首页 > 最新文献

信息工程最新文献

英文 中文
IF:
Optimal load frequency control system for two-area connected via AC/DC link using cuckoo search algorithm 基于布谷鸟搜索算法的交直流两区连接最优负荷频率控制系统
Q1 Computer Science Pub Date : 2025-06-01 DOI: 10.1016/j.vrih.2025.03.006
Gaber EL-SAADY , Alexey MIKHAYLOV , Nora BARANYAI , Mahrous AHMED , Mahmoud HEMEIDA

Background

Interconnection of different power systems has a major effect on system stability. This study aims to design an optimal load frequency control (LFC) system based on a proportional-integral (PI) controller for a two-area power system.

Methods

Two areas were connected through an AC tie line in parallel with a DC link to stabilize the frequency of oscillations in both areas. The PI parameters were tuned using the cuckoo search algorithm (CSA) to minimize the integral absolute error (IAE). A state matrix was provided, and the stability of the system was verified by calculating the eigenvalues. The frequency response was investigated for load variation, changes in the generator rate constraint, the turbine time constant, and the governor time constant.

Results

The CSA was compared with particle swarm optimization algorithm (PSO) under identical conditions. The system was modeled based on a state-space mathematical representation and simulated using MATLAB. The results demonstrated the effectiveness of the proposed controller based on both algorithms and, it is clear that CSA is superior to PSO.

