期刊文献+
共找到42,949篇文章
< 1 2 250 >
每页显示 20 50 100
Ponzi Scheme Detection for Smart Contracts Based on Oversampling
1
作者 Yafei Liu Yuling Chen +2 位作者 Xuewei Wang Yuxiang Yang Chaoyue Tan 《Computers, Materials & Continua》 2026年第1期1065-1085,共21页
As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security ... As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security threats to blockchain ecosystems.Although numerous detection techniques have been proposed,existing methods suffer from significant limitations,such as class imbalance and insufficient modeling of transaction-related semantic features.To address these challenges,this paper proposes an oversampling-based detection framework for Ponzi smart contracts.We enhance the Adaptive Synthetic Sampling(ADASYN)algorithm by incorporating sample proximity to decision boundaries and ensuring realistic sample distributions.This enhancement facilitates the generation of high-quality minority class samples and effectively mitigates class imbalance.In addition,we design a Contract Transaction Graph(CTG)construction algorithm to preserve key transactional semantics through feature extraction from contract code.A graph neural network(GNN)is then applied for classification.This study employs a publicly available dataset from the XBlock platform,consisting of 318 verified Ponzi contracts and 6498 benign contracts.Sourced from real Ethereum deployments,the dataset reflects diverse application scenarios and captures the varied characteristics of Ponzi schemes.Experimental results demonstrate that our approach achieves an accuracy of 96%,a recall of 92%,and an F1-score of 94%in detecting Ponzi contracts,outperforming state-of-the-art methods. 展开更多
关键词 Blockchain smart contracts Ponzi schemes class imbalance graph structure construction
在线阅读 下载PDF
Robust Detection and Analysis of Smart Contract Vulnerabilities with Large Language Model Agents
2
作者 Nishank P. Kuppa Vijay K. Madisetti 《Journal of Information Security》 2025年第1期197-226,共30页
Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart cont... Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart contracts for personal financial gain, which undermines the integrity of the Ethereum blockchain. This paper proposes a computer program called SADA (Static and Dynamic Analyzer), a novel approach to smart contract vulnerability detection using multiple Large Language Model (LLM) agents to analyze and flag suspicious Solidity code for Ethereum smart contracts. SADA not only improves upon existing vulnerability detection methods but also paves the way for more secure smart contract development practices in the rapidly evolving blockchain ecosystem. 展开更多
关键词 Blockchain Ethereum Smart contracts Security Decentralized Applications WEB3 Cryptocurrency Large Language Models
在线阅读 下载PDF
家庭医生签约服务驱动社区骨健康管理的模式探讨 被引量:1
3
作者 李玲慧 魏戌 +8 位作者 秦晓宽 章轶立 徐西林 杨少锋 冯天笑 王振宇 杨克新 孙凯 朱立国 《中国全科医学》 北大核心 2026年第3期348-354,共7页
随着人口老龄化加剧,骨健康疾病(如骨质疏松症、骨关节炎、脊柱侧凸等)已成为我国重大的公共卫生问题。传统医疗模式以急性期诊疗为核心,存在重治轻防、服务碎片化及康复连续性不足等弊端,导致疾病早期筛查率低、患者依从性差、复发风... 随着人口老龄化加剧,骨健康疾病(如骨质疏松症、骨关节炎、脊柱侧凸等)已成为我国重大的公共卫生问题。传统医疗模式以急性期诊疗为核心,存在重治轻防、服务碎片化及康复连续性不足等弊端,导致疾病早期筛查率低、患者依从性差、复发风险高等问题。本研究分析了骨健康疾病的核心特征及管理瓶颈,参照国际慢性病管理模式与国内实践经验,基于家庭医生签约服务的资源整合优势,构建了“智能分层预警-多学科协作干预-医防协同保障”的骨健康全周期闭环管理模式,旨在破解骨健康管理的系统性难题,以智能化工具提高管理效能、以多学科协作优化资源配置、以政策改革强化医疗服务可持续性,为基层骨健康管理提供了系统性范式。 展开更多
关键词 骨健康管理 家庭医生签约服务 全周期闭环模式 智能分层预警 多学科协作
暂未订购
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
4
作者 Xueshuo Xie Haolong Wang +3 位作者 Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li 《Digital Communications and Networks》 2025年第1期1-12,共12页
