首页 > 最新文献

IET Blockchain最新文献

英文 中文
Ponzi scheme detection in smart contracts using the integration of deep learning and formal verification 利用深度学习与形式验证的结合检测智能合约中的庞氏骗局
Pub Date : 2023-12-27 DOI: 10.1049/blc2.12056
Shibao Chen, Fei Li

Blockchain smart contracts are codes that can execute and enforce rules for blockchain digital transactions. However, smart contracts may contain numerous subtle vulnerabilities, among which Ponzi vulnerabilities are notable. Existing Ponzi scheme contract detection approaches often rely on machine learning models trained on manually extracted features to achieve satisfactory classification results. Nonetheless, the code of a smart contract potentially harbours elusive semantics and characteristics, which compromises the precision and accuracy of vulnerability detection. Therefore, this paper proposes a method of converting operation codes into sequences to process data to avoid losing unnecessary important information, and uses a one-dimensional convolutional neural network combined with formal verification. This method is named PZ-C1DZ3(Ponzi-Conv1D-Z3) and is used for Ponzi scheme detection. Four types of machine learning models, namely Conv1D, Conv1D-LSTM, Conv1D-MLP, and Conv1D-transformer, are employed for improvement and comparative validation experiments. Additionally, formal verification tool Z3 solver is utilized to conduct formal security verification on the final model, ensuring its safety. Experimental results demonstrate that the improved Conv1D model outperforms other existing models in terms of detection efficiency and accuracy while also meeting the requirements of formal security verification.

区块链智能合约是可以执行和实施区块链数字交易规则的代码。然而,智能合约可能包含许多微妙的漏洞,其中庞氏骗局漏洞尤为突出。现有的庞氏骗局合约检测方法通常依赖于人工提取特征训练的机器学习模型,以获得令人满意的分类结果。然而,智能合约的代码可能隐藏着难以捉摸的语义和特征,这就影响了漏洞检测的精度和准确性。因此,本文提出了一种将操作码转换成序列来处理数据的方法,以避免丢失不必要的重要信息,并使用一维卷积神经网络结合形式验证。该方法被命名为 PZ-C1DZ3(Ponzi-Conv1D-Z3),用于庞氏骗局检测。在改进和比较验证实验中,采用了四种机器学习模型,即 Conv1D、Conv1D-LSTM、Conv1D-MLP 和 Conv1D-transformer。此外,还利用形式验证工具 Z3 求解器对最终模型进行形式安全验证,确保其安全性。实验结果表明,改进后的 Conv1D 模型在检测效率和准确性方面优于其他现有模型,同时也满足形式安全验证的要求。
{"title":"Ponzi scheme detection in smart contracts using the integration of deep learning and formal verification","authors":"Shibao Chen,&nbsp;Fei Li","doi":"10.1049/blc2.12056","DOIUrl":"10.1049/blc2.12056","url":null,"abstract":"<p>Blockchain smart contracts are codes that can execute and enforce rules for blockchain digital transactions. However, smart contracts may contain numerous subtle vulnerabilities, among which Ponzi vulnerabilities are notable. Existing Ponzi scheme contract detection approaches often rely on machine learning models trained on manually extracted features to achieve satisfactory classification results. Nonetheless, the code of a smart contract potentially harbours elusive semantics and characteristics, which compromises the precision and accuracy of vulnerability detection. Therefore, this paper proposes a method of converting operation codes into sequences to process data to avoid losing unnecessary important information, and uses a one-dimensional convolutional neural network combined with formal verification. This method is named PZ-C1DZ3(Ponzi-Conv1D-Z3) and is used for Ponzi scheme detection. Four types of machine learning models, namely Conv1D, Conv1D-LSTM, Conv1D-MLP, and Conv1D-transformer, are employed for improvement and comparative validation experiments. Additionally, formal verification tool Z3 solver is utilized to conduct formal security verification on the final model, ensuring its safety. Experimental results demonstrate that the improved Conv1D model outperforms other existing models in terms of detection efficiency and accuracy while also meeting the requirements of formal security verification.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"185-196"},"PeriodicalIF":0.0,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141251517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QIoTChain: Quantum IoT-blockchain fusion for advanced data protection in Industry 4.0 QIoTChain:量子物联网-区块链融合,为工业 4.0 提供先进的数据保护
Pub Date : 2023-11-17 DOI: 10.1049/blc2.12059
Aditya Kumar Sharma, Mritunjay Shall Peelam, Brijesh Kumar Chauasia, Vinay Chamola

The modern world has its foundation built on data. Data is generated all the time, and many aspects of the society and economy are built upon it. In today's world, data is employed in better decision-making, innovation, and improving the efficiency of systems. It becomes essential to protect it from being tampered with or misused. Encryptions based on cryptographic systems are used in mainstream data protection these days. There have been newer iterations of mechanisms based on new techniques using blockchain and the zero trust model and even systems that employ fog computing along with content delivery networks. The advent of computation through quantum technologies also helped in developing data security with post-quantum mechanisms. The critical conditions for the working of these mechanisms hinder their adoption primarily. This also leads current systems to lack one or more of these technologies. Thus, the importance of a unified system that can employ quantum technologies effectively becomes prominent and requires a definitive investigation. In this article, a Quantum-IoT-based data protection scheme that can be of value to Industry 4.0 is analyzed. Light is also shed on innovations in quantum computing that can help solve not just current problems but also the future.

