期刊文献+
共找到11,419篇文章
< 1 2 250 >
每页显示 20 50 100
Superconductivity and band topology of double-layer honeycomb structure M_(2)N_(2)(M=Nb,Ta)
1
作者 Jin-Han Tan Na Jiao +2 位作者 Meng-Meng Zheng Ping Zhang Hong-Yan Lu 《Chinese Physics B》 2025年第9期581-587,共7页
Two-dimensional double-layer honeycomb(DLHC)materials are known for their diverse physical properties,but superconductivity has been a notably absent characteristic in this structure.We address this gap by investigati... Two-dimensional double-layer honeycomb(DLHC)materials are known for their diverse physical properties,but superconductivity has been a notably absent characteristic in this structure.We address this gap by investigating M_(2)N_(2)(M=Nb,Ta)with DLHC structure using first-principles calculations.Our results show that M_(2)N_(2)are stable and metallic,exhibiting superconducting behavior.Specifically,Nb_(2)N_(2)and Ta_(2)N_(2)display superconducting transition temperatures of 6.8 K and 8.8 K,respectively.Their electron-phonon coupling is predominantly driven by the coupling between metal d-orbitals and low-frequency metal-dominated vibration modes.Interestingly,two compounds also exhibit non-trivial band topology.Thus,M_(2)N_(2)are promising platforms for studying the interplay between topology and superconductivity and fill the gap in superconductivity research for DLHC materials. 展开更多
关键词 first-principles calculations phonon-mediated superconductivity double-layer honeycomb structure band topology
原文传递
Jet formation and penetration performance of a double-layer charge liner with chemically-deposited tungsten as the inner liner 被引量:3
2
作者 Bihui Hong Wenbin Li +2 位作者 Yiming Li Zhiwei Guo Binyou Yan 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期374-385,共12页
This paper proposes a type of double-layer charge liner fabricated using chemical vapor deposition(CVD)that has tungsten as its inner liner.The feasibility of this design was evaluated through penetration tests.Double... This paper proposes a type of double-layer charge liner fabricated using chemical vapor deposition(CVD)that has tungsten as its inner liner.The feasibility of this design was evaluated through penetration tests.Double-layer charge liners were fabricated by using CVD to deposit tungsten layers on the inner surfaces of pure T2 copper liners.The microstructures of the tungsten layers were analyzed using a scanning electron microscope(SEM).The feasibility analysis was carried out by pulsed X-rays,slug-retrieval test and static penetration tests.The shaped charge jet forming and penetration law of inner tungsten-coated double-layer liner were studied by numerical simulation method.The results showed that the double-layer liners could form well-shaped jets.The errors between the X-ray test results and the numerical results were within 11.07%.A slug-retrieval test was found that the retrieved slug was similar to a numerically simulated slug.Compared with the traditional pure copper shaped charge jet,the penetration depth of the double-layer shaped charge liner increased by 11.4% and>10.8% respectively.In summary,the test results are good,and the numerical simulation is in good agreement with the test,which verified the feasibility of using the CVD method to fabricate double-layer charge liners with a high-density and high-strength refractory metal as the inner liner. 展开更多
关键词 Shaped charge Chemical vapor deposition TUNGSTEN double-layer charge liner X-ray PENETRATION
在线阅读 下载PDF
Discovery and Significance of the Triassic–Late Paleozoic Double-layered Basement in the Songliao Basin:Based on the Complete Coring Data from ICDP Borehole SK2 被引量:2
3
作者 YANG Zhuolong WANG Pujun +2 位作者 GAO Youfeng GAO Chuancheng TANG Xin 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2024年第S01期75-76,共2页
The Songliao Basin(SLB)covers an area of approximately 260,000 km2in northeastern Asia and preserves a continuous and complete Cretaceous terrestrial record(Wang et al.,2021).The region is the most important petrolife... The Songliao Basin(SLB)covers an area of approximately 260,000 km2in northeastern Asia and preserves a continuous and complete Cretaceous terrestrial record(Wang et al.,2021).The region is the most important petroliferous sedimentary basin in China because of its continual annual oil and gas equivalent production of tens of millions of tons(ca.220–440 million barrels per year)since 1959.The SLB was previously thought to have developed on Hercynian basement and accumulated continuous sedimentary deposits during the Late Jurassic and Cretaceous(Wan et al.,2013;Wang et al.,2016). 展开更多
关键词 double-layered basement ICDP Triassic and Paleozoic Songliao Basin
在线阅读 下载PDF
Double-layered skeleton of Li alloy anchored on 3D metal foam enabling ultralong lifespan of Li anode under high rate 被引量:1
4
作者 Chaohui Wei Zeyu Yao +7 位作者 Jin Ruan Zhicui Song Aijun Zhou Yingze Song Donghuang Wang Jicheng Jiang Xin Wang Jingze Li 《Chinese Chemical Letters》 SCIE CAS CSCD 2024年第3期479-485,共7页