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on Ethereum.Effective vulnerability detection of large-scale smart contracts is critical,as attack... Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on Ethereum.Effective vulnerability detection of large-scale smart contracts is critical,as attacks on smart contracts often cause huge economic losses.Since it is difficult to repair and update smart contracts,it is necessary to find the vulnerabilities before they are deployed.However,code analysis,which requires traversal paths,and learning methods,which require many features to be trained,are too time-consuming to detect large-scale on-chain contracts.Learning-based methods will obtain detection models from a feature space compared to code analysis methods such as symbol execution.But the existing features lack the interpretability of the detection results and training model,even worse,the large-scale feature space also affects the efficiency of detection.This paper focuses on improving the detection efficiency by reducing the dimension of the features,combined with expert knowledge.In this paper,a feature extraction model Block-gram is proposed to form low-dimensional knowledge-based features from bytecode.First,the metadata is separated and the runtime code is converted into a sequence of opcodes,which are divided into segments based on some instructions(jumps,etc.).Then,scalable Block-gram features,including 4-dimensional block features and 8-dimensional attribute features,are mined for the learning-based model training.Finally,feature contributions are calculated from SHAP values to measure the relationship between our features and the results of the detection model.In addition,six types of vulnerability labels are made on a dataset containing 33,885 contracts,and these knowledge-based features are evaluated using seven state-of-the-art learning algorithms,which show that the average detection latency speeds up 25×to 650×,compared with the features extracted by N-gram,and also can enhance the interpretability of the detection model. 展开更多
关键词 Smart contract Bytecode&opcode Knowledgeable features Vulnerability detection Feature contribution
在线阅读 下载PDF
A Path to Recognizing Intellectual Property Contracts as Nominate Contracts in the Post-Civil Code Era
5
作者 Li Hao 《科技与法律(中英文)》 2025年第6期124-137,共14页
The Book on Contracts of the Civil Code does not recognize"intellectual property contracts"as nominate contracts.Owing to both substantive and structural shortcomings,the Chapter on Technology Contracts fall... The Book on Contracts of the Civil Code does not recognize"intellectual property contracts"as nominate contracts.Owing to both substantive and structural shortcomings,the Chapter on Technology Contracts falls short of providing comprehensive regulation of transactions involving intellectual property,and its Article 876 linking clause has given rise to legal controversies over application by reference and priority of application.There is therefore an urgent need to recognize intellectual property contracts as a nominate category.The rules on such contracts that are dispersed across standalone intellectual property statutes,specialized regulations,adjudicated cases,and judicial interpretations have already produced decodification and should be integrated in the course of enacting the Intellectual Property Code,so as to achieve the recodification of contracts concerning intellectual property.Specifically,the Chapter on Contracts should consist of two parts,General Provisions and Nominate Contracts,to articulate the common features and specific rules of the various contract types while confirming the applicability of the General Provisions in the Book on Contracts.In this way,systemic disorder from mechanically adding nominate contracts to the Civil Code and unnecessary complexity from creating a separate sectoral contract code can both be avoided,and the status of the Book on Contracts as the basic law in the field of contract can be preserved. 展开更多
关键词 contract section decodification re-codification intellectual property code
在线阅读 下载PDF
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation
6
作者 Yunhua He Yigang Yang +4 位作者 Chao Wang Anke Xie Li Ma Bin Wu Yongdong Wu 《Digital Communications and Networks》 2025年第2期432-441,共10页
