信息工程最新文献

筛选
英文 中文
A review of medical ocular image segmentation 医学眼部图像分割综述
Virtual Reality Intelligent Hardware Pub Date : 2024-06-01 DOI: 10.1016/j.vrih.2024.04.001
Lai WEI, Menghan HU
{"title":"A review of medical ocular image segmentation","authors":"Lai WEI,&nbsp;Menghan HU","doi":"10.1016/j.vrih.2024.04.001","DOIUrl":"https://doi.org/10.1016/j.vrih.2024.04.001","url":null,"abstract":"<div><p>Deep learning has been extensively applied to medical image segmentation, resulting in significant advancements in the field of deep neural networks for medical image segmentation since the notable success of U-Net in 2015. However, the application of deep learning models to ocular medical image segmentation poses unique challenges, especially compared to other body parts, due to the complexity, small size, and blurriness of such images, coupled with the scarcity of data. This article aims to provide a comprehensive review of medical image segmentation from two perspectives: the development of deep network structures and the application of segmentation in ocular imaging. Initially, the article introduces an overview of medical imaging, data processing, and performance evaluation metrics. Subsequently, it analyzes recent developments in U-Net-based network structures. Finally, for the segmentation of ocular medical images, the application of deep learning is reviewed and categorized by the type of ocular tissue.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209657962400010X/pdfft?md5=c30a9952442a34ae8a35e52683ed1214&pid=1-s2.0-S209657962400010X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141484810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of blockchain technology in integrated IoT networks for constructing scalable ITS systems in India 在集成物联网网络中实施区块链技术,在印度构建可扩展的智能交通系统
IF 6.9 3区 计算机科学
Blockchain-Research and Applications Pub Date : 2024-06-01 DOI: 10.1016/j.bcra.2024.100188
Arya Kharche, Sanskar Badholia, Ram Krishna Upadhyay
{"title":"Implementation of blockchain technology in integrated IoT networks for constructing scalable ITS systems in India","authors":"Arya Kharche,&nbsp;Sanskar Badholia,&nbsp;Ram Krishna Upadhyay","doi":"10.1016/j.bcra.2024.100188","DOIUrl":"10.1016/j.bcra.2024.100188","url":null,"abstract":"<div><p>The implementation of blockchain technology in integrated IoT networks for constructing scalable Intelligent Transportation Systems (ITSs) in India has the potential to revolutionize the way we approach transportation. By leveraging the power of IoT and blockchain, we can create a highly secure, transparent, and efficient system that can transform the way we move people and goods. India, one of the world’s most populous countries, has a highly congested and inefficient transportation system that often leads to delays, accidents, and waste of time and resources. The integration of IoT and blockchain can help address these issues by enabling real-time monitoring, tracking, and optimization of traffic flows, thereby reducing congestion, improving safety, and increasing the overall efficiency of the transportation system. This paper explores the potential of blockchain technology in the context of integrated IoT networks for constructing scalable ITS systems in India. The methodology followed is to develop a proof-of-concept blockchain-based application for ITS, implement the blockchain solution into the existing ITS infrastructure, and ensure proper integration and compatibility with other systems. Conduct thorough research and maintenance to ensure the reliability and sustainability of such blockchain-based systems. This research discusses the various benefits and challenges of this approach and the various applications of this technology in the transportation sector, including the green sustainability concept. The results find various ways in which such implementations of blockchain and IoT-Machine Learning (IoT-ML) can revolutionize transportation systems.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000010/pdfft?md5=f0df3bf2f2a306097761b6d525acf13d&pid=1-s2.0-S2096720924000010-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139393019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extending OpenStack Monasca for Predictive Elasticity Control 扩展 OpenStack Monasca 以实现预测性弹性控制
IF 13.6 1区 计算机科学
Big Data Mining and Analytics Pub Date : 2024-06-01 DOI: 10.26599/bdma.2023.9020014
Giacomo Lanciano, Filippo Galli, Tommaso Cucinotta, Davide Bacciu, Andrea Passarella
{"title":"Extending OpenStack Monasca for Predictive Elasticity Control","authors":"Giacomo Lanciano, Filippo Galli, Tommaso Cucinotta, Davide Bacciu, Andrea Passarella","doi":"10.26599/bdma.2023.9020014","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020014","url":null,"abstract":"","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141230354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph ROBO-SPOT:通过了解用户参与度和连接图检测 Robocalls
IF 13.6 1区 计算机科学
Big Data Mining and Analytics Pub Date : 2024-06-01 DOI: 10.26599/bdma.2023.9020020
