首页 > 最新文献

信息工程最新文献

英文 中文
IF:
Computational modeling and inhibition of SARS-COV-2 Papain-like protease enzyme: A potential therapeutic approach for COVID-19 计算建模和抑制 SARS-COV-2 Papain 样蛋白酶:COVID-19 的潜在治疗方法
Q1 Social Sciences Pub Date : 2024-08-03 DOI: 10.1016/j.jobb.2024.07.001
Auwal Rabiu Auwal , Isa Abdullahi Baba , Evren Hincal , Fathalla A. Rihan

This study aims to investigate the potential impact of inhibitors targeting the papain-like protease (PLpro) of SARS-CoV-2 on viral replication and the host immune response. A mathematical model was developed to simulate the interaction among susceptible cells, infected cells, PLpro, and immune cells, incorporating data on PLpro inhibition. Through numerical simulations using MATLAB, the model parameters were estimated based on available statistical data. The results indicate that strategically positioned inhibitors could impede the virus’s access to host cellular machinery, thereby enhancing the immune response and gradually reducing susceptible and infected cells over time. The dynamics of the viral enzyme PLpro showed reduced activity with the introduction of the inhibitor, leading to a decline in viral replication. Moreover, the immune cell population exhibited functional recovery as the inhibitor suppressed PLpro activity. These findings suggest that inhibitors targeting PLpro may serve as therapeutic interventions against SARS-CoV-2 by inhibiting viral replication and bolstering the immune response.

本研究旨在探讨针对 SARS-CoV-2 的木瓜蛋白酶(PLpro)的抑制剂对病毒复制和宿主免疫反应的潜在影响。研究建立了一个数学模型来模拟易感细胞、感染细胞、PLpro 和免疫细胞之间的相互作用,并结合了有关 PLpro 抑制的数据。通过使用 MATLAB 进行数值模拟,根据现有统计数据对模型参数进行了估计。结果表明,有策略地放置抑制剂可以阻碍病毒进入宿主细胞机制,从而增强免疫反应,并随着时间的推移逐渐减少易感细胞和受感染细胞。病毒酶 PLpro 的动态变化表明,抑制剂的引入会降低病毒酶 PLpro 的活性,从而导致病毒复制能力下降。此外,由于抑制剂抑制了 PLpro 的活性,免疫细胞群表现出功能恢复。这些研究结果表明,针对 PLpro 的抑制剂可以通过抑制病毒复制和增强免疫反应来干预 SARS-CoV-2 的治疗。
{"title":"Computational modeling and inhibition of SARS-COV-2 Papain-like protease enzyme: A potential therapeutic approach for COVID-19","authors":"Auwal Rabiu Auwal ,&nbsp;Isa Abdullahi Baba ,&nbsp;Evren Hincal ,&nbsp;Fathalla A. Rihan","doi":"10.1016/j.jobb.2024.07.001","DOIUrl":"10.1016/j.jobb.2024.07.001","url":null,"abstract":"<div><p>This study aims to investigate the potential impact of inhibitors targeting the papain-like protease (PLpro) of SARS-CoV-2 on viral replication and the host immune response. A mathematical model was developed to simulate the interaction among susceptible cells, infected cells, PLpro, and immune cells, incorporating data on PLpro inhibition. Through numerical simulations using MATLAB, the model parameters were estimated based on available statistical data. The results indicate that strategically positioned inhibitors could impede the virus’s access to host cellular machinery, thereby enhancing the immune response and gradually reducing susceptible and infected cells over time. The dynamics of the viral enzyme PLpro showed reduced activity with the introduction of the inhibitor, leading to a decline in viral replication. Moreover, the immune cell population exhibited functional recovery as the inhibitor suppressed PLpro activity. These findings suggest that inhibitors targeting PLpro may serve as therapeutic interventions against SARS-CoV-2 by inhibiting viral replication and bolstering the immune response.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"6 3","pages":"Pages 211-221"},"PeriodicalIF":0.0,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000372/pdfft?md5=fdbf876165b0e2e2b70466ae5d584222&pid=1-s2.0-S2588933824000372-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MKEAH: Multimodal knowledge extraction and accumulation based on hyperplane embedding for knowledge-based visual question answering MKEAH: 基于超平面嵌入的多模态知识提取和积累,用于基于知识的视觉问题解答
Q1 Computer Science Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.002
Heng Zhang , Zhihua Wei , Guanming Liu , Rui Wang , Ruibin Mu , Chuanbao Liu , Aiquan Yuan , Guodong Cao , Ning Hu

Background

External knowledge representations play an essential role in knowledge-based visual question and answering to better understand complex scenarios in the open world. Recent entity-relationship embedding approaches are deficient in representing some complex relations, resulting in a lack of topic-related knowledge and redundancy in topic-irrelevant information.