现代世界的基础是数据。数据无时无刻不在产生,社会和经济的许多方面都建立在数据之上。在当今世界,数据被用于更好的决策、创新和提高系统效率。保护数据不被篡改或滥用变得至关重要。如今,基于加密系统的加密技术已成为数据保护的主流。基于使用区块链和零信任模型的新技术,甚至是采用雾计算和内容交付网络的系统,已经有了更新的迭代机制。量子技术计算的出现也有助于利用后量子机制发展数据安全。这些机制工作的关键条件主要阻碍了它们的采用。这也导致当前的系统缺乏其中一种或多种技术。因此,建立一个能有效利用量子技术的统一系统就变得尤为重要,需要进行明确的研究。本文分析了一种基于量子物联网的数据保护方案,该方案可为工业 4.0 带来价值。此外,本文还介绍了量子计算的创新,这些创新不仅有助于解决当前的问题,还有助于解决未来的问题。
{"title":"QIoTChain: Quantum IoT-blockchain fusion for advanced data protection in Industry 4.0","authors":"Aditya Kumar Sharma,&nbsp;Mritunjay Shall Peelam,&nbsp;Brijesh Kumar Chauasia,&nbsp;Vinay Chamola","doi":"10.1049/blc2.12059","DOIUrl":"10.1049/blc2.12059","url":null,"abstract":"<p>The modern world has its foundation built on data. Data is generated all the time, and many aspects of the society and economy are built upon it. In today's world, data is employed in better decision-making, innovation, and improving the efficiency of systems. It becomes essential to protect it from being tampered with or misused. Encryptions based on cryptographic systems are used in mainstream data protection these days. There have been newer iterations of mechanisms based on new techniques using blockchain and the zero trust model and even systems that employ fog computing along with content delivery networks. The advent of computation through quantum technologies also helped in developing data security with post-quantum mechanisms. The critical conditions for the working of these mechanisms hinder their adoption primarily. This also leads current systems to lack one or more of these technologies. Thus, the importance of a unified system that can employ quantum technologies effectively becomes prominent and requires a definitive investigation. In this article, a Quantum-IoT-based data protection scheme that can be of value to Industry 4.0 is analyzed. Light is also shed on innovations in quantum computing that can help solve not just current problems but also the future.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"252-262"},"PeriodicalIF":0.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142160203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-fungible token-based health record marketplace 基于令牌的非传染性健康记录市场
Pub Date : 2023-11-13 DOI: 10.1049/blc2.12057
Valli S Kumar, John J. Lee, Qin Hu

With an increasing affinity towards patient-centric care, sharing real-time sensitive data for collaboration between multiple parties with finer access control becomes critical. Most existing studies based on the blockchain technology in the medical field discuss various application scenarios and security aspects, without focusing on data ownership, secure data sharing, or finer access control. In this work, a non-fungible token (NFT)-based system is proposed to implement a health record marketplace. The system leverages the NFT technology to provide dual ownership along with finer access control and efficiency in data sharing. The advantage of permissioned blockchain along with InterPlanetary File System (IPFS) are taken for off-chain data storage to improve security and efficiency. Because price determination is critical in the market, Stackelberg game theory is utilized to determine pricing strategies for both data owners and consumers. Also, to efficiently achieve finer access control, a popularity-based adaptive NFT management scheme using reinforcement learning is proposed. Simulation experiments are carried out to demonstrate accuracy and efficiency of our proposed schemes.