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,com... The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,complex functions such as matrix operations are difficult to implement on Ethereum Virtual Machine(EVM)-based smart contract platforms due to their distributed security environment limitations.Existing off-chain methods often result in a significant reduction in contract execution efficiency,thus a platform software development kit interface implementation method has become a feasible way to reduce overheads,but this method cannot verify operation correctness and may leak sensitive user data.To solve the above problems,we propose a verifiable EVM-based smart contract cross-language implementation scheme for complex operations,especially matrix operations,which can guarantee operation correctness and user privacy while ensuring computational efficiency.In this scheme,a verifiable interaction process is designed to verify the computation process and results,and a matrix blinding technology is introduced to protect sensitive user data in the calculation process.The security analysis and performance tests show that the proposed scheme can satisfy the correctness and privacy of the cross-language implementation of smart contracts at a small additional efficiency cost. 展开更多
关键词 Smart contract Blockchain Cross-language programming Bilinear pairing Publicly verifiable computation
在线阅读 下载PDF
Smart Contract Vulnerability Detection Using Large Language Models and Graph Structural Analysis
7
作者 Ra-Yeon Choi Yeji Song +3 位作者 Minsoo Jang Taekyung Kim Jinhyun Ahn Dong-Hyuk Im 《Computers, Materials & Continua》 2025年第4期785-801,共17页
Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity.However,their immutability after deployment makes programming errors particularly critical,... Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity.However,their immutability after deployment makes programming errors particularly critical,as such errors can be exploited to compromise blockchain security.Existing vulnerability detection methods often rely on fixed rules or target specific vulnerabilities,limiting their scalability and adaptability to diverse smart contract scenarios.Furthermore,natural language processing approaches for source code analysis frequently fail to capture program flow,which is essential for identifying structural vulnerabilities.To address these limitations,we propose a novel model that integrates textual and structural information for smart contract vulnerability detection.Our approach employs the CodeBERT NLP model for textual analysis,augmented with structural insights derived from control flow graphs created using the abstract syntax tree and opcode of smart contracts.Each graph node is embedded using Sent2Vec,and centrality analysis is applied to highlight critical paths and nodes within the code.The extracted features are normalized and combined into a prompt for a large language model to detect vulnerabilities effectivel.Experimental results demonstrate the superiority of our model,achieving an accuracy of 86.70%,a recall of 84.87%,a precision of 85.24%,and an F1-score of 84.46%.These outcomes surpass existing methods,including CodeBERT alone(accuracy:81.26%,F1-score:79.84%)and CodeBERT combined with abstract syntax tree analysis(accuracy:83.48%,F1-score:79.65%).The findings underscore the effectiveness of incorporating graph structural information alongside text-based analysis,offering improved scalability and performance in detecting diverse vulnerabilities. 展开更多
关键词 Blockchain smart contract vulnerability detection large language model
在线阅读 下载PDF
Detecting Ethereum Ponzi Scheme Based on Hybrid Sampling for Smart Contract
8
作者 Yuanjun Qu Xiameng Si +1 位作者 Haiyan Kang Hanlin Zhou 《Computers, Materials & Continua》 2025年第2期3111-3130,共20页