Methods

To this end, we propose MKEAH: Multimodal Knowledge Extraction and Accumulation on Hyperplanes. To ensure that the lengths of the feature vectors projected onto the hyperplane compare equally and to filter out sufficient topic-irrelevant information, two losses are proposed to learn the triplet representations from the complementary views: range loss and orthogonal loss. To interpret the capability of extracting topic-related knowledge, we present the Topic Similarity (TS) between topic and entity-relations.

Results

Experimental results demonstrate the effectiveness of hyperplane embedding for knowledge representation in knowledge-based visual question answering. Our model outperformed state-of-the-art methods by 2.12% and 3.24% on two challenging knowledge-request datasets: OK-VQA and KRVQA, respectively.

Conclusions

The obvious advantages of our model in TS show that using hyperplane embedding to represent multimodal knowledge can improve its ability to extract topic-related knowledge.

背景外部知识表征在基于知识的可视化问答中发挥着至关重要的作用,可以更好地理解开放世界中的复杂场景。最近的实体关系嵌入方法在表示一些复杂关系方面存在缺陷,导致缺乏与主题相关的知识和与主题无关的冗余信息。为了确保投射到超平面上的特征向量长度相等,并过滤掉足够多的与主题无关的信息,我们提出了两种损失来学习互补视图的三元组表示:范围损失和正交损失。为了解释提取主题相关知识的能力,我们提出了主题和实体关系之间的主题相似度(TS)。 实验结果实验结果证明了超平面嵌入在基于知识的视觉问题解答中的知识表示的有效性。在两个具有挑战性的知识请求数据集上,我们的模型分别以 2.12% 和 3.24% 的优势超过了最先进的方法:结论我们的模型在 TS 中的明显优势表明,使用超平面嵌入来表示多模态知识可以提高提取主题相关知识的能力。
{"title":"MKEAH: Multimodal knowledge extraction and accumulation based on hyperplane embedding for knowledge-based visual question answering","authors":"Heng Zhang ,&nbsp;Zhihua Wei ,&nbsp;Guanming Liu ,&nbsp;Rui Wang ,&nbsp;Ruibin Mu ,&nbsp;Chuanbao Liu ,&nbsp;Aiquan Yuan ,&nbsp;Guodong Cao ,&nbsp;Ning Hu","doi":"10.1016/j.vrih.2023.06.002","DOIUrl":"10.1016/j.vrih.2023.06.002","url":null,"abstract":"<div><h3>Background</h3><p>External knowledge representations play an essential role in knowledge-based visual question and answering to better understand complex scenarios in the open world. Recent entity-relationship embedding approaches are deficient in representing some complex relations, resulting in a lack of topic-related knowledge and redundancy in topic-irrelevant information.</p></div><div><h3>Methods</h3><p>To this end, we propose MKEAH: Multimodal Knowledge Extraction and Accumulation on Hyperplanes. To ensure that the lengths of the feature vectors projected onto the hyperplane compare equally and to filter out sufficient topic-irrelevant information, two losses are proposed to learn the triplet representations from the complementary views: range loss and orthogonal loss. To interpret the capability of extracting topic-related knowledge, we present the Topic Similarity (TS) between topic and entity-relations.</p></div><div><h3>Results</h3><p>Experimental results demonstrate the effectiveness of hyperplane embedding for knowledge representation in knowledge-based visual question answering. Our model outperformed state-of-the-art methods by 2.12% and 3.24% on two challenging knowledge-request datasets: OK-VQA and KRVQA, respectively.</p></div><div><h3>Conclusions</h3><p>The obvious advantages of our model in TS show that using hyperplane embedding to represent multimodal knowledge can improve its ability to extract topic-related knowledge.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"6 4","pages":"Pages 280-291"},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000268/pdfft?md5=74ea90656cf281de7a0e35aa5b55705b&pid=1-s2.0-S2096579623000268-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-scale context-aware network for continuous sign language recognition 用于连续手语识别的多尺度情境感知网络
Q1 Computer Science Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.011
Senhua XUE, Liqing GAO, Liang WAN, Wei FENG

The hands and face are the most important parts for expressing sign language morphemes in sign language videos. However, we find that existing Continuous Sign Language Recognition (CSLR) methods lack the mining of hand and face information in visual backbones or use expensive and time-consuming external extractors to explore this information. In addition, the signs have different lengths, whereas previous CSLR methods typically use a fixed-length window to segment the video to capture sequential features and then perform global temporal modeling, which disturbs the perception of complete signs. In this study, we propose a Multi-Scale Context-Aware network (MSCA-Net) to solve the aforementioned problems. Our MSCA-Net contains two main modules: (1) Multi-Scale Motion Attention (MSMA), which uses the differences among frames to perceive information of the hands and face in multiple spatial scales, replacing the heavy feature extractors; and (2) Multi-Scale Temporal Modeling (MSTM), which explores crucial temporal information in the sign language video from different temporal scales. We conduct extensive experiments using three widely used sign language datasets, i.e., RWTH-PHOENIX-Weather-2014, RWTH-PHOENIX-Weather-2014T, and CSL-Daily. The proposed MSCA-Net achieve state-of-the-art performance, demonstrating the effectiveness of our approach.