随着以患者为中心的护理理念日益深入人心,多方协作共享实时敏感数据并进行更精细的访问控制变得至关重要。大多数基于区块链技术在医疗领域的现有研究都讨论了各种应用场景和安全方面,但没有关注数据所有权、安全数据共享或更精细的访问控制。在这项工作中,提出了一种基于不可篡改令牌(NFT)的系统,以实现健康记录市场。该系统利用 NFT 技术提供双重所有权以及更精细的访问控制和数据共享效率。允许的区块链和跨专有文件系统(IPFS)的优势被用于链外数据存储,以提高安全性和效率。由于价格决定在市场中至关重要,因此利用斯塔克尔伯格博弈论来确定数据所有者和消费者的定价策略。此外,为了有效实现更精细的访问控制,还提出了一种利用强化学习的基于流行度的自适应 NFT 管理方案。仿真实验证明了我们所提方案的准确性和效率。
{"title":"Non-fungible token-based health record marketplace","authors":"Valli S Kumar,&nbsp;John J. Lee,&nbsp;Qin Hu","doi":"10.1049/blc2.12057","DOIUrl":"10.1049/blc2.12057","url":null,"abstract":"<p>With an increasing affinity towards patient-centric care, sharing real-time sensitive data for collaboration between multiple parties with finer access control becomes critical. Most existing studies based on the blockchain technology in the medical field discuss various application scenarios and security aspects, without focusing on data ownership, secure data sharing, or finer access control. In this work, a non-fungible token (NFT)-based system is proposed to implement a health record marketplace. The system leverages the NFT technology to provide dual ownership along with finer access control and efficiency in data sharing. The advantage of permissioned blockchain along with InterPlanetary File System (IPFS) are taken for off-chain data storage to improve security and efficiency. Because price determination is critical in the market, Stackelberg game theory is utilized to determine pricing strategies for both data owners and consumers. Also, to efficiently achieve finer access control, a popularity-based adaptive NFT management scheme using reinforcement learning is proposed. Simulation experiments are carried out to demonstrate accuracy and efficiency of our proposed schemes.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"169-184"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain privacy: Fundamental aspects and challenges for the future Internet data sharing 区块链隐私:未来互联网数据共享的基本方面和挑战
Pub Date : 2023-11-08 DOI: 10.1049/blc2.12058
Nikolaos Kapsoulis, Alexandros Psychas, Antonios Litke, Theodora Varvarigou

Privacy concerns the majority of individuals, governments, and organizations that share data over dissimilar networks of nodes. Every kind of participant requires awareness of the data journey that unfolds inside a blockchain network with its own trustworthy rules of data management and accessibility. This paper provides a methodological approach on privacy for data sharing within blockchain environments. Specific technological aspects of blockchains that relate to on-chain privacy such as network nature, party join, smart contracts, blockchain states, transactions, and ledger flows, are analysed with respect to the involvement and impact of privacy in distributed ledgers. A high-level architectural approach is suggested that is intended to address significant privacy concerns on data sharing among different kinds of users in the context of blockchain networks deployment and the broader Web 3.0 ecosystem building. Simultaneously, many pertinent challenges are discussed regarding network nature, configurable privacy, ownership, confidentiality, secured computation, and data monetization that appear in the field and ought to be carefully tackled for the future mass adoption of privacy-matured distributed ledgers that interconnect delivering the future Internet.

隐私问题关系到通过不同节点网络共享数据的大多数个人、政府和组织。每种参与者都需要了解在区块链网络中展开的数据之旅,该网络有自己值得信赖的数据管理和访问规则。本文为区块链环境下的数据共享隐私提供了一种方法论。本文分析了区块链与链上隐私有关的具体技术方面,如网络性质、加入方、智能合约、区块链状态、交易和分类账流,以及隐私在分布式分类账中的参与和影响。提出了一种高级架构方法,旨在解决区块链网络部署和更广泛的 Web 3.0 生态系统建设背景下不同类型用户之间数据共享的重大隐私问题。同时,还讨论了网络性质、可配置的隐私、所有权、保密性、安全计算和数据货币化等方面的许多相关挑战,这些挑战出现在该领域,必须认真应对,才能在未来大规模采用隐私成熟的分布式账本,实现与未来互联网的互联。
{"title":"Blockchain privacy: Fundamental aspects and challenges for the future Internet data sharing","authors":"Nikolaos Kapsoulis,&nbsp;Alexandros Psychas,&nbsp;Antonios Litke,&nbsp;Theodora Varvarigou","doi":"10.1049/blc2.12058","DOIUrl":"10.1049/blc2.12058","url":null,"abstract":"<p>Privacy concerns the majority of individuals, governments, and organizations that share data over dissimilar networks of nodes. Every kind of participant requires awareness of the data journey that unfolds inside a blockchain network with its own trustworthy rules of data management and accessibility. This paper provides a methodological approach on privacy for data sharing within blockchain environments. Specific technological aspects of blockchains that relate to on-chain privacy such as network nature, party join, smart contracts, blockchain states, transactions, and ledger flows, are analysed with respect to the involvement and impact of privacy in distributed ledgers. A high-level architectural approach is suggested that is intended to address significant privacy concerns on data sharing among different kinds of users in the context of blockchain networks deployment and the broader Web 3.0 ecosystem building. Simultaneously, many pertinent challenges are discussed regarding network nature, configurable privacy, ownership, confidentiality, secured computation, and data monetization that appear in the field and ought to be carefully tackled for the future mass adoption of privacy-matured distributed ledgers that interconnect delivering the future Internet.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"152-168"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135393308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering young learners to explore blockchain with user-friendly tools: a method using Google Blockly and NFTs 让年轻学习者用用户友好的工具探索谷歌:使用谷歌block和nft的方法
Pub Date : 2023-11-07 DOI: 10.1049/blc2.12055
Yun-Cheng Tsai, Jiun-Yu Huang, Da-Ru Chiou

This paper presents a novel architecture utilizing blockchain technology to enhance educational systems. A method is proposed that empowers non-fungible tokens by updating their metadata through an API layer, making blockchain technology more accessible to K-12 students. Leveraging Google Blockly, a visual programming language, the aim is to engage students in computational thinking and foster their understanding of blockchain concepts. The approach promotes student engagement, facilitates the comprehension of digital ownership and value, and develops essential skills for the digital age. Through the method, the contribution is in the advancing of blockchain in education. The demo video can be seen using the following link, https://youtu.be/ZPVKgWtSb6U.