Muhammad Ajmal Azad, J. Arshad, Farhan Riaz
{"title":"ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph","authors":"Muhammad Ajmal Azad, J. Arshad, Farhan Riaz","doi":"10.26599/bdma.2023.9020020","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020020","url":null,"abstract":"—Robo or unsolicited calls have become a persistent issue in telecommunication networks, posing significant challenges to individuals, businesses, and regulatory authorities. These calls not only trick users to disclose their private and financial information but also affect their productivity through unwanted phone ringing. A proactive approach to identify and block such unsolicited calls is essential to protect users and service providers from potential harm. Therein, this paper proposes a solution to identify robo-callers in the telephony network utilising a set of novel features to evaluate the trustworthiness of callers in a network. The trust score of the callers is then used along with machine learning models to classify them as legitimate or robo-caller. We used a large anonymized data set (call detailed records) from a large telecommunication provider containing more than 1 billion records collected over 10 days. We have conducted extensive evaluation demonstrating that the proposed approach achieves high accuracy and detection rate whilst minimizing the error rate. Specifically, the proposed features when used collectively achieve a true-positive rate of around 97% with a false-positive rate of less than 0.01%.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141233263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-varying nexus and causality in the quantile between Google investor sentiment and cryptocurrency returns 谷歌投资者情绪与加密货币回报率之间的时变联系和因果关系
IF 5.6 3区 计算机科学
Blockchain-Research and Applications Pub Date : 2024-06-01 DOI: 10.1016/j.bcra.2023.100177
Fatma Ben Hamadou, Taicir Mezghani, Mouna Boujelbène Abbes
{"title":"Time-varying nexus and causality in the quantile between Google investor sentiment and cryptocurrency returns","authors":"Fatma Ben Hamadou,&nbsp;Taicir Mezghani,&nbsp;Mouna Boujelbène Abbes","doi":"10.1016/j.bcra.2023.100177","DOIUrl":"10.1016/j.bcra.2023.100177","url":null,"abstract":"<div><p>Understanding the interplay between investor sentiment and cryptocurrency returns has become a critical area of research. Indeed, this study aims to uncover the role of Google investor sentiment on cryptocurrency returns (including Bitcoin, Litecoin, Ethereum, and Tether), especially during the 2017–18 bubble (January 01, 2017, to December 31, 2018) and the COVID-19 pandemic (January 01, 2020, to March 15, 2022). To achieve this, we use two techniques: quantile causality and wavelet coherence. First, the quantile causality test revealed that investors’ optimistic sentiments have notably higher cryptocurrency returns, whereas pessimistic sentiments have significantly opposite effects. Moreover, the wavelet coherence analysis shows that co-movement between investor sentiment and Tether cannot be considered significant. This result supports the role of Tether as a stablecoin in portfolio diversification strategies. In fact, the findings will help investors improve the accuracy of cryptocurrency return forecasts in times of stressful events and pave the way for enhanced decision-making utility.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000520/pdfft?md5=98182819a759cd071a476d4ffe8e903a&pid=1-s2.0-S2096720923000520-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139196126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers 利用多头二维变换器可解释地检测 Windows 可移植可执行文件中的恶意行为
IF 13.6 1区 计算机科学
Big Data Mining and Analytics Pub Date : 2024-06-01 DOI: 10.26599/bdma.2023.9020025
Sohail Khan, Mohammad Nauman
{"title":"Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers","authors":"Sohail Khan, Mohammad Nauman","doi":"10.26599/bdma.2023.9020025","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020025","url":null,"abstract":": Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on systems. One of the major challenges in tackling this problem is the complexity of malware analysis, which requires expertise from human analysts. Recent developments in machine learning have led to the creation of deep models for malware detection. However, these models often lack transparency, making it difficult to understand the reasoning behind the model’s decisions, otherwise known as the black-box problem. To address these limitations, this paper presents a novel model for malware detection, utilizing vision transformers to analyze the opcode sequences of more than 350,000 Windows portable executable malware samples from real-world datasets. The model achieved a high accuracy of 0.9864, not only surpassing previous results but also providing valuable insights into the reasoning behind the classification. Our model is able to pinpoint specific instructions that lead to malicious behavior in malware samples, aiding human experts in their analysis and driving further advancements in the field. We report our findings and show how causality can be established between malicious code and actual classification by a deep learning model thus opening up this black-box problem for deeper analysis.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141231638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: Problems, challenges and solutions 关于采用物联网和区块链的智能家居医疗保健计划中的安全和隐私问题的重要文献综述:问题、挑战和解决方案