手和脸是手语视频中表达手语语素的最重要部分。然而,我们发现现有的连续手语识别(CSLR)方法缺乏对视觉骨干中手和脸部信息的挖掘,或者使用昂贵耗时的外部提取器来挖掘这些信息。此外,手势的长度各不相同,而以往的 CSLR 方法通常使用固定长度的窗口分割视频以捕捉连续特征,然后进行全局时序建模,这干扰了对完整手势的感知。在本研究中,我们提出了一种多尺度上下文感知网络(MSCA-Net)来解决上述问题。我们的 MSCA-Net 包含两个主要模块:(1) 多尺度运动注意(MSMA),它利用帧间的差异来感知多个空间尺度上的手部和面部信息,取代了繁重的特征提取器;(2) 多尺度时间建模(MSTM),它从不同的时间尺度上探索手语视频中关键的时间信息。我们使用三个广泛使用的手语数据集(即 RWTH-PHOENIX-Weather-2014、RWTH-PHOENIX-Weather-2014T 和 CSL-Daily)进行了大量实验。所提出的 MSCA-Net 达到了最先进的性能,证明了我们方法的有效性。
{"title":"Multi-scale context-aware network for continuous sign language recognition","authors":"Senhua XUE,&nbsp;Liqing GAO,&nbsp;Liang WAN,&nbsp;Wei FENG","doi":"10.1016/j.vrih.2023.06.011","DOIUrl":"10.1016/j.vrih.2023.06.011","url":null,"abstract":"<div><p>The hands and face are the most important parts for expressing sign language morphemes in sign language videos. However, we find that existing Continuous Sign Language Recognition (CSLR) methods lack the mining of hand and face information in visual backbones or use expensive and time-consuming external extractors to explore this information. In addition, the signs have different lengths, whereas previous CSLR methods typically use a fixed-length window to segment the video to capture sequential features and then perform global temporal modeling, which disturbs the perception of complete signs. In this study, we propose a Multi-Scale Context-Aware network (MSCA-Net) to solve the aforementioned problems. Our MSCA-Net contains two main modules: <strong>(</strong>1) Multi-Scale Motion Attention (MSMA), which uses the differences among frames to perceive information of the hands and face in multiple spatial scales, replacing the heavy feature extractors; and <strong>(</strong>2) Multi-Scale Temporal Modeling (MSTM), which explores crucial temporal information in the sign language video from different temporal scales. We conduct extensive experiments using three widely used sign language datasets, i.e., RWTH-PHOENIX-Weather-2014, RWTH-PHOENIX-Weather-2014T, and CSL-Daily. The proposed MSCA-Net achieve state-of-the-art performance, demonstrating the effectiveness of our approach.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"6 4","pages":"Pages 323-337"},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000414/pdfft?md5=d9cac344d105f6ddc495c1cb1e50a67a&pid=1-s2.0-S2096579623000414-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust blind image watermarking based on interest points 基于兴趣点的鲁棒盲图像水印技术
Q1 Computer Science Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.012
Zizhuo WANG, Kun HU, Chaoyangfan HUANG, Zixuan HU, Shuo YANG, Xingjun WANG

Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability. However, image watermarking algorithms are weak against hybrid attacks, especially geometric at-tacks, such as cropping attacks, rotation attacks, etc. We propose a robust blind image watermarking algorithm that combines stable interest points and deep learning networks to improve the robustness of the watermarking algorithm further. First, to extract more sparse and stable interest points, we use the Superpoint algorithm for generation and design two steps to perform the screening procedure. We first keep the points with the highest possibility in a given region to ensure the sparsity of the points and then filter the robust interest points by hybrid attacks to ensure high stability. The message is embedded in sub-blocks centered on stable interest points using a deep learning-based framework. Different kinds of attacks and simulated noise are added to the adversarial training to guarantee the robustness of embedded blocks. We use the ConvNext network for watermark extraction and determine the division threshold based on the decoded values of the unembedded sub-blocks. Through extensive experimental results, we demonstrate that our proposed algorithm can improve the accuracy of the network in extracting information while ensuring high invisibility between the embedded image and the original cover image. Comparison with previous SOTA work reveals that our algorithm can achieve better visual and numerical results on hybrid and geometric attacks.

