机构作者

文献数量:2

文献数量:1

文献数量:2

文献数量:3

文献数量:1

文献数量:1

文献数量:3

文献数量:3

文献数量:1

文献数量:3

文献数量:1

文献数量:1

文献数量:1

文献数量:2

文献数量:1

文献数量:1
机构文献
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction[J]
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
Behavior-Aware Account De-Anonymization on Ethereum Interaction Graph[J]
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
NetChain: A Blockchain-Enabled Privacy-Preserving Multi-Domain Network Slice Orchestration Architecture[J]
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks[J]
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing[J]
IEEE INTERNET OF THINGS JOURNAL
Transaction-based classification and detection approach for Ethereum smart contract[J]
INFORMATION PROCESSING & MANAGEMENT
Evolutionary V2X Technologies Toward the Internet of Vehicles: Challenges and Opportunities[J]
PROCEEDINGS OF THE IEEE