Peixuan Feng , Wenrui Cao , Siqi Lu , Yongjuan Wang , Haoyuan Xue , Runnan Yang
{"title":"ACOFuzz: An ant colony algorithm-based fuzzer for smart contracts","authors":"Peixuan Feng , Wenrui Cao , Siqi Lu , Yongjuan Wang , Haoyuan Xue , Runnan Yang","doi":"10.1016/j.bcra.2025.100279","DOIUrl":"10.1016/j.bcra.2025.100279","url":null,"abstract":"<div><div>In today's blockchain landscape, smart contracts are assuming a pivotal role, albeit accompanied by a heightened risk of exploitation by attackers. As smart contracts grow in complexity, vulnerabilities lurking within deeper layers of code become more prevalent. Existing analysis tools primarily focus on data flow and a priori knowledge based on symbolic execution as a test case generation strategy, often falling short in uncovering vulnerabilities nested within intricate conditional statements. To address this challenge, we present ACOFuzz, an advanced fuzzer for Ethereum smart contracts. ACOFuzz employs the ant colony optimization (ACO) algorithm to traverse the control flow graph (CFG) of smart contracts, systematically exploring execution paths and generating test cases. Subsequently, it strategically directs the search towards paths that are more susceptible to vulnerabilities within the CFG, leveraging block coverage data obtained from executing the test cases. In a comprehensive evaluation, we demonstrate that ACOFuzz excels in covering a wider array of paths within a contract while exhibiting enhanced accuracy in pinpointing specific vulnerabilities compared to contemporary fuzzers.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100279"},"PeriodicalIF":5.6,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144861166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A blockchain-based platform for ensuring provenance and traceability of donations for cultural heritage","authors":"Sara Migliorini, Mauro Gambini, Alberto Belussi","doi":"10.1016/j.bcra.2025.100278","DOIUrl":"10.1016/j.bcra.2025.100278","url":null,"abstract":"<div><div>The preservation and restoration of cultural heritage has acquired increasing attention in recent years since it has priceless value from both historical and touristic points of view. However, this activity requires considerable funds to be carried out, and frequently, such costs cannot rely entirely on public sources. At the same time, crowdfunding platforms are becoming a widely recognized way to collect funds and finance projects. Indeed, in the literature, some attempts have been made to use crowdfunding platforms to support renovation and restoration projects for cultural heritage items. Even if the benefits of their use in general, particularly for cultural heritage, are widely recognized, skepticism remains regarding transparency, reliability, and trustworthiness. In this regard, the emerging blockchain technology could represent an innovative solution for promoting and guaranteeing such properties through the entire crowdfunding process. However, existing solutions based on the direct use of cryptocurrencies for collecting funds have encountered users' fear and reluctance due to their novelty and the absence of clear and complete regulation by governments. For this reason, in this paper, we propose a solution that is not based on using cryptocurrencies but concentrates on the immutability, traceability, and trustworthiness properties that blockchain offers. To do so, an integrated solution is proposed that combines traditional platforms with a set of smart contracts and a Decentralized Application (dApp), allowing the immutable storage of information inside the blockchain and their subsequent validation by the donors.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100278"},"PeriodicalIF":5.6,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144861165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chunming Rong , Jungwon Seo , Zihan Zhao , Ferhat Ozgur Catak , Jiahui Geng , Martin Gilje Jaatun
{"title":"Federated Large Domain Model System","authors":"Chunming Rong , Jungwon Seo , Zihan Zhao , Ferhat Ozgur Catak , Jiahui Geng , Martin Gilje Jaatun","doi":"10.1016/j.bcra.2025.100277","DOIUrl":"10.1016/j.bcra.2025.100277","url":null,"abstract":"<div><div>As organizations increasingly seek to build Foundation Models (FMs) using their own proprietary data, many are adopting private and in-house cloud infrastructures (often in addition to public clouds) to address concerns over cost, data privacy, and data sovereignty. However, these isolated private clouds frequently lack interoperability, creating barriers to cross-institutional collaboration, which is vital for training robust Domain-Specific Foundation Models (DSFMs) that rely on large and diverse datasets. Additionally, underutilized resources in private clouds lead to significant global energy inefficiencies. In this paper, we propose the Federated Large Domain Model System (FLDMS), a conceptual framework designed to facilitate collaborative foundation model development across multiple private cloud environments. We review the necessary enabling technologies, including decentralized protocols for data privacy and Large Language Models (LLMs) for automated orchestration, and present a high-level system design demonstrating how these components can be integrated. By enabling secure and efficient cross-organization cooperation, FLDMS provides a blueprint for building DSFMs while addressing the inefficiencies inherent in siloed private cloud systems.