数字水印技术在防伪和溯源工作中发挥着至关重要的作用。然而,图像水印算法对混合攻击的抵抗力较弱,尤其是几何攻击,如裁剪攻击、旋转攻击等。我们提出了一种结合稳定兴趣点和深度学习网络的鲁棒盲图像水印算法,以进一步提高水印算法的鲁棒性。首先,为了提取更多稀疏且稳定的兴趣点,我们使用超级点算法进行生成,并设计了两个步骤来执行筛选程序。我们首先保留给定区域内可能性最大的点,以确保点的稀疏性,然后通过混合攻击筛选出稳健的兴趣点,以确保高稳定性。利用基于深度学习的框架,将信息嵌入以稳定兴趣点为中心的子块中。在对抗训练中加入不同类型的攻击和模拟噪声,以保证嵌入块的鲁棒性。我们使用 ConvNext 网络提取水印,并根据未嵌入子块的解码值确定分割阈值。通过大量的实验结果,我们证明了我们提出的算法可以提高网络提取信息的准确性,同时确保嵌入图像与原始覆盖图像之间的高隐蔽性。与之前的 SOTA 工作相比,我们的算法可以在混合攻击和几何攻击中取得更好的视觉和数值结果。
{"title":"Robust blind image watermarking based on interest points","authors":"Zizhuo WANG,&nbsp;Kun HU,&nbsp;Chaoyangfan HUANG,&nbsp;Zixuan HU,&nbsp;Shuo YANG,&nbsp;Xingjun WANG","doi":"10.1016/j.vrih.2023.06.012","DOIUrl":"10.1016/j.vrih.2023.06.012","url":null,"abstract":"<div><p>Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability. However, image watermarking algorithms are weak against hybrid attacks, especially geometric at-tacks, such as cropping attacks, rotation attacks, etc. We propose a robust blind image watermarking algorithm that combines stable interest points and deep learning networks to improve the robustness of the watermarking algorithm further. First, to extract more sparse and stable interest points, we use the Superpoint algorithm for generation and design two steps to perform the screening procedure. We first keep the points with the highest possibility in a given region to ensure the sparsity of the points and then filter the robust interest points by hybrid attacks to ensure high stability. The message is embedded in sub-blocks centered on stable interest points using a deep learning-based framework. Different kinds of attacks and simulated noise are added to the adversarial training to guarantee the robustness of embedded blocks. We use the ConvNext network for watermark extraction and determine the division threshold based on the decoded values of the unembedded sub-blocks. Through extensive experimental results, we demonstrate that our proposed algorithm can improve the accuracy of the network in extracting information while ensuring high invisibility between the embedded image and the original cover image. Comparison with previous SOTA work reveals that our algorithm can achieve better visual and numerical results on hybrid and geometric attacks.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"6 4","pages":"Pages 308-322"},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000426/pdfft?md5=0d46d851b07db92670b0c63431ec427e&pid=1-s2.0-S2096579623000426-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
S2ANet: Combining local spectral and spatial point grouping for point cloud processing S2ANet:结合局部光谱和空间点分组进行点云处理
Q1 Computer Science Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.005
Yujie LIU, Xiaorui SUN, Wenbin SHAO, Yafu YUAN

Background

Despite the recent progress in 3D point cloud processing using deep convolutional neural networks, the inability to extract local features remains a challenging problem. In addition, existing methods consider only the spatial domain in the feature extraction process.

Methods

In this paper, we propose a spectral and spatial aggregation convolutional network (S2ANet), which combines spectral and spatial features for point cloud processing. First, we calculate the local frequency of the point cloud in the spectral domain. Then, we use the local frequency to group points and provide a spectral aggregation convolution module to extract the features of the points grouped by the local frequency. We simultaneously extract the local features in the spatial domain to supplement the final features.

Results

S2ANet was applied in several point cloud analysis tasks; it achieved state-of-the-art classification accuracies of 93.8%, 88.0%, and 83.1% on the ModelNet40, ShapeNetCore, and ScanObjectNN datasets, respectively. For indoor scene segmentation, training and testing were performed on the S3DIS dataset, and the mean intersection over union was 62.4%.

Conclusions

The proposed S2ANet can effectively capture the local geometric information of point clouds, thereby improving accuracy on various tasks.