With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, i... With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, its anonymity has provided new ways for Ponzi schemes to commit fraud, posing significant risks to investors. Current research still has some limitations, for example, Ponzi schemes are difficult to detect in the early stages of smart contract deployment, and data imbalance is not considered. In addition, there is room for improving the detection accuracy. To address the above issues, this paper proposes LT-SPSD (LSTM-Transformer smart Ponzi schemes detection), which is a Ponzi scheme detection method that combines Long Short-Term Memory (LSTM) and Transformer considering the time-series transaction information of smart contracts as well as the global information. Based on the verified smart contract addresses, account features, and code features are extracted to construct a feature dataset, and the SMOTE-Tomek algorithm is used to deal with the imbalanced data classification problem. By comparing our method with the other four typical detection methods in the experiment, the LT-SPSD method shows significant performance improvement in precision, recall, and F1-score. The results of the experiment confirm the efficacy of the model, which has some application value in Ethereum Ponzi scheme smart contract detection. 展开更多
关键词 Blockchain smart contract detection Ponzi scheme long short-term memory hybrid sampling
在线阅读 下载PDF
Analysis of the Application of Contract Settlement Accounts for Insurance Companies Under the New Revenue Standard
9
作者 Ji Shu'an Zhang Tiantian 《Journal of Humanities and Nature》 2025年第2期73-77,共5页
The implementation of the new revenue standard has a far-reaching impact on the accounting treatment of insurance enterprises,and the application of contract settlement accounts,as the key to connect business and fina... The implementation of the new revenue standard has a far-reaching impact on the accounting treatment of insurance enterprises,and the application of contract settlement accounts,as the key to connect business and financial accounting,needs to be standardized.This paper analyzes the core requirements of the new revenue standard,combines the special characteristics of insurance contracts with both service and financial attributes,and explains the logic of setting up and accounting methods of secondary accounts,such as insurance service income and investment component apportionment.In view of the practical pain points such as variable consideration apportionment and reclassification of inter-period contracts,the paper proposes strategies for system upgrading and internal control strengthening.The study shows that standardizing the application of accounts can help enterprises implement the requirements of the standard and improve the quality of financial information. 展开更多
关键词 New Revenue Standards Insurance Companies contract Settlement Accounts ACCOUNTING
在线阅读 下载PDF
Smart Contract-Aided Attribute-Based Signature Algorithm with Non-Monotonic Access Structures
10
作者 Xin Xu Zhen Yang Yongfeng Huang 《Computers, Materials & Continua》 2025年第6期5019-5035,共17页
Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained envi... Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained environments,and traditional monotonic access structures are inadequate for handling increasingly complex access policies.In this paper,we propose a novel smart contract-assisted ABS(SC-ABS)algorithm that supports nonmonotonic access structures,aiming to reduce client computing overhead while providingmore expressive and flexible access control.The SC-ABS scheme extends the monotonic access structure by introducing the concept of negative attributes,allowing for more complex and dynamic access policies.By utilizing smart contracts,the algorithmsupports distributed trusted assisted computation,and the computation code is transparent and auditable.Importantly,this design allows information about user attributes to be deployed on smart contracts for computation,both reducing the risk of privacy abuse by semi-honest servers and preventing malicious users from attribute concealment to forge signatures.We prove that SC-ABS satisfies unforgeability and anonymity under a random oracle model,and test the scheme’s cost.Comparedwith existing schemes,this scheme has higher efficiency in client signature and authentication.This scheme reduces the computing burden of users,and the design of smart contracts improves the security of aided computing further,solves the problem of attribute concealment,and expresses a more flexible access structure.The solution enables permission control applications in resource-constrained distributed scenarios,such as the Internet of Things(IoT)and distributed version control systems,where data security and flexible access control are critical. 展开更多
