With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, i...
详细信息
With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, its anonymity has provided new ways for Ponzi schemes to commit fraud, posing significant risks to investors. Current research still has some limitations, for example, Ponzi schemes are difficult to detect in the early stages of smart contract deployment, and data imbalance is not considered. In addition, there is room for improving the detection accuracy. To address the above issues, this paper proposes LT-SPSD (LSTM-Transformer smart Ponzi schemes detection), which is a Ponzi scheme detection method that combines Long Short-Term Memory (LSTM) and Transformer considering the time-series transaction information of smart contracts as well as the global information. Based on the verified smart contract addresses, account features, and code features are extracted to construct a feature dataset, and the SMOTE-Tomek algorithm is used to deal with the imbalanced data classification problem. By comparing our method with the other four typical detection methods in the experiment, the LT-SPSD method shows significant performance improvement in precision, recall, and F1-score. The results of the experiment confirm the efficacy of the model, which has some application value in Ethereum Ponzi scheme smart contract detection.
Voronoi diagrams on triangulated surfaces based on the geodesic metric play a key role in many applications of computer *** methods of constructing such Voronoi diagrams generally depended on having an exact geodesic ...
详细信息
Voronoi diagrams on triangulated surfaces based on the geodesic metric play a key role in many applications of computer *** methods of constructing such Voronoi diagrams generally depended on having an exact geodesic ***,exact geodesic computation is time-consuming and has high memory usage,limiting wider application of geodesic Voronoi diagrams(GVDs).In order to overcome this issue,instead of using exact methods,we reformulate a graph method based on Steiner point insertion,as an effective way to obtain geodesic ***,since a bisector comprises hyperbolic and line segments,we utilize Apollonius diagrams to encode complicated structures,enabling Voronoi diagrams to encode a medial-axis surface for a dense set of boundary *** on these strategies,we present an approximation algorithm for efficient Voronoi diagram construction on triangulated *** also suggest a measure for evaluating similarity of our results to the exact *** our GVD results are constructed using approximate geodesic distances,we can get GVD results similar to exact results by inserting Steiner points on triangle *** results on many 3D models indicate the improved speed and memory requirements compared to previous leading methods.
Recently,a breakthrough in the high-pressure synthesis of sp^(3)-bonded clathrate-like R-3m-L_(a)B_(8)featuring Latrapped B_(26)cages was *** the superconducting critical temperature(T_(c))and Vickers hardness(H_(v))o...
详细信息
Recently,a breakthrough in the high-pressure synthesis of sp^(3)-bonded clathrate-like R-3m-L_(a)B_(8)featuring Latrapped B_(26)cages was *** the superconducting critical temperature(T_(c))and Vickers hardness(H_(v))of L_(a)B_(8)were estimated,the anisotropic superconductivity and superconducting gap nature remain *** stability of pure B_(26)cages under ambient conditions is of interest for exploring the B_(26)hardness and the role of La atoms in the L_(a)B_(8)*** resolving the Allen–Dynes modified Mc Millan equation and the anisotropic Eliashberg equations,it was found that L_(a)B_(8)exhibits anisotropic single-gap superconductivity with T_(c)=19.0~26.5 K,and the superconducting gap anisotropic ratio reaches 48.50%at 5 *** significantly,our work fundamentally validated the coupling of B-2p orbitals with the optical double-degenerate E_(g)phonon modes and A_(g)phonon mode from a novel *** H_(v)of B_(26)cages was determined to be 18.6 GPa,which is lower than that of La-trapped B_(26)cages(i.e.,L_(a)B_(8)),indicating that La acts as a hardness enhancer for L_(a)B_(8).
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems,...
详细信息
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems, which will relieve the burden on end-users across all industry sectors by featuring AI-enhanced functionalities, such as personalized and automated in-database AI-powered analytics, and selfdriving capabilities for improved system performance. In this paper, we explore the evolution of data systems with a focus on deepening the fusion of AI and DB. We present NeurDB, an AI-powered autonomous data system designed to fully embrace AI design in each major system component and provide in-database AI-powered analytics. We outline the conceptual and architectural overview of NeurDB, discuss its design choices and key components, and report its current development and future plan.
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting...