背景尽管最近在使用深度卷积神经网络进行三维点云处理方面取得了进展,但无法提取局部特征仍然是一个具有挑战性的问题。此外,现有方法在特征提取过程中只考虑了空间域。方法在本文中,我们提出了一种光谱和空间聚合卷积网络(S2ANet),它结合了光谱和空间特征,用于点云处理。首先,我们在光谱域计算点云的局部频率。然后,我们利用局部频率对点进行分组,并提供一个光谱聚合卷积模块来提取按局部频率分组的点的特征。我们同时提取了空间域的局部特征,以补充最终特征。结果S2ANet 被应用于多个点云分析任务中;它在 ModelNet40、ShapeNetCore 和 ScanObjectNN 数据集上的分类准确率分别达到了 93.8%、88.0% 和 83.1%,达到了最先进的水平。在室内场景分割方面,在 S3DIS 数据集上进行了训练和测试,平均交集超过联合的比例为 62.4%。
{"title":"S2ANet: Combining local spectral and spatial point grouping for point cloud processing","authors":"Yujie LIU,&nbsp;Xiaorui SUN,&nbsp;Wenbin SHAO,&nbsp;Yafu YUAN","doi":"10.1016/j.vrih.2023.06.005","DOIUrl":"10.1016/j.vrih.2023.06.005","url":null,"abstract":"<div><h3>Background</h3><p>Despite the recent progress in 3D point cloud processing using deep convolutional neural networks, the inability to extract local features remains a challenging problem. In addition, existing methods consider only the spatial domain in the feature extraction process.</p></div><div><h3>Methods</h3><p>In this paper, we propose a spectral and spatial aggregation convolutional network (S<sup>2</sup>ANet), which combines spectral and spatial features for point cloud processing. First, we calculate the local frequency of the point cloud in the spectral domain. Then, we use the local frequency to group points and provide a spectral aggregation convolution module to extract the features of the points grouped by the local frequency. We simultaneously extract the local features in the spatial domain to supplement the final features.</p></div><div><h3>Results</h3><p>S<sup>2</sup>ANet was applied in several point cloud analysis tasks; it achieved state-of-the-art classification accuracies of 93.8%, 88.0%, and 83.1% on the ModelNet40, ShapeNetCore, and ScanObjectNN datasets, respectively. For indoor scene segmentation, training and testing were performed on the S3DIS dataset, and the mean intersection over union was 62.4%.</p></div><div><h3>Conclusions</h3><p>The proposed S<sup>2</sup>ANet can effectively capture the local geometric information of point clouds, thereby improving accuracy on various tasks.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"6 4","pages":"Pages 267-279"},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000360/pdfft?md5=718a7d943dc6468abf44b38521bcc2cb&pid=1-s2.0-S2096579623000360-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating animatable 3D cartoon faces from single portraits 从单个肖像生成可动画化的 3D 卡通人脸
Q1 Computer Science Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.010
Chuanyu PAN , Guowei YANG , Taijiang MU , Yu-Kun LAI

Background

With the development of virtual reality (VR) technology, there is a growing need for customized 3D avatars. However, traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to the person being modeled. This study presents a novel framework for generating animatable 3D cartoon faces from a single portrait image.

Methods

First, we transferred an input real-world portrait to a stylized cartoon image using StyleGAN. We then proposed a two-stage reconstruction method to recover a 3D cartoon face with detailed texture. Our two-stage strategy initially performs coarse estimation based on template models and subsequently refines the model by nonrigid deformation under landmark supervision. Finally, we proposed a semantic-preserving face-rigging method based on manually created templates and deformation transfer.

Conclusions

Compared with prior arts, the qualitative and quantitative results show that our method achieves better accuracy, aesthetics, and similarity criteria. Furthermore, we demonstrated the capability of the proposed 3D model for real-time facial animation.

