nonchalance 发表于 2025-3-25 03:54:57
Diego González,Oscar Gonzales,Christian Ortega,Christian Llumiquinga,Homero Torresy. However, when oriented to distributed resource-constrained edge devices, existing federated learning schemes still suffer from heterogeneity challenge. Hierarchical federated learning divides devices into clusters based on their resources to enhance training efficiency. In addition, there are als改正 发表于 2025-3-25 09:59:03
Oscar Gonzales,Diego González,Christian Llumiquinga,Christian Ortega,Mauricio Roseroance. However, with the development of the blockchain industry, various financial fraud activities have also emerged on the blockchain. Effective regulation is a necessary condition for the healthy development of the blockchain ecosystem. A comprehensive blockchain anti-fraud prototype system is a sFAR 发表于 2025-3-25 14:20:56
http://reply.papertrans.cn/47/4601/460019/460019_23.png按时间顺序 发表于 2025-3-25 19:04:36
Lesly Cadena,Xavier David Rógel,Nelson Sotomayoraper proposes a blockchain-based on-chain and off-chain dual-trusted carbon emission trading system with reputation mechanism (BoodCET). We employ the Internet of Things technology, BigchainDB storage, and supervision by the Ministry of Ecology Environment for the “collection - storage - calculation疏忽 发表于 2025-3-25 23:20:53
Abraham Loja,Alan Cuenca,Elizabeth Armas,Jerson Colchame based on the RLWE (learning with errors from ring) commitment scheme and further apply the proposed LRS scheme to blockchain to construct an anonymous post-quantum cryptocurrency model. Concretely, we first prove through setting parameters reasonably, we can make a RLWE-based commitment scheme to雄伟 发表于 2025-3-26 01:13:54
David Trajano Basantes Montero,Bryan Rafael Rosero Ortiz,Daniel Isaías Barzallo Núñez,Luis Miguel Qu This paper proposes an information encryption mechanism based on QR code to solve the problem of information leakage in data communication. The error correction mechanism of the QR code allows it to record information normally even if it is partially damaged. Taking advantage of this feature, this两种语言 发表于 2025-3-26 04:49:59
http://reply.papertrans.cn/47/4601/460019/460019_27.png行为 发表于 2025-3-26 08:29:03
Ricardo Rosero,Oscar Gonzales,Christian Llumiquinga,Anabel Portero,Gabriel Vásquezlockchain technology, its security has become a bottleneck restricting the development. In order to solve the problem, the blockchain structure characteristic can be used to build a security detection model. Taking 51% attack detection as an example, the relationship among attack state, attack inten弯腰 发表于 2025-3-26 12:49:24
http://reply.papertrans.cn/47/4601/460019/460019_29.png宫殿般 发表于 2025-3-26 19:03:50
Alan Cuenca,Henry Miniguano,Santiago Illescas,Livio Miniguano,Darwin Cuasapazent decreases, attackers generally use encrypted traffic for camouflage to avoid network intrusion detection. Existing malicious traffic detection methods mainly focus on extracting traffic features at the single-flow level, but they have lost their effectiveness due to frequent malware updates and