Conclusion

The CSA algorithm smoothens the system response, reduces ripples, decreases overshooting and settling time, and improves the overall system performance under different disturbances.
不同电力系统之间的互联对系统的稳定性有着重要的影响。本研究旨在设计一种基于比例积分(PI)控制器的两区电力系统最优负荷频率控制系统。方法采用交流联线与直流联线并联,稳定两个区域的振荡频率。采用布谷鸟搜索算法(CSA)对PI参数进行调整,使积分绝对误差(IAE)最小。给出了状态矩阵,并通过计算特征值验证了系统的稳定性。研究了负荷变化、发电机转速约束、水轮机时间常数和调速器时间常数的频率响应。结果在相同条件下,将CSA算法与粒子群优化算法(PSO)进行了比较。基于状态空间数学表示对系统进行了建模,并用MATLAB进行了仿真。结果证明了基于这两种算法的控制器的有效性,并且很明显,CSA优于PSO。结论CSA算法平滑了系统响应,减少了波纹,减少了超调量和稳定时间,提高了系统在不同干扰下的整体性能。
{"title":"Optimal load frequency control system for two-area connected via AC/DC link using cuckoo search algorithm","authors":"Gaber EL-SAADY ,&nbsp;Alexey MIKHAYLOV ,&nbsp;Nora BARANYAI ,&nbsp;Mahrous AHMED ,&nbsp;Mahmoud HEMEIDA","doi":"10.1016/j.vrih.2025.03.006","DOIUrl":"10.1016/j.vrih.2025.03.006","url":null,"abstract":"<div><h3>Background</h3><div>Interconnection of different power systems has a major effect on system stability. This study aims to design an optimal load frequency control (LFC) system based on a proportional-integral (PI) controller for a two-area power system.</div></div><div><h3>Methods</h3><div>Two areas were connected through an AC tie line in parallel with a DC link to stabilize the frequency of oscillations in both areas. The PI parameters were tuned using the cuckoo search algorithm (CSA) to minimize the integral absolute error (IAE). A state matrix was provided, and the stability of the system was verified by calculating the eigenvalues. The frequency response was investigated for load variation, changes in the generator rate constraint, the turbine time constant, and the governor time constant.</div></div><div><h3>Results</h3><div>The CSA was compared with particle swarm optimization algorithm (PSO) under identical conditions. The system was modeled based on a state-space mathematical representation and simulated using MATLAB. The results demonstrated the effectiveness of the proposed controller based on both algorithms and, it is clear that CSA is superior to PSO.</div></div><div><h3>Conclusion</h3><div>The CSA algorithm smoothens the system response, reduces ripples, decreases overshooting and settling time, and improves the overall system performance under different disturbances.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"7 3","pages":"Pages 299-316"},"PeriodicalIF":0.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144491946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SmartZKCP: Towards practical data exchange marketplace against active attacks SmartZKCP:针对主动攻击的实用数据交换市场
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100272
Xuanming Liu , Jiawen Zhang , Yinghao Wang , Xinpeng Yang , Xiaohu Yang
The trading of data is becoming increasingly important as it holds substantial value. A blockchain-based data marketplace can provide a secure and transparent platform for data exchange. To facilitate this, developing a fair data exchange protocol for digital goods has garnered considerable attention in recent decades. The Zero Knowledge Contingent Payment (ZKCP) protocol enables trustless fair exchanges with the aid of blockchain and zero-knowledge proofs. However, applying this protocol in a practical data marketplace is not trivial.
In this paper, several potential attacks are identified when applying the ZKCP protocol in a practical public data marketplace. To address these issues, we propose SmartZKCP, an enhanced solution that offers improved security measures and increased performance. The protocol is formalized to ensure fairness and secure against potential attacks. Moreover, SmartZKCP offers efficiency optimizations and minimized communication costs. Evaluation results show that SmartZKCP is both practical and efficient, making it applicable in a data exchange marketplace.
数据交易正变得越来越重要,因为它具有巨大的价值。基于区块链的数据市场可以为数据交换提供安全透明的平台。为了促进这一点,近几十年来,为数字产品开发公平的数据交换协议已经引起了相当大的关注。零知识或有支付(ZKCP)协议借助区块链和零知识证明实现了无需信任的公平交换。然而,在实际的数据市场中应用该协议并非易事。在本文中,在实际的公共数据市场中应用ZKCP协议时,确定了几种潜在的攻击。为了解决这些问题,我们提出了SmartZKCP,这是一种增强的解决方案,提供了改进的安全措施和更高的性能。该协议是形式化的,以确保公平和安全,防止潜在的攻击。此外,SmartZKCP提供效率优化和最小化通信成本。评估结果表明,SmartZKCP既实用又高效,适用于数据交换市场。
{"title":"SmartZKCP: Towards practical data exchange marketplace against active attacks","authors":"Xuanming Liu ,&nbsp;Jiawen Zhang ,&nbsp;Yinghao Wang ,&nbsp;Xinpeng Yang ,&nbsp;Xiaohu Yang","doi":"10.1016/j.bcra.2024.100272","DOIUrl":"10.1016/j.bcra.2024.100272","url":null,"abstract":"<div><div>The trading of data is becoming increasingly important as it holds substantial value. A blockchain-based data marketplace can provide a secure and transparent platform for data exchange. To facilitate this, developing a fair data exchange protocol for digital goods has garnered considerable attention in recent decades. The Zero Knowledge Contingent Payment (ZKCP) protocol enables trustless fair exchanges with the aid of blockchain and zero-knowledge proofs. However, applying this protocol in a practical data marketplace is not trivial.</div><div>In this paper, several potential attacks are identified when applying the ZKCP protocol in a practical public data marketplace. To address these issues, we propose SmartZKCP, an enhanced solution that offers improved security measures and increased performance. The protocol is formalized to ensure fairness and secure against potential attacks. Moreover, SmartZKCP offers efficiency optimizations and minimized communication costs. Evaluation results show that SmartZKCP is both practical and efficient, making it applicable in a data exchange marketplace.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100272"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144270707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain based efficient incentive mechanism in tripartite cyber threat intelligence service marketplace 基于b区块链的三方网络威胁情报服务市场有效激励机制
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100263
Yuan Zhou , Yaoyao Zhang , Qinglin Yang , Yuan Liu , Chunming Rong , Zhihong Tian
The Cyber Threat Intelligence (CTI) marketplace is an emerging platform for CTI service requesters to countermeasure advanced cyber attacks, where CTI service providers are employed on payment. To create a trustworthy CTI marketplace environment, consortium-blockchain-based CTI service platforms have been widely proposed, where the blockchain system becomes the third role, crucially impacting the CTI service quality. How to sustainably promote CTI service quality in this tripartite marketplace is a challenging issue, which has not been well investigated in the literature. In this study, we propose a two-stage tripartite dynamic game-model-based incentive mechanism, where the participation incentives of the three parties are promoted under the constraints of Individual Rationality (IR) and Incentive Compatibility (IC). The sustainability of CTI service is quantitatively formalized through the CTI market demand, which impacts the future profits of the three parties. The Nash equilibrium of the proposed incentive mechanism is solved, where the CTI requester offers an optimal price to achieve effective defense against cyber attacks, and the blockchain platform and CTI service providers collaboratively contribute high-quality CTI services. Empirical experimental results show that the higher the quality of CTI services provided in the marketplace, the greater the market demand for CTI, resulting in a sustainable CTI marketplace.
CTI (Cyber Threat Intelligence,网络威胁情报)市场是CTI服务请求者对抗高级网络攻击的新兴平台,CTI服务提供商用于支付。为了创造一个值得信赖的CTI市场环境,基于联盟区块链的CTI服务平台被广泛提出,其中区块链系统成为第三个角色,对CTI服务质量产生了至关重要的影响。如何在这个三方市场中持续提升CTI服务质量是一个具有挑战性的问题,文献中尚未有很好的研究。在本研究中,我们提出了一个基于两阶段三方动态博弈模型的激励机制,在个体理性(IR)和激励兼容性(IC)的约束下,三方的参与激励得以提升。CTI业务的可持续性通过CTI市场需求进行量化形式化,影响三方未来的利润。解决了所提激励机制的纳什均衡,即CTI请求方提供最优价格以实现对网络攻击的有效防御,区块链平台和CTI服务提供商协同提供高质量的CTI服务。实证研究结果表明,市场提供的CTI服务质量越高,市场对CTI的需求就越大,从而形成一个可持续的CTI市场。
{"title":"A blockchain based efficient incentive mechanism in tripartite cyber threat intelligence service marketplace","authors":"Yuan Zhou ,&nbsp;Yaoyao Zhang ,&nbsp;Qinglin Yang ,&nbsp;Yuan Liu ,&nbsp;Chunming Rong ,&nbsp;Zhihong Tian","doi":"10.1016/j.bcra.2024.100263","DOIUrl":"10.1016/j.bcra.2024.100263","url":null,"abstract":"<div><div>The Cyber Threat Intelligence (CTI) marketplace is an emerging platform for CTI service requesters to countermeasure advanced cyber attacks, where CTI service providers are employed on payment. To create a trustworthy CTI marketplace environment, consortium-blockchain-based CTI service platforms have been widely proposed, where the blockchain system becomes the third role, crucially impacting the CTI service quality. How to sustainably promote CTI service quality in this tripartite marketplace is a challenging issue, which has not been well investigated in the literature. In this study, we propose a two-stage tripartite dynamic game-model-based incentive mechanism, where the participation incentives of the three parties are promoted under the constraints of Individual Rationality (IR) and Incentive Compatibility (IC). The sustainability of CTI service is quantitatively formalized through the CTI market demand, which impacts the future profits of the three parties. The Nash equilibrium of the proposed incentive mechanism is solved, where the CTI requester offers an optimal price to achieve effective defense against cyber attacks, and the blockchain platform and CTI service providers collaboratively contribute high-quality CTI services. Empirical experimental results show that the higher the quality of CTI services provided in the marketplace, the greater the market demand for CTI, resulting in a sustainable CTI marketplace.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100263"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144307966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of immersive virtual reality-based exercise on quality of life, stress, anxiety, depression, and handgrip strength in fibromyalgia: A pilot study 沉浸式虚拟现实运动对纤维肌痛患者生活质量、压力、焦虑、抑郁和握力的影响:一项初步研究
Q1 Computer Science Pub Date : 2025-06-01 DOI: 10.1016/j.vrih.2025.03.004
Gonzalo ARIAS-ÁLVAREZ , Carla GUZMÁN-PINCHEIRA , Diego GONZÁLEZ-GONZÁLEZ , Waldo OSORIO-TORRES , Daniel PECOS-MARTÍN , José GÓMEZ-PULIDO , Claudio CARVAJAL-PARODI

