demote 发表于 2025-3-23 10:11:56
Is Biology Methodologically Unique? select optimal clients that can maximize the social surplus. Finally, we employ blockchain for on-chain evidence storage of models to ensure the safety of the federated recommendation system. The experimental results show that our proposed incentive mechanism can attract clients with superior train诱拐 发表于 2025-3-23 14:14:10
http://reply.papertrans.cn/20/1928/192733/192733_12.pnginsular 发表于 2025-3-23 21:54:14
,Tailoring Noise to Fit: An Adaptive Noise Optimization Mechanism Against Gradient Leakage, data attributes, thereby achieving a more favorable utility-privacy trade-off. Our comprehensive experimental evaluation demonstrates ANOM’s superior capability to balance utility and privacy. Across all defenses, ANOM results in the minimal accuracy reduction on public datasets when compared to th索赔 发表于 2025-3-24 00:22:56
Design of Privacy-Preserving Smart Contracts for Regional Equity Markets, contracts designed for the cross-market interconnectivity and interoperability business processes in the regional equity market, enabling the coordinated execution and verification of privacy computations across on-chain and off-chain environments. This approach effectively protects private data wh刚开始 发表于 2025-3-24 02:51:00
http://reply.papertrans.cn/20/1928/192733/192733_15.pngWallow 发表于 2025-3-24 10:07:20
,Secure and Efficient Deduplication for Encrypted Image Data in Cloud Storage, attacks. Our security analysis and experimental results demonstrate that SEDDS not only enhances security against side-channel attacks but also significantly reduces communication and storage overheads compared to existing schemes.加入 发表于 2025-3-24 12:42:21
,Accountability Mechanism for Reliable Mobile Crowdsourcing with Efficient Blockchain,age nodes, mining candidate nodes, relay nodes, and verification nodes are mainly responsible for transaction retrieval, block generation, block forwarding and block verification, respectively. It reduces the latency of blockchain maintenance in a large-scale network. Finally, the experimental resuletidronate 发表于 2025-3-24 17:01:04
,Who Will Be Hooked?: A Phishing Fraud Detection Model Based on Dynamic Graph Temporal Feature Codin graph are used to obtain phishing or non-phishing node embeddings. Finally, the acquired node embeddings are trained to be fitted using the cross-entropy loss function to complete the prediction of the next fished node. The experimental results show that the phishing fraud detection model (PFD-TF)BUCK 发表于 2025-3-24 21:59:51
,Static Analysis Detection of Hyperledger Fabric Read-Write Logic Vulnerability,alse positive rate. Based on this, this paper proposes a static analysis method based on the SSA form of Go’s intermediate representation, analyzing read-write control flow and introducing data flow features. This approach improves the detection accuracy of mainstream tools like Chaincode Analyzer,POINT 发表于 2025-3-25 02:17:19
,A Dataset Quality Evaluation Algorithm for Data Trading on Blockchain,cted graph, namely dependency network. On this basis, according to the characteristics and quantity of data items that depend on fields, we propose the FieldRank algorithm. The algorithm objectively quantifies and evaluates the importance of each field, so that the field importance weight obtained b