The high specific capacity and low negative electrochemical potential of lithium metal anodes(LMAs),may allow the energy density threshold of Li metal batteries(LMBs)to be pushed higher.However,the existing detrimenta... The high specific capacity and low negative electrochemical potential of lithium metal anodes(LMAs),may allow the energy density threshold of Li metal batteries(LMBs)to be pushed higher.However,the existing detrimental issues,such as dendritic growth and volume expansion,have hindered the practical implementation of LMBs.Introducing three-dimensional frameworks(e.g.,copper and nickel foam),have been regarded as one of the fundamental strategies to reduce the local current density,aiming to extend the Sand'time.Nevertheless,the local environment far from the skeleton is almost the same as the typical plane Li,due to macroporous space of metal foam.Herein,we built a double-layered 3D current collector of Li alloy anchored on the metal foam,with micropores interconnected macropores,via a viable thermal infiltration and cooling strategy.Due to the excellent electronic and ionic conductivity coupled with favorable lithiophilicity,the Li alloy can effectively reduce the nucleation barrier and enhance the Li^(+)transportation rate,while the metal foam can role as the primary promotor to enlarge the surface area and buffer the dimensional variation.Synergistically,the Li composite anode with hierarchical structure of primary and secondary scaffolds realized the even deposition behavior and minimum volume expansion,outputting preeminent prolonged cycling performances under high rate. 展开更多
关键词 double-layered skeleton Li alloy 3D Metal foam Ultralong lifespan Lithium metal batteries High rate
原文传递
Performance and Application of Double-layered Microcapsule Corrosion Inhibitors
5
作者 余海燕 WANG Yingxiang +2 位作者 WANG Ruizhi HU Lintong WANG Tianlei 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS CSCD 2024年第4期845-853,共9页
Double-layered microcapsule corrosion inhibitors were developed by sodium monofluorophosphate as the core material,polymethyl methacrylate as the inner wall material,and polyvinyl alcohol as the outer wall material co... Double-layered microcapsule corrosion inhibitors were developed by sodium monofluorophosphate as the core material,polymethyl methacrylate as the inner wall material,and polyvinyl alcohol as the outer wall material combining the solvent evaporation method and spray drying method.The protection by the outer capsule wall was used to prolong the service life of the corrosion inhibitor.The dispersion,encapsulation,thermal stability of microcapsules,and the degradation rate of capsule wall in concrete pore solution were analyzed by ultra-deep field microscopy,scanning electron microscopy,thermal analyzer,and sodium ion release rate analysis.The microcapsules were incorporated into mortar samples containing steel reinforcement,and the effects of double-layered microcapsule corrosion inhibitors on the performance of the cement matrix and the actual corrosion-inhibiting effect were analyzed.The experimental results show that the double-layered microcapsules have a moderate particle size and uniform distribution,and the capsules were completely wrapped.The microcapsules as a whole have good thermal stability below 230 ℃.The monolayer membrane structure microcapsules completely broke within 1 day in the simulated concrete pore solution,and the double-layer membrane structure prolonged the service life of the microcapsules to 80 days in the simulated concrete pore solution before the core material was completely released.The mortar samples containing steel reinforcement incorporated with the double-layered microcapsule corrosion inhibitors still maintained a higher corrosion potential than the monolayer microcapsule corrosion inhibitors control group at 60 days.The incorporation of double-layered microcapsules into the cement matrix has no significant adverse effect on the setting time and early strength. 展开更多
关键词 corrosion inhibitors MICROCAPSULE double-layer structure potentiodynamic polarization curve
原文传递
Technologies of blockchain interoperability:A survey 被引量:3
6
作者 Haonan Yuan Shufan Fei Zheng Yan 《Digital Communications and Networks》 2025年第1期210-224,共15页
Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields... Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out. 展开更多
关键词 blockchain blockchain interoperability Cross-chain technology
在线阅读 下载PDF
A blockchain-based anonymous and regulated e-taxing protocol for art trading 被引量:1
7
作者 Xuejing Liu Hongli Liu +1 位作者 Xingyu Liang Yuchao Yao 《Digital Communications and Networks》 2025年第3期681-688,共8页
Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of... Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of e-taxation provides a enhanced security for taxation,but it still faces the risk of inefficiency and tax data leakage.As a decentralized ledger,blockchain provides an effective solution for protecting tax data and avoiding tax-related errors and fraud.The introduction of blockchain into e-taxation protocols can ensure the public verification of taxes.However,balancing taxpayer identity privacy with regulation remains a challenge.In this paper,we propose a blockchain-based anonymous and regulatory e-taxation protocol.This protocol ensures the supervision and tracking of malicious taxpayers while maintaining honest taxpayer identity privacy,reduces the storage needs for public key certificates in the public key infrastructure,and enables selfcertification of taxpayers’public keys and addresses.We formalize the security model of unforgeability for transactions,anonymity for honest taxpayers,and traceability for malicious taxpayers.Security analysis shows that the proposed protocol satisfies unforgeability,anonymity,and traceability.The experimental results of time consumption show that the protocol is feasible in practical applications. 展开更多
关键词 E-taxing blockchain Schnorr signature Regulation ANONYMITY
在线阅读 下载PDF
Adaptor signature based on randomized EdDSA in blockchain 被引量:1
8
作者 Yixing Zhu Huilin Li +1 位作者 Mengze Li Yong Yu 《Digital Communications and Networks》 2025年第3期689-699,共11页
Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signatu... Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signature,adaptor signature can bind the release of a complete digital signature with the exchange of a secret value.Existing constructions of adaptor signatures are mainly based on Schnorr or ECDSA signature algorithms,which suffer low signing efficiency and long signature length.In this paper,to address these issues,we propose a new construction of adaptor signature using randomized EdDSA,which has Schnorr-like structure with higher signing efficiency and shorter signature length.We prove the required security properties,including unforgeability,witness extractability and pre-signature adaptability,of the new adaptor signature scheme in the random oracle model.We conduct a comparative analysis with an ECDSA-based adaptor signature scheme to demonstrate the effectiveness and feasibility of our new proposal. 展开更多
关键词 blockchain Adaptor signature Randomized EdDSA Payment channel
在线阅读 下载PDF
Lightweight consensus mechanisms in the Internet of Blockchained Things:Thorough analysis and research directions 被引量:1
9
作者 Somia Sahraoui Abdelmalik Bachir 《Digital Communications and Networks》 2025年第4期1245-1260,共16页
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ... The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support. 展开更多
关键词 blockchain Internet of Things Lightweight consensus
在线阅读 下载PDF
A Lightweight IoT Data Security Sharing Scheme Based on Attribute-Based Encryption and Blockchain 被引量:1
10
作者 Hongliang Tian Meiruo Li 《Computers, Materials & Continua》 2025年第6期5539-5559,共21页
The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facili... The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure. 展开更多
关键词 Edge blockchain CP-ABE data security sharing IOT
在线阅读 下载PDF
From Pilot to Planet: Scaling United Nations’ Blockchain Projects for a Sustainable Future 被引量:1
11
作者 Roberta Pisani 《Chinese Business Review》 2025年第3期87-98,共12页
Within the framework of the 2030 Agenda and to achieve the Sustainable Development Goals(SDGs),science,technology and innovation play an even more central role.Building on this foundation,the primary objective of this... Within the framework of the 2030 Agenda and to achieve the Sustainable Development Goals(SDGs),science,technology and innovation play an even more central role.Building on this foundation,the primary objective of this paper is to explore the potential applications of blockchain in supporting the achievement of these sustainability goals.Starting from a review of the relevant literature on this topic,the main fields in which blockchain can contribute to sustainable development will be identified.The main blockchain applications will then be analyzed and categorized according to these SDGs.This research will then critically present the main blockchain-based projects that emerged in the first stage of the study and were implemented by the United Nations.The main objectives and benefits of each project will be analyzed.This is where the originality of this paper lies.To the best of the author’s knowledge,this is one of the first attempts to present a comprehensive overview of the United Nations’projects related to SDGs 1,2,5,7,9,13,and 16.This paper,which bridges the gap between innovation management and the sustainability field,will contribute to the increasingly current debate on sustainability issues and be beneficial to scholars,practitioners,and policymakers alike. 展开更多
关键词 blockchain SDGs SUSTAINABILITY sustainable development innovation management case studies blockchain-based projects
在线阅读 下载PDF
