- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book constitutes the refereed proceedings of the Second Conference on 2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange, BWTAC 2025, held in Chengdu, China, during November 7-9, 2025.
The 41 full papers and 3 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: Protocols, Security, and Smart Contracts; Data, Governance, and Applications; and Scalability, Cross-Chain, and Ecosystems.
Contents
.- Protocols, Security, and Smart Contracts.
.- Zero-Shot Detection of Bytecode-Level Ponzi Contract Using LLM.
.- Smart Contract Vulnerability Detection Using Combined Sequence and Graph Features from Source Code.
.- UAVSpectrumChain: Smart-Contract Based Credible Spectrum Trading for UAV Communications.
.- Cryptocurrency Network Anomaly Detection Based on Time-Aware Channel Fusion Dynamic Graph Neural Network.
.- HSTA: Ethereum Phishing Fraud Detection Model Based on Dynamic Graph Hybrid Spatio-Temporal Attention Mechanism.
.- Semantic Interaction and Relation-Decoupled Heterogeneous Graph Structure Learning: Application to Smart Contracts.
.- Learning to Detect Smart Contract Vulnerabilities from Code Property Graph.
.- SD-ATD: Semantic-Decoupling Contrastive Learning Model for Blockchain Abnormal Transaction Detection.
.- BFCSR: a Blockchain-Based Federated Learning Framework with Client Selection and Round-Based Training Scheme.
.- A Learning Behavior Based Framework for Secure Personalised Blockchain Federated Learning.
.- MultiSCDetect: a Multi-Objective Detection-Based Framework for Smart Contract Vulnerability Detection.
.- DDCTGAN: a Dual Discriminator Conditional Tabular Generative Adversarial Network for Network Intrusion Detection Systems.
.- TrustZone-Based WebAssembly Smart Contract Execution for Privacy-Preserving Blockchain.
.- LogSentry: an LSTM-Based Framework for Real-Time Vulnerability Detection in Smart Contracts.
.- PROMISE: Pedersen Commitment-Based Transaction Hiding Scheme for Blockchain System.
.- Data, Governance, and Applications.
.- Federated Trustworthy Energy Regulation Scheme Based on on-Chain and off-Chain Collaboration.
.- Securing the Metaverse: Designing Multi-Layered Accountability Architectures for Web 3.0.
.- Understanding Ethereum Money Laundering via Transaction Network Analysis: a Case Study of the Bybit Incident.
.- Beformer: Behavior Enhanced Transformer for Task Demand Forecasting in Computing Power Networks.
.- Computing Power Networks Load Prediction Based on Trend Segmentation Technology.
.- Edge Computing Scheduling by Using Temporal Knowledge Graph.
.- Smart Contract Penetrating Supervision Solution for Regional Equity Markets.
.- A Distributed and Trusted Collaborative Framework for Industrial Defect Detection Based on Pseudo-Anomaly Augmentation and Residual Segmentation.
.- Research and Application of Blockchain Judicial Evidence Preservation in the Correlation Analysis Between Electrical Equipment Failures and Forest Fires.
.- BDSN: Blockchain-Based Data Sharing Network.
.- Value Representation of Industrial Internet Data Elements Based on Digital Object Architecture.
.- Dataset Ownership in the Era of Large Language Models.
.- Incentive Mechanisms for Collaborative Intelligence Sharing in Blockchain-Based Federated LLM Fine-Tuning.
.- Blockchain Governance and Adaptive Incentive Mechanisms in Federated Learning.
.- Scalability, Cross-Chain, and Ecosystems.
.- A Survey of Web 3.0 Development: from Technical Architecture to Application Domains and Global-Local Practices.
.- Reinforcing Data Security Regulation via Cross-Chain Smart Contracts.
.- A Cross-Chain Identity Anonymity Protection Scheme for Regulatory Scenarios.
.- The Design and Implementation of an Ethereum Account Fraud Detection Scheme.
.- Demystifying Toxic Content in Ethereum Transactions.
.- Towards Intelligent Blockchain Consensus Technique: Status and Development.
.- Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for VANETs.
.- An Anonymous Smart Contract Access Control Scheme Based on Group Signatures.
.- An Asynchronous Consensus and Certification Algorithm Based on Parallel Chains.
.- DHS-RBAC: a Domain and Hierarchical Data Sharing Scheme for Industrial Internet.
.- Heterogeneous-Aware Adaptive Load-Balancing Sharded Blockchain for Financial Data Sharing.
.- A Reputation-Enhanced Hashgraph Consensus Mechanism for Internet of Vehicles.
.- Blockchain Load Balancing Optimization for Multi-Modal Transactions.
.- A Blockchain Based Distributed Code Hosting Platform.
.- CIFGViewer: Detecting Cross-Chain Bridge Attacks via Cross-Chain Information Flow Graph.