Background

Fibromyalgia (FM) is a chronic rheumatic disorder characterised by musculoskeletal pain, fatigue, and psychoemotional symptoms. Virtual reality (VR) has proven to be an innovative and motivating tool for managing FM, with several studies indicating that it can improve quality of life indices and reduce psychoemotional symptoms. However, studies on immersive VR-based exercise (iVRE) are limited.

Methods

The aim of this study was to evaluate the effects of iVRE on quality of life, stress, anxiety, depression, and handgrip strength in patients with FM. A single-arm pre-post-test pilot study was conducted. Individuals diagnosed with FM were recruited using convenience sampling. The iVRE protocol consisted of 12 sessions of 10 min warm-up and 15 min exercises applied with the Oculus Quest 2TM device. The impact on quality of life was assessed using the Revised Fibromyalgia Impact Questionnaire, and the effects on stress, anxiety, and depression were determined using the Depression Anxiety Stress Scale-21 questionnaire. Handgrip strength was evaluated using the Baseline® dynamometer. The normality assumption was evaluated, and the pre-post means were compared using Student's t-test (p < 0.05).

Results

Eleven individuals (40.6 ± 11.2 years) completed the protocol (10 women). There were significant differences in favour of iVRE in quality of life impact (p < 0.001, Cohen's d: 1.48), handgrip strength (p < 0.05, Cohen's d: 0.26), depression (p < 0.05, Cohen's d: 0.73), and anxiety (p < 0.05, Cohen's d: 0.73).

