Post-hoc explainability methods aim to clarify predictions of black-box
...
Anomaly detection in large industrial cooling systems is very challengin...
Coating chambers create thin layers that improve the mechanical and opti...
One of the defining features of Bitcoin and the thousands of cryptocurre...
We present the first study on compositions of Decentralized Finance (DeF...
The increasing deployment of low-cost IoT sensor platforms in industry b...
We present a first measurement study on two popular wallets with built-i...
There is currently an increasing demand for cryptoasset analysis tools a...
Graphs are by nature unifying abstractions that can leverage
interconnec...
Investors tend to sell their winning investments and hold onto their los...
Payment channel networks (PCNs) have emerged as a promising alternative ...
Blockchains are typically managed by peer-to-peer (P2P) networks providi...
In the proof-of-stake (PoS) paradigm for maintaining decentralized,
perm...
Travelogues represent an important and intensively studied source for
sc...
In the past year, a new spamming scheme has emerged: sexual extortion
me...
Analyzing cryptocurrency payment flows has become a key forensic method ...
Miners play a key role in cryptocurrencies such as Bitcoin: they invest
...
Predicting unscheduled breakdowns of plasma etching equipment can reduce...
Monero is a privacy-centric cryptocurrency that makes payments untraceab...
Ransomware can prevent a user from accessing a device and its files unti...
Knowledge graphs represent concepts (e.g., people, places, events) and t...