关键词 Attribute-based signature non-monotone smart contract
在线阅读 下载PDF
Numerical simulation of size contraction of Typhoon Cempaka(2021)
11
作者 Lingfeng Sun Qingqing Li 《Atmospheric and Oceanic Science Letters》 2025年第2期29-35,共7页
In 2021,Cempaka,a tiny tropical cyclone,made landfall in China.As the TC intensified prior to landfall,the tropical cyclone size measured with precipitation decreased significantly.A numerical simulation was conducted... In 2021,Cempaka,a tiny tropical cyclone,made landfall in China.As the TC intensified prior to landfall,the tropical cyclone size measured with precipitation decreased significantly.A numerical simulation was conducted to examine the possible processes modulating the storm size.Azimuthally mean potential vorticity(PV)was found to decrease mainly in the middle to upper troposphere between 50-and 80-km radii.The PV budget results indicate that the advection and generation of mean PV associated with asymmetric processes,rather than the symmetric processes,primarily contributed to the decrease in mean PV.These asymmetric processes leading to a negative PV tendency were likely associated with inactive outer rainbands.In contrast,the tangential winds simultaneously expanded radially outward,possibly related to inner-core diabatic heating.The findings here emphasize the importance of outer rainband activity in tropical cyclone size change. 展开更多
关键词 Typhoon cempaka Vortex size contraction Potential vorticity budget Asymmetric structure Outer rainband
在线阅读 下载PDF
GMS:A Novel Method for Detecting Reentrancy Vulnerabilities in Smart Contracts
12
作者 Dawei Xu Fan Huang +3 位作者 Jiaxin Zhang Yunfang Liang Baokun Zheng Jian Zhao 《Computers, Materials & Continua》 2025年第5期2207-2220,共14页
With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly important.Blockchain and smart contract technologies,with their decentralized nature,provide ... With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly important.Blockchain and smart contract technologies,with their decentralized nature,provide strong security guarantees for IoT.However,at the same time,smart contracts themselves face numerous security challenges,among which reentrancy vulnerabilities are particularly prominent.Existing detection tools for reentrancy vulnerabilities often suffer from high false positive and false negative rates due to their reliance on identifying patterns related to specific transfer functions.To address these limitations,this paper proposes a novel detection method that combines pattern matching with deep learning.Specifically,we carefully identify and define three common patterns of reentrancy vulnerabilities in smart contracts.Then,we extract key vulnerability features based on these patterns.Furthermore,we employ a Graph Attention Neural Network to extract graph embedding features from the contract graph,capturing the complex relationships between different components of the contract.Finally,we use an attention mechanism to fuse these two sets of feature information,enhancing the weights of effective information and suppressing irrelevant information,thereby significantly improving the accuracy and robustness of vulnerability detection.Experimental results demonstrate that our proposed method outperforms existing state-ofthe-art techniques,achieving a 3.88%improvement in accuracy compared to the latest vulnerability detection model AME(Attentive Multi-Encoder Network).This indicates that our method effectively reduces false positives and false negatives,significantly enhancing the security and reliability of smart contracts in the evolving IoT ecosystem. 展开更多
关键词 Smart contract Internet of Things reentrancy vulnerabilities graph neural network
在线阅读 下载PDF