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100277"},"PeriodicalIF":5.6,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144780043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
自主智能系统(英文)Pub Date : 2025-03-20DOI: 10.1007/s43684-025-00095-z
Qiang Mei, Rui Huang, Duo Li, Jingyi Li, Nan Shi, Mei Du, Yingkang Zhong, Chunqi Tian
{"title":"Intelligent hierarchical federated learning system based on semi-asynchronous and scheduled synchronous control strategies in satellite network","authors":"Qiang Mei, Rui Huang, Duo Li, Jingyi Li, Nan Shi, Mei Du, Yingkang Zhong, Chunqi Tian","doi":"10.1007/s43684-025-00095-z","DOIUrl":"10.1007/s43684-025-00095-z","url":null,"abstract":"<div><p>Federated learning (FL) is a technology that allows multiple devices to collaboratively train a global model without sharing original data, which is a hot topic in distributed intelligent systems. Combined with satellite network, FL can overcome the geographical limitation and achieve broader applications. However, it also faces the issues such as straggler effect, unreliable network environments and non-independent and identically distributed (Non-IID) samples. To address these problems, we propose an intelligent hierarchical FL system based on semi-asynchronous and scheduled synchronous control strategies in cloud-edge-client structure for satellite network. Our intelligent system effectively handles multiple client requests by distributing the communication load of the central cloud to various edge clouds. Additionally, the cloud server selection algorithm and the edge-client semi-asynchronous control strategy minimize clients’ waiting time, improving the overall efficiency of the FL process. Furthermore, the center-edge scheduled synchronous control strategy ensures the timeliness of partial models. Based on the experiment results, our proposed intelligent hierarchical FL system demonstrates a distinct advantage in global accuracy over traditional FedAvg, achieving 2% higher global accuracy within the same time frame and reducing 52% training time to achieve the target accuracy.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00095-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143655326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A glance over the past decade: road scene parsing towards safe and comfortable autonomous driving","authors":"Rui Fan, Jiahang Li, Jiaqi Li, Jiale Wang, Ziwei Long, Ning Jia, Yanan Liu, Wenshuo Wang, Mohammud J. Bocus, Sergey Vityazev, Xieyuanli Chen, Junhao Xiao, Stepan Andreev, Huimin Lu, Alexander Dvorkovich","doi":"10.1007/s43684-025-00096-y","DOIUrl":"10.1007/s43684-025-00096-y","url":null,"abstract":"<div><p>Road scene parsing is a crucial capability for self-driving vehicles and intelligent road inspection systems. Recent research has increasingly focused on enhancing driving safety and comfort by improving the detection of both drivable areas and road defects. This article reviews state-of-the-art networks developed over the past decade for both general-purpose semantic segmentation and specialized road scene parsing tasks. It also includes extensive experimental comparisons of these networks across five public datasets. Additionally, we explore the key challenges and emerging trends in the field, aiming to guide researchers toward developing next-generation models for more effective and reliable road scene parsing.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00096-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143602382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
自主智能系统(英文)Pub Date : 2025-03-05DOI: 10.1007/s43684-025-00089-x
Kezhou Chen, Tao Wang, Huimin Zhuo, Lianglun Cheng
