Replay	Attacks	on	Ethereum	Smart	Contracts
Zhenxuan	Bai,	Yuwei	Zheng,		Kunzhe	Chai Senhua	Wang
About	us
•  360	Technology	is	a	leading	Internet	security	company	in	China.	Our	core	
products	are	anti-virus	security	software	for	PC	and	cellphones.	
•  UnicornTeam	(https://unicorn.360.com/)	was	built	in	2014.	This	is	a	group	
that	focuses	on	the	security	issues	in	many	kinds	of	wireless	
telecommunication	systems.	The	team	also	encourage	members	to	do	other	
research	that	they	are	interested	in.	
•  Highlighted	works	of	UnicornTeam	include:	
–  Low-cost	GPS	spoofing	research	(DEFCON	23)	
–  LTE	redirection	attack	(DEFCON	24)	
–  Attack	on	power	line	communication	(Black	Hat	USA	2016)
PPT www.1ppt.com/moban/																		PPT www.1ppt.com/sucai/	
PPT www.1ppt.com/beijing/																			PPT www.1ppt.com/tubiao/							
PPT www.1ppt.com/xiazai/																					PPT www.1ppt.com/powerpoint/							
www.1ppt.com/ziliao/																			 www.1ppt.com/fanwen/														
www.1ppt.com/shiti/																					 www.1ppt.com/jiaoan/																
PPT www.1ppt.cn																																					PPT www.1ppt.com/kejian/		
www.1ppt.com/kejian/yuwen/				 www.1ppt.com/kejian/shuxue/		
www.1ppt.com/kejian/yingyu/				 www.1ppt.com/kejian/meishu/		
www.1ppt.com/kejian/kexue/					 www.1ppt.com/kejian/wuli/		
www.1ppt.com/kejian/huaxue/		 www.1ppt.com/kejian/shengwu/		
www.1ppt.com/kejian/dili/										 www.1ppt.com/kejian/lishi/									
Part	1 Part	2 Part	3 Part	4
The	Main	Idea
Back	Ground	 DemonstrationSafety	Problem Replay	Attack
Part	1
Back Ground
(Blockchain & smart contract & Ethereum)
What is Blockchain?
Blockchain is:
A	Large-scale	globally	decentralized	computer	
network		
A	system	that	users	can	interact	with	by	sending	
transactions	
—	Transactions	are	guaranteed	by	
Consensus	Mechanism
Advantages of Blockchain
•  having	the	unified	database	with	rapid	consensus	
•  With	large-scale	fault-tolerant	mechanism	
•  Not	relying	on	trust,	not	controlled	by	any	single	administrator	or	
organization	(not	for	private/consortium	blockchain)	
•  Audit-able:	external	observers	can	verify	transaction	history.	
•  Automation:	operating	without	human	involvement.
What on-earth can Blockchain do?
Cryptocurrency: digital assets on the Blockchain
There	are	tokens	in	the	public	blockchains	used	to	limit	the	rates	of	updating	
transactions	&	power	the	maintenance	of	Blockchain.		
Record	Registration	(such	as	the	Domain	Name	System	based	on	Blockchain.	
Timestamp	to	track	high	value	data	
Financial	Contracts		
General	Computation	
Non-monetary Characteristics
Support Functionalities
Ethereum
About 2013, the public realized that Blockchain can be used in hundreds
of applications besides cryptocurrency, such as asset issuance,
crowdfunding, domain-name registration, ownership registration, market
forecasting, Internet of things, voting and so on.
How to realize?
Smart contracts are pieces of code that live on the Blockchain
and execute commands exactly how the were told to.
“smart contract" - a computer program running in a secure environment
that automatically transfers digital assets according to previously arbitrary
rules.
business people
Developer
Smart Contract
How to build one?
■  Blockchain with built-in programming language
■  maximum abstraction and versatility
■  it is very ideal to process smart contracts
Ethereum
Ethereum
EVM: It is the operating environment for smart contract in
the Ethereum. It is not only encapsulated by a sandbox, but
in fact it is completely isolated, that is, the code that runs
inside the EVM does not have access to the network, file
system, or other processes. Even smart contracts have
limited contact with other smart contracts.
Operating System
Contract usage scenario
Hedging contracts, Savings Purse,
Testamentary contract
Financial scenario
Online voting, De-centralized
governance , Domain name
registration
Non-financial scenario
Part	2	
Related Safety Problem
The Ecology of the Ethereum
On average, there are 100 thousand of new users join the
Ethereum ecosystem every day. The users are very
active, with an average daily transactions of more than 1
million times on Ethereum.
The safety issue of the Ethereum
attack	and	token	steal		
exchange
probable	to	be	hijacked	
wallet
overflow		attack	
smart contract
main
parts
The security problem of smart contract
April	2018,	
