Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy issues in deep reinforcement learning: Threats and countermeasures
Deep Reinforcement Learning (DRL) is an essential subfield of Artificial Intelligence (AI),
where agents interact with environments to learn policies for solving complex tasks. In recent …
where agents interact with environments to learn policies for solving complex tasks. In recent …
A novel classification of attacks on blockchain layers: Vulnerabilities, attacks, mitigations, and research directions
The widespread adoption of blockchain technology has amplified the spectrum of potential
threats to its integrity and security. The ongoing quest to exploit vulnerabilities emphasizes …
threats to its integrity and security. The ongoing quest to exploit vulnerabilities emphasizes …
[HTML][HTML] A survey on blockchain systems: Attacks, defenses, and privacy preservation
Owing to the incremental and diverse applications of cryptocurrencies and the continuous
development of distributed system technology, blockchain has been broadly used in fintech …
development of distributed system technology, blockchain has been broadly used in fintech …
Semi‐selfish mining based on hidden Markov decision process
Selfish mining attacks sabotage the blockchain systems by utilizing the vulnerabilities of
consensus mechanism. The attackers' main target is to obtain higher revenues compared …
consensus mechanism. The attackers' main target is to obtain higher revenues compared …
Is semi‐selfish mining available without being detected?
Selfish mining attacks get a high prize due to the additional rewards unproportionate to their
mining power (mining pools have particular advantages). Generally, this category of attacks …
mining power (mining pools have particular advantages). Generally, this category of attacks …
BSM-ether: Bribery selfish mining in blockchain-based healthcare systems
Blockchain-enabled distributed networks present a new infrastructure for building reliable
and privacy-preserving healthcare utilities. Among them, Ethereum networks have gained …
and privacy-preserving healthcare utilities. Among them, Ethereum networks have gained …
[HTML][HTML] A review on deep anomaly detection in blockchain
The last few years have witnessed the widespread use of blockchain technology in several
works, due to its effectiveness in terms of privacy, security, and trustworthiness. However, the …
works, due to its effectiveness in terms of privacy, security, and trustworthiness. However, the …
Dual attention guided multi-scale CNN for fine-grained image classification
For the classification of fine-grained images, the subtle differences among the subclasses of
the main category must be distinguished. Intuitively, the key to realizing the fine-grained …
the main category must be distinguished. Intuitively, the key to realizing the fine-grained …
Dynamic application partitioning and task-scheduling secure schemes for biosensor healthcare workload in mobile edge cloud
Currently, the use of biosensor-enabled mobile healthcare workflow applications in mobile
edge-cloud-enabled systems is increasing progressively. These applications are …
edge-cloud-enabled systems is increasing progressively. These applications are …
Wireless communications and mobile computing blockchain‐based trust management in distributed internet of things
F Li, D Wang, Y Wang, X Yu, N Wu… - … and Mobile Computing, 2020 - Wiley Online Library
The development of Internet of Things (IoT) and Mobile Edge Computing (MEC) has led to
close cooperation between electronic devices. It requires strong reliability and …
close cooperation between electronic devices. It requires strong reliability and …