{"title":"WGO: a similarly encoded whale-goshawk optimization algorithm for uncertain cloud manufacturing service composition","authors":"Kezhou Chen, Tao Wang, Huimin Zhuo, Lianglun Cheng","doi":"10.1007/s43684-025-00089-x","DOIUrl":"10.1007/s43684-025-00089-x","url":null,"abstract":"<div><p>Service Composition and Optimization Selection (SCOS) is crucial in Cloud Manufacturing (CMfg), but the uncertainties in service states and working environments pose challenges for existing QoS-based methods. Recently, digital twins have gained prominence in CMfg due to their predictive capabilities, enhancing the reliability of service composition. Heuristic algorithms are widely used in this field for their flexibility and compatibility with uncertain environments. This paper proposes the Whale-Goshawk Optimization Algorithm (WGO), which combines the Whale Optimization Algorithm (WOA) and Northern Goshawk Optimization Algorithm (NGO). A novel similar integer coding method, incorporating spatial feature information, addresses the limitations of traditional integer coding, while a whale-optimized prey generation strategy improves NGO’s global optimization efficiency. Additionally, a local search method based on similar integer coding enhances WGO’s local search ability. Experimental results demonstrate the effectiveness of the proposed approach.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00089-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
自主智能系统(英文)Pub Date : 2025-03-03DOI: 10.1007/s43684-025-00092-2
Binchuan Qi, Wei Gong, Li Li
{"title":"Explanation framework for industrial recommendation systems based on the generative adversarial network with embedding constraints","authors":"Binchuan Qi, Wei Gong, Li Li","doi":"10.1007/s43684-025-00092-2","DOIUrl":"10.1007/s43684-025-00092-2","url":null,"abstract":"<div><p>The explainability of recommendation systems refers to the ability to explain the logic that guides the system’s decision to endorse or exclude an item. In industrial-grade recommendation systems, the high complexity of features, the presence of embedding layers, the existence of adversarial samples and the requirements for explanation accuracy and efficiency pose significant challenges to current explanation methods. This paper proposes a novel framework AdvLIME (Adversarial Local Interpretable Model-agnostic Explanation) that leverages Generative Adversarial Networks (GANs) with Embedding Constraints to enhance explainability. This method utilizes adversarial samples as references to explain recommendation decisions, generating these samples in accordance with realistic distributions and ensuring they meet the structural constraints of the embedding module. AdvLIME requires no modifications to the existing model architecture and needs only a single training session for global explanation, making it ideal for industrial applications. This work contributes two significant advancements. First, it develops a model-independent global explanation method via adversarial generation. Second, it introduces a model discrimination method to guarantee that the generated samples adhere to the embedding constraints. We evaluate the AdvLIME framework on the Behavior Sequence Transformer (BST) model using the MovieLens 20 M dataset. The experimental results show that AdvLIME outperforms traditional methods such as LIME and DLIME, reducing the approximation error of real samples by 50% and demonstrating improved stability and accuracy.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00092-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143529968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The individual readiness and risk-related concerns of IT professionals for blockchain adoption","authors":"Cigdem Turhan , Ibrahim Akman","doi":"10.1016/j.bcra.2024.100254","DOIUrl":"10.1016/j.bcra.2024.100254","url":null,"abstract":"<div><div>Blockchain has gained remarkable momentum since its introduction in 2008, drawing the attention of industries, individuals, and governments on a global scale. This technology has been studied in the literature, with a focus on technical aspects, application areas, and emerging research challenges. However, few studies address individuals’ perceptions of and concerns with respect to blockchain adoption. This study aims to investigate the attributes affecting blockchain adoption intention. A sample of IT professionals was used for this purpose since they are expected to have earlier and greater awareness of new digital technologies. The perceptions of this group of users regarding attributes such as innovativeness, self-efficacy, social pressure, and awareness, as well as their perceptions of privacy, security, and complexity, were examined through a survey of 208 responses. The results indicate that among the individual attributes, personal innovativeness, awareness, and social pressure positively affect blockchain acceptance, whereas security and privacy concerns fuel the reluctance to adopt blockchain. The findings hopefully provide insight for developers and management of enterprises to ensure a smooth transition into blockchain and present evidence to forecast its future.