A hierarchical blockchain-enabled distributed federated learning system with model contribution based rewarding 被引量:1
12
作者 Haibo Wang Hongwei Gao +2 位作者 Teng Ma Chong Li Tao Jing 《Digital Communications and Networks》 2025年第1期35-42,共8页
Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privac... Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privacy-preserving Web3 scenarios.However,DFL faces incentive and security challenges in the decentralized framework.To address these issues,this paper presents a Hierarchical Blockchain-enabled DFL(HBDFL)system,which provides a generic solution framework for the DFL-related applications.The proposed system consists of four major components,including a model contribution-based reward mechanism,a Proof of Elapsed Time and Accuracy(PoETA)consensus algorithm,a Distributed Reputation-based Verification Mechanism(DRTM)and an Accuracy-Dependent Throughput Management(ADTM)mechanism.The model contribution-based rewarding mechanism incentivizes network nodes to train models with their local datasets,while the PoETA consensus algorithm optimizes the tradeoff between the shared model accuracy and system throughput.The DRTM improves the system efficiency in consensus,and the ADTM mechanism guarantees that the throughput performance remains within a predefined range while improving the shared model accuracy.The performance of the proposed HBDFL system is evaluated by numerical simulations,with the results showing that the system improves the accuracy of the shared model while maintaining high throughput and ensuring security. 展开更多
关键词 blockchain Federated learning Consensus scheme Accuracy dependent throughput management
在线阅读 下载PDF
Optimal Production Capacity Matching for Blockchain-Enabled Manufacturing Collaboration With the Iterative Double Auction Method 被引量:1
13
作者 Ying Chen Feilong Lin +2 位作者 Zhongyu Chen Changbing Tang Cailian Chen 《IEEE/CAA Journal of Automatica Sinica》 2025年第3期550-562,共13页
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other.In this article,a block... The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other.In this article,a blockchain-enabled manufacturing collaboration framework is proposed,with a focus on the production capacity matching problem for blockchainbased peer-to-peer(P2P)collaboration.First,a digital model of production capacity description is built for trustworthy and transparent sharing over the blockchain.Second,an optimization problem is formulated for P2P production capacity matching with objectives to maximize both social welfare and individual benefits of all participants.Third,a feasible solution based on an iterative double auction mechanism is designed to determine the optimal price and quantity for production capacity matching with a lack of personal information.It facilitates automation of the matching process while protecting users'privacy via blockchainbased smart contracts.Finally,simulation results from the Hyperledger Fabric-based prototype show that the proposed approach increases social welfare by 1.4%compared to the Bayesian game-based approach,makes all participants profitable,and achieves 90%fairness of enterprises. 展开更多
关键词 blockchain iterative double auction manufacturing collaboration production capacity matching
在线阅读 下载PDF
Security Strategy of Digital Medical Contents Based on Blockchain in Generative AI Model
14
作者 Hoon Ko Marek R.Ogiela 《Computers, Materials & Continua》 SCIE EI 2025年第1期259-278,共20页
This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain an... This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain and generative AI,the research team aimed to address the timely challenge of safeguarding visual medical content.The participating researchers conducted a comprehensive analysis,examining the vulnerabilities of medical AI services,personal information protection issues,and overall security weaknesses.This multi faceted exploration led to an indepth evaluation of the model’s performance and security.Notably,the correlation between accuracy,detection rate,and error rate was scrutinized.This analysis revealed insights into the model’s strengths and limitations,while the consideration of standard deviation shed light on the model’s stability and performance variability.The study proposed practical improvements,emphasizing the reduction of false negatives to enhance detection rate and leveraging blockchain technology to ensure visual data integrity in medical applications.Applying blockchain to generative AI-created medical content addresses key personal information protection issues.By utilizing the distributed ledger system of blockchain,the research team aimed to protect the privacy and integrity of medical data especially medical images.This approach not only enhances security but also enables transparent and tamperproof record-keeping.Additionally,the use of generative AI models ensures the creation of novel medical content without compromising personal information,further safeguarding patient privacy.In conclusion,this study showcases the potential of blockchain-based solutions in the medical field,particularly in securing sensitive medical data and protecting patient privacy.The proposed approach,combining blockchain and generative AI,offers a promising direction toward more robust and secure medical content management.Further research and advancements in this area will undoubtedly contribute to the development of robust and privacy-preserving healthcare systems,and visual diagnostic systems. 展开更多
