Blockchain, Metaverse and Trustworthy Systems : 6th International Conference, BlockSys 2024, Hangzhou, China, July 12-14, 2024, Revised Selected Papers, Part I (Communications in Computer and Information Science)

個数:

Blockchain, Metaverse and Trustworthy Systems : 6th International Conference, BlockSys 2024, Hangzhou, China, July 12-14, 2024, Revised Selected Papers, Part I (Communications in Computer and Information Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 236 p.
  • 言語 ENG
  • 商品コード 9789819614103

Full Description

This two-volume set CCIS 2264 and CCIS 2265 constitutes the refereed proceedings of the 6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024, held in Hangzhou, China, during July 12-14, 2024.

The 34 full papers  presented in these two volumes were carefully reviewed and selected from 74 submissions. The papers are organized in the following topical sections:

Part I: Blockchain and Data Mining; Data Security and Anomaly Detection; Blockchain Performance Optimization.

Part II: Frontier Technology Integration; Trustworthy System and Cryptocurrencies; Blockchain Applications.

Contents

.- Blockchain and Data Mining.

.- Intrusion Anomaly Detection with Multi-Transformer.

.- A Federated Learning Method Based on Linear Probing and Fine-Tuning.

.- Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection.

.- A Secure Hierarchical Federated Learning Framework based on FISCO Group Mechanism.

.- Research on Network Traffic Anomaly Detection Method Based on Deep Learning.

.- Hyper-parameter Optimization and Proxy Re-encryption for Federated Learning.

.- Data Security and Anomaly Detection.

.- Exploring Embedded Content in the Ethereum Blockchain: Data Restoration and Analysis.

.- Task Allocation and Process Optimization of Data, Information, Knowledge, and Wisdom (DIKW)-based Workflow Engine.

.- Location Data Sharing Method Based on Blockchain and Attribute-Based Encryption.

.- Implicit White-Box Implementations of Efficient Double-Block-Length MAC.

.- A Survey on Blockchain Scalability.

.- Supply Chain Financing Model Embedded with "Full-Process" Blockchain.

.- Blockchain Performance Optimization.

.- ReCon: Faster Smart Contract Vulnerability Detection by Reusable Symbolic Execution Tree.

.- SVD-SESDG: Smart Contract Vulnerability  Detection Technology via Symbol Execution and  State Variable Dependency Graph.

.- Dual-view Aware Smart Contract Vulnerability Detection for Ethereum.

.- Blockchain Layered Sharding Algorithm Based on Transaction Characteristics.

.- An Empirical Study on the Performance of EVMs and Wasm VMs for Smart Contract Execution.

.- Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph.

最近チェックした商品