2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange : Second Conference, BWTAC 2025, Chengdu, China, November 7-9, 2025, Proceedings (Communications in Computer and Information Science)

個数:
  • 予約

2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange : Second Conference, BWTAC 2025, Chengdu, China, November 7-9, 2025, Proceedings (Communications in Computer and Information Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 520 p.
  • 言語 ENG
  • 商品コード 9789819541416

Full Description

This book constitutes the refereed proceedings of the Second Conference on 2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange, BWTAC 2025, held in Chengdu, China, during November 7-9, 2025.

The 41 full papers and 3 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: Protocols, Security, and Smart Contracts; Data, Governance, and Applications; and Scalability, Cross-Chain, and Ecosystems.

 

Contents

.- Protocols, Security, and Smart Contracts.
.- Zero-Shot Detection of Bytecode-Level Ponzi Contract Using LLM.
.- Smart Contract Vulnerability Detection Using Combined Sequence and Graph Features from Source Code.
.- UAVSpectrumChain: Smart-Contract Based Credible Spectrum Trading for UAV Communications.
.- Cryptocurrency Network Anomaly Detection Based on Time-Aware Channel Fusion Dynamic Graph Neural Network.
.- HSTA: Ethereum Phishing Fraud Detection Model Based on Dynamic Graph Hybrid Spatio-Temporal Attention Mechanism.
.- Semantic Interaction and Relation-Decoupled Heterogeneous Graph Structure Learning: Application to Smart Contracts.
.- Learning to Detect Smart Contract Vulnerabilities from Code Property Graph.
.- SD-ATD: Semantic-Decoupling Contrastive Learning Model for Blockchain Abnormal Transaction Detection.
.- BFCSR: a Blockchain-Based Federated Learning Framework with Client Selection and Round-Based Training Scheme.
.- A Learning Behavior Based Framework for Secure Personalised Blockchain Federated Learning.
.- MultiSCDetect: a Multi-Objective Detection-Based Framework for Smart Contract Vulnerability Detection.
.- DDCTGAN: a Dual Discriminator Conditional Tabular Generative Adversarial Network for Network Intrusion Detection Systems.
.- TrustZone-Based WebAssembly Smart Contract Execution for Privacy-Preserving Blockchain.
.- LogSentry: an LSTM-Based Framework for Real-Time Vulnerability Detection in Smart Contracts.
.- PROMISE: Pedersen Commitment-Based Transaction Hiding Scheme for Blockchain System.
.- Data, Governance, and Applications.
.- Federated Trustworthy Energy Regulation Scheme Based on on-Chain and off-Chain Collaboration.
.- Securing the Metaverse: Designing Multi-Layered Accountability Architectures for Web 3.0.
.- Understanding Ethereum Money Laundering via Transaction Network Analysis: a Case Study of the Bybit Incident.
.- Beformer: Behavior Enhanced Transformer for Task Demand Forecasting in Computing Power Networks.
.- Computing Power Networks Load Prediction Based on Trend Segmentation Technology.
.- Edge Computing Scheduling by Using Temporal Knowledge Graph.
.- Smart Contract Penetrating Supervision Solution for Regional Equity Markets.
.- A Distributed and Trusted Collaborative Framework for Industrial Defect Detection Based on Pseudo-Anomaly Augmentation and Residual Segmentation.
.- Research and Application of Blockchain Judicial Evidence Preservation in the Correlation Analysis Between Electrical Equipment Failures and Forest Fires.
.- BDSN: Blockchain-Based Data Sharing Network.
.- Value Representation of Industrial Internet Data Elements Based on Digital Object Architecture.
.- Dataset Ownership in the Era of Large Language Models.
.- Incentive Mechanisms for Collaborative Intelligence Sharing in Blockchain-Based Federated LLM Fine-Tuning.
.- Blockchain Governance and Adaptive Incentive Mechanisms in Federated Learning.
.- Scalability, Cross-Chain, and Ecosystems.
.- A Survey of Web 3.0 Development: from Technical Architecture to Application Domains and Global-Local Practices.
.- Reinforcing Data Security Regulation via Cross-Chain Smart Contracts.
.- A Cross-Chain Identity Anonymity Protection Scheme for Regulatory Scenarios.
.- The Design and Implementation of an Ethereum Account Fraud Detection Scheme.
.- Demystifying Toxic Content in Ethereum Transactions.
.- Towards Intelligent Blockchain Consensus Technique: Status and Development.
.- Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for VANETs.
.- An Anonymous Smart Contract Access Control Scheme Based on Group Signatures.
.- An Asynchronous Consensus and Certification Algorithm Based on Parallel Chains.
.- DHS-RBAC: a Domain and Hierarchical Data Sharing Scheme for Industrial Internet.
.- Heterogeneous-Aware Adaptive Load-Balancing Sharded Blockchain for Financial Data Sharing.
.- A Reputation-Enhanced Hashgraph Consensus Mechanism for Internet of Vehicles.
.- Blockchain Load Balancing Optimization for Multi-Modal Transactions.
.- A Blockchain Based Distributed Code Hosting Platform.
.- CIFGViewer: Detecting Cross-Chain Bridge Attacks via Cross-Chain Information Flow Graph.

最近チェックした商品