		BEC	contract	
May	2018,	
	EDU	contract	 June	2018,	
	SNC	contract	
Directly	affects	the	major	
exchanges,	including	the	
issue,	recharge	or	cash	
withdrawal	of	the	tokens.
Vulnerability in Smart Contracts
According to < Finding The Greedy , Prodigal , and Suicidal Contracts at Scale>, In
March 2018, nearly 1 million smart contracts were analyzed , among which there are
34200 smart contracts can be easily attacked by hackers.
How to lower the probability of loss ?
A complete and objective audit is required for smart contracts.
The emergency response can be made when the vulnerability was found in Smart
Contracts
Reward can be provided when someone detect any bug .
Replay attack on
smart contractPart	3
What are we care about - Replay attack
Replay	attack:	If	a	transaction	is	legitimate	on	one	Blockchain,	it	is	also	
legitimate	on	another	block	chain.	
When	you	transfer	BTC1,	your	BTC2/BTC3	may	be	transferred	at	the	same	time.
Our discovery
Many	smart	contracts	adopt	the	same	way	to	verify	the	validity	of	
the	signature,	and	it	is	possible	for	replay	attack.
Our motivation
We	proposed	the	replay	attacks	in	the	smart	contracts,	which	hope	to	
attract	the	user’s	attention.	
We	detect	the	vulnerability	in	smart	contracts,	which	hope	to	make	
them	more	secure.	
We	hope	to	enhance	the	risk	awareness	for	contract	creator	and	
ensure	the	interests	of	investors.
  we	found	the	replay	attack	problem	exists	in	52	smart	contracts.		
  We	 analyzed	 the	 smart	 contract	 example	 to	 verify	 the	 replay	
attack.	
  We	analyzed	the	source	and	process	of	replay	attack	to	expound	
the	feasibility	of	replay	attack	in	principle.			
  We	verified	the	replay	attack	based	on	the	signature	
vulnerability.		
  We	proposed	defense	strategy	to	prevent	this	problem.		
Our Contribution
•  Judging whether the contract is accord with the
ERC20 standard.
we set three scanning standards to discovery the
smart contracts which have the VULNERABILITY.
					require	(	totalsupply>0)	
Vulnerability Scanning
•  Get	 the	 name	 of	 the	 contract	 to	 determine	
whether	the	name	is	valid.	
Vulnerability Scanning
•  Filter	smart	contracts	vulnerable	to	replay	attack.		
Scanning	Result:	52	risky	targets		
Vulnerability Scanning
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Contracts
●  It	 has	 been	 confirmed(proved)	 that	 there	 are	 two	 smart	
contracts	allow	proxy	transactions..	
●  If	the	two	smart	contracts	use	a	similar	mechanism	and	share	
the	same	transaction	format.		
●  When	a	transaction	happens	in	one	contract,	this	transaction	
will	 be	 also	 legal	 in	 another	 contract,	 and	 the	 replay	 attack	
will	be	successfully	executed.	
Why does the replay attack occur?
The issue lies in this line: bytes32 h = keccak256(_from,_to,_value,_fee,nonce);
Example
Attack Process
●  we	chose	two	ERC20	smart	contracts,	the	UGT	contract	
and	the	MTC	contract.	
●  we	created	two	accounts,	Alice	and	Bob	
●  we	 deposit	 some	 tokens	 in	 the	 two	 accounts	 in	 UGT	
contracts	and	MTC	contracts.	
●  at	least	one	Ethereum	full	node	
Experiment condition
Step	 one:	 transaction	 records	 on	 the	 Ethereum	 were	
scanned	to	find	out	accounts	which	had	both	UGT	tokens	
and	MTC	tokens(we	use	two	accounts,	Alice	and	Bob)	.		
Verification of the replay attack process
Step	two:	Bob	induced	Alice	to	send	him	2	UGT	tokens.	The	transaction	input	data	
is	shown	as	below:	
Function:	 transferProxy(address	 _from,	 address	 _to,	 uint256	 _value,	 uint256	
_feeUgt,	uint8	_v,	bytes32	_r,	bytes32	_s)	
MethodID:	0xeb502d45	
Verification of the replay attack process
Step	 three:	 Bob	 take	 out	 the	 input	 data	 of	 this	 transaction	 on	 the	
blockchain.	The	parameters	“from,	to,	value,	fee,	v,	r,	s”	were	extracted	
from	 [0]-	 [6]	 in	 step	 two.	 The	 following	 is	 the	 implementation	 of	 the	
transfer	function.	
Verification of the replay attack process
Step	four:	Bob	use	the	input	data	in	step	2	to	execute	another	transfer	in	
the	 smart	 contract	 of	 MTC.	 The	 result	 of	 this	 transaction	 is	 shown	 as	
below.	
Verification of the replay attack process
Step	five:	Bob	got	not	only	2	UGT	tokens	but	also	2	MTC	tokens	from	
Alice.	In	this	process,	the	transfer	of	2	MTC	tokens	was	not	authorized	
by	Alice.	
Verification of the replay attack process
Part	4
Demonstration
Select contract
Account setting
genesis.json
the UGT contract and the MTC contract
	