本文提出了一种利用区块链技术增强教育系统的新架构。提出了一种通过API层更新元数据来授权不可替代令牌的方法,使K-12学生更容易使用区块链技术。利用谷歌Blockly,一种可视化编程语言,目的是让学生参与计算思维,培养他们对谷歌概念的理解。这种方法促进了学生的参与,促进了对数字所有权和价值的理解,并培养了数字时代的基本技能。通过这种方法,对区块链在教育中的推进做出了贡献。演示视频可以通过以下链接https://youtu.be/ZPVKgWtSb6U观看。
{"title":"Empowering young learners to explore blockchain with user-friendly tools: a method using Google Blockly and NFTs","authors":"Yun-Cheng Tsai,&nbsp;Jiun-Yu Huang,&nbsp;Da-Ru Chiou","doi":"10.1049/blc2.12055","DOIUrl":"10.1049/blc2.12055","url":null,"abstract":"<p>This paper presents a novel architecture utilizing blockchain technology to enhance educational systems. A method is proposed that empowers non-fungible tokens by updating their metadata through an API layer, making blockchain technology more accessible to K-12 students. Leveraging Google Blockly, a visual programming language, the aim is to engage students in computational thinking and foster their understanding of blockchain concepts. The approach promotes student engagement, facilitates the comprehension of digital ownership and value, and develops essential skills for the digital age. Through the method, the contribution is in the advancing of blockchain in education. The demo video can be seen using the following link, https://youtu.be/ZPVKgWtSb6U.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"324-334"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135540130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain 基于区块链的安全弹性无人机群网络
Pub Date : 2023-10-28 DOI: 10.1049/blc2.12050
Xin Zhou, Lin Yang, Linru MA, Huasen He

Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi-party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an adaptive networking mechanism for UAVs based on blockchain technology, which incorporates three key technologies. Utilizing Global Unique Identifier (GUID) and block storage, UAVs can achieve rapid identity authentication and efficient swarm switching. By evaluating node participation in block consensus, malicious nodes within the UAV swarm can be accurately identified. Additionally, routing learning based on node security attributes and link quality ensures secure and efficient data transmission. Simulation test results demonstrate the practicality and applicability of the proposed blockchain-based adaptive networking mechanism for UAV swarm networks.

区块链作为一种新兴技术,在解决多方合作中的信任问题方面有多种应用。无人机(UAV)群网络领域也不例外,因为无人机由于计算和存储资源有限,容易受到恶意对手的攻击。本文提出了一种基于区块链技术的无人机自适应组网机制,该机制融合了三个关键技术。利用全局唯一标识符(GUID)和块存储技术,无人机可以实现快速的身份认证和高效的群交换。通过评估节点在区块共识中的参与度,可以准确识别出无人机群中的恶意节点。此外,基于节点安全属性和链路质量的路由学习,保证了数据的安全高效传输。仿真测试结果验证了所提出的基于区块链的无人机群网络自适应组网机制的实用性和适用性。
{"title":"Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain","authors":"Xin Zhou,&nbsp;Lin Yang,&nbsp;Linru MA,&nbsp;Huasen He","doi":"10.1049/blc2.12050","DOIUrl":"10.1049/blc2.12050","url":null,"abstract":"<p>Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi-party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an adaptive networking mechanism for UAVs based on blockchain technology, which incorporates three key technologies. Utilizing Global Unique Identifier (GUID) and block storage, UAVs can achieve rapid identity authentication and efficient swarm switching. By evaluating node participation in block consensus, malicious nodes within the UAV swarm can be accurately identified. Additionally, routing learning based on node security attributes and link quality ensures secure and efficient data transmission. Simulation test results demonstrate the practicality and applicability of the proposed blockchain-based adaptive networking mechanism for UAV swarm networks.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"483-493"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136233187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized federated learning via directed acyclic graph based blockchain 通过基于有向无环图的区块链实现个性化联合学习
Pub Date : 2023-10-25 DOI: 10.1049/blc2.12054
Chenglong Huang, Erwu Liu, Rui Wang, Yan Liu, Hanfu Zhang, Yuanzhe Geng, Jie Wang, Shaoyi Han

Common federated learning (FL) lacks consideration of clients' personalized requirements, which performs poorly for the scenario with data and resource heterogeneity. In order to overcome the challenge of heterogeneous characteristics, this letter proposes a novel decentralized personalized federated learning (PFL) architecture that first utilizes a directed acyclic graph (DAG) blockchain technology to achieve PFL efficiently, which is called PFLDAG. Simulation results demonstrate that PFLDAG approximately improves accuracy by 80% compared with the classic Google FedAvg algorithm, and by 10% compared with IFCA cluster PFL which considers personalized requirements. In addition, the approach also substantially improves the convergence speed.