背景随着虚拟现实(VR)技术的发展,人们对定制三维头像的需求越来越大。然而,传统的三维头像建模方法要么耗时,要么无法保持与被建模者的相似性。本研究提出了一种新颖的框架,用于从单个肖像图像生成可动画化的三维卡通人脸。方法首先,我们使用 StyleGAN 将输入的真实世界肖像转为风格化的卡通图像。然后,我们提出了一种两阶段重建方法,以恢复具有详细纹理的三维卡通人脸。我们的两阶段策略首先基于模板模型进行粗略估计,然后在地标监督下通过非刚性变形完善模型。最后,我们提出了一种基于人工创建模板和变形转移的语义保护人脸重建方法。结论与之前的技术相比,定性和定量结果表明我们的方法实现了更好的准确性、美观性和相似性标准。此外,我们还证明了所提出的三维模型在实时面部动画方面的能力。
{"title":"Generating animatable 3D cartoon faces from single portraits","authors":"Chuanyu PAN ,&nbsp;Guowei YANG ,&nbsp;Taijiang MU ,&nbsp;Yu-Kun LAI","doi":"10.1016/j.vrih.2023.06.010","DOIUrl":"10.1016/j.vrih.2023.06.010","url":null,"abstract":"<div><h3>Background</h3><p>With the development of virtual reality (VR) technology, there is a growing need for customized 3D avatars. However, traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to the person being modeled. This study presents a novel framework for generating animatable 3D cartoon faces from a single portrait image.</p></div><div><h3>Methods</h3><p>First, we transferred an input real-world portrait to a stylized cartoon image using StyleGAN. We then proposed a two-stage reconstruction method to recover a 3D cartoon face with detailed texture. Our two-stage strategy initially performs coarse estimation based on template models and subsequently refines the model by nonrigid deformation under landmark supervision. Finally, we proposed a semantic-preserving face-rigging method based on manually created templates and deformation transfer.</p></div><div><h3>Conclusions</h3><p>Compared with prior arts, the qualitative and quantitative results show that our method achieves better accuracy, aesthetics, and similarity criteria. Furthermore, we demonstrated the capability of the proposed 3D model for real-time facial animation.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"6 4","pages":"Pages 292-307"},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000359/pdfft?md5=e0641053e4314662ffe5dca1c167d86b&pid=1-s2.0-S2096579623000359-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
‘There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience 每次走进办公室的门,我都有点创伤后应激障碍":勒索软件的危害和影响受害组织经历的因素
IF 3.9 Q1 SOCIAL SCIENCES, INTERDISCIPLINARY Pub Date : 2024-07-30 DOI: 10.1093/cybsec/tyae013
Gareth Mott, Sarah Turner, Jason R C Nurse, Nandita Pattnaik, Jamie MacColl, Pia Huesch, James Sullivan
Ransomware is a pernicious contemporary cyber threat for organizations, with ransomware operators intentionally leveraging a range of harms against their victims in order to solicit increasingly significant ransom payments. This article advances current research by engaging in a topical analysis into the depth and breadth of harms experienced by victim organizations and their members of staff. We, therefore, enhance the understanding of the negative experiences from ransomware attacks, particularly looking beyond the financial impact which dominates current narratives. Having conducted an interview or workshop with 83 professionals including ransomware victims, incident responders, ransom negotiators, law enforcement, and government, we identify a wide array of severe harms. For organizations, the risk of business interruption and/or data exposure presents potentially highly impactful financial and reputational harm(s). The victim organization’s staff can also experience a range of under-reported harms, which include physiological and physical harms that may be acute. We also identify factors that can either alleviate or aggravate the experiencing of harms at the organizational and employee level; including ransomware preparedness, leadership culture, and crisis communication. Given the scale and scope of the identified harms, the paper provides significant new empirical evidence to emphasize ransomware’s positioning as a whole-of-organization crisis phenomenon, as opposed to an ‘IT problem’. We argue that the wider discourse surrounding ransomware harms and impacts should be reflective of the nature of the real-term experience(s) of victims. This, in turn, could help guide efforts to alleviate ransomware harms, through improved organizational ransomware preparedness and tailored post-ransomware mitigation.
勒索软件是当代组织面临的一种有害的网络威胁,勒索软件的操作者有意利用一系列对受害者的伤害来索取越来越多的赎金。本文通过对受害组织及其员工所经历的伤害的深度和广度进行专题分析,推进了当前的研究。因此,我们加深了对勒索软件攻击带来的负面体验的理解,尤其是超越了目前主要叙述的财务影响。在与包括勒索软件受害者、事件响应者、赎金谈判者、执法部门和政府在内的 83 位专业人士进行访谈或举办研讨会后,我们发现了一系列严重的危害。对组织而言,业务中断和/或数据暴露的风险可能会造成严重的财务和声誉损害。受害组织的员工也可能经历一系列未被充分报告的伤害,其中包括可能很严重的生理和身体伤害。我们还确定了可减轻或加重组织和员工层面伤害的因素,包括勒索软件的准备工作、领导文化和危机沟通。鉴于所发现的危害的规模和范围,本文提供了重要的新经验证据,强调了勒索软件作为整个组织危机现象的定位,而非 "IT 问题"。我们认为,围绕勒索软件危害和影响的更广泛讨论应反映受害者实际经历的性质。反过来,这也有助于通过改善组织对勒索软件的准备工作和量身定制的勒索软件后缓解措施来指导减轻勒索软件危害的工作。
{"title":"‘There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience","authors":"Gareth Mott, Sarah Turner, Jason R C Nurse, Nandita Pattnaik, Jamie MacColl, Pia Huesch, James Sullivan","doi":"10.1093/cybsec/tyae013","DOIUrl":"https://doi.org/10.1093/cybsec/tyae013","url":null,"abstract":"Ransomware is a pernicious contemporary cyber threat for organizations, with ransomware operators intentionally leveraging a range of harms against their victims in order to solicit increasingly significant ransom payments. This article advances current research by engaging in a topical analysis into the depth and breadth of harms experienced by victim organizations and their members of staff. We, therefore, enhance the understanding of the negative experiences from ransomware attacks, particularly looking beyond the financial impact which dominates current narratives. Having conducted an interview or workshop with 83 professionals including ransomware victims, incident responders, ransom negotiators, law enforcement, and government, we identify a wide array of severe harms. For organizations, the risk of business interruption and/or data exposure presents potentially highly impactful financial and reputational harm(s). The victim organization’s staff can also experience a range of under-reported harms, which include physiological and physical harms that may be acute. We also identify factors that can either alleviate or aggravate the experiencing of harms at the organizational and employee level; including ransomware preparedness, leadership culture, and crisis communication. Given the scale and scope of the identified harms, the paper provides significant new empirical evidence to emphasize ransomware’s positioning as a whole-of-organization crisis phenomenon, as opposed to an ‘IT problem’. We argue that the wider discourse surrounding ransomware harms and impacts should be reflective of the nature of the real-term experience(s) of victims. This, in turn, could help guide efforts to alleviate ransomware harms, through improved organizational ransomware preparedness and tailored post-ransomware mitigation.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":"145 1","pages":""},"PeriodicalIF":3.9,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141866680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
nPPoS: Non-interactive practical proof-of-storage for blockchain nPPoS:区块链非交互式实用存储证明
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-19 DOI: 10.1016/j.bcra.2024.100221
Jun Wook Heo, Gowri Ramachandran, Raja Jurdak
Blockchain full nodes are pivotal for transaction availability, as they store the entire ledger, but verifying their storage integrity faces challenges from malicious remote storage attacks such as Sybil, outsourcing, and generation attacks. However, there is no suitable proof-of-storage solution for blockchain full nodes to ensure a healthy number of replicas of the ledger. Existing proof-of-storage solutions are designed for general-purpose settings where a data owner uses secret information to verify storage, rendering them unsuitable for blockchain where proof-of-storage must be fast, publicly verifiable, and data owner-agnostic. This paper introduces a decentralised and quantum-resistant solution named Non-interactive Practical Proof of Storage (nPPoS) with an asymmetric encoding and decoding scheme for fast and secure PoStorage and Zero-Knowledge Scalable Transparent Arguments of Knowledge (zk-STARKs) for public variability in blockchain full nodes. The algorithm with asymmetric times for encoding and decoding creates unique block replicas and corresponding proofs for each storage node to mitigate malicious remote attacks and minimise performance degradation. The intentional resource-intensive encoding deters attacks, while faster decoding minimises performance overhead. Through zk-STARKs, nPPoS achieves public verifiability, enabling one-to-many verification for scalability, quantum resistance and decentralisation. It also introduces a two-phase randomisation technique and a time-weighted trustworthiness measurement for scalability and adaptability.
区块链全节点是交易可用性的关键,因为它们存储了整个账本,但验证其存储完整性面临着恶意远程存储攻击(如 Sybil、外包和生成攻击)的挑战。然而,目前还没有合适的区块链全节点存储证明解决方案来确保账本有健康的副本数量。现有的存储证明解决方案是为数据所有者使用秘密信息验证存储的通用设置而设计的,因此不适合区块链,因为区块链的存储证明必须快速、可公开验证,并且与数据所有者无关。本文介绍了一种名为 "非交互式实用存储证明(nPPoS)"的去中心化和抗量子解决方案,它采用非对称编码和解码方案,用于快速、安全的 PoStorage 和零知识可扩展透明知识论证(zk-STARKs),以实现区块链全节点的公共可变性。该算法的编码和解码时间不对称,为每个存储节点创建唯一的区块副本和相应的证明,以减轻恶意远程攻击并最大限度地减少性能下降。有意识的资源密集型编码可阻止攻击,而更快的解码可将性能开销降至最低。通过zk-STARKs,nPPoS实现了公共可验证性,实现了一对多的验证,从而实现了可扩展性、量子抗性和去中心化。它还引入了两阶段随机化技术和时间加权可信度测量,以实现可扩展性和适应性。
{"title":"nPPoS: Non-interactive practical proof-of-storage for blockchain","authors":"Jun Wook Heo,&nbsp;Gowri Ramachandran,&nbsp;Raja Jurdak","doi":"10.1016/j.bcra.2024.100221","DOIUrl":"10.1016/j.bcra.2024.100221","url":null,"abstract":"<div><div>Blockchain full nodes are pivotal for transaction availability, as they store the entire ledger, but verifying their storage integrity faces challenges from malicious remote storage attacks such as Sybil, outsourcing, and generation attacks. However, there is no suitable proof-of-storage solution for blockchain full nodes to ensure a healthy number of replicas of the ledger. Existing proof-of-storage solutions are designed for general-purpose settings where a data owner uses secret information to verify storage, rendering them unsuitable for blockchain where proof-of-storage must be fast, publicly verifiable, and data owner-agnostic. This paper introduces a decentralised and quantum-resistant solution named <em>Non-interactive Practical Proof of Storage (nPPoS) with an asymmetric encoding and decoding scheme for fast and secure PoStorage and Zero-Knowledge Scalable Transparent Arguments of Knowledge (zk-STARKs)</em> for public variability in blockchain full nodes. The algorithm with asymmetric times for encoding and decoding creates unique block replicas and corresponding proofs for each storage node to mitigate malicious remote attacks and minimise performance degradation. The intentional resource-intensive encoding deters attacks, while faster decoding minimises performance overhead. Through zk-STARKs, nPPoS achieves public verifiability, enabling one-to-many verification for scalability, quantum resistance and decentralisation. It also introduces a two-phase randomisation technique and a time-weighted trustworthiness measurement for scalability and adaptability.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 4","pages":"Article 100221"},"PeriodicalIF":6.9,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141853546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Interplay Between Social Awareness and the Use of Bed Nets in a Malaria Control Program 探索疟疾控制计划中社会意识与蚊帐使用之间的相互作用
Q1 Social Sciences Pub Date : 2024-07-14 DOI: 10.1016/j.jobb.2024.06.005
Iffatricia Haura Febiriana , Dipo Aldila , Bevina Desjwiandra Handari , Puji Budi Setia Asih , Muhamad Hifzhudin Noor Aziz