Conclusions

A six-week iVRE program significantly reduces the impact on quality of life, anxiety, and depression and improves handgrip strength in people with FM. Future studies should investigate the physiological effects using systemic biomarkers to explain the scope of this therapeutic modality.
纤维肌痛(FM)是一种慢性风湿性疾病,以肌肉骨骼疼痛、疲劳和心理情绪症状为特征。虚拟现实(VR)已被证明是一种管理FM的创新和激励工具,一些研究表明它可以改善生活质量指数并减少心理情绪症状。然而,关于沉浸式vr运动(iVRE)的研究还很有限。方法本研究的目的是评估iVRE对FM患者生活质量、压力、焦虑、抑郁和握力的影响。进行了一项单臂试验前-后试点研究。采用方便抽样方法招募确诊为FM的个体。iVRE方案包括12次10分钟的热身和15分钟的练习,使用Oculus Quest 2TM设备。使用修订纤维肌痛影响问卷评估对生活质量的影响,使用抑郁焦虑压力量表-21问卷确定对压力、焦虑和抑郁的影响。使用Baseline®测力仪评估握力。评估正态性假设,并使用学生t检验比较前后均值(p <;0.05)。结果11例患者(40.6±11.2岁)完成治疗方案(10例女性)。iVRE对生活质量的影响有显著差异(p <;0.001, Cohen’s d: 1.48),握力(p <;0.05, Cohen’s d: 0.26),抑郁(p <;0.05, Cohen’s d: 0.73)和焦虑(p <;0.05, Cohen’s d: 0.73)。结论:6周的iVRE方案显著降低了FM患者生活质量、焦虑和抑郁的影响,并提高了握力。未来的研究应该使用系统生物标志物来研究生理效应,以解释这种治疗方式的范围。
{"title":"Effects of immersive virtual reality-based exercise on quality of life, stress, anxiety, depression, and handgrip strength in fibromyalgia: A pilot study","authors":"Gonzalo ARIAS-ÁLVAREZ ,&nbsp;Carla GUZMÁN-PINCHEIRA ,&nbsp;Diego GONZÁLEZ-GONZÁLEZ ,&nbsp;Waldo OSORIO-TORRES ,&nbsp;Daniel PECOS-MARTÍN ,&nbsp;José GÓMEZ-PULIDO ,&nbsp;Claudio CARVAJAL-PARODI","doi":"10.1016/j.vrih.2025.03.004","DOIUrl":"10.1016/j.vrih.2025.03.004","url":null,"abstract":"<div><h3>Background</h3><div>Fibromyalgia (FM) is a chronic rheumatic disorder characterised by musculoskeletal pain, fatigue, and psychoemotional symptoms. Virtual reality (VR) has proven to be an innovative and motivating tool for managing FM, with several studies indicating that it can improve quality of life indices and reduce psychoemotional symptoms. However, studies on immersive VR-based exercise (iVRE) are limited.</div></div><div><h3>Methods</h3><div>The aim of this study was to evaluate the effects of iVRE on quality of life, stress, anxiety, depression, and handgrip strength in patients with FM. A single-arm pre-post-test pilot study was conducted. Individuals diagnosed with FM were recruited using convenience sampling. The iVRE protocol consisted of 12 sessions of 10 min warm-up and 15 min exercises applied with the Oculus Quest 2<sup>TM</sup> device. The impact on quality of life was assessed using the Revised Fibromyalgia Impact Questionnaire, and the effects on stress, anxiety, and depression were determined using the Depression Anxiety Stress Scale-21 questionnaire. Handgrip strength was evaluated using the Baseline® dynamometer. The normality assumption was evaluated, and the pre-post means were compared using Student's <em>t</em>-test (<em>p</em> &lt; 0.05).</div></div><div><h3>Results</h3><div>Eleven individuals (40.6 ± 11.2 years) completed the protocol (10 women). There were significant differences in favour of iVRE in quality of life impact (<em>p</em> &lt; 0.001, Cohen's <em>d</em>: 1.48), handgrip strength (<em>p</em> &lt; 0.05, Cohen's <em>d</em>: 0.26), depression (<em>p</em> &lt; 0.05, Cohen's <em>d</em>: 0.73), and anxiety (<em>p</em> &lt; 0.05, Cohen's <em>d</em>: 0.73).</div></div><div><h3>Conclusions</h3><div>A six-week iVRE program significantly reduces the impact on quality of life, anxiety, and depression and improves handgrip strength in people with FM. Future studies should investigate the physiological effects using systemic biomarkers to explain the scope of this therapeutic modality.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"7 3","pages":"Pages 267-278"},"PeriodicalIF":0.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144491437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new human-computer interaction paradigm: Agent interaction model based on large models and its prospects 一种新的人机交互范式:基于大模型的Agent交互模型及其展望
Q1 Computer Science Pub Date : 2025-06-01 DOI: 10.1016/j.vrih.2025.04.001
Yang LIU
This study examines the advent of agent interaction (AIx) as a transformative paradigm in human-computer interaction (HCI), signifying a notable evolution beyond traditional graphical interfaces and touchscreen interactions. Within the context of large models, AIx is characterized by its innovative interaction patterns and a plethora of application scenarios that hold great potential. The paper highlights the pivotal role of AIx in shaping the future landscape of the large model industry, emphasizing its adoption and necessity from a user's perspective. This study underscores the pivotal role of AIx in dictating the future trajectory of a large model industry by emphasizing the importance of its adoption and necessity from a user-centric perspective. The fundamental drivers of AIx include the introduction of novel capabilities, replication of capabilities (both anthropomorphic and superhuman), migration of capabilities, aggregation of intelligence, and multiplication of capabilities. These elements are essential for propelling innovation, expanding the frontiers of capability, and realizing the exponential superposition of capabilities, thereby mitigating labor redundancy and addressing a spectrum of human needs. Furthermore, this study provides an in-depth analysis of the structural components and operational mechanisms of agents supported by large models. Such advancements significantly enhance the capacity of agents to tackle complex problems and provide intelligent services, thereby facilitating a more intuitive, adaptive, and personalized engagement between humans and machines. The study further delineates four principal categories of interaction patterns that encompass eight distinct modalities of interaction, corresponding to twenty-one specific scenarios, including applications in smart home systems, health assistance, and elderly care. This emphasizes the significance of this new paradigm in advancing HCI, fostering technological advancements, and redefining user experiences. However, it also acknowledges the challenges and ethical considerations that accompany this paradigm shift, recognizing the need for a balanced approach to harness the full potential of AIx in modern society.