普通的联合学习(FL)缺乏对客户个性化需求的考虑,在数据和资源异构的场景下表现不佳。为了克服异构特性带来的挑战,本文提出了一种新颖的去中心化个性化联合学习(PFL)架构,首先利用有向无环图(DAG)区块链技术来高效实现PFL,即PFLDAG。仿真结果表明,与经典的谷歌 FedAvg 算法相比,PFLDAG 的准确率提高了约 80%,与考虑了个性化需求的 IFCA 集群 PFL 相比,准确率提高了 10%。此外,该方法还大大提高了收敛速度。
{"title":"Personalized federated learning via directed acyclic graph based blockchain","authors":"Chenglong Huang,&nbsp;Erwu Liu,&nbsp;Rui Wang,&nbsp;Yan Liu,&nbsp;Hanfu Zhang,&nbsp;Yuanzhe Geng,&nbsp;Jie Wang,&nbsp;Shaoyi Han","doi":"10.1049/blc2.12054","DOIUrl":"10.1049/blc2.12054","url":null,"abstract":"<p>Common federated learning (FL) lacks consideration of clients' personalized requirements, which performs poorly for the scenario with data and resource heterogeneity. In order to overcome the challenge of heterogeneous characteristics, this letter proposes a novel decentralized personalized federated learning (PFL) architecture that first utilizes a directed acyclic graph (DAG) blockchain technology to achieve PFL efficiently, which is called PFLDAG. Simulation results demonstrate that PFLDAG approximately improves accuracy by 80% compared with the classic Google FedAvg algorithm, and by 10% compared with IFCA cluster PFL which considers personalized requirements. In addition, the approach also substantially improves the convergence speed.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"73-82"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135218227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and privacy issues in blockchain and its applications 区块链及其应用中的安全和隐私问题
Pub Date : 2023-10-21 DOI: 10.1049/blc2.12051
Liangmin Wang, Victor S. Sheng, Boris Düdder, Haiqin Wu, Huijuan Zhu

Blockchain technology has emerged and evolved as a disruptive technology with the potential to be applied in various fields, including digital finance, healthcare, and the Internet of Things (IoT). Besides being a distributed ledger, blockchain enables decentralized and trusted storage/computation without relying on a central trusted party. However, the growing heterogeneity of blockchain platforms and the expanding range of applications have resulted in escalating security and privacy concerns. These concerns encompass persistent privacy breaches, vulnerabilities in smart contracts, and the “impossible triangle” problem. These challenges have emerged as the primary obstacles to the development and seamless integration of blockchain technology with industry applications.

To address the security and privacy challenges in blockchain platforms and its applications, numerous researchers have conducted extensive studies in this field by leveraging advanced technologies, including new cryptographic protocols and deep learning techniques. This special issue aims to highlight research perspectives, articles, and experimental studies pertaining to “Security and Privacy Issues in Blockchain and Its Applications”.

In this special issue, we received a total of 19 papers, out of which 17 underwent a rigorous peer-review process. However, two papers were excluded from the peer-reviewed selection because one was submitted in a draft form and the other was voluntarily withdrawn by the authors. Out of the 17 papers submitted for review, 10 were accepted for publication, six were rejected without being transferred, and one was rejected and referred to a transfer service. The exceptional quality of all the submissions played a crucial role in ensuring the success of this special issue.

These accepted papers can be classified into two categories, namely blockchain application security and cross-chain interaction security. The papers in the first category focus on analyzing and providing insights into the security of blockchain applications. Their objective is to keep readers informed about the latest trends, developments, challenges, and opportunities in blockchain application security. Moreover, significant research efforts have been dedicated to security analysis and detection in typical blockchain applications. The papers in this category are of Zhou et al., Grybniak et al., Lv et al., Li et al., Gong et al., Xiao et al. and Videira et al. These contributions further enhance our understanding and capability to safeguard blockchain applications from potential security threats. The second category of papers presents novel solutions that target the enhancement of security in cross-system interactions. These papers are of Feng et al., Xu et al. and Yu et al. By addressing the specific challenges associated with cross-system communication, these solutions contribute to the development of robust and secure blockchain networks. A brief presentation