•  Alice	and	Bob	
•  Alice(the	sender):	0x8e65d5349ab0833cd76d336d380144294417249e	
•  Bob(the	receiver):	0x5967613d024a1ed052c8f9687dc74897dc7968d6	
•  Both	own	some	tokens	for	transferring.	
UGT	Token	:0x43eE79e379e7b78D871100ed696e803E7893b644
MTC	Token:0xdfdc0D82d96F8fd40ca0CFB4A288955bECEc2088
Core code
Demo
Demo
By	April	27th,	2018,	loophole	of	this	replay	attack	risk	exists	in	52	
Ethereum	smart	contracts.	
according	to	the	vulnerability	of	the	replay	attack:
l  High-risk	group	(10/52):	no	specific	information	is	contained	in	the	signature	of	
smart	contract,	which	the	signature	can	be	fully	reused.	
l  moderate-risk	group	(37/52):	fixed	string	is	contained	in	the	signature	of	smart	
contract,	which	the	probability	of	reusing	the	signature	is	still	high.	
l  Low	 -risk	 group	 (5/52):	 the	 address	 of	 the	 contract	 (1	 in	 5)	 or	 the	 address	 of	
sender	(4	in5)	is	contained	in	the	signature	of	smart	contract.	There	are	strong	
restrictions,	but	there	is	still		own	the	possibility	of	replay	attacks.
Statistics and Analysis
l  Replay	in	the	same	contract	(5/52)
MiracleTele RoyalForkToken FirstBlood KarmaToken KarmaToken2
l  Cross-contracts	replay	(45/52)
Besides,	we	divided	these	45	contracts	into	3	groups,	for	the	specific	prefix	
data	used	in	the	signatures.	Cross-contracts	replays	may	happen	among	any	
contracts	as	long	as	they	are	in	a	same	group.	
	According	to	feasible	replay	attack	approaches:
Statistics and Analysis
ü  Group	1 the	specific	prefix	data	1	used	in	the	signatures	(28/52)
ARCCoin,BAF,	Claes	Cash Claes	Cash2 CNF,CWC,DET,	Developeo,	
Envion,	FiCoin,			GoldCub JaroCoin metax,	metax2	 NODE,	NODE2,	NPLAY,	
SIGMA,	 solomex,	 Solomon	 Exchange,	 Solomon	 Exchange2,	 Trump	 Full	 Term	
Token,	Trump	Impeachment	Token,	X,	ZEUS	TOKEN ZEUS	TOKEN2	,cpay.	
ü  Group2 the	 specific	 prefix	 data	 2	 used	 in	 the	 signatures	 (7/52)
"x19Ethereum	Signed	Message:n32"
Acore CLC CLOUT CNYToken,	CNYTokenPlus,	GigBit The	4th	
Pillar		Token,
Statistics and Analysis
	According	to	feasible	replay	attack	approaches:
ü  Group3 no	specific	prefix	data		used	in	the	signatures	(10/52)
BlockchainCuties First(smt),	GG	Token M2C	Mesh	Network M2C	
Mesh	 Network2	 MJ	 comeback,	 MJ	 comeback2,	 MTC	 Mesh	 Network,	
SmartMesh	Token,	UG	Token
l  Replay	between	test	chain	and	main	chain	(2/52)	
MeshBox			MeshBox2	
l  Replay	between	different	main	chain	(0/52)
	According	to	feasible	replay	attack	approaches:
Statistics and Analysis
According	to		the	trading	frequency	of	above-mentioned	
contracts	
	By	9:00	April	30th,	2018,	
•  	24	contracts	were	found	which	have	the	transaction	records	within	
one	week,	The	proportion	is	46.15%	of	the	total	number	of	contracts.		
•  9	contracts	were	found	which	have	the	transaction	records	from	one	
week	to	one	month,	The	proportion	is	17.31%	of	the	total	number	of	
contracts.	
Statistics and Analysis
According	 to	 	 the	 trading	 frequency	 of	 above-mentioned	
contracts	
	By	9:00	April	30th,	2018,	
•  16	contracts	were	found	which	have	the	transaction	records	beyond	
one	month,	The	proportion	is	30.77%	of	the	total	number	of	contracts.		
•  3	contracts	Only	have	the	records	for	deployment.	The	proportion	is	
5.77%	of	the	total	number	of	contracts.		
According	 to	 the	 comprehensive	 analysis,	 63.46%	 of	 the	
contract	transactions	are	still	active.	
Statistics and Analysis
Ø The	designers	of	smart	contract	should	always	confirm	the	
suitable	 range	 of	 digital	 signature	 when	 designing	 smart	
contracts.	
Ø The	smart	contracts	deployed	on	public	chain	should	add	in	
the	 specific	 information	 of	 the	 public	 chain	 such	 as	 the	
chainID	and	the	name	of	the	public	chain.	
Ø The	users	of	smart	contracts	need	to	pay	attention	to	news	
and	reports	concerning	the	loophole	disclosures.	
Countermeasures
p The	 security	 problems	 of	 smart	 contracts	 have	 been	
widely	concerned.	
	