Data Elements and Trustworthy Circulation:A Clearing and Settlement Architecture for Element Market Transactions Integrating Privacy Computing and Smart Contracts
13
作者 Huanjing Huang 《Journal of Electronic Research and Application》 2025年第5期86-92,共7页
This article explores the characteristics of data resources from the perspective of production factors,analyzes the demand for trustworthy circulation technology,designs a fusion architecture and related solutions,inc... This article explores the characteristics of data resources from the perspective of production factors,analyzes the demand for trustworthy circulation technology,designs a fusion architecture and related solutions,including multi-party data intersection calculation,distributed machine learning,etc.It also compares performance differences,conducts formal verification,points out the value and limitations of architecture innovation,and looks forward to future opportunities. 展开更多
关键词 Data elements Privacy computing Smart contracts
在线阅读 下载PDF
Efficacy of combining posterior scleral contraction and intravitreal C_(3)F_(8)injection in high myopia with macular hole retinal detachment
14
作者 Si Chen Jie Ye +6 位作者 Qin-Tuo Pan Fang Huang Lin-Yan Zheng Hui-Fang Ye Yan-Feng Su Yan Li Shuang-Qian Zhu 《International Journal of Ophthalmology(English edition)》 2025年第6期1077-1084,共8页
AIM:To evaluate the efficacy and safety of combining posterior scleral contraction(PSC)with intravitreal perfluoropropane(C_(3)F_(8))injection in high myopia with macular hole retinal detachment(MHRD).METHODS:A total ... AIM:To evaluate the efficacy and safety of combining posterior scleral contraction(PSC)with intravitreal perfluoropropane(C_(3)F_(8))injection in high myopia with macular hole retinal detachment(MHRD).METHODS:A total of 22 participants(22 eyes)with high myopia[axial length(AL)≥26.5 mm]and MHRD who underwent PSC combined with intravitreal C_(3)F_(8)injection,with at least 6mo of follow-up were retrospectively recruited.Outcome measures included best-corrected visual acuity(BCVA),AL,optical coherence tomography(OCT)findings,and adverse events.Retinal recovery was categorized as type Ⅰ(macular hole bridging with retinal reattachment)or type Ⅱ(reattachment without hole bridging).RESULTS:The mean age of participants was 62.1±8.8y and mean follow-up duration was 9.18±4.21mo.Complete retinal reattachment was observed in 11 eyes(50%)at postoperative day 1,19 eyes(86.3%)at week 1,and all 22 eyes at month 1.Ten eyes(45.5%)achieved type Ⅰ recovery and 12 eyes(54.5%)achieved type Ⅱ.Mean BCVA improved from 1.68±0.84 logMAR before surgery to 1.21±0.65 logMAR after surgery(P<0.001),and AL was significantly reduced compared to baseline(29.07±2.05 vs 30.8±2.2 mm;P<0.001).No serious complications were reported.CONCLUSION:PSC combined with intravitreal C_(3)F_(8)injection is a safe and effective treatment for MHRD in highly myopic eyes,especially for retinal detachment limited within the vascular arcade. 展开更多
关键词 posterior scleral contraction retinal detachment macular hole MYOPIA C_(3)F_(8)
原文传递
Controlled proximal contractions with an application to a class of integral equations
15
作者 Mudasir Younis Haroon Ahmad 《Applied Mathematics(A Journal of Chinese Universities)》 2025年第3期645-665,共21页
In this study,we explore some of the best proximity point results for generalized proximal contractions in the setting of double-controlled metric-type spaces.A non-trivial example is given to elucidate our analysis,a... In this study,we explore some of the best proximity point results for generalized proximal contractions in the setting of double-controlled metric-type spaces.A non-trivial example is given to elucidate our analysis,and some novel results are derived.The discovered results generalize previously known results in the context of a double controlled metric type space environment.This article’s proximity point results are the first of their kind in the realm of controlled metric spaces.To build on the results achieved in this article,we present an application demonstrating the usability of the given results. 展开更多