This research aims to understand the effect of human awareness and the use of bed nets on malaria control programs. A deterministic host-vector mathematical model was utilized and simplified using the Quasi-Steady State Approximation, assuming the mosquito population is at equilibrium due to its fast, dynamic behavior. The model reveals two equilibrium states: the malaria-free equilibrium and the endemic equilibrium. The malaria-free equilibrium is locally asymptotically stable when the basic reproduction number is less than one and unstable if it is larger than one. Conversely, the malaria-endemic equilibrium is unique and stable if the reproduction number exceeds one and does not exist otherwise. Based on incidence data from Papua, parameter estimation and sensitivity analyses indicate that human awareness and the use of bed nets significantly reduce the reproduction number. To address budget constraints for interventions, the model was reformulated as an optimal control problem, characterized using the Pontryagin Maximum Principle, and solved with the forward–backward sweep method. Numerical experiments were conducted to assess the impact of various scenarios on the malaria control program. Cost-effectiveness analyses employing ACER, ICER, and IAR metrics suggest that while the combined implementation of awareness campaigns and bed nets effectively reduces infections, it incurs high costs. In contrast, implementing human awareness campaigns alone emerges as the best strategy based on ACER, ICER, and IAR standards. This study demonstrates that enhancing human awareness and promoting the use of bed nets are effective strategies for controlling malaria. However, due to budget constraints, focusing solely on awareness campaigns proves to be the most cost-effective intervention. This approach not only reduces malaria transmission but also optimizes resource allocation, highlighting the importance of targeted educational programs in public health initiatives for malaria control.