IF 6.9 3区 计算机科学
Blockchain-Research and Applications Pub Date : 2024-06-01 DOI: 10.1016/j.bcra.2023.100178
Olusogo Popoola , Marcos Rodrigues , Jims Marchang , Alex Shenfield , Augustine Ikpehai , Jumoke Popoola
{"title":"A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: Problems, challenges and solutions","authors":"Olusogo Popoola ,&nbsp;Marcos Rodrigues ,&nbsp;Jims Marchang ,&nbsp;Alex Shenfield ,&nbsp;Augustine Ikpehai ,&nbsp;Jumoke Popoola","doi":"10.1016/j.bcra.2023.100178","DOIUrl":"10.1016/j.bcra.2023.100178","url":null,"abstract":"<div><p>Protecting private data in smart homes, a popular Internet-of-Things (IoT) application, remains a significant data security and privacy challenge due to the large-scale development and distributed nature of IoT networks. Recently, smart healthcare has leveraged smart home systems, thereby compounding security concerns in terms of the confidentiality of sensitive and private data and by extension the privacy of the data owner. However, proof-of-authority (PoA)-based blockchain distributed ledger technology (DLT) has emerged as a promising solution for protecting private data from indiscriminate use and thereby preserving the privacy of individuals residing in IoT-enabled smart homes. This review elicits some concerns, issues, and problems that have hindered the adoption of blockchain and IoT (BCoT) in some domains and suggests requisite solutions using the aging-in-place scenario. Implementation issues with BCoT were examined as well as the combined challenges BCoT can pose when utilised for security gains. The study discusses recent findings, opportunities, and barriers, and provides recommendations that could facilitate the continuous growth of blockchain applications in healthcare. Lastly, the study explored the potential of using a PoA-based permission blockchain with an applicable consent-based privacy model for decision-making in the information disclosure process, including the use of publisher-subscriber contracts for fine-grained access control to ensure secure data processing and sharing, as well as ethical trust in personal information disclosure, as a solution direction. The proposed authorisation framework could guarantee data ownership, conditional access management, scalable and tamper-proof data storage, and a more resilient system against threat models such as interception and insider attacks.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000532/pdfft?md5=430c94e12710b1fc82ce9b0e78f3eb2a&pid=1-s2.0-S2096720923000532-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139191753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic detection of breast lesions in automated 3D breast ultrasound with cross-organ transfer learning 利用跨器官迁移学习在自动三维乳腺超声中自动检测乳腺病变
Virtual Reality Intelligent Hardware Pub Date : 2024-06-01 DOI: 10.1016/j.vrih.2024.02.001
B.A.O. Lingyun , Zhengrui HUANG , Zehui LIN , Yue SUN , Hui CHEN , You LI , Zhang LI , Xiaochen YUAN , Lin XU , Tao TAN
{"title":"Automatic detection of breast lesions in automated 3D breast ultrasound with cross-organ transfer learning","authors":"B.A.O. Lingyun ,&nbsp;Zhengrui HUANG ,&nbsp;Zehui LIN ,&nbsp;Yue SUN ,&nbsp;Hui CHEN ,&nbsp;You LI ,&nbsp;Zhang LI ,&nbsp;Xiaochen YUAN ,&nbsp;Lin XU ,&nbsp;Tao TAN","doi":"10.1016/j.vrih.2024.02.001","DOIUrl":"https://doi.org/10.1016/j.vrih.2024.02.001","url":null,"abstract":"<div><h3>Background</h3><p>Deep convolutional neural networks have garnered considerable attention in numerous machine learning applications, particularly in visual recognition tasks such as image and video analyses. There is a growing interest in applying this technology to diverse applications in medical image analysis. Automated three-dimensional Breast Ultrasound is a vital tool for detecting breast cancer, and computer-assisted diagnosis software, developed based on deep learning, can effectively assist radiologists in diagnosis. However, the network model is prone to overfitting during training, owing to challenges such as insufficient training data. This study attempts to solve the problem caused by small datasets and improve model detection performance.</p></div><div><h3>Methods</h3><p>We propose a breast cancer detection framework based on deep learning (a transfer learning method based on cross-organ cancer detection) and a contrastive learning method based on breast imaging reporting and data systems (BI-RADS).</p></div><div><h3>Results</h3><p>When using cross organ transfer learning and BIRADS based contrastive learning, the average sensitivity of the model increased by a maximum of 16.05%.</p></div><div><h3>Conclusion</h3><p>Our experiments have demonstrated that the parameters and experiences of cross-organ cancer detection can be mutually referenced, and contrastive learning method based on BI-RADS can improve the detection performance of the model.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209657962400007X/pdfft?md5=a1bdf0d74f499e2548f6f5735dd9b5bf&pid=1-s2.0-S209657962400007X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141484848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based engine data trustworthy swarm learning management method 基于区块链的引擎数据可信蜂群学习管理方法
