LEADER 00828nam0-22002891i-450- 001 990004750190403321 005 19990530 035 $a000475019 035 $aFED01000475019 035 $a(Aleph)000475019FED01 035 $a000475019 100 $a19990530d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aAb urbe condita. Liber XXI$fTiti Livi$gRecensione e note di Ignazio Bassi 205 $a2.a ed. int. rifatta 210 $aTorino [etc.]$cG.B. Paravia & C. 215 $a124 p.$d19 cm 700 1$aLivius,$bTitus$f<59 a. C.-17>$05194 702 1$aBassi,$bIgnazio 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004750190403321 952 $aIX I 35$bR. Bibl. 3280$fFLFBC 959 $aFLFBC 996 $aAb urbe condita. Liber XXI$9558201 997 $aUNINA LEADER 04887nam 22007575 450 001 9910983032403321 005 20251225183614.0 010 $a9789819614110 010 $a9819614112 024 7 $a10.1007/978-981-96-1411-0 035 $a(CKB)37391294100041 035 $a(MiAaPQ)EBC31892458 035 $a(Au-PeEL)EBL31892458 035 $a(DE-He213)978-981-96-1411-0 035 $a(EXLCZ)9937391294100041 100 $a20250127d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBlockchain, Metaverse and Trustworthy Systems $e6th International Conference, BlockSys 2024, Hangzhou, China, July 12?14, 2024, Revised Selected Papers, Part I /$fedited by Debiao He, Jiajing Wu, Chen Wang, Huawei Huang 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (330 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2264 311 08$a9789819614103 311 08$a9819614104 327 $a -- Blockchain and Data Mining. -- Intrusion Anomaly Detection with Multi-Transformer. -- A Federated Learning Method Based on Linear Probing and Fine-Tuning. -- Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection. -- A Secure Hierarchical Federated Learning Framework based on FISCO Group Mechanism. -- Research on Network Traffic Anomaly Detection Method Based on Deep Learning. -- Hyper-parameter Optimization and Proxy Re-encryption for Federated Learning. -- Data Security and Anomaly Detection. -- Exploring Embedded Content in the Ethereum Blockchain: Data Restoration and Analysis. -- Task Allocation and Process Optimization of Data, Information, Knowledge, and Wisdom (DIKW)-based Workflow Engine. -- Location Data Sharing Method Based on Blockchain and Attribute-Based Encryption. -- Implicit White-Box Implementations of Efficient Double-Block-Length MAC. -- A Survey on Blockchain Scalability. -- Supply Chain Financing Model Embedded with ?Full-Process? Blockchain. -- Blockchain Performance Optimization. -- ReCon: Faster Smart Contract Vulnerability Detection by Reusable Symbolic Execution Tree. -- SVD-SESDG: Smart Contract Vulnerability Detection Technology via Symbol Execution and State Variable Dependency Graph. -- Dual-view Aware Smart Contract Vulnerability Detection for Ethereum. -- Blockchain Layered Sharding Algorithm Based on Transaction Characteristics. -- An Empirical Study on the Performance of EVMs and Wasm VMs for Smart Contract Execution. -- Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph. 330 $aThis two-volume set CCIS 2264 and CCIS 2265 constitutes the refereed proceedings of the 6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024, held in Hangzhou, China, during July 12?14, 2024. The 34 full papers presented in these two volumes were carefully reviewed and selected from 74 submissions. The papers are organized in the following topical sections: Part I: Blockchain and Data Mining; Data Security and Anomaly Detection; Blockchain Performance Optimization. Part II: Frontier Technology Integration; Trustworthy System and Cryptocurrencies; Blockchain Applications. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2264 606 $aData protection$xLaw and legislation 606 $aArtificial intelligence 606 $aData structures (Computer science) 606 $aInformation theory 606 $aOperating systems (Computers) 606 $aComputers, Special purpose 606 $aPrivacy 606 $aArtificial Intelligence 606 $aData Structures and Information Theory 606 $aOperating Systems 606 $aSpecial Purpose and Application-Based Systems 615 0$aData protection$xLaw and legislation. 615 0$aArtificial intelligence. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aOperating systems (Computers) 615 0$aComputers, Special purpose. 615 14$aPrivacy. 615 24$aArtificial Intelligence. 615 24$aData Structures and Information Theory. 615 24$aOperating Systems. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a005.8 676 $a323.448 700 $aHe$b Debiao$01784772 701 $aWu$b Jiajing$01784773 701 $aWang$b Chen$0501623 701 $aHuang$b Huawei$01373685 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983032403321 996 $aBlockchain, Metaverse and Trustworthy Systems$94316332 997 $aUNINA