heckle 发表于 2025-3-25 03:37:17

http://reply.papertrans.cn/17/1623/162281/162281_21.png

dithiolethione 发表于 2025-3-25 11:29:04

A Survey on Ethereum Illicit Detectionereum transaction data, using general detection methods; the other is for specific types of illicit transactions detection (Including Ponzi schemes and honeypot contracts). For each transaction type, summarized relevant research ideas, model establishment and evaluation effects. Finally, the paper a

enlist 发表于 2025-3-25 13:31:40

Research on Offense and Defense of DDos Based on Evolutionary Game Theoryy related to national security. DDos attacks exploit protocol vulnerabilities and use malicious traffic from multiple sources to attack networks and network services, have caused huge economic losses to users and service providers. Based on the evolutionary game theory, this paper models both the of

exorbitant 发表于 2025-3-25 16:05:49

http://reply.papertrans.cn/17/1623/162281/162281_24.png

乐章 发表于 2025-3-25 22:46:36

Data Provenance in Large-Scale Distribution collaborative data analysis. To ensure the safety and legal use of data, the company needs to record and track the use of data to establish a reasonable accountability and protection mechanism. In fact, the rapid growth of data scale and the complexity of the environment pose serious challenges to

弓箭 发表于 2025-3-26 00:53:08

A Vulnerability Detection Algorithm Based on Transformer Modeluter or mobile phone and on the hardware. In order to meet people’s various daily needs, developers need to continuously develop new software and firmware. The software development process requires the reuse of shared codes and the realization of the middle-station module codes. These reusable codes

相容 发表于 2025-3-26 06:31:16

http://reply.papertrans.cn/17/1623/162281/162281_27.png

infinite 发表于 2025-3-26 09:07:42

http://reply.papertrans.cn/17/1623/162281/162281_28.png

Preamble 发表于 2025-3-26 13:19:04

http://reply.papertrans.cn/17/1623/162281/162281_29.png

场所 发表于 2025-3-26 19:05:07

http://reply.papertrans.cn/17/1623/162281/162281_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Artificial Intelligence and Security; 8th International Co Xingming Sun,Xiaorui Zhang,Elisa Bertino Conference proceedings 2022 The Editor(