IF 6.9 3区 计算机科学
Blockchain-Research and Applications Pub Date : 2024-06-01 DOI: 10.1016/j.bcra.2023.100185
Zhenjie Luo, Hui Zhang
{"title":"Blockchain-based engine data trustworthy swarm learning management method","authors":"Zhenjie Luo,&nbsp;Hui Zhang","doi":"10.1016/j.bcra.2023.100185","DOIUrl":"10.1016/j.bcra.2023.100185","url":null,"abstract":"<div><p>Engine data management is of great significance for ensuring data security and sharing, as well as facilitating multi-party collaborative learning. Traditional data management approaches often involve decentralized data storage that is vulnerable to tampering, making it challenging to conduct multi-party collaborative learning under privacy protection conditions and fully leverage the value of data. Moreover, data with compromised integrity can lead to incorrect results if used for model training. Therefore, this paper aims to break down data sharing barriers and fully utilize decentralized data for multi-party collaborative learning under privacy protection conditions. We propose a trustworthy engine data management method based on blockchain technology to ensure data immutability and non-repudiation. To address the issue of limited data samples for some users resulting in poor model performance, we introduce swarm learning techniques based on centralized machine learning and design a trustworthy data management method for swarm learning, achieving trustworthy regulation of the entire process. We conduct research on engine models under swarm learning based on the NASA open dataset, effectively organizing decentralized data samples for collaborative training while ensuring data privacy and fully leveraging the value of data.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209672092300060X/pdfft?md5=3cecec9b4347c0153afcf9159a3b9bdc&pid=1-s2.0-S209672092300060X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139129817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based secure dining: Enhancing safety, transparency, and traceability in food consumption environment 基于区块链的安全餐饮:提高食品消费环境的安全性、透明度和可追溯性
IF 6.9 3区 计算机科学
Blockchain-Research and Applications Pub Date : 2024-06-01 DOI: 10.1016/j.bcra.2023.100187
Sachin Yele, Ratnesh Litoriya
{"title":"Blockchain-based secure dining: Enhancing safety, transparency, and traceability in food consumption environment","authors":"Sachin Yele,&nbsp;Ratnesh Litoriya","doi":"10.1016/j.bcra.2023.100187","DOIUrl":"10.1016/j.bcra.2023.100187","url":null,"abstract":"<div><p>This research paper seeks to examine the possibilities of blockchain technology. For use in the field of restaurant food tracking and safety. Public health risks and economic costs are at stake when foodborne illness outbreaks occur, making food safety a top priority in the food industry. It can be difficult to quickly identify and address possible concerns about using traditional food traceability systems due to inefficiencies, data discrepancies, and a lack of transparency. In this study, we introduce a novel blockchain-based system developed especially for the purpose of tracking restaurant food. Blockchain decentralised consensus, immutability, and smart contracts are put to use in this system to provide trustworthy and transparent traceable infrastructure. Real-time monitoring and data collection along the food supply chain become possible when the blockchain architecture is combined with the Internet of Things (IoT) devices and RFID technology. We show that our proposed blockchain-based traceability solution is practical and efficient through a thorough assessment and validation procedure. The outcomes show that the system not only improves data quality and reliability but also drastically decreases the time and resources needed for food traceability. In addition, patrons are more likely to return to eateries that place a premium on food safety when they are given more information about the establishment’s practises. Additionally, we discuss scalability, data privacy, and interoperability concerns that may arise in future implementations and provide some initial ideas for overcoming these issues.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000623/pdfft?md5=b81f2fd6ad7c0182a78d05469e8ac252&pid=1-s2.0-S2096720923000623-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139127783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信