ZJU-INCAS / LearnPaperLinks
Learn and share papers about Block Chain
☆32Updated 5 years ago
Alternatives and similar repositories for LearnPaper
Users that are interested in LearnPaper are comparing it to the libraries listed below
Sorting:
- 浙江大学incas实验室-区块链顶会论文展示☆51Updated 2 years ago
- The existing blockchain-related academic papers. All papers are sorted according to the conference and published year. Welcome developer…☆1,156Updated 4 months ago
- A curated list of academic blockchain-related papers☆125Updated 6 months ago
- ☆57Updated 7 years ago
- ☆334Updated 2 weeks ago
- ☆30Updated 2 years ago
- PrivacyGuard is a platform that combines blockchain smart contract and TEE to enable transparent enforcement of private data computation …☆29Updated 3 years ago
- Smart contract vulnerability detection using graph neural network (DR-GCN).☆156Updated 2 years ago
- 可编辑区块链,使用基于RSA假设及因数分解的陷门哈希函数替换以太坊geth客户端的keccak256算法并开放出JSON-RPC接口,实现单节点修改指定区块数据、多节点同步修改区块数据的功能。☆17Updated 5 years ago
- Source code for the SIGMOD20 paper "vChain: A Blockchain System Ensuring Query Integrity"☆27Updated 4 years ago
- Xscope: Hunting for Cross-Chain Bridge Attacks☆15Updated 3 years ago
- ☆62Updated 4 years ago
- Python仿真区块链,适合毕业设计项目或课题研究。汇智网提供☆118Updated 5 years ago
- Academic Smart Contract Papers. Welcome developers or researchers to add more published papers to this list.☆601Updated last week
- A rapidchain implementation for my master thesis☆24Updated 5 years ago
- ☆135Updated 5 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Updated 4 years ago
- ☆14Updated 6 years ago
- ☆20Updated 5 years ago
- 基于访问树构造的属性基加密☆62Updated 3 years ago
- Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accept…☆97Updated 2 years ago
- A Sequence Learning Approach to Detecting Vulnerabilities☆49Updated 4 years ago
- ☆17Updated 6 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Updated 3 years ago
- IS416 Final Project. A PoW-based blockchain implementation with attackers trying fork attacks. Language: Go.☆17Updated 3 years ago
- The Ethereum Smart Contract Fuzzer for Security Vulnerability Detection (ASE 2018)☆247Updated 2 years ago
- ☆37Updated 4 years ago
- ☆56Updated 3 years ago
- Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection (TKDE Accepted)☆119Updated 2 years ago
- ☆30Updated 10 months ago