区块链技术已经成为一种颠覆性技术,有可能应用于数字金融、医疗保健和物联网(IoT)等各个领域。除了作为分布式账本之外,区块链还可以在不依赖中央可信方的情况下实现分散和可信的存储/计算。然而,区块链平台日益增长的异质性和应用范围的扩大导致了安全和隐私问题的升级。这些担忧包括持续的隐私泄露、智能合约漏洞和“不可能三角”问题。这些挑战已成为区块链技术与行业应用开发和无缝集成的主要障碍。为了解决区块链平台及其应用中的安全和隐私挑战,许多研究人员利用先进技术,包括新的加密协议和深度学习技术,在这一领域进行了广泛的研究。本期特刊旨在突出与“区块链及其应用中的安全和隐私问题”相关的研究观点、文章和实验研究。在本期特刊中,我们共收到了19篇论文,其中17篇经过了严格的同行评议。然而,两篇论文被排除在同行评议的选择之外,因为一篇是以草稿形式提交的,另一篇是作者自愿撤回的。在17篇论文中,10篇论文被接受发表,6篇论文被拒绝,但没有转移,1篇论文被拒绝,并被转介到转移服务机构。所有投稿作品的卓越品质对确保本期特刊的成功发挥了至关重要的作用。这些被接受的论文可以分为两类,即区块链应用安全性和跨链交互安全性。第一类的论文侧重于分析和提供对区块链应用程序安全性的见解。他们的目标是让读者了解区块链应用安全的最新趋势、发展、挑战和机遇。此外,对典型区块链应用中的安全分析和检测也进行了大量的研究。该类论文有Zhou等人、Grybniak等人、Lv等人、Li等人、Gong等人、Xiao等人、Videira等人。这些贡献进一步增强了我们保护区块链应用免受潜在安全威胁的理解和能力。第二类论文提出了针对增强跨系统交互安全性的新颖解决方案。这些论文分别是Feng et al., Xu et al.和Yu et al.。通过解决与跨系统通信相关的具体挑战,这些解决方案有助于开发强大而安全的区块链网络。以下是特刊中每篇论文的简要介绍。Zhou等人提出了WASMOD,这是一个用于检测WebAssembly (Wasm)智能合约漏洞的原型系统。WASMOD结合了字节码检测、运行时验证和灰盒模糊测试技术来识别整数溢出和堆栈溢出漏洞。该工具有效应用于EOSIO区块链,成功检测出易受攻击的智能合约。Grybniak等人提出了“瀑布:Gozalandia”,这是一种基于权益证明方法的分布式协议。该协议在使用BlockDAG结构的网络中实现快速终局,经过验证的安全性和活跃性。通过采用交叉投票进行区块排序,该协议确保了快速共识和检测不诚实行为的能力。该协议假定存在一个协调网络,该网络保存有关已批准的订购的信息。这种协调网络可以显著增强安全性,从质的角度提高网络的同步性。通过负载测试,该协议已经证明了其处理每秒3200-3600个事务的吞吐量的能力,平均确认等待时间为20秒。Lv等人提出了一种基于图的嵌入分类方法,用于以太坊区块链上的网络钓鱼检测。该方法涉及使用从以太坊收集的交易记录构建多个子图,并引入Graph2Vec的修改版本,称为imgraph2vec。这种改进的方法旨在从子图中学习更多有意义的信息。为了识别网络钓鱼企图,使用了极限梯度增强(XGBoost)算法。Li等人介绍了BlockDetective,这是一个基于GCN的创新框架,采用学生-教师架构来识别欺诈性加密货币交易。 区块链技术已经成为一种颠覆性技术,有可能应用于数字金融、医疗保健和物联网(IoT)等各个领域。除了作为分布式账本之外,区块链还可以在不依赖中央可信方的情况下实现分散和可信的存储/计算。然而,区块链平台日益增长的异质性和应用范围的扩大导致了安全和隐私问题的升级。这些担忧包括持续的隐私泄露、智能合约漏洞和“不可能三角”问题。这些挑战已成为区块链技术与行业应用开发和无缝集成的主要障碍。为了解决区块链平台及其应用中的安全和隐私挑战,许多研究人员利用先进技术,包括新的加密协议和深度学习技术,在这一领域进行了广泛的研究。本期特刊旨在突出与“区块链及其应用中的安全和隐私问题”相关的研究观点、文章和实验研究。在本期特刊中,我们共收到了19篇论文,其中17篇经过了严格的同行评审。然而,两篇论文被排除在同行评议的选择之外,因为一篇是以草稿形式提交的,另一篇是作者自愿撤回的。在17篇论文中,有10篇论文被接受发表,6篇论文被拒绝,但没有转移,1篇论文被拒绝,并被转介到转移服务机构。所有投稿作品的卓越品质对确保本期特刊的成功发挥了至关重要的作用。这些被接受的论文可以分为两类,即区块链应用安全性和跨链交互安全性。第一类的论文侧重于分析和提供对区块链应用程序安全性的见解。他们的目标是让读者了解区块链应用安全的最新趋势、发展、挑战和机遇。此外,对典型区块链应用中的安全分析和检测也进行了大量的研究。该类论文有Zhou等人、Grybniak等人、Lv等人、Li等人、Gong等人、Xiao等人、Videira等人。这些贡献进一步增强了我们保护区块链应用免受潜在安全威胁的理解和能力。第二类论文提出了针对增强跨系统交互安全性的新颖解决方案。这些论文分别是Feng et al., Xu et al.和Yu et al.。通过解决与跨系统通信相关的具体挑战,这些解决方案有助于开发强大而安全的区块链网络。以下是特刊中每篇论文的简要介绍。Zhou等人提出了WASMOD,这是一个用于检测WebAssembly (Wasm)智能合约漏洞的原型系统。WASMOD结合了字节码检测、运行时验证和灰盒模糊测试技术来识别整数溢出和堆栈溢出漏洞。该工具有效应用于EOSIO区块链,成功检测出易受攻击的智能合约。Grybniak等人提出了“瀑布:Gozalandia”,这是一种基于权益证明方法的分布式协议。该协议在使用BlockDAG结构的网络中实现快速终局,经过验证的安全性和活跃性。通过采用交叉投票进行区块排序,该协议确保了快速共识和检测不诚实行为的能力。该协议假定存在一个协调网络,该网络保存有关已批准的订购的信息。这种协调网络可以显著增强安全性,从质的角度提高网络的同步性。通过负载测试,该协议已经证明了其处理每秒3200-3600个事务的吞吐量的能力,平均确认等待时间为20秒。Lv等人提出了一种基于图的嵌入分类方法,用于以太坊区块链上的网络钓鱼检测。该方法涉及使用从以太坊收集的交易记录构建多个子图,并引入Graph2Vec的修改版本,称为imgraph2vec。这种改进的方法旨在从子图中学习更多有意义的信息。为了识别网络钓鱼企图,使用了极限梯度增强(XGBoost)算法。Li等人介绍了BlockDetective,这是一个基于GCN的创新框架,采用学生-教师架构来识别欺诈性加密货币交易。 该框架结合了预训练和微调,使预训练模型(教师)能够有效地适应新的数据分布,提高预测性能。同时,训练一个轻量级模型(学生)来提供抽象和高级的信息。实验结果表明,BlockDetective优于最先进的方法。Gong等人提出了一种名为SCGformer的新方法,旨在检测智能合约中的漏洞。该方法结合了控制流图(CFG)和变压器模型的功能,提高了漏洞检测的准确性和有效性。SCGformer涉及使用智能合约的操作代码(opcodes)构建cfg。通过关注操