p As	long	as	the	signature	was	not	limited	by	the	smart	
contracts,	there	is	possibility	of	replay	attack.	
p We	 believe	 that	 loopholes	 on	 the	 Ethereum	 smart	
contracts	have	not	totally	come	to	light.
	
Conclusion
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Contracts

More Related Content

PDF
AI and Machine Learning for Analyzing Cryptocurrencies and the Blockchain
PPTX
Emerging application and data protection for multi cloud
PDF
AI and Cybersecurity - Food for Thought
PDF
Design and Development of an E-Commerce Security Using RSA Cryptosystem
PPTX
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
PDF
Secure Sharing of Design Information with Blockchains
PDF
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
PPTX
Practical risk management for the multi cloud
AI and Machine Learning for Analyzing Cryptocurrencies and the Blockchain
Emerging application and data protection for multi cloud
AI and Cybersecurity - Food for Thought
Design and Development of an E-Commerce Security Using RSA Cryptosystem
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
Secure Sharing of Design Information with Blockchains
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Practical risk management for the multi cloud

What's hot (20)

PPTX
Product security by Blockchain, AI and Security Certs
PDF
PPTX
What I Learned at RSAC 2020
PDF
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PDF
Jehyuk jang and heung no lee ieee
PPTX
What is a secure enterprise architecture roadmap?
PPTX
Cyber Threat Intelligence - La rilevanza del dato per il business
PPTX
Securing data today and in the future - Oracle NYC
PPTX
New regulations and the evolving cybersecurity technology landscape
PPTX
What is tokenization in blockchain?
PDF
Cryptointro
PPTX
Privacy preserving computing and secure multi-party computation ISACA Atlanta
PPTX
New technologies for data protection
PDF
Bat38 aouini bogosalvarado_zk-snark_blockchain
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
PDF
N-able webinar:Build recurring revenue in 45 days
PDF
An extensive research survey on data integrity and deduplication towards priv...
PDF
ETIS Information Security Benchmark Successful Practices in telco security
PDF
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
PPTX
Smart City Lecture 2 - Privacy in the Smart City
Product security by Blockchain, AI and Security Certs
What I Learned at RSAC 2020
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
Jehyuk jang and heung no lee ieee
What is a secure enterprise architecture roadmap?
Cyber Threat Intelligence - La rilevanza del dato per il business
Securing data today and in the future - Oracle NYC
New regulations and the evolving cybersecurity technology landscape
What is tokenization in blockchain?
Cryptointro
Privacy preserving computing and secure multi-party computation ISACA Atlanta
New technologies for data protection
Bat38 aouini bogosalvarado_zk-snark_blockchain
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
N-able webinar:Build recurring revenue in 45 days
An extensive research survey on data integrity and deduplication towards priv...
ETIS Information Security Benchmark Successful Practices in telco security
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
