A blockchain-based code copyright management system
暂无分享,去创建一个
Vijayan Sugumaran | Qi Liu | Nan Jing | V. Sugumaran | Qi Liu | Nan Jing
[1] Dafang Zhang,et al. Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection , 2021, IEEE Transactions on Emerging Topics in Computing.
[2] Sanjay Jha,et al. B-FERL: Blockchain based Framework for Securing Smart Vehicles , 2020, Inf. Process. Manag..
[3] Christian Esposito,et al. Blockchain-based authentication and authorization for smart city applications , 2021, Inf. Process. Manag..
[4] Günther Pernul,et al. EtherTwin: Blockchain-based Secure Digital Twin Information Management , 2021, Inf. Process. Manag..
[5] Attila Kertesz,et al. PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling , 2021, Inf. Process. Manag..
[6] Yaser Jararweh,et al. A Survey on Blockchain for Information Systems Management and Security , 2021, Inf. Process. Manag..
[7] Thar Baker,et al. Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems , 2020, Inf. Process. Manag..
[8] Lalit M. Patnaik,et al. ISCG: An Intelligent Sensing and Caption Generation System for Object Detection and Captioning Using Deep Learning , 2020, Int. J. Intell. Inf. Technol..
[9] Moayad Aloqaily,et al. An incentive-aware blockchain-based solution for internet of fake media things , 2020, Inf. Process. Manag..
[10] Said Ouatik El Alaoui,et al. Deep Neural Models and Retrofitting for Arabic Text Categorization , 2020, Int. J. Intell. Inf. Technol..
[11] Zhini Cai,et al. Usage of Deep Learning and Blockchain in Compilation and Copyright Protection of Digital Music , 2020, IEEE Access.
[12] Weidong Xiao,et al. A Blockchain-Based Traceable IP Copyright Protection Algorithm , 2020, IEEE Access.
[13] Rishabh Saxena,et al. A Comparative Study on Adversarial Noise Generation for Single Image Classification , 2020, Int. J. Intell. Inf. Technol..
[14] Hong Li,et al. Blockchain for Large-Scale Internet of Things Data Storage and Protection , 2019, IEEE Transactions on Services Computing.
[15] Qassim Nasir,et al. Performance Analysis of Hyperledger Fabric Platforms , 2018, Secur. Commun. Networks.
[16] Athanasios V. Vasilakos,et al. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..
[17] Hirotsugu Kinoshita,et al. Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).
[18] Amir Herzberg,et al. Blockchain Access Privacy: Challenges and Directions , 2018, IEEE Security & Privacy.
[19] Pin Lv,et al. BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation , 2018, IEEE Access.
[20] Ke Xiao,et al. A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications , 2018, IEEE Access.
[21] Alexander Ivanovitch Savelyev,et al. Copyright in the Blockchain Era: Promises and Challenges , 2017, Comput. Law Secur. Rev..
[22] Sencun Zhu,et al. Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection , 2017, IEEE Transactions on Software Engineering.
[23] Omri Ross,et al. KYC Optimization Using Distributed Ledger Technology , 2017, WI 2017.
[24] Kieron O'Hara,et al. Smart Contracts - Dumb Idea , 2017, IEEE Internet Comput..
[25] Haoran Yu,et al. WASTK: A Weighted Abstract Syntax Tree Kernel Method for Source Code Plagiarism Detection , 2017, Sci. Program..
[26] Wei Jiang,et al. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.
[27] Fangfang Zhang,et al. Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection , 2016, IEEE Transactions on Reliability.
[28] Sunju Park,et al. Credible, resilient, and scalable detection of software plagiarism using authority histograms , 2016, Knowl. Based Syst..
[29] Qinghua Zheng,et al. Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences , 2015, IEEE Transactions on Software Engineering.
[30] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[31] M. Sahin,et al. Trust but verify: the introduction of plagiarism detection software. , 2014, Pediatric neurology.
[32] Cui Baojiang,et al. Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree , 2013, EIDWT.
[33] Siu-Ming Yiu,et al. Heap Graph Based Software Theft Detection , 2013, IEEE Transactions on Information Forensics and Security.
[34] Georgina Cosma,et al. An Approach to Source-Code Plagiarism Detection and Investigation Using Latent Semantic Analysis , 2012, IEEE Transactions on Computers.
[35] Alberto Barrón-Cedeño,et al. Towards the Detection of Cross-Language Source Code Reuse , 2011, NLDB.
[36] Lucienne Blessing,et al. DRM, a Design Research Methodology , 2009 .
[37] Philip S. Yu,et al. GPLAG: detection of software plagiarism by program dependence graph analysis , 2006, KDD '06.
[38] Seong-Bae Park,et al. Program Plagiarism Detection Using Parse Tree Kernels , 2006, PRICAI.
[39] Armand Navabi,et al. The evaluation of two software watermarking algorithms , 2005, Softw. Pract. Exp..
[40] Patrick Cousot,et al. An abstract interpretation-based framework for software watermarking , 2004, POPL.
[41] Shinji Kusumoto,et al. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..
[42] Jean-Jacques Quisquater,et al. Robust Object Watermarking: Application to Code , 1999, Information Hiding.
[43] Michael J. Wise,et al. Plagiarism à la Mode: A Comparison of Automated Systems for Detecting Suspected Plagiarism , 1996, Comput. J..
[44] Russell W. Quong,et al. ANTLR: A predicated‐LL(k) parser generator , 1995, Softw. Pract. Exp..
[45] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[46] Geoff Whale. Software metrics and plagiarism detection , 1990, J. Syst. Softw..
[47] Vijay V. Raghavan,et al. A critical investigation of recall and precision as measures of retrieval system performance , 1989, TOIS.
[48] S. K. Robinson,et al. An empirical approach for detecting program similarity and plagiarism within a university programming environment , 1987 .