关键词 integral equation double controlled metric type space proximal contractive mappings coincidence best proximity point
在线阅读 下载PDF
Suzuki-Type(μ,v)-Weak Contraction for the Hesitant Fuzzy Soft Set Valued Mappings with Applications in Decision Making
16
作者 Muhammad Sarwar Rafiq Alam +2 位作者 Kamaleldin Abodayeh Saowaluck Chasreechai Thanin Sitthiwirattham 《Computer Modeling in Engineering & Sciences》 2025年第5期2213-2236,共24页
In this manuscript,the notion of a hesitant fuzzy soft fixed point is introduced.Using this notion and the concept of Suzuki-type(μ,ν)-weak contraction for hesitant fuzzy soft set valued-mapping,some fixed point res... In this manuscript,the notion of a hesitant fuzzy soft fixed point is introduced.Using this notion and the concept of Suzuki-type(μ,ν)-weak contraction for hesitant fuzzy soft set valued-mapping,some fixed point results are established in the framework of metric spaces.Based on the presented work,some examples reflecting decision-making problems related to real life are also solved.The suggested method’s flexibility and efficacy compared to conventional techniques are demonstrated in decision-making situations involving uncertainty,such as choosing the best options in multi-criteria settings.We noted that the presented work combines and generalizes two major concepts,the idea of soft sets and hesitant fuzzy set-valued mapping from the existing literature. 展开更多
关键词 Hesitant fuzzy soft set valued mapping Suzuki-type(μ ν)-weak contraction fixed point decision making problem
在线阅读 下载PDF
大语言模型赋能区块链服务安全研究综述:现状、挑战与机遇(特邀)
17
作者 林丹 卢顺峰 +5 位作者 刘姿妍 张博昭 何龙 蒋子规 吴嘉婧 郑子彬 《计算机工程》 北大核心 2026年第1期1-21,共21页
区块链已逐渐发展成支撑数字经济的重要基础设施,但其匿名性、跨链互操作性、多方参与等特征,导致诈骗、洗钱与攻击等安全事件频发,严重威胁生态系统的稳定与合规。尽管现有分析工具与方法在区块链服务安全领域取得了一定进展,但仍普遍... 区块链已逐渐发展成支撑数字经济的重要基础设施,但其匿名性、跨链互操作性、多方参与等特征,导致诈骗、洗钱与攻击等安全事件频发,严重威胁生态系统的稳定与合规。尽管现有分析工具与方法在区块链服务安全领域取得了一定进展,但仍普遍存在泛化能力不足、推理能力有限、难以适应复杂业务逻辑演化等问题。与此同时,生成式大语言模型(LLM)的快速发展正在深刻重塑服务计算范式,其在自然语言理解、知识推理与多模态融合等方面的优势,为区块链服务安全研究提供了新的思路与技术路径。系统梳理LLM在事前智能合约审计、事中异常行为检测、事后多链行为关联任务中的应用进展,归纳其优势与局限,总结LLM赋能区块链服务安全的典型实践。最后,展望LLM赋能区块链服务安全面临的开放科学问题与未来研究方向,为构建可信、可解释、高效的区块链服务计算与治理体系提供参考。 展开更多
关键词 区块链 大语言模型 服务安全 智能合约审计 异常行为检测 多链行为关联
在线阅读 下载PDF
公私法融合视域下企业数据向政府共享的强制缔约路径
18
作者 谢潇 罗世杰 《东北大学学报(社会科学版)》 北大核心 2026年第1期112-121,共10页
在数字政府建设背景下,企业数据向政府共享(B2G数据共享)的法治化推进具有重要意义。然而,仅靠私法自治下的企业自主共享,或者公法强制下的数据报送与调取,容易导致公私利益失衡进而影响B2G数据共享模式的可持续发展,故亟须一种兼具公... 在数字政府建设背景下,企业数据向政府共享(B2G数据共享)的法治化推进具有重要意义。然而,仅靠私法自治下的企业自主共享,或者公法强制下的数据报送与调取,容易导致公私利益失衡进而影响B2G数据共享模式的可持续发展,故亟须一种兼具公私法属性的法律机制作为其有效补充。相比强制征用或强制许可制度,以缔约自由为前置基础、以缔约强制为后置干预的强制缔约义务更具适用优势。一般来说,B2G数据共享方式的选择顺位应为企业自主共享、共享强制缔约与行政强制获取。B2G数据共享中强制缔约制度的适用,需要满足目的、主体以及程序上的合理限制。同时,强制缔约制度的适用主要是为了促成数据共享达成,而在具体的缔约内容上,则需要为政企双方保留充分的合意空间。 展开更多
关键词 B2G数据共享 公私法融合 数据合同 强制缔约
在线阅读 下载PDF
心律失常性心肌病的研究进展
19
作者 谭林琳 刘凯悦 +1 位作者 秦丽 王智慧 《中国实验诊断学》 2026年第1期140-143,共4页
心律失常患者常伴发心力衰竭和左心室功能障碍,心动过速、心房颤动(房颤)、室性期前收缩导致的可逆性扩张性心肌病被称为心律失常性心肌病(Arrhythmia-induced cardiomyopathy,AIC)。目前研究者关注的问题是,为什么在心律失常负担相似... 心律失常患者常伴发心力衰竭和左心室功能障碍,心动过速、心房颤动(房颤)、室性期前收缩导致的可逆性扩张性心肌病被称为心律失常性心肌病(Arrhythmia-induced cardiomyopathy,AIC)。目前研究者关注的问题是,为什么在心律失常负担相似的情况下某些患者更容易患上心律失常性心肌病?此外确定心律失常在多大程度上导致了左心室收缩功能障碍也是心律失常性心肌病的研究的主要问题。对平均心率大于100次/分、房颤或室性期前收缩超过总心搏数10%的患者均应考虑发生心律失常性心肌病的风险。在根治心律失常后,心肌病得到恢复可确诊心律失常性心肌病。心律失常性心肌病的治疗方案主要依据心律失常的种类,患者的合并症及患者治疗意愿来制定。准确的诊断和治疗能够提高患者的生活质量,改善临床预后,减少住院及医疗费用。本综述旨在提供关于心律失常性心肌病的最新研究进展。 展开更多
关键词 心律失常性心肌病 心肌病 心房颤动 室性期前收缩
暂未订购
基于区块链的粮食供需匹配机制构建研究
20
作者 王琳 刘伊 《中国农机化学报》 北大核心 2026年第2期168-176,共9页
创新粮食供需匹配机制,是缓解现阶段我国粮食供需紧平衡、降低局部区域粮食供应风险和隐患的现实需求,更是畅通粮食国内大循环、提升粮食产业链供应链韧性的必要举措。基于粮食供需交易实践和区块链技术优势,构建基于区块链的粮食供需... 创新粮食供需匹配机制,是缓解现阶段我国粮食供需紧平衡、降低局部区域粮食供应风险和隐患的现实需求,更是畅通粮食国内大循环、提升粮食产业链供应链韧性的必要举措。基于粮食供需交易实践和区块链技术优势,构建基于区块链的粮食供需匹配机制,重点针对多源异构粮食供需数据构建规范化要素表达方式、设计基于要素相似度的粮食供需匹配算法并给出该算法智能合约实现的关键步骤,最后通过算例验证该匹配机制的科学性与有效性。该匹配机制不仅提供粮食供需数据规范化的语义和结构表达方式,而且能有效解决由时间、地域和信息不对称等因素造成的粮食供需匹配难题,同时通过智能合约的自动执行和动态调节可在无第三方参与的情况下达到可信状态,实现粮食供需交易的高效对接。模拟测试表明,基于区块链的粮食供需匹配机制能显著提高匹配效率,每笔订单平均匹配时间为1.2 s,可同时处理约2250条供需信息单,减少匹配决策的时间成本。 展开更多
关键词 供需匹配 粮食供应链 区块链 智能合约 数据治理
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部