambling or phishing contracts.There are three main issues with current research.Firstly,there exists a severe data imbalance between fraudulent and non-fraudulent contracts.Secondly,the existing detection methods rely on diverse raw features that may not generalize well in identifying various classes of fraudulent contracts.Lastly,most prior studies have used contract source code as raw features,but many smart contracts only exist in bytecode.To address these issues,we propose a fraud detection method that utilizes Efficient Channel Attention EfficientNet(ECA-EfficientNet)and data enhancement.Our method begins by converting bytecode into Red Green Blue(RGB)three-channel images and then applying channel exchange data enhancement.We then use the enhanced ECA-EfficientNet approach to classify fraudulent smart contract RGB images.Our proposed method achieves high F1-score and Recall on both publicly available Ponzi datasets and self-built multi-classification datasets that include Ponzi,honeypot,gambling,and phishing smart contracts.The results of the experiments demonstrate that our model outperforms current methods and their variants in Ponzi contract detection.Our research addresses a significant problem in smart contract security and offers an effective and efficient solution for detecting fraudulent contracts.
基金the National Natural Science Foundation of China(No.61702258)the Key Projects of Natural Science Research in Colleges and Universities of Jiangsu Province(No.19KJA410001)the Foundation of Jiangsu Advanced Numerical Control Technology Key Laboratory(No.SYKJ201901).
文摘Evidences indicate that,due to the limited caching capacity or inaccurate estimation on users’preferences,the requested files may not be fully cached in the network edge.The transmissions of the un-cached files will also lead to duplicated transmissions on backhaul channels.Buffer-aided relay has been proposed to improve the transmission performance of the un-cached files.Because of the limited buffer capacity and the information asymmetric environment,how to allocate the limited buffer capacity and how to incentivize users in participating buffer-aided relay have become critical issues.In this work,an incentive scheme based on the contract theory is proposed.Specifically,the backlog violation probability,i.e.,the buffer overflow probability,is provided based on the martingale theory.Next,based on the backlog violation probability,the utility functions of the relay node and users are constructed.With the purpose to maximize the utility of the relay node,the optimal contract problem is formulated.Then,the feasibility of the contract is also demonstrated,and the optimal solution can be obtained by the interior point method.Finally,numerical results are presented to demonstrate effectiveness of the proposed contract theory scheme.
基金Funded by the National Torch Plan of China(No.2005EB031110)the National Scientific and Technique Program of Ninth-five Year Plan(96-22-01-19)。
文摘Kinetics and mechanism of oxidation induced contraction of MgAl2O4 spinel carbon composites reinforced by Al4C3 in situ reaction were researched in air using vertical high temperature thermal dilatometer from 25℃to 1400℃.It is shown that oxidation induced contraction of MgAl2O4 spinel carbon composites reinforced Al4C3 in situ reaction is the common logarithm of oxidation time t and the oxygen partial pressure P inside MgAl2O4 spinel carbon composites reinforced by Al4C3 in situ reaction in air at 1400℃is as follows:P=F(-2.75×10^-4A+2.13×10^-3)lnt.The nonsteady diffusion kinetic equation of O2 at 1400℃inside the composites is as follows:J=De lnt.Acceleration of the total diffusional?flux of oxygen inside the composites at 1400℃is in inverse proportion to the oxidation time.The nonsteady state effective diffusion coefficient De of O2(g)inside the composites decreases in direct proportional to the increase of the amount of metallic aluminium.The method of preventing the oxidation induced contraction of MgAl2O4 spinel carbon composites reinforced by Al4C3 in situ reaction is to increase the amount of Al.The slag erosion index of MgO-Al2O3 spinel carbon composite reinforced by Al4C3 in situ reaction is 0.47 times that of MgO-CaO brick used in the lining above slag line area of a VOD stainless steel-making vessel.HMOR of MgO-Al2O3 spinel carbon composite reinforced by Al4C3 in situ reaction is 26.7 MPa,HMOR of the composite is 3.6 times the same as that of MgO-CaO brick used in the lining above slag line area of a VOD vessel.Its service life is two times as many as that of MgO-CaO brick.
基金Supported by PROMEP Grant Ugto-PTC-183 and Ugto-CA-37
文摘Biomagnetic techniques were used to measure motility in various parts of the gastrointestinal(GI) tract,particularly a new technique for detecting magnetic markers and tracers.A coil was used to enhance the signal from a magnetic tracer in the GI tract and the signal was detected using a fluxgate magnetometer or a magnetoresistor in an unshielded room.Estimates of esophageal transit time were affected by the position of the subject.The reproducibility of estimates derived using the new biomagnetic technique was greater than 85% and it yielded estimates similar to those obtained using scintigraphy.This technique is suitable for studying the effect of emotional state on GI physiology and for measuring GI transit time.The biomagnetic technique can be used to evaluate digesta transit time in the esophagus,stomach and colon,peristaltic frequency and gastric emptying and is easy to use in the hospital setting.
文摘An incompressible flow in a porous channel with expanding or contacting walls in the presence of a transverse magnetic field is considered. Using similarity transformations, the governing equations are reduced to the nonlinear ordinary differential equations. The exact similar solutions for the different cases of the expansion ratio and the Hartmann number are obtained with a singular perturbation method, and the associated behavior is discussed in detail.
基金supported by Major Scientific and Technological Special Project of Guizhou Province(20183001)Exploration and Practice on the Education Mode for Engineering Students Based on Technology,Literature and art Inter-disciplinary Integration with the Internet+Background(022150118004/001)+2 种基金Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ014)Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ019)Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ022).
文摘Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart contract is the key to ensure the security of blockchain system.Oriented to Ethereum smart contract,the study solves the problems of redundant input and low coverage in the smart contract fuzz.In this paper,a taint analysis method based on EVM is proposed to reduce the invalid input,a dangerous operation database is designed to identify the dangerous input,and genetic algorithm is used to optimize the code coverage of the input,which construct the fuzzing framework for smart contract together.Finally,by comparing Oyente and ContractFuzzer,the performance and efficiency of the framework are proved.
基金the National Natural Science Foundations of China (grant No. 61802436 and No. 61702550)he National Key Research and Development Plan (grant No. 2018YFB0803603 and No. 2016YFB0501901).
文摘The current Internet web trust system is based on the traditional PKI system, to achieve the purpose of secure communication through the trusted third party. However, with the increase of network nodes, various problems appear in the centralization system of public key infrastructure (PKI). In recent years, in addition to cryptographic problems, attacks against PKI have focused on the single point of failure of certificate authority (CA). Although there are many reasons for a single point of failure, the purpose of the attack is to invalidate the CA. Thus a distributed authentication system is explored to provide a feasible solution to develop distributed PKI with the rise of the blockchain. Due to the automation and economic penalties of smart contracts, a PKI system is proposed based on smart contracts. The certificate chain was constructed in the blockchain, and a mechanism was adopted for auditing access to CA nodes in the blockchain. Experimental results show that security requirements of CA are met in this system.