Muutke küpsiste eelistusi

E-raamat: Blockchain and Trustworthy Systems: 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, Zhuhai, China, May 30-31, 2025, Revised Selected Papers, Part III

Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 98,18 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.

The 110 full papers included in this book were carefully reviewed and selected from 254 submissions. They were organized in topical sections as follows:
Part I: Blockchain Security & Attack Mitigation; Identity Authentication & Data Privacy; Blockchain Applications & Industry Solutions; 
Part II: Deep Learning Architectures & Optimization; Computer Vision & Medical Image Analysis; Natural Language Processing & Multimodal Learning; Reinforcement Learning & Edge Computing Systems;
part III:
Blockchain & Smart Contract Trustworthiness; Federated Learning & Edge Computing ; Industrial & IoT System Reliability; Privacy-Preserving & Secure Data Management

.- Blockchain & Smart Contract Trustworthiness.
.- Slime: An Intelligent Hybrid Recovery Strategy that Minimizes Recovery
Overhead.
.- ASCRec: Recommending Accurate and Secure Codes for Smart Contract
Developers.
.- A Smart Contract Vulnerability Detection Method Based on Graph Neural
Networks and Zero-Shot Learning.
.- Decentralized Data Trading Solutions with Poisoning Attacks Defense.
.- USCSafe: Identifying Permission Vulnerabilities in Upgradeable Smart
Contracts.
.- SAFE: A Blockchain-Based Framework for Secure Health Data Sharing with
Symmetric Encryption.
.- The Impact of Cryptographic Algorithm Performance on Smart Contracts in
WebAssembly.
.- A Survey of Sharding Blockchains on Performance and Scalability.
.- Investigating Tornado Cash: Empirical Insights into Mixing Service
Anonymity.
.- Federated Learning & Edge Computing Security.
.-A Spam Detection Model With Federated Learning and Large Language Model.
.- Secure and Efficient Task Offloading with Resource Allocation in Vehicular
Edge Computing.
.- Crowdsensing with Federated Trust Management: Adaptive Defense Against
Malicious Contributions.
.- CDDSF: A Zero-Shot Domain Adaptation Framework for Secure Solidity Code
Search.
.- Cost-aware Makespan Minimization for Workflow Scheduling in Trustworthy
Heterogeneous Clouds.
.- A Mutimodal Smart Contract Classification Method Based on Hybrid
Convolutional Neural Networks.
.- Computility Planning for Sustainable Supercomputing Centers.
.- Research on Web Vulnerability Mining System Based on Machine Learning.
.- A Survey on Trustworthy Systems in ChatGPT-Like Large-Scale Generative AI
Models: Security, Interpretability, Reliability, and Privacy Considerations.
.- Industrial & IoT System Reliability
.- HMC-Driven Efficient Prediction of SiC Ion Annealing.
.- IEDD-Net: Industrial Endoscope Defect Detection Network Based on Improved
YOLOv12n.
.- Research on Reliable Control Methods for Industrial Robotic Arms.
.- Adaptive Damage Detection Algorithm for Food Packaging Based on Deep
Learning.
.- Service Quality Improvement Strategy in Public Services: An NN-SHAP
Analysis Model for Satisfaction Survey.
.- Feature-Fusion-Based Adaptive Architectural Crack Detection System.
.- Research on Vegetation Generation Technology for 3D Scenes Based on
Multi-Physics Field Coupling.
.- A 2D Engineering Drawing Element Parsing Method Based on Multi-Modal
Frequency-Spatial Feature Pyramid Network.
.- Pi 4B-based Visual Navigation System for Low-computing Power Intelligent
Vehicles.
.- CIHD-Net: A Cross-modal Interactive Hierarchical Dilated Network for RGB-D
Salient Object Detection.
.- A Semi-fragile Reversible Watermarking for 3D Models Using Quantization
Interval Division Modulation.
.- An Effective Reliability Prediction Model for Blockchain Services via
Hybrid Multi-Layer Graph Attention and Self-attention.
.- DCD: A Semantic Segmentation Model for Fetal Ultrasound Four-Chamber
View.
.- Detecting Inconsistent Privacy Statements between Mobile Vehicle Apps and
their Third-party Integrations.
.- CSM:Cross-Scan Mamba for Remote Sensing Object Detection.
.- Robust Cross-Modal Semantic Communication for Object Detection.
.- Research on the Application of Pedagogical Agents in Interdisciplinary
Teaching.
.- A Dynamic Swarm Reputation-DrivenConsensus Mechanism for
TrustworthyEmbodied Intelligent Collaboration.