LEADER 01017nam 2200337 450 001 9910720508303321 005 20230627164345.0 035 $a(CKB)5710000000124023 035 $a(NjHacI)995710000000124023 035 $a(EXLCZ)995710000000124023 100 $a20230627d2011 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEcology of Marine Bivalves $eAn Ecosystem Approach /$fRichard F. Dame, Michael J. Kenneth 210 1$a[Place of publication not identified] :$cTaylor & Francis,$d2011. 215 $a1 online resource (284 pages) 517 $aEcology of Marine Bivalves 606 $aMarine biology 615 0$aMarine biology. 676 $a574.92 700 $aDame$b Richard F.$0914428 702 $aKenneth$b Michael J. 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910720508303321 996 $aEcology of marine bivalves$92048616 997 $aUNINA LEADER 07180nam 22006375 450 001 9911047711903321 005 20251030120453.0 010 $a9789819541423$b(electronic bk.) 010 $z9789819541416 024 7 $a10.1007/978-981-95-4142-3 035 $a(MiAaPQ)EBC32383114 035 $a(Au-PeEL)EBL32383114 035 $a(CKB)41986538100041 035 $a(DE-He213)978-981-95-4142-3 035 $a(OCoLC)1549521548 035 $a(EXLCZ)9941986538100041 100 $a20251030d2026 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange $eSecond Conference, BWTAC 2025, Chengdu, China, November 7?9, 2025, Proceedings /$fedited by Xiao Song Zhang, Sheng Cao 205 $a1st ed. 2026. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2026. 215 $a1 online resource (800 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2715 311 08$aPrint version: Zhang, Xiao Song 2025 International Conference on Blockchain and Web3. 0 Technology Innovation and Application Exchange Singapore : Springer,c2025 9789819541416 327 $a -- Protocols, Security, and Smart Contracts. -- Zero-Shot Detection of Bytecode-Level Ponzi Contract Using LLM. -- Smart Contract Vulnerability Detection Using Combined Sequence and Graph Features from Source Code. -- UAVSpectrumChain: Smart-Contract Based Credible Spectrum Trading for UAV Communications. -- Cryptocurrency Network Anomaly Detection Based on Time-Aware Channel Fusion Dynamic Graph Neural Network. -- HSTA: Ethereum Phishing Fraud Detection Model Based on Dynamic Graph Hybrid Spatio-Temporal Attention Mechanism. -- Semantic Interaction and Relation-Decoupled Heterogeneous Graph Structure Learning: Application to Smart Contracts. -- Learning to Detect Smart Contract Vulnerabilities from Code Property Graph. -- SD-ATD: Semantic-Decoupling Contrastive Learning Model for Blockchain Abnormal Transaction Detection. -- BFCSR: a Blockchain-Based Federated Learning Framework with Client Selection and Round-Based Training Scheme. -- A Learning Behavior Based Framework for Secure Personalised Blockchain Federated Learning. -- MultiSCDetect: a Multi-Objective Detection-Based Framework for Smart Contract Vulnerability Detection. -- DDCTGAN: a Dual Discriminator Conditional Tabular Generative Adversarial Network for Network Intrusion Detection Systems. -- TrustZone-Based WebAssembly Smart Contract Execution for Privacy-Preserving Blockchain. -- LogSentry: an LSTM-Based Framework for Real-Time Vulnerability Detection in Smart Contracts. -- PROMISE: Pedersen Commitment-Based Transaction Hiding Scheme for Blockchain System. -- Data, Governance, and Applications. -- Federated Trustworthy Energy Regulation Scheme Based on on-Chain and off-Chain Collaboration. -- Securing the Metaverse: Designing Multi-Layered Accountability Architectures for Web 3.0. -- Understanding Ethereum Money Laundering via Transaction Network Analysis: a Case Study of the Bybit Incident. -- Beformer: Behavior Enhanced Transformer for Task Demand Forecasting in Computing Power Networks. -- Computing Power Networks Load Prediction Based on Trend Segmentation Technology. -- Edge Computing Scheduling by Using Temporal Knowledge Graph. -- Smart Contract Penetrating Supervision Solution for Regional Equity Markets. -- A Distributed and Trusted Collaborative Framework for Industrial Defect Detection Based on Pseudo-Anomaly Augmentation and Residual Segmentation. -- Research and Application of Blockchain Judicial Evidence Preservation in the Correlation Analysis Between Electrical Equipment Failures and Forest Fires. -- BDSN: Blockchain-Based Data Sharing Network. -- Value Representation of Industrial Internet Data Elements Based on Digital Object Architecture. -- Dataset Ownership in the Era of Large Language Models. -- Incentive Mechanisms for Collaborative Intelligence Sharing in Blockchain-Based Federated LLM Fine-Tuning. -- Blockchain Governance and Adaptive Incentive Mechanisms in Federated Learning. -- Scalability, Cross-Chain, and Ecosystems. -- A Survey of Web 3.0 Development: from Technical Architecture to Application Domains and Global-Local Practices. -- Reinforcing Data Security Regulation via Cross-Chain Smart Contracts. -- A Cross-Chain Identity Anonymity Protection Scheme for Regulatory Scenarios. -- The Design and Implementation of an Ethereum Account Fraud Detection Scheme. -- Demystifying Toxic Content in Ethereum Transactions. -- Towards Intelligent Blockchain Consensus Technique: Status and Development. -- Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for VANETs. -- An Anonymous Smart Contract Access Control Scheme Based on Group Signatures. -- An Asynchronous Consensus and Certification Algorithm Based on Parallel Chains. -- DHS-RBAC: a Domain and Hierarchical Data Sharing Scheme for Industrial Internet. -- Heterogeneous-Aware Adaptive Load-Balancing Sharded Blockchain for Financial Data Sharing. -- A Reputation-Enhanced Hashgraph Consensus Mechanism for Internet of Vehicles. -- Blockchain Load Balancing Optimization for Multi-Modal Transactions. -- A Blockchain Based Distributed Code Hosting Platform. -- CIFGViewer: Detecting Cross-Chain Bridge Attacks via Cross-Chain Information Flow Graph. 330 $aThis book constitutes the refereed proceedings of the Second Conference on 2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange, BWTAC 2025, held in Chengdu, China, during November 7?9, 2025. The 41 full papers and 3 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: Protocols, Security, and Smart Contracts; Data, Governance, and Applications; and Scalability, Cross-Chain, and Ecosystems. . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2715 606 $aApplication software 606 $aData protection 606 $aBlockchains (Databases) 606 $aSoftware engineering 606 $aComputer and Information Systems Applications 606 $aData and Information Security 606 $aBlockchain 606 $aSoftware Engineering 615 0$aApplication software. 615 0$aData protection. 615 0$aBlockchains (Databases) 615 0$aSoftware engineering. 615 14$aComputer and Information Systems Applications. 615 24$aData and Information Security. 615 24$aBlockchain. 615 24$aSoftware Engineering. 676 $a005.3 700 $aZhang$b Xiao Song$01870071 701 $aCao$b Sheng$0696206 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9911047711903321 996 $a2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange$94478399 997 $aUNINA