详细信息
The proliferation of deep learning(DL)has amplified the demand for processing large and complex datasets for tasks such as modeling,classification,and ***,traditional DL methods compromise client privacy by collecting sensitive data,underscoring the necessity for privacy-preserving solutions like Federated Learning(FL).FL effectively addresses escalating privacy concerns by facilitating collaborative model training without necessitating the sharing of raw *** that FL clients autonomously manage training data,encouraging client engagement is pivotal for successful model *** overcome challenges like unreliable communication and budget constraints,we present ENTIRE,a contract-based dynamic participation incentive mechanism for *** ensures impartial model training by tailoring participation levels and payments to accommodate diverse client *** approach involves several key ***,we examine how random client participation impacts FL convergence in non-convex scenarios,establishing the correlation between client participation levels and model ***,we reframe model performance optimization as an optimal contract design challenge to guide the distribution of rewards among clients with varying participation *** balancing budget considerations with model effectiveness,we craft optimal contracts for different budgetary constraints,prompting clients to disclose their participation preferences and select suitable contracts for contributing to model ***,we conduct a comprehensive experimental evaluation of ENTIRE using three real *** results demonstrate a significant 12.9%enhancement in model performance,validating its adherence to anticipated economic properties.
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under t...
详细信息
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under the assumption of static obstacles,aiming to maximize the perception coverage of wireless RF(Radio Frequency)signals and reduce positioning blind ***,in practical security systems,obstacles are subject to change,necessitating the consideration of base station deployment in dynamic ***,research in this area still needs to be *** paper proposes a Dynamic Indoor Environment Beacon Deployment Algorithm(DIE-BDA)to address this *** algorithm considers the dynamic alterations in obstacle locations within the designated *** determines the requisite number of base stations,the requisite time,and the area’s practical and overall signal coverage *** experimental results demonstrate that the algorithm can calculate the deployment strategy in 0.12 s following a change in obstacle *** results show that the algorithm in this paper requires 0.12 s to compute the deployment strategy after the positions of obstacles *** 13 base stations,it achieves an effective coverage rate of 93.5%and an overall coverage rate of 97.75%.The algorithm can rapidly compute a revised deployment strategy in response to changes in obstacle positions within security systems,thereby ensuring the efficacy of signal coverage.
The optical potential ambiguity is a long-standing problem in the analysis of elastic scattering *** a specific collid-ing system,ambiguous potential families can lead to different behaviors in the nearside and farsid...
详细信息
The optical potential ambiguity is a long-standing problem in the analysis of elastic scattering *** a specific collid-ing system,ambiguous potential families can lead to different behaviors in the nearside and farside scattering *** contrast,the envelope method can decompose the experimental data into two components with negative and positive deflection angles,***,a question arises as to whether the comparison between the calculated nearside(or farside)component and the derived positive-deflection-angle(or negative-deflection-angle)component can help analyze the potential ambiguity *** this study,we conducted a trial application of the envelope method to the potential ambiguity *** envelope method was improved by including uncertainties in the experimental *** colliding systems of 16O+28Si at 215.2 MeV and 12C+12C at 1016 MeV were considered in the *** each colliding system,the angular distribution experimental data were described nearly equally well by two potential sets,one of which is“surface transpar-ent”and the other is *** calculated angular distributions were decomposed into nearside and farside scattering *** the improved envelope method,the experimental data were decomposed into the positive-deflection-angle and negative-deflection-angle components,which were then compared with the calculated nearside and farside *** capability of the envelope method to analyze the potential ambiguities was also discussed.
In our current study,the impact of pre-creep treatment at 300 ℃ and 560 MPa for 1000 h on the sub-sequent creep behavior and properties at an elevated temperature of 400 ℃ have been *** characterization of the resul...
详细信息
Deepfake detection aims to mitigate the threat of manipulated content by identifying and exposing forgeries. However, previous methods primarily tend to perform poorly when confronted with cross-dataset scenarios. To ...
详细信息
A Multiscale-Motion Embedding Pseudo-3D (MME-P3D) gesture recognition algorithm has been proposed to tackle the issues of excessive parameters and high computational complexity encountered by existing gesture recognit...
详细信息
暂无评论