关键词 Digitalmedical content medical diagnostic visualization security analysis generativeAI blockchain VULNERABILITY pattern recognition
在线阅读 下载PDF
Mitigating Blockchain Extractable Value threats by Distributed Transaction Sequencing Strategy
15
作者 Xiongfei Zhao Hou-Wan Long +2 位作者 Zhengzhe Li Jiangchuan Liu Yain-Whar Si 《Digital Communications and Networks》 2025年第5期1394-1409,共16页
The rapid growth of blockchain and Decentralized Finance(DeFi)has introduced new challenges and vulnerabilities that threaten the integrity and efficiency of the ecosystem.This study identifies critical issues such as... The rapid growth of blockchain and Decentralized Finance(DeFi)has introduced new challenges and vulnerabilities that threaten the integrity and efficiency of the ecosystem.This study identifies critical issues such as Transaction Order Dependence(TOD),Blockchain Extractable Value(BEV),and Transaction Importance Diversity(TID),which collectively undermine the fairness and security of DeFi systems.BEV-related activities,including sandwich attacks,liquidations,transaction replay etc.have emerged as significant threats,collectively generating$540.54 million in losses over 32 months across 11,289 addresses,involving 49,691 cryptocurrencies and 60,830 on-chain markets.These attacks exploit transaction mechanics to manipulate asset prices and extract value at the expense of other participants,with sandwich attacks being particularly impactful.Additionally,the growing adoption of blockchain in traditional finance highlights the challenge of TID,wherein high transaction volumes can strain systems and compromise time-sensitive operations.To address these pressing issues,we propose a novel Distributed Transaction Sequencing Strategy(DTSS)that integrates forking mechanisms with an Analytic Hierarchy Process(AHP)to enforce fair and transparent transaction ordering in a decentralized manner.Our approach is further enhanced by an optimization framework and the introduction of a Normalized Allocation Disparity Metric(NADM)that ensures optimal parameter selection for transaction prioritization.Experimental evaluations demonstrated that the DTSS effectively mitigated BEV risks,enhanced transaction fairness,and significantly improved the security and transparency of DeFi ecosystems. 展开更多
关键词 blockchain Transaction ordering blockchain extractable value Distributed transaction sequencing strategy
在线阅读 下载PDF
Machine Learning on Blockchain (MLOB): A New Paradigm for Computational Security in Engineering
16
作者 Zhiming Dong Weisheng Lu 《Engineering》 2025年第4期250-263,共14页
Machine learning(ML)has been increasingly adopted to solve engineering problems with performance gauged by accuracy,efficiency,and security.Notably,blockchain technology(BT)has been added to ML when security is a part... Machine learning(ML)has been increasingly adopted to solve engineering problems with performance gauged by accuracy,efficiency,and security.Notably,blockchain technology(BT)has been added to ML when security is a particular concern.Nevertheless,there is a research gap that prevailing solutions focus primarily on data security using blockchain but ignore computational security,making the traditional ML process vulnerable to off-chain risks.Therefore,the research objective is to develop a novel ML on blockchain(MLOB)framework to ensure both the data and computational process security.The central tenet is to place them both on the blockchain,execute them as blockchain smart contracts,and protect the execution records on-chain.The framework is established by developing a prototype and further calibrated using a case study of industrial inspection.It is shown that the MLOB framework,compared with existing ML and BT isolated solutions,is superior in terms of security(successfully defending against corruption on six designed attack scenario),maintaining accuracy(0.01%difference with baseline),albeit with a slightly compromised efficiency(0.231 second latency increased).The key finding is MLOB can significantly enhances the computational security of engineering computing without increasing computing power demands.This finding can alleviate concerns regarding the computational resource requirements of ML-BT integration.With proper adaption,the MLOB framework can inform various novel solutions to achieve computational security in broader engineering challenges. 展开更多