本研究探讨了agent交互(AIx)作为人机交互(HCI)的变革范例的出现,标志着超越传统图形界面和触摸屏交互的显著进化。在大型模型的上下文中,AIx的特点是其创新的交互模式和大量具有巨大潜力的应用程序场景。本文强调了AIx在塑造大型模型行业未来格局中的关键作用,从用户的角度强调了它的采用和必要性。这项研究强调了AIx在决定大型模型行业未来发展轨迹方面的关键作用,从用户为中心的角度强调了采用AIx的重要性和必要性。AIx的基本驱动因素包括新功能的引入、功能的复制(拟人的和超人的)、功能的迁移、智能的聚合和功能的倍增。这些要素对于推动创新、扩展能力的前沿和实现能力的指数叠加至关重要,从而减轻劳动力冗余并解决一系列人类需求。此外,本研究还深入分析了大型模型支持下智能体的结构组成和运行机制。这些进步显著提高了智能体解决复杂问题和提供智能服务的能力,从而促进了人与机器之间更直观、更自适应、更个性化的接触。该研究进一步描述了交互模式的四个主要类别,涵盖了八种不同的交互模式,对应于21种具体场景,包括智能家居系统、健康援助和老年人护理的应用。这强调了这种新模式在推进HCI、促进技术进步和重新定义用户体验方面的重要性。然而,它也承认伴随着这种范式转变的挑战和伦理考虑,认识到需要一种平衡的方法来充分利用AIx在现代社会中的潜力。
{"title":"A new human-computer interaction paradigm: Agent interaction model based on large models and its prospects","authors":"Yang LIU","doi":"10.1016/j.vrih.2025.04.001","DOIUrl":"10.1016/j.vrih.2025.04.001","url":null,"abstract":"<div><div>This study examines the advent of agent interaction (AIx) as a transformative paradigm in human-computer interaction (HCI), signifying a notable evolution beyond traditional graphical interfaces and touchscreen interactions. Within the context of large models, AIx is characterized by its innovative interaction patterns and a plethora of application scenarios that hold great potential. The paper highlights the pivotal role of AIx in shaping the future landscape of the large model industry, emphasizing its adoption and necessity from a user's perspective. This study underscores the pivotal role of AIx in dictating the future trajectory of a large model industry by emphasizing the importance of its adoption and necessity from a user-centric perspective. The fundamental drivers of AIx include the introduction of novel capabilities, replication of capabilities (both anthropomorphic and superhuman), migration of capabilities, aggregation of intelligence, and multiplication of capabilities. These elements are essential for propelling innovation, expanding the frontiers of capability, and realizing the exponential superposition of capabilities, thereby mitigating labor redundancy and addressing a spectrum of human needs. Furthermore, this study provides an in-depth analysis of the structural components and operational mechanisms of agents supported by large models. Such advancements significantly enhance the capacity of agents to tackle complex problems and provide intelligent services, thereby facilitating a more intuitive, adaptive, and personalized engagement between humans and machines. The study further delineates four principal categories of interaction patterns that encompass eight distinct modalities of interaction, corresponding to twenty-one specific scenarios, including applications in smart home systems, health assistance, and elderly care. This emphasizes the significance of this new paradigm in advancing HCI, fostering technological advancements, and redefining user experiences. However, it also acknowledges the challenges and ethical considerations that accompany this paradigm shift, recognizing the need for a balanced approach to harness the full potential of AIx in modern society.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"7 3","pages":"Pages 237-266"},"PeriodicalIF":0.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144491436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What are desirable biosecurity trainings for veterinary practitioners and farmers? 兽医从业人员和农民需要接受哪些生物安全培训?
Q1 Social Sciences Pub Date : 2025-06-01 DOI: 10.1016/j.jobb.2025.06.003
Anna Maria Iatrou , Blerta Mehmedi Kastrati , Rreze M. Gecaj , Georgios Batikas , Jarkko K. Niemi , Claude Saegerman , Alberto Oscar Allepuz , Wiebke Jansen , Nancy De Briyne , Daniele De Meneghi , Murat Yılmaz , Evelien Biebaut , Ramazan Yildiz , Marco De Nardi , Carla Correia-Gomes , Tarmo Niine
Effective biosecurity training is essential for disease prevention in livestock systems; however, substantial gaps persist. We combined an online survey (74 fully completed questionnaires; 267 views) with two World Café workshops (∼60 participants) to map the current provision, competence levels, and training needs across Europe. Key findings: (i) self-rated biosecurity knowledge differed markedly between stakeholder groups and veterinarians and other stakeholders reported median scores close to 80/100; (ii) more than three-quarters of cattle (77 %) and 70 % of swine veterinarians perceived a major gap in their ability to demonstrate the economic benefits of biosecurity to clients; (iii) 39 – 44 % of cattle and small-ruminant veterinarians reported inadequate mixed (theory + practice) training formats, and up to 50 % of poultry veterinarians identified deficits in communication and behavior-change skills; (iv) across all discussions, participants favored modular, blended delivery that couples concise e-learning with on-farm coaching, supported by externally audited certification and greater farmer co-design. Therefore, recommendations focus on developing species-specific, flexible modules that embed communication and cost-benefit elements, provide micro-learning units for time-constrained farmers, and operate within a tiered certification framework linked to continuing professional development. Implementing these measures will narrow competence gaps, strengthen veterinarian–farmer engagement, and enhance disease preparedness throughout European livestock production.
有效的生物安全培训对牲畜系统的疾病预防至关重要;然而,巨大的差距仍然存在。我们结合了在线调查(74份完整填写的问卷;267个视图)与两个世界咖啡研讨会(约60名参与者)一起绘制欧洲目前的供应、能力水平和培训需求。主要发现:(i)利益相关者群体之间自评生物安全知识差异显著,兽医和其他利益相关者报告的中位数得分接近80/100;(ii)超过四分之三的牛兽医(77%)和70%的猪兽医认为,他们在向客户证明生物安全的经济效益方面存在重大差距;(iii) 39% - 44%的牛和小反刍动物兽医报告说,混合(理论+实践)培训形式不足,高达50%的家禽兽医发现在沟通和行为改变技能方面存在缺陷;(iv)在所有的讨论中,参与者都倾向于模块化、混合式交付,将简洁的电子学习与农场指导结合起来,并辅以外部审计认证和更多的农民共同设计。因此,建议的重点是开发特定品种的灵活模块,这些模块包含沟通和成本效益要素,为时间有限的农民提供微型学习单元,并在与持续专业发展相关的分层认证框架内运行。实施这些措施将缩小能力差距,加强兽医农民的参与,并在整个欧洲畜牧生产中加强疾病防范。