{"title":"Security and privacy issues in blockchain and its applications","authors":"Liangmin Wang,&nbsp;Victor S. Sheng,&nbsp;Boris Düdder,&nbsp;Haiqin Wu,&nbsp;Huijuan Zhu","doi":"10.1049/blc2.12051","DOIUrl":"10.1049/blc2.12051","url":null,"abstract":"<p>Blockchain technology has emerged and evolved as a disruptive technology with the potential to be applied in various fields, including digital finance, healthcare, and the Internet of Things (IoT). Besides being a distributed ledger, blockchain enables decentralized and trusted storage/computation without relying on a central trusted party. However, the growing heterogeneity of blockchain platforms and the expanding range of applications have resulted in escalating security and privacy concerns. These concerns encompass persistent privacy breaches, vulnerabilities in smart contracts, and the “impossible triangle” problem. These challenges have emerged as the primary obstacles to the development and seamless integration of blockchain technology with industry applications.</p><p>To address the security and privacy challenges in blockchain platforms and its applications, numerous researchers have conducted extensive studies in this field by leveraging advanced technologies, including new cryptographic protocols and deep learning techniques. This special issue aims to highlight research perspectives, articles, and experimental studies pertaining to “Security and Privacy Issues in Blockchain and Its Applications”.</p><p>In this special issue, we received a total of 19 papers, out of which 17 underwent a rigorous peer-review process. However, two papers were excluded from the peer-reviewed selection because one was submitted in a draft form and the other was voluntarily withdrawn by the authors. Out of the 17 papers submitted for review, 10 were accepted for publication, six were rejected without being transferred, and one was rejected and referred to a transfer service. The exceptional quality of all the submissions played a crucial role in ensuring the success of this special issue.</p><p>These accepted papers can be classified into two categories, namely blockchain application security and cross-chain interaction security. The papers in the first category focus on analyzing and providing insights into the security of blockchain applications. Their objective is to keep readers informed about the latest trends, developments, challenges, and opportunities in blockchain application security. Moreover, significant research efforts have been dedicated to security analysis and detection in typical blockchain applications. The papers in this category are of Zhou et al., Grybniak et al., Lv et al., Li et al., Gong et al., Xiao et al. and Videira et al. These contributions further enhance our understanding and capability to safeguard blockchain applications from potential security threats. The second category of papers presents novel solutions that target the enhancement of security in cross-system interactions. These papers are of Feng et al., Xu et al. and Yu et al. By addressing the specific challenges associated with cross-system communication, these solutions contribute to the development of robust and secure blockchain networks. A brief presentation ","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"169-171"},"PeriodicalIF":0.0,"publicationDate":"2023-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12051","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135511811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized trustworthiness score management with smart contracts on the trustlend platform 利用 trustlend 平台上的智能合约进行去中心化可信度评分管理
Pub Date : 2023-10-19 DOI: 10.1049/blc2.12053
Wisnu Uriawan, Youakim Badr, Omar Hasan, Lionel Brunie

The personal lending marketplace, known as Peer-to-Peer (P2P) lending, has increased globally. However, providing unsecured loans to peers without requiring collateral remains a challenge. A platform called TrustLend is proposed to enable trustworthy transactions in the personal lending application. The platform attempts to eliminate or minimize the collateral requirement. The trustworthiness score adds to this platform's variable selection rules and can help lenders decide on reliable candidates as borrowers. The prototype implementing the TrustLend platform based on Ethereum smart contracts that use the trustworthiness score is also described and it is illustrated with a Decentralized Application (DApp) case study and customized smart contracts. The prototype demonstrates fundamental features and supports borrowers, lenders, and recommenders in establishing proposals and approvals. Finally, the prototype shows how end-users can easily access loans with reduced collateral without hidden costs and swift transactions.

被称为点对点(P2P)借贷的个人借贷市场在全球范围内不断扩大。然而,向同行提供无需抵押的无担保贷款仍是一项挑战。为了在个人借贷应用中实现值得信赖的交易,我们提出了一个名为 TrustLend 的平台。该平台试图消除或尽量减少抵押要求。可信度评分增加了该平台的变量选择规则,可帮助贷款人决定可靠的借款人候选者。本文还介绍了基于以太坊智能合约的 TrustLend 平台原型,该平台使用了可信度评分,并通过去中心化应用程序(DApp)案例研究和定制的智能合约进行了说明。原型展示了基本功能,并支持借款人、贷款人和推荐人建立建议和批准。最后,原型展示了最终用户如何通过减少抵押品、无隐藏成本和快速交易轻松获得贷款。
{"title":"Decentralized trustworthiness score management with smart contracts on the trustlend platform","authors":"Wisnu Uriawan,&nbsp;Youakim Badr,&nbsp;Omar Hasan,&nbsp;Lionel Brunie","doi":"10.1049/blc2.12053","DOIUrl":"10.1049/blc2.12053","url":null,"abstract":"<p>The personal lending marketplace, known as Peer-to-Peer (P2P) lending, has increased globally. However, providing unsecured loans to peers without requiring collateral remains a challenge. A platform called TrustLend is proposed to enable trustworthy transactions in the personal lending application. The platform attempts to eliminate or minimize the collateral requirement. The trustworthiness score adds to this platform's variable selection rules and can help lenders decide on reliable candidates as borrowers. The prototype implementing the TrustLend platform based on Ethereum smart contracts that use the trustworthiness score is also described and it is illustrated with a Decentralized Application (DApp) case study and customized smart contracts. The prototype demonstrates fundamental features and supports borrowers, lenders, and recommenders in establishing proposals and approvals. Finally, the prototype shows how end-users can easily access loans with reduced collateral without hidden costs and swift transactions.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"59-72"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135730786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-based user authorization management method for information exchanging of federation of industry and commerce 一种基于区块链的工商联信息交换用户授权管理方法
Pub Date : 2023-10-10 DOI: 10.1049/blc2.12052
Jingqi Yang, Hanqing Li

The blockchain does not need the central organization to make trust endorsement, which is suitable for large scale information exchange between different regions. In addition, blockchain has the characteristics of decentralization and tamper resistant, so that it no longer needs an intermediary platform. A blockchain-based user authorization management method is proposed, which applies blockchain as an underlaying security mechanism for distributed user authorization management within a trusted community of a distributed information exchange sites of federation of industry and commerce. This method can ensure the reliability, consistency, and integrity of user authorization information. With this method, an elastic data exchange trusted community can be built between the data owner and the authorized data user according to the data exchange needs to achieve reliable distributed access authorization.

区块链不需要中央机构进行信任背书,适合于不同区域间的大规模信息交换。此外,区块链具有去中心化和防篡改的特点,不再需要中介平台。提出了一种基于区块链的用户授权管理方法,将区块链作为分布式工商联信息交换站点可信社区内分布式用户授权管理的底层安全机制。该方法可以保证用户授权信息的可靠性、一致性和完整性。该方法可以根据数据交换的需要,在数据所有者和授权的数据用户之间建立弹性的数据交换信任社区,实现可靠的分布式访问授权。
{"title":"A blockchain-based user authorization management method for information exchanging of federation of industry and commerce","authors":"Jingqi Yang,&nbsp;Hanqing Li","doi":"10.1049/blc2.12052","DOIUrl":"10.1049/blc2.12052","url":null,"abstract":"<p>The blockchain does not need the central organization to make trust endorsement, which is suitable for large scale information exchange between different regions. In addition, blockchain has the characteristics of decentralization and tamper resistant, so that it no longer needs an intermediary platform. A blockchain-based user authorization management method is proposed, which applies blockchain as an underlaying security mechanism for distributed user authorization management within a trusted community of a distributed information exchange sites of federation of industry and commerce. This method can ensure the reliability, consistency, and integrity of user authorization information. With this method, an elastic data exchange trusted community can be built between the data owner and the authorized data user according to the data exchange needs to achieve reliable distributed access authorization.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"632-643"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12052","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136359387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Blockchain
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1