关键词 Engineering computing Machine learning blockchain blockchain smart contract Deployable framework
在线阅读 下载PDF
ACSarF:a DRL-based adaptive consortium blockchain sharding framework for supply chain finance
17
作者 Shijing Hu Junxiong Lin +4 位作者 Xin Du Wenbin Huang Zhihui Lu Qiang Duan Jie Wu 《Digital Communications and Networks》 2025年第1期26-34,共9页
Blockchain technologies have been used to facilitate Web 3.0 and FinTech applications.However,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 ... Blockchain technologies have been used to facilitate Web 3.0 and FinTech applications.However,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 and FinTech applications such as Supply Chain Finance(SCF).Blockchain sharding has been proposed to improve blockchain performance.However,the existing sharding methods either use a static sharding strategy,which lacks the adaptability for the dynamic SCF environment,or are designed for public chains,which are not applicable to consortium blockchain-based SCF.To address these issues,we propose an adaptive consortium blockchain sharding framework named ACSarF,which is based on the deep reinforcement learning algorithm.The proposed framework can improve consortium blockchain sharding to effectively reduce transaction delay and adaptively adjust the sharding and blockout strategies to increase the transaction success rate in a dynamic SCF environment.Furthermore,we propose to use a consistent hash algorithm in the ACSarF framework to ensure transaction load balancing in the adaptive sharding system to further improve the performance of blockchain sharding in dynamic SCF scenarios.To evaluate the proposed framework,we conducted extensive experiments in a typical SCF scenario.The obtained experimental results show that the ACSarF framework achieves a more than 60%improvement in user experience compared to other state-of-the-art blockchain systems. 展开更多
关键词 Web 3.0 Consortium blockchain blockchain sharding Supply chain finance FinTech regulation
在线阅读 下载PDF
Navigating the Blockchain Trilemma:A Review of Recent Advances and Emerging Solutions in Decentralization,Security,and Scalability Optimization
18
作者 Saha Reno Koushik Roy 《Computers, Materials & Continua》 2025年第8期2061-2119,共59页
The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneousl... The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures. 展开更多
关键词 blockchain trilemma SCALABILITY DECENTRALIZATION SECURITY consensus algorithms sharding layer-2 solutions DAG-based architectures cross-chain interoperability blockchain optimization
在线阅读 下载PDF
Unleashing the Potential of Metaverse in Social IoV:An Authentication Protocol Based on Blockchain
19
作者 Tsu-Yang Wu Haozhi Wu +2 位作者 Maoxin Tang Saru Kumari Chien-Ming Chen 《Computers, Materials & Continua》 2025年第8期3175-3192,共18页
As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in... As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in a variety of fields,including education,social entertainment,Internet of vehicles(IoV),healthcare,and virtual tours.In IoVs,researchers primarily focus on using the metaverse to improve the traffic safety of vehicles,while paying limited attention to passengers’social needs.At the same time,Social Internet ofVehicles(SIoV)introduces the concept of social networks in IoV to provide better resources and services for users.However,the problem of single interaction between SIoVand users has become increasingly prominent.In this paper,we first introduce a SIoVenvironment combined with the metaverse.In this environment,we adopt blockchain as the platform of the metaverse to provide a decentralized environment.Concerning passengers’social data may contain sensitive/private information,we then design an authentication and key agreement protocol calledMSIoV-AKAto protect the communications.Through formal security verifications in the real-or-random(ROR)model and using the AVISPA(Automated Validation of Internet Security Protocols and Applications)tool,we firmly verify the security of the protocol.Finally,detailed comparisons are made between our protocol and robust protocols/schemes in terms of computational cost and communication cost.In addition,we implement the MSIoV-AKA protocol in the Ethereum test network and Hyperledger Sawtooth to show the practicality. 展开更多
关键词 AUTHENTICATION key agreement SIoV metaverse blockchain
在线阅读 下载PDF
Security and Privacy in Permissioned Blockchain Interoperability:A Systematic Review
20
作者 Alsoudi Dua TanFong Ang +5 位作者 Chin Soon Ku Okmi Mohammed Yu Luo Jiahui Chen Uzair Aslam Bhatti Lip Yee Por 《Computers, Materials & Continua》 2025年第11期2579-2624,共46页
Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to syst... Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems. 展开更多
关键词 blockchain security PRIVACY ATTACK THREAT INTEROPERABILITY cross-chain
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部