Open Access
ARTICLE
Yuji Sang1, Lijun Liu1,*, Long Lv1,*, Husheng Wu2, Hemin Yin1
1 Key Laboratory of Information and Network Security, Engineering University of the PAP, Xi’an, 710086, China
2 The School of Equipment Management and Support, Engineering University of PAP, Xi’an, 710086, China
* Corresponding Author: Lijun Liu. Email: ; Long Lv. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.073837
Received 26 September 2025; Accepted 11 December 2025; Published online 06 January 2026
View
Download
Like
Deep Learning-Based Program-Wide Binary Code Similarity for Smart Contracts
Yuan Zhuang, Baobao Wang, Jianguo...Privacy Data Management Mechanism Based on Blockchain and Federated Learning
Mingsen Mo, Shan Ji, Xiaowan Wang,...Optimization Scheme of Trusted Task Offloading in IIoT Scenario Based on DQN
Xiaojuan Wang, Zikui Lu, Siyuan...Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment
Salaheddine Kably, Tajeddine Benbarrad,...A Systematic Review of Blockchain Technology for Government Information Sharing
Lu Zhang, Jiarong Mao, Yuting...