{"title":"What are desirable biosecurity trainings for veterinary practitioners and farmers?","authors":"Anna Maria Iatrou ,&nbsp;Blerta Mehmedi Kastrati ,&nbsp;Rreze M. Gecaj ,&nbsp;Georgios Batikas ,&nbsp;Jarkko K. Niemi ,&nbsp;Claude Saegerman ,&nbsp;Alberto Oscar Allepuz ,&nbsp;Wiebke Jansen ,&nbsp;Nancy De Briyne ,&nbsp;Daniele De Meneghi ,&nbsp;Murat Yılmaz ,&nbsp;Evelien Biebaut ,&nbsp;Ramazan Yildiz ,&nbsp;Marco De Nardi ,&nbsp;Carla Correia-Gomes ,&nbsp;Tarmo Niine","doi":"10.1016/j.jobb.2025.06.003","DOIUrl":"10.1016/j.jobb.2025.06.003","url":null,"abstract":"<div><div>Effective biosecurity training is essential for disease prevention in livestock systems; however, substantial gaps persist. We combined an online survey (74 fully completed questionnaires; 267 views) with two World Café workshops (∼60 participants) to map the current provision, competence levels, and training needs across Europe. Key findings: (i) self-rated biosecurity knowledge differed markedly between stakeholder groups and veterinarians and other stakeholders reported median scores close to 80/100; (ii) more than three-quarters of cattle (77 %) and 70 % of swine veterinarians perceived a major gap in their ability to demonstrate the economic benefits of biosecurity to clients; (iii) 39 – 44 % of cattle and small-ruminant veterinarians reported inadequate mixed (theory + practice) training formats, and up to 50 % of poultry veterinarians identified deficits in communication and behavior-change skills; (iv) across all discussions, participants favored modular, blended delivery that couples concise e-learning with on-farm coaching, supported by externally audited certification and greater farmer co-design. Therefore, recommendations focus on developing species-specific, flexible modules that embed communication and cost-benefit elements, provide micro-learning units for time-constrained farmers, and operate within a tiered certification framework linked to continuing professional development. Implementing these measures will narrow competence gaps, strengthen veterinarian–farmer engagement, and enhance disease preparedness throughout European livestock production.</div></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"7 2","pages":"Pages 91-106"},"PeriodicalIF":0.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144614700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeFi risk assessment: MakerDAO loan portfolio case DeFi风险评估:MakerDAO贷款组合案例
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100259
Ignat Melnikov , Irina Lebedeva , Artem Petrov , Yury Yanovich
Decentralized finance (DeFi) is a rapidly evolving blockchain technology that offers a new perspective on financial services through Web3 applications. DeFi offers developers the flexibility to create financial services using smart contracts, leading to a lack of standardized protocols and challenges in applying traditional finance models for risk assessment, especially in the early stages of adoption. The Maker protocol is a prominent DeFi platform known for its diverse functionalities, including loan services. This study focuses on analyzing the risk associated with Maker's loan portfolio by developing a risk model based on multiple Brownian motions and passage levels, with Brownian motions representing different collateral types and passage levels representing users' collateralization ratios. Through numerical experiments using artificial and real data, we evaluate the model's effectiveness in assessing risk within the loan portfolio. While our findings demonstrate the model's potential for assessing risk within a single DeFi project, it is important to acknowledge that the model's assumptions may not be fully applicable to real-world data. This research underscores the importance of developing project-specific risk assessment models for individual DeFi projects and encourages further exploration of other DeFi protocols.
去中心化金融(DeFi)是一种快速发展的区块链技术,它通过Web3应用程序为金融服务提供了新的视角。DeFi为开发人员提供了使用智能合约创建金融服务的灵活性,导致缺乏标准化协议,并且在应用传统金融模型进行风险评估方面存在挑战,特别是在采用的早期阶段。Maker协议是一个著名的DeFi平台,以其多种功能而闻名,包括贷款服务。本研究重点分析了Maker贷款组合的风险,建立了基于多个布朗运动和通道水平的风险模型,其中布朗运动代表不同的抵押品类型,通道水平代表用户的抵押比率。通过使用人工数据和真实数据的数值实验,我们评估了该模型在评估贷款组合风险方面的有效性。虽然我们的研究结果证明了该模型在单个DeFi项目中评估风险的潜力,但重要的是要承认该模型的假设可能并不完全适用于现实世界的数据。本研究强调了为单个DeFi项目开发特定于项目的风险评估模型的重要性,并鼓励进一步探索其他DeFi协议。
{"title":"DeFi risk assessment: MakerDAO loan portfolio case","authors":"Ignat Melnikov ,&nbsp;Irina Lebedeva ,&nbsp;Artem Petrov ,&nbsp;Yury Yanovich","doi":"10.1016/j.bcra.2024.100259","DOIUrl":"10.1016/j.bcra.2024.100259","url":null,"abstract":"<div><div>Decentralized finance (DeFi) is a rapidly evolving blockchain technology that offers a new perspective on financial services through Web3 applications. DeFi offers developers the flexibility to create financial services using smart contracts, leading to a lack of standardized protocols and challenges in applying traditional finance models for risk assessment, especially in the early stages of adoption. The Maker protocol is a prominent DeFi platform known for its diverse functionalities, including loan services. This study focuses on analyzing the risk associated with Maker's loan portfolio by developing a risk model based on multiple Brownian motions and passage levels, with Brownian motions representing different collateral types and passage levels representing users' collateralization ratios. Through numerical experiments using artificial and real data, we evaluate the model's effectiveness in assessing risk within the loan portfolio. While our findings demonstrate the model's potential for assessing risk within a single DeFi project, it is important to acknowledge that the model's assumptions may not be fully applicable to real-world data. This research underscores the importance of developing project-specific risk assessment models for individual DeFi projects and encourages further exploration of other DeFi protocols.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100259"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144190436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Atomic and privacy-preserving cyclic cross-chain protocol based on chameleon hash function 基于变色龙哈希函数的原子和隐私保护循环交叉链协议
