- SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereum Smart Contracts
- Parallel and Asynchronous Smart Contract Execution
- Vulnerable Smart Contract Function Locating Based on Multi-Relational Nested Graph Convolutional Network
- An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts
- You’re Invited: CodeX Meeting on June 8, 2023
- Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly
- NFT.mine: An xDeepFM-based Recommender System for Non-fungible Token (NFT) Buyers
- Greedy-Mine: A Profitable Mining Attack Strategy in Bitcoin-NG
- Russo-Ukrainian War: Prediction and explanation of Twitter suspension
- The current opportunities and challenges of Web 3.0
- Quantum Blockchain Miners Provide Massive Energy Savings
- Shoal: Improving DAG-BFT Latency And Robustness
- Modular zk-Rollup On-Demand
- NFTVis: Visual Analysis of NFT Performance
- The Role of Twitter in Cryptocurrency Pump-and-Dumps
- SourceP: Smart Ponzi Schemes Detection on Ethereum Using Pre-training Model with Data Flow
- Blockchain Model for Environment/Infrastructure Monitoring in Cloud-Enabled High-Altitude Platform Systems
- Heart Diseases Prediction Using Block-chain and Machine Learning
- Proxy Re-encryption based Fair Trade Protocol for Digital Goods Transactions via Smart Contracts
- Blockchain-based Decentralized Co-governance: Innovations and Solutions for Sustainable Crowdfunding
- EduChain: A Blockchain-based Education Data Management System
- Harnessing the Potential of Blockchain in DevOps: A Framework for Distributed Integration and Development
- Examination of Supernets to Facilitate International Trade for Indian Exports to Brazil
- Challenges and Remedies to Privacy and Security in AIGC: Exploring the Potential of Privacy Computing, Blockchain, and Beyond
- Sustainable AI Regulation
- Human-centric Literature on Trust for SfTI Veracity Spearhead
- Proof-of-work consensus by quantum sampling
- Aggregated Zero-knowledge Proof and Blockchain-Empowered Authentication for Autonomous Truck Platooning
- A Hybrid Blockchain-Edge Architecture for Electronic Health Records Management with Attribute-based Cryptographic Mechanisms
- Efficiency-Improved Inter-Rollup Transfer System Leveraging Batch Settlement Methods
- Adoption of Blockchain Platform for Security Enhancement in Energy Transaction
- The centralizing effects of private order flow on proposer-builder separation
- Ethereum's Proposer-Builder Separation: Promises and Realities
- Blockchain Censorship
- Blockchain Censorship
- On the Minimal Knowledge Required for Solving Stellar Consensus
- Analyzing Geospatial Distribution in Blockchains
- A Hierarchical and Location-aware Consensus Protocol for IoT-Blockchain Applications
- BFRT: Blockchained Federated Learning for Real-time Traffic Flow Prediction
- Understanding Blockchain Governance: Analyzing Decentralized Voting to Amend DeFi Smart Contracts
- ESIA: An Efficient and Stable Identity Authentication for Internet of Vehicles
- Horizontal Scaling of Transaction-Creating Machines
- GOC-Ledger: State-based Conflict-Free Replicated Ledger from Grow-Only Counters
- A Location-based and Hierarchical Framework for Fast Consensus in Blockchain Networks
- P-CFT: A Privacy-preserving and Crash Fault Tolerant Consensus Algorithm for Permissioned Blockchains
- CBDC-AquaSphere: Interoperable Central Bank Digital Currency Built on Trusted Computing and Blockchain
- Argumentation Schemes for Blockchain Deanonymization
- Location-aware Verification for Autonomous Truck Platooning Based on Blockchain and Zero-knowledge Proof
- Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection
- Time to Bribe: Measuring Block Construction Market
- Time to Bribe: Measuring Block Construction Market
- Definition and Detection of Defects in NFT Smart Contracts
- Chasing the Speed of Light: Low-Latency Planetary-Scale Adaptive Byzantine Consensus
- Towards Understanding Crypto Money Laundering in Web3 Through the Lenses of Ethereum Heists
- Towards Automated Security Analysis of Smart Contracts based on Execution Property Graph
- Towards Automated Security Analysis of Smart Contracts based on Execution Property Graph
- A Physics-Based Hybrid Dynamical Model of Hysteresis in Polycrystalline Shape Memory Alloy Wire Transducers
- Agent-Based Modelling of Ethereum Consensus
- Achieving Maximum Efficiency in Schnorr-based Multi-signature and Applications in Blockchain
- Lessons from HotStuff
- Stanford CodeX Hosts the First LLM x Law Hackathon
- Network Participation and Accessibility of Proof-of-Stake (PoS) Blockchains: A Cross-platform Comparative Analysis
- Trustless Price Feeds of Cryptocurrencies: Pathfinder
- Complexity measure, kernel density estimation, bandwidth selection, and the efficient market hypothesis
- The Power of Persuasion (“Captology”) in the Age of AI and Quantum Computing
- Transparent and Traceable Food Supply Chain Management
- Relay Mining: Verifiable Multi-Tenant Distributed Rate Limiting
- You’re Invited: CodeX Meeting on May 18, 2023
- Towards Data Redaction in Bitcoin
- Blockchain-enabled Parametric Solar Energy Insurance via Remote Sensing
- Blockchain-enabled Parametric Solar Energy Insurance via Remote Sensing
- Incremental Outlier Detection Modelling Using Streaming Analytics in Finance & Health Care
- Many-Body Excited States with a Contracted Quantum Eigensolver
- If blockchain is the solution, robot security is the problem
- Secure compilation of rich smart contracts on poor UTXO blockchains
- Availability Evaluation of IoT Systems with Byzantine Fault-Tolerance for Mission-critical Applications
- LogDoctor: an open and decentralized worker-centered solution for occupational management in healthcare
- Trustworthy Privacy-preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 with Blockchain
- Smart Policy Control for Securing Federated Learning Management System
- Smart Policy Control for Securing Federated Learning Management System
- Time is Money: Strategic Timing Games in Proof-of-Stake Protocols
- SEAL: A Strategy-Proof and Privacy-Preserving UAV Computation Offloading Framework
- A Survey of Blockchain and Artificial Intelligence for 6G Wireless Communications
- DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects
- DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects
- Privacy-preserving Blockchain-enabled Parametric Insurance via Remote Sensing and IoT
- CLawK: Monitoring Business Processes in Smart Contracts
- CLawK: Monitoring Business Processes in Smart Contracts
- Blockchain Transaction Fee Forecasting: A Comparison of Machine Learning Methods
- Interchain Timestamping for Mesh Security
- Torrent Driven (TD) Coin: A Crypto Coin with Built In Distributed Data Storage System
- PRIME: A Price-Reverting Impact Model of a cryptocurrency Exchange
- Novel bribery mining attacks in the bitcoin system and the bribery miner's dilemma
- SigRec: Automatic Recovery of Function Signatures in Smart Contracts
- SigRec: Automatic Recovery of Function Signatures in Smart Contracts
- Copula-Based Trading of Cointegrated Cryptocurrency Pairs
- A fast topological approach for predicting anomalies in time-varying graphs
- Transaction Confirmation in Coded Blockchain
- Unraveling the MEV Enigma: ABI-Free Detection Model using Graph Neural Networks
- You’re Invited: CodeX Meeting on May 11, 2023