分解 发表于 2025-3-23 11:29:18

http://reply.papertrans.cn/25/2418/241736/241736_11.png

狂热语言 发表于 2025-3-23 17:49:49

Vamsi Krishna Moparthi,Cecilia Hägerhälls of transaction patterns. Focus on the presented transaction patterns, we propose three heuristic clustering rules to link the users’ addresses, which reduce the size of users’ anonymity set. Finally, we perform the experiment on real Tornado Cash transaction data to describe the effectiveness of the proposed clustering rules.

付出 发表于 2025-3-23 19:11:44

Complexes I in the Green Lineager Tor user’s anonymity according to the current path-relay selecting algorithm. There exits two types of anomalous binding relationship consists 35 exit relay families, with different size ranging from 2 to 230, which are neither announced in the consensus document or detected by the Tor network.

拍翅 发表于 2025-3-23 23:35:54

http://reply.papertrans.cn/25/2418/241736/241736_14.png

用树皮 发表于 2025-3-24 05:26:13

ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Router Tor user’s anonymity according to the current path-relay selecting algorithm. There exits two types of anomalous binding relationship consists 35 exit relay families, with different size ranging from 2 to 230, which are neither announced in the consensus document or detected by the Tor network.

jungle 发表于 2025-3-24 07:02:18

http://reply.papertrans.cn/25/2418/241736/241736_16.png

画布 发表于 2025-3-24 13:12:34

A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchtages such as decentralization and non-tamperability perfectly meet the needs of permanent query of traceability scene information, and can solve the trust problem of multi-party participation in various links. At the same time, as data security has received more and more attention. The privacy prot

英寸 发表于 2025-3-24 16:38:44

http://reply.papertrans.cn/25/2418/241736/241736_18.png

Eviction 发表于 2025-3-24 23:02:39

http://reply.papertrans.cn/25/2418/241736/241736_19.png

Obloquy 发表于 2025-3-25 01:34:56

Deep Learning Based Anomaly Detection for Muti-dimensional Time Series: A Surveyprocess according to a given sampling rate. It also has the ability to describe space and time and is widely used in many fields such as system state anomaly detection. However, multi-dimensional time series have problems such as dimensional explosion and data sparseness, as well as complex pattern
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Cyber Security; 18th China Annual Co Wei Lu,Yuqing Zhang,Chao Li Conference proceedings‘‘‘‘‘‘‘‘ 2022 The Editor(s) (if applicable) and The