A Deep Learning Approach for Detecting Security Attacks on Blockchain
暂无分享,去创建一个
Ettore Ritacco | Giuseppe Manco | Massimo Guarascio | Francesco Scicchitano | Angelica Liguori | G. Manco | E. Ritacco | M. Guarascio | Angelica Liguori | Francesco Scicchitano
[1] Michael Stuart,et al. Understanding Robust and Exploratory Data Analysis , 1984 .
[2] Claus Pahl,et al. A Review of Distributed Ledger Technologies , 2018, OTM Conferences.
[3] Ali A. Ghorbani,et al. Application of deep learning to cybersecurity: A survey , 2019, Neurocomputing.
[4] Alex Graves,et al. Supervised Sequence Labelling with Recurrent Neural Networks , 2012, Studies in Computational Intelligence.
[5] Yoshua Bengio,et al. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.
[6] Roberto Di Pietro,et al. BAD: Blockchain Anomaly Detection , 2018, ArXiv.
[7] Keiron O'Shea,et al. An Introduction to Convolutional Neural Networks , 2015, ArXiv.
[8] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[9] Xiangjian He,et al. A Survey on Representation Learning Efforts in Cybersecurity Domain , 2019, ACM Comput. Surv..
[10] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[11] Andreas Bogner,et al. Seeing is understanding: anomaly detection in blockchains with visualized features , 2017, UbiComp/ISWC Adjunct.
[12] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[13] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[14] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[15] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[16] Hongming Cai,et al. Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting , 2018, 2018 5th International Conference on Dependable Systems and Their Applications (DSA).
[17] Yoshua Bengio,et al. Greedy Layer-Wise Training of Deep Networks , 2006, NIPS.
[18] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[19] Huashan Chen,et al. A Survey on Ethereum Systems Security , 2019, ACM Comput. Surv..
[20] P. A. Blight. The Analysis of Time Series: An Introduction , 1991 .
[21] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .