Autism Spectrum Disorder (ASD) diagnosis is difficult due to its complex and diverse symptomatology. This study focuses on using machine learning, specifically the Random Forest algorithm, to identify ASD. We use a la...
详细信息
We introduce Lanturn: a general purpose adaptive learning-based framework for measuring the cryptoeconomic security of composed decentralized-finance (DeFi) smart contracts. Lanturn discovers strategies comprising of ...
详细信息
ISBN:
(纸本)9798400700507
We introduce Lanturn: a general purpose adaptive learning-based framework for measuring the cryptoeconomic security of composed decentralized-finance (DeFi) smart contracts. Lanturn discovers strategies comprising of concrete transactions for extracting economic value from smart contracts interacting with a particular transaction environment. We formulate the strategy discovery as a black-box optimization problem and leverage a novel adaptive learning-based algorithm to address it. Lanturn features three key properties. First, it needs no contract-specific heuristics or reasoning, due to our black-box formulation of cryptoeconomic security. Second, it utilizes a simulation framework that operates natively on blockchain state and smart contract machine code, such that transactions returned by Lanturn's learning-based optimization engine can be executed on-chain without modification. Finally, Lanturn is scalable in that it can explore strategies comprising a large number of transactions that can be reordered or subject to insertion of new transactions. We evaluate Lanturn on the historical data of the biggest and most active DeFi Applications: Sushiswap, UniswapV2, UniswapV3, and AaveV2. Our results show that Lanturn not only rediscovers existing, well-known strategies for extracting value from smart contracts, but also discovers new strategies that are previously undocumented. Lanturn also consistently discovers higher value than evidenced in the wild, surpassing a natural baseline computed using value extracted by bots and other strategic agents.
With the arrival of the era of big data, the value of artificial intelligence technology has become more and more prominent, and its application in computer network technology has become more extensive. In practice, t...
详细信息
Wireless Sensor Networks (WSNs) consist of sensors that transmit data wirelessly, making energy consumption a critical factor in the overall transmission process. Detecting malicious nodes in WSNs is a significant cha...
详细信息
The proceedings contain 82 papers. The special focus in this conference is on Deep Sciences for Computing andcommunications. The topics include: Digital Identity System for Real World Asset Using Blockchain;blockchai...
ISBN:
(纸本)9783031689079
The proceedings contain 82 papers. The special focus in this conference is on Deep Sciences for Computing andcommunications. The topics include: Digital Identity System for Real World Asset Using Blockchain;blockchain-Driven Framework for Fake Product Detection;blockchain Powered Real-Estate Management System;a Block-Chain Based Decentralized Mechanism to Ensure the security of Electronic Voting System Using Solidity Language;a Secure Persistent Health Care System Using Blockchain Smart Contract;multimodal Fake News Detection Using Deep Learning Techniques;maritime Human Drowning Detection Using Intelligent Deep Learning Algorithm;development of a Pothole Detection System Using Deep Learning Techniques and Depth Estimation;machine Learning and Deep Learning Algorithms for Breast Cancer Prediction;leaf Disease Detection Using Deep Learning Approach;Robust Traffic Sign Recognition Using CNN YOLOv5 Model;Fusion Emotion Prediction Using the CEFER Algorithm;performance Analysis of Various Machine Learning Techniques for Mental Health Tracking;Chronic Kidney Disease (CKD) Detection Analysis Using Machine Learning;Revolutionizing MS Rehabilitation with Digital Twins and Machine Learning: A Promising Path to Precision Medicine;empirical Evaluation of Machine Learning Techniques for Car Price Prediction;water Quality Analysis Using Machine Learning Techniques;design and Development of Human Identification and Obstacle Detection System for Blind Using Machine Learning;effective Parkinson Disease Detection and Prediction Using Voting Classifier in Machine Learning;inflow and Infiltration Water Problem Detection Using Machine Learning;crop Recommendation and Production Prediction;a Comparison of Cox Model and Machine Learning Techniques in the High-Dimensional Survival Data;Smart Farming: Using IoT and AI to Improve Crop Yield in Aeroponics System.
We introduce GROTTO, a framework and C++ library for space- and time-efficient (2 + 1)-party piecewise polynomial (i.e., spline) evaluation on secrets additively shared over Z(2n). GROTTO improves on the state-of-the-...
详细信息
ISBN:
(纸本)9798400700507
We introduce GROTTO, a framework and C++ library for space- and time-efficient (2 + 1)-party piecewise polynomial (i.e., spline) evaluation on secrets additively shared over Z(2n). GROTTO improves on the state-of-the-art approaches based on distributed comparison functions (DCFs) in almost every metric, offering asymptotically superior communication and computation costs with the same or lower round complexity. At the heart of GROTTO is a novel observation about the structure of the "tree" representation underlying the most efficient distributed point functions (DPFs) from the literature, alongside an efficient algorithm that leverages this structure to do with a lightweight DPF what state-of-the-art approaches require comparatively heavyweight DCFs to do. Our open-source GROTTO implementation supports dozens of useful functions out of the box, including trigonometric and hyperbolic functions with their inverses;various logarithms;roots, reciprocals, and reciprocal roots;sign testing and bit counting;and over two dozen of the most common univariate activation functions from the deep-learning literature.
Cloud computing (CC) offers a wide range of on-demand resources and services over the internet. However, due to the inherent vulnerability of the cloud's dispersed architecture, guaranteeing the privacy and securi...
详细信息
This research presents a groundbreaking healthcare application aimed at revolutionizing patient care and improving the overall healthcare experience. The application is developed through an extensive research and deve...
详细信息
In the current era, the exponential rise in security threats is a significant concern, extending beyond the realm of the Internet of Things (IoT). The data being transferred and stored requires a robust encryption and...
详细信息
Blockchain technology is predicted to be one of the key technologies of 6G cellular mobile communication due to its advantages of decentralization, anonymity, openness and immutability. Blockchain technology based on ...
详细信息
ISBN:
(纸本)9798350368208
Blockchain technology is predicted to be one of the key technologies of 6G cellular mobile communication due to its advantages of decentralization, anonymity, openness and immutability. Blockchain technology based on mobile communications can protect privacy and save costs. However, due to problems such as fixed and energy consumption of traditional blockchain scenarios, the mobile blockchain generated by mobile mining in the future may become a mainstream technology and be applied in all aspects. In mobile communication, mobile devices cannot meet the huge computing power requirements of mobile blockchain due to power supply and memory problems. Mobile users can offload mining tasks to edge computing servers while moving blockchain in a communication environment requires refactoring the system security model to be applied to collaborative processing of offloading tasks in mobile edge computing. Based on traditional blockchain and mobile edge computing, this paper first proposes hypotheses about mobile blockchain, analyzes the attack model of traditional blockchain, forms a computing power alliance, and builds a security model based on smart contracts. The security guarantee of mobile blockchain is formed from three aspects: the difficulty value of personal computing power is increased, the security based on contract accounts is improved, and the success probability of fork attack is reduced. In the process of resource allocation, auction algorithm is used to construct the price utility function to solve the problem of social welfare maximization. The simulation results verify that the security increases with the increase of sequestration funds and sequestration time, and the success rate of fork attack decreases with the increase of the number of verifiers. Compared with traditional methods, the combined optimization algorithm has certain advantages in utility sum and average return, and its security is also higher than other algorithms. After the emergence of mobi
暂无评论