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100262
Mengyan Li, Maoning Wang, Meijiao Duan
Blockchain-based digital assets have increasingly emerged in recent years, necessitating cross-chain swaps. Hash Time-Lock Contract (HTLC) is a widely used protocol for such swaps; however, simple hash time locks can allow attackers to analyze transaction paths, thereby causing privacy breaches and financial loss to users in some sensitive scenarios. To prevent payment path leakage, a privacy-preserving cyclic cross-chain protocol is proposed herein. This protocol primarily uses the Chameleon Hash (CH) protocol to obscure the correlation between users in the path, ensuring the privacy of cross-chain swaps. The protocol is divided into pre-swap, commit, and decommit phases. The pre-swap phase is firstly executed to determine the swap order. Then, users ensure atomicity via serial asset locking in the commit phase, and each receiver obtains swap assets from the corresponding sender via CH collision in the decommit phase. The security proof under the Universally Composable (UC) system demonstrates the correctness and usability of the protocol. In summary, the entire protocol ensures the atomicity and privacy of cross-chain swaps, providing a new principle and method to solve the privacy leakage problem caused by transaction path analysis.
近年来,基于区块链的数字资产越来越多,需要跨链交换。哈希时间锁合约(HTLC)是一种广泛使用的交换协议;但是,简单的散列时间锁可以允许攻击者分析事务路径,从而在某些敏感场景中给用户造成隐私泄露和经济损失。为了防止支付路径泄露,本文提出了一种保护隐私的循环跨链协议。该协议主要使用变色龙哈希(Chameleon Hash, CH)协议来模糊路径中用户之间的相关性,确保跨链交换的隐私性。该协议分为预交换、提交和解除提交阶段。首先执行预交换阶段以确定交换顺序。然后,用户在提交阶段通过串行资产锁定确保原子性,每个接收方在解提交阶段通过CH碰撞从相应的发送方获得交换资产。通用可组合(UC)系统下的安全性证明证明了该协议的正确性和可用性。综上所述,整个协议保证了跨链交换的原子性和隐私性,为解决交易路径分析带来的隐私泄露问题提供了新的原理和方法。
{"title":"Atomic and privacy-preserving cyclic cross-chain protocol based on chameleon hash function","authors":"Mengyan Li,&nbsp;Maoning Wang,&nbsp;Meijiao Duan","doi":"10.1016/j.bcra.2024.100262","DOIUrl":"10.1016/j.bcra.2024.100262","url":null,"abstract":"<div><div>Blockchain-based digital assets have increasingly emerged in recent years, necessitating cross-chain swaps. Hash Time-Lock Contract (HTLC) is a widely used protocol for such swaps; however, simple hash time locks can allow attackers to analyze transaction paths, thereby causing privacy breaches and financial loss to users in some sensitive scenarios. To prevent payment path leakage, a privacy-preserving cyclic cross-chain protocol is proposed herein. This protocol primarily uses the Chameleon Hash (CH) protocol to obscure the correlation between users in the path, ensuring the privacy of cross-chain swaps. The protocol is divided into pre-swap, commit, and decommit phases. The pre-swap phase is firstly executed to determine the swap order. Then, users ensure atomicity via serial asset locking in the commit phase, and each receiver obtains swap assets from the corresponding sender via CH collision in the decommit phase. The security proof under the Universally Composable (UC) system demonstrates the correctness and usability of the protocol. In summary, the entire protocol ensures the atomicity and privacy of cross-chain swaps, providing a new principle and method to solve the privacy leakage problem caused by transaction path analysis.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100262"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144307954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meta reinforcement learning based dynamic tuning for blockchain systems in diverse network environments 基于元强化学习的区块链系统在不同网络环境下的动态调谐
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100261
Yue Pei , Mengxiao Zhu , Chen Zhu , Weihu Song , Yi Sun , Lei Li , Haogang Zhu
The evolution of blockchain technology across various areas has highlighted the importance of optimizing blockchain systems' performance, especially in fluctuating network bandwidth conditions. We observe that the performance of blockchain systems exhibits variations, and the optimal parameter configuration shifts accordingly when changes in network bandwidth occur. Current methods in blockchain optimization require establishing fixed mappings between various environments and their optimal parameters. However, this process exhibits poor sample efficiency and lacks the ability for fast adaptation to novel bandwidth environments. In this paper, we propose MetaTune, a meta-Reinforcement-Learning (meta-RL)-based dynamic tuning method for blockchain systems. MetaTune can quickly adapt to unknown bandwidth changes and automatically configure optimized parameters. Through empirical evaluations of a real-world blockchain system, ChainMaker, we demonstrate that MetaTune significantly reduces the training samples needed for generalization across different bandwidth environments compared to non-adaptive methods. Our findings suggest that MetaTune offers a promising approach for efficiently optimizing blockchain systems in dynamic network environments.
区块链技术在各个领域的发展突出了优化区块链系统性能的重要性,特别是在波动的网络带宽条件下。我们观察到区块链系统的性能表现出变化,当网络带宽发生变化时,最优参数配置也会发生相应的变化。目前区块链优化方法需要在各种环境及其最优参数之间建立固定的映射关系。然而,该方法的采样效率较差,缺乏对新带宽环境的快速适应能力。在本文中,我们提出了一种基于元强化学习(meta-RL)的区块链系统动态调谐方法MetaTune。MetaTune可以快速适应未知的带宽变化,自动配置优化参数。通过对现实世界的区块链系统ChainMaker的经验评估,我们证明了与非自适应方法相比,MetaTune显着减少了在不同带宽环境下泛化所需的训练样本。我们的研究结果表明,MetaTune为在动态网络环境中有效优化区块链系统提供了一种有前途的方法。