Smart City Lecture 2 - Privacy in the Smart City
Ad

Similar to You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Contracts (20)

PDF
Security_evaluation_of_smart_contract_based_Ethereum_wallets___NSS__Camera_re...
PDF
Part 4: Understanding the working of Smart Contracts
PDF
IRJET- Blockchain-A Secure Mode for Transaction
PDF
IRJET- Smart Contracts using Blockchain
PDF
Real-life Application of a Decentralized System
PDF
Tronbotix Whitepaper ICO 2018 English
PDF
Tronbotix Whitepaper ICO 2018 English
PPTX
The Future Of Cryptocurrency Exchange Development Trends to Watch.pptx
PDF
IRJET- Ethical Hacking
PPTX
What is tokenization in blockchain?
PDF
Blockchains For The IOT - EVRYTHNG
PDF
Attacking and Exploiting Ethereum Smart Contracts: Auditing 101
PDF
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
PDF
Blockchain-based Applications
DOCX
Impact of Blockchain on IT AuditBlockchain Techn.docx
PDF
What is an IDO How can IDO be attacked.pdf
PDF
Etherparty Pitch Dek
PPTX
What is tokenization in blockchain?
PPTX
Ethereum smart contract security audit
PPTX
blockchain ppt for research puropse in the university
Security_evaluation_of_smart_contract_based_Ethereum_wallets___NSS__Camera_re...
Part 4: Understanding the working of Smart Contracts
IRJET- Blockchain-A Secure Mode for Transaction
IRJET- Smart Contracts using Blockchain
Real-life Application of a Decentralized System
Tronbotix Whitepaper ICO 2018 English
Tronbotix Whitepaper ICO 2018 English
The Future Of Cryptocurrency Exchange Development Trends to Watch.pptx
IRJET- Ethical Hacking
What is tokenization in blockchain?
Blockchains For The IOT - EVRYTHNG
Attacking and Exploiting Ethereum Smart Contracts: Auditing 101
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
Blockchain-based Applications
Impact of Blockchain on IT AuditBlockchain Techn.docx
What is an IDO How can IDO be attacked.pdf
Etherparty Pitch Dek
What is tokenization in blockchain?
Ethereum smart contract security audit
blockchain ppt for research puropse in the university
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
STKI Israel Market Study 2025 version august
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
The various Industrial Revolutions .pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Abstractive summarization using multilingual text-to-text transfer transforme...
Getting started with AI Agents and Multi-Agent Systems
2018-HIPAA-Renewal-Training for executives
A review of recent deep learning applications in wood surface defect identifi...
STKI Israel Market Study 2025 version august
sustainability-14-14877-v2.pddhzftheheeeee
Final SEM Unit 1 for mit wpu at pune .pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Hindi spoken digit analysis for native and non-native speakers
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Taming the Chaos: How to Turn Unstructured Data into Decisions
Consumable AI The What, Why & How for Small Teams.pdf
Developing a website for English-speaking practice to English as a foreign la...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A comparative study of natural language inference in Swahili using monolingua...
The various Industrial Revolutions .pptx

You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Contracts