The Vulnerabilities in Smart Contracts: A Survey

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICAIS (7. : 2021 : Dublin) Advances in artificial intelligence and security ; Part 3
1. Verfasser: Tang, Xiangyan (VerfasserIn)
Weitere Verfasser: Zhou, Ke (VerfasserIn), Cheng, Jieren (VerfasserIn), Li, Hui (VerfasserIn), Yuan, Yuming (VerfasserIn)
Pages:3
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural Network 2021 Lin, Weiwei
Imbalance Malware Classification by Decoupling Representation and Classiıfier 2021 Liu, Jiayin
The Vulnerabilities in Smart Contracts: A Survey 2021 Tang, Xiangyan
A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural Network 2021 Li, Li
Color Image Steganography Scheme Based on Convolutional Neutral Network 2021 Zeng, Cheng
Design and Development of Mobile Monitoring System for Forest fire Fighting 2021 Kia, Minna
Collaboration Energy Efficiency with Mobile Edge Computing for Target Tracking in IOT 2021 Zou, Guobin
Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example 2021 Ji, Mingtao
Optimization of Location Technology in Meteorological Wireless Sensor Network 2021 Li, Haichuan
Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection 2021 Chen, Qi
A Blockchain-Based Internet of Things Forensics Model 2021 Liang, Guangjun
Providing Network-Based Datasets and Multi-dimensional Features for IoT Botnet Detection Research 2021 Yin, Jie
A Caching Strategy Based on Content Popularity Level for NDN 2021 Feng, Min
A Method of Network Attack Recognition Based on CNN+LSTM Model 2021 Zheng, Changliang
The Promotion of Online Communication Ability of Mainstream Media 2021 Yang, Xiaoxuan
Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data Sources 2021 Mei, Lin
A Feature Extracting and Matching System Based on Magic-Number and AC-Algorithm 2021 Wei, Xiankui
An Adversarial Examples Defense Method Based on Image Low-Frequency Information 2021 Song, ZiAn
3D Coverless Image Steganography Scheme Based on 3D Slice Technology 2021 Xiang, Xuyu
Software Information Hiding Algorithm Based on Import Table of Portable Executable File 2021 Tian, Zuwei
Alle Artikel auflisten