Zobrazeno 1 - 10
of 182
pro vyhledávání: '"Du, Ruiying"'
Smart contracts, self-executing agreements directly encoded in code, are fundamental to blockchain technology, especially in decentralized finance (DeFi) and Web3. However, the rise of Ponzi schemes in smart contracts poses significant risks, leading
Externí odkaz:
http://arxiv.org/abs/2411.07498
The rapid expansion of Internet of Things (IoT) has resulted in vast, heterogeneous graphs that capture complex interactions among devices, sensors, and systems. Efficient analysis of these graphs is critical for deriving insights in IoT scenarios su
Externí odkaz:
http://arxiv.org/abs/2411.07022
Autor:
Liu, Ao, Chen, Jing, He, Kun, Du, Ruiying, Xu, Jiahua, Wu, Cong, Feng, Yebo, Li, Teng, Ma, Jianfeng
Blockchain sharding has emerged as a promising solution to the scalability challenges in traditional blockchain systems by partitioning the network into smaller, manageable subsets called shards. Despite its potential, existing sharding solutions fac
Externí odkaz:
http://arxiv.org/abs/2411.06895
Autor:
Li, Qiao, Wu, Cong, Chen, Jing, Zhang, Zijun, He, Kun, Du, Ruiying, Wang, Xinxin, Zhao, Qingchuang, Liu, Yang
Deep neural networks (DNNs) are increasingly used in critical applications such as identity authentication and autonomous driving, where robustness against adversarial attacks is crucial. These attacks can exploit minor perturbations to cause signifi
Externí odkaz:
http://arxiv.org/abs/2408.10647
Autor:
Liang, Ruichao, Chen, Jing, Wu, Cong, He, Kun, Wu, Yueming, Cao, Ruochen, Du, Ruiying, Liu, Yang, Zhao, Ziming
Smart contracts, the cornerstone of decentralized applications, have become increasingly prominent in revolutionizing the digital landscape. However, vulnerabilities in smart contracts pose great risks to user assets and undermine overall trust in de
Externí odkaz:
http://arxiv.org/abs/2408.10116
Autor:
Liang, Ruichao, Chen, Jing, Wu, Cong, He, Kun, Wu, Yueming, Sun, Weisong, Du, Ruiying, Zhao, Qingchuan, Liu, Yang
Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent years, causing massive financial losses. Existing detection methods primarily focus on rule-based approaches and machine learning techniques that utilize static
Externí odkaz:
http://arxiv.org/abs/2406.00921
The integration of Voice Control Systems (VCS) into smart devices and their growing presence in daily life accentuate the importance of their security. Current research has uncovered numerous vulnerabilities in VCS, presenting significant risks to us
Externí odkaz:
http://arxiv.org/abs/2405.17100
The increasing prevalence of audio deepfakes poses significant security threats, necessitating robust detection methods. While existing detection systems exhibit promise, their robustness against malicious audio manipulations remains underexplored. T
Externí odkaz:
http://arxiv.org/abs/2404.15854
Autor:
Sun, Xiping, Chen, Jing, He, Kun, He, Zhixiang, Du, Ruiying, Feng, Yebo, Zhao, Qingchuan, Wu, Cong
Private voice communication often contains sensitive information, making it critical to ensure that only authorized users have access to such calls. Unfortunately, current authentication mechanisms, such as PIN-based passwords, fingerprint recognitio
Externí odkaz:
http://arxiv.org/abs/2404.15000
Autor:
Liang, Xinyu, Du, Ruiying, Chen, Jing, Zhang, Yu, Jia, Meng, Cao, Shuangxi, Wei, Yufeng, Yao, Shixiong
As cross-chain technology continues to advance, the scale of cross-chain transactions is experiencing significant expansion. To improve scalability, researchers have turned to the study of cross-chain state channels. However, most of the existing sch
Externí odkaz:
http://arxiv.org/abs/2404.09408