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100254"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143683328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-platform wallet for privacy protection and key recovery in decentralized applications","authors":"Cristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Ignacio Miguel-Rodríguez","doi":"10.1016/j.bcra.2024.100243","DOIUrl":"10.1016/j.bcra.2024.100243","url":null,"abstract":"<div><div>In recent years, the rise of blockchain technology and its applications has led the software development industry to consider blockchain-powered Decentralized Applications (dApps) as serverless REST APIs. However, to engage with dApps, users require a blockchain wallet. This tool facilitates the generation and secure storage of a user's private key and verifies their identity, among other functionalities. Despite their utility, blockchain wallets present significant challenges, such as reliance on trusted third parties, vulnerability to adversaries observing and potentially linking user interactions, key recovery issues, and synchronization of cryptographic keys across multiple devices. This paper addresses these challenges by introducing a fully decentralized multi-platform wallet that leverages blockchain and InterPlanetary File System (IPFS) technologies for managing asymmetric keys and enabling key recovery. This novel approach empowers users to interact with dApps built on blockchain smart contracts while preserving their privacy and ensuring seamless key recovery in the case of device theft or damage. The proposed system is economically viable, with in-depth cost analysis, and demonstrates resilience against security and privacy attacks. A comparative analysis highlights the advantages of the new scheme over existing mainstream and state-of-the-art solutions. Finally, a preliminary prototype implementation is presented to validate the system's feasibility.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100243"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143580550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adel A. Nasser , Abed Saif Ahmed Alghawli , S. Saleh , Amani A.K. Elsayed
{"title":"Health security disparities in the Eastern Mediterranean Region: A comparative analysis using an integrated MCDM and clustering approach","authors":"Adel A. Nasser , Abed Saif Ahmed Alghawli , S. Saleh , Amani A.K. Elsayed","doi":"10.1016/j.jobb.2025.01.001","DOIUrl":"10.1016/j.jobb.2025.01.001","url":null,"abstract":"<div><h3>Objectives</h3><div>This study aimed to analyze and compare health security performance (HSP) between Gulf Cooperation Council and non-Gulf Cooperation Council countries within the Eastern Mediterranean Region (EMR) for 2019 and 2021, recognizing the critical role of health security in managing global health threats.</div></div><div><h3>Methods</h3><div>The study utilized data from the Global Health Security Index (GHSI) for 2019 and 2021. Key health security priorities were identified using the entropy objective weighting method. The VIKOR (VIseKriterijumska Optimizacija I Kompromisno Resenje) method was employed to rank countries based on overall performance. K-means clustering was applied to group countries with similar health security profiles. Pearson’s and Spearman’s rank correlation coefficients were used to assess relationships between independent HSP indicators and overall performance scores.</div></div><div><h3>Results</h3><div>A significant shift in health security priorities within the EMR was observed between 2019 and 2021, with prevention gaining prominence. Gulf Cooperation Council countries emphasized detection and reporting, while non-Gulf Cooperation Council countries prioritized health systems and prevention. Gulf Cooperation Council countries, particularly Qatar and Saudi Arabia, consistently demonstrated strong HSP. Conversely, non-Gulf Cooperation Council countries facing conflict and instability, such as Yemen, Somalia, and Syria, exhibited weaker performance. Health system capacity, prevention, detection and reporting, and risk environment showed robust correlations with overall HSP.</div></div><div><h3>Conclusion</h3><div>This study underscores the necessity for tailored, adaptive policies to address HSP disparities across regions, highlighting investment in prevention, detection, and reporting. It stresses international collaboration, improved policy implementation, and ongoing research to enhance global health security systems across diverse contexts.</div></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"7 1","pages":"Pages 38-51"},"PeriodicalIF":0.0,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143519743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}