nonchalance
发表于 2025-3-25 03:54:57
Diego González,Oscar Gonzales,Christian Ortega,Christian Llumiquinga,Homero Torresy. However, when oriented to distributed resource-constrained edge devices, existing federated learning schemes still suffer from heterogeneity challenge. Hierarchical federated learning divides devices into clusters based on their resources to enhance training efficiency. In addition, there are als
改正
发表于 2025-3-25 09:59:03
Oscar Gonzales,Diego González,Christian Llumiquinga,Christian Ortega,Mauricio Roseroance. However, with the development of the blockchain industry, various financial fraud activities have also emerged on the blockchain. Effective regulation is a necessary condition for the healthy development of the blockchain ecosystem. A comprehensive blockchain anti-fraud prototype system is a s
FAR
发表于 2025-3-25 14:20:56
http://reply.papertrans.cn/47/4601/460019/460019_23.png
按时间顺序
发表于 2025-3-25 19:04:36
Lesly Cadena,Xavier David Rógel,Nelson Sotomayoraper proposes a blockchain-based on-chain and off-chain dual-trusted carbon emission trading system with reputation mechanism (BoodCET). We employ the Internet of Things technology, BigchainDB storage, and supervision by the Ministry of Ecology Environment for the “collection - storage - calculation
疏忽
发表于 2025-3-25 23:20:53
Abraham Loja,Alan Cuenca,Elizabeth Armas,Jerson Colchame based on the RLWE (learning with errors from ring) commitment scheme and further apply the proposed LRS scheme to blockchain to construct an anonymous post-quantum cryptocurrency model. Concretely, we first prove through setting parameters reasonably, we can make a RLWE-based commitment scheme to
雄伟
发表于 2025-3-26 01:13:54
David Trajano Basantes Montero,Bryan Rafael Rosero Ortiz,Daniel Isaías Barzallo Núñez,Luis Miguel Qu This paper proposes an information encryption mechanism based on QR code to solve the problem of information leakage in data communication. The error correction mechanism of the QR code allows it to record information normally even if it is partially damaged. Taking advantage of this feature, this
两种语言
发表于 2025-3-26 04:49:59
http://reply.papertrans.cn/47/4601/460019/460019_27.png
行为
发表于 2025-3-26 08:29:03
Ricardo Rosero,Oscar Gonzales,Christian Llumiquinga,Anabel Portero,Gabriel Vásquezlockchain technology, its security has become a bottleneck restricting the development. In order to solve the problem, the blockchain structure characteristic can be used to build a security detection model. Taking 51% attack detection as an example, the relationship among attack state, attack inten
弯腰
发表于 2025-3-26 12:49:24
http://reply.papertrans.cn/47/4601/460019/460019_29.png
宫殿般
发表于 2025-3-26 19:03:50
Alan Cuenca,Henry Miniguano,Santiago Illescas,Livio Miniguano,Darwin Cuasapazent decreases, attackers generally use encrypted traffic for camouflage to avoid network intrusion detection. Existing malicious traffic detection methods mainly focus on extracting traffic features at the single-flow level, but they have lost their effectiveness due to frequent malware updates and