{"title":"Meta reinforcement learning based dynamic tuning for blockchain systems in diverse network environments","authors":"Yue Pei ,&nbsp;Mengxiao Zhu ,&nbsp;Chen Zhu ,&nbsp;Weihu Song ,&nbsp;Yi Sun ,&nbsp;Lei Li ,&nbsp;Haogang Zhu","doi":"10.1016/j.bcra.2024.100261","DOIUrl":"10.1016/j.bcra.2024.100261","url":null,"abstract":"<div><div>The evolution of blockchain technology across various areas has highlighted the importance of optimizing blockchain systems' performance, especially in fluctuating network bandwidth conditions. We observe that the performance of blockchain systems exhibits variations, and the optimal parameter configuration shifts accordingly when changes in network bandwidth occur. Current methods in blockchain optimization require establishing fixed mappings between various environments and their optimal parameters. However, this process exhibits poor sample efficiency and lacks the ability for fast adaptation to novel bandwidth environments. In this paper, we propose MetaTune, a meta-Reinforcement-Learning (meta-RL)-based dynamic tuning method for blockchain systems. MetaTune can quickly adapt to unknown bandwidth changes and automatically configure optimized parameters. Through empirical evaluations of a real-world blockchain system, ChainMaker, we demonstrate that MetaTune significantly reduces the training samples needed for generalization across different bandwidth environments compared to non-adaptive methods. Our findings suggest that MetaTune offers a promising approach for efficiently optimizing blockchain systems in dynamic network environments.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100261"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144338980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: On the security of non-fungible tokens SoK:关于不可替代代币的安全性
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100268
Kai Ma , Jintao Huang , Ningyu He , Zhuo Wang , Haoyu Wang
Non-Fungible Tokens (NFTs) drive the prosperity of the Web3 ecosystem. By May 2024, the total market value of NFT projects reached approximately $69 billion. Accompanying the success of NFTs are various security issues, i.e., attacks and scams are prevalent in the ecosystem. While NFTs have attracted significant attention from both industry and academia, there is a lack of understanding of the kinds of NFT security issues. The discovery, in-depth analysis, and systematic categorization of these security issues are of significant importance for the prosperous development of the NFT ecosystem. To fill this gap, we perform a systematic literature review related to NFT security and identify 176 incidents from 248 security reports and 35 academic papers until May 1st, 2024. Through manual analysis of the compiled security incidents, we classify them into 12 major categories. Then, we explore potential solutions and mitigation strategies. Drawing from these analyses, we establish the first NFT security reference frame. In addition, we extract the characteristics of NFT security issues, i.e., the prevalence, severity, and intractability. We highlight the gap between industry and academia for NFT security and provide further research directions for the community. This paper, as the first Systematization of Knowledge (SoK) of NFT security, systematically explores security issues within the NFT ecosystem, shedding light on their root causes, real-world attacks, and potential ways to address them. Our findings will contribute to future research on NFT security.
不可替代代币(nft)推动了Web3生态系统的繁荣。到2024年5月,NFT项目的总市值达到约690亿美元。伴随着nft的成功而来的是各种安全问题,即攻击和诈骗在生态系统中普遍存在。虽然NFT已经引起了工业界和学术界的极大关注,但人们对NFT安全问题的种类缺乏了解。这些安全问题的发现、深入分析和系统分类对NFT生态系统的繁荣发展具有重要意义。为了填补这一空白,我们进行了与NFT安全相关的系统文献综述,并从248份安全报告和35篇学术论文中确定了176起事件,直至2024年5月1日。通过手工分析已编译的安全事件,我们将其分为12大类。然后,我们探讨了潜在的解决方案和缓解策略。根据这些分析,我们建立了第一个NFT安全参考框架。此外,我们还提取了NFT安全问题的特征,即普遍性、严重性和难治性。我们强调了工业界和学术界在NFT安全方面的差距,并为社区提供了进一步的研究方向。本文作为NFT安全的第一个系统化知识(SoK),系统地探讨了NFT生态系统中的安全问题,揭示了它们的根本原因、现实世界的攻击以及解决它们的潜在方法。我们的研究结果将有助于对NFT安全性的进一步研究。
{"title":"SoK: On the security of non-fungible tokens","authors":"Kai Ma ,&nbsp;Jintao Huang ,&nbsp;Ningyu He ,&nbsp;Zhuo Wang ,&nbsp;Haoyu Wang","doi":"10.1016/j.bcra.2024.100268","DOIUrl":"10.1016/j.bcra.2024.100268","url":null,"abstract":"<div><div>Non-Fungible Tokens (NFTs) drive the prosperity of the Web3 ecosystem. By May 2024, the total market value of NFT projects reached approximately $69 billion. Accompanying the success of NFTs are various security issues, i.e., attacks and scams are prevalent in the ecosystem. While NFTs have attracted significant attention from both industry and academia, there is a lack of understanding of the kinds of NFT security issues. The discovery, in-depth analysis, and systematic categorization of these security issues are of significant importance for the prosperous development of the NFT ecosystem. To fill this gap, we perform a systematic literature review related to NFT security and identify 176 incidents from 248 security reports and 35 academic papers until May 1st, 2024. Through manual analysis of the compiled security incidents, we classify them into 12 major categories. Then, we explore potential solutions and mitigation strategies. Drawing from these analyses, we establish the first NFT security reference frame. In addition, we extract the characteristics of NFT security issues, i.e., the prevalence, severity, and intractability. We highlight the gap between industry and academia for NFT security and provide further research directions for the community. This paper, as the first Systematization of Knowledge (SoK) of NFT security, systematically explores security issues within the NFT ecosystem, shedding light on their root causes, real-world attacks, and potential ways to address them. Our findings will contribute to future research on NFT security.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100268"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144470084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 科技通报 计算机与应用化学 电子工业专用设备 河北工业科技 Journal of Applied Sciences 中国科学技术大学学报 印制电路信息 Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 南京邮电大学学报(自然科学版) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 华南理工大学学报(自然科学版) 中国图象图形学报 雷达学报 信息与控制 数据采集与处理 机器人 西北工业大学学报 High Technology Letters Journal of Cybersecurity 中国科学:信息科学 Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art 清华大学学报(自然科学版) 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 信息通信技术 数据分析和信息处理(英文)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1