这项研究旨在了解人类意识和蚊帐的使用对疟疾控制计划的影响。研究利用了一个确定性宿主-媒介数学模型,并使用准稳态近似法进行了简化,假设蚊子种群因其快速、动态的行为而处于平衡状态。该模型揭示了两种平衡状态:无疟疾平衡和地方病平衡。当基本繁殖数小于 1 时,无疟疾平衡是局部渐近稳定的;当基本繁殖数大于 1 时,无疟疾平衡是不稳定的。相反,如果繁殖数大于 1,疟疾流行均衡是唯一且稳定的,否则不存在。根据巴布亚的发病率数据,参数估计和敏感性分析表明,人的意识和蚊帐的使用能显著降低繁殖数。为解决干预措施的预算限制问题,该模型被重新表述为一个最优控制问题,利用庞特里亚金最大原则对其进行表征,并采用前向-后向扫频方法进行求解。通过数值实验评估了各种方案对疟疾控制计划的影响。采用 ACER、ICER 和 IAR 指标进行的成本效益分析表明,虽然联合实施宣传活动和蚊帐能有效降低感染率,但成本较高。相比之下,根据 ACER、ICER 和 IAR 标准,单独开展提高人类意识的活动是最佳策略。这项研究表明,提高人们的意识和推广使用蚊帐是控制疟疾的有效策略。然而,由于预算限制,仅专注于宣传活动被证明是最具成本效益的干预措施。这种方法不仅能减少疟疾传播,还能优化资源分配,突出了有针对性的教育计划在疟疾控制公共卫生行动中的重要性。
{"title":"Exploring the Interplay Between Social Awareness and the Use of Bed Nets in a Malaria Control Program","authors":"Iffatricia Haura Febiriana ,&nbsp;Dipo Aldila ,&nbsp;Bevina Desjwiandra Handari ,&nbsp;Puji Budi Setia Asih ,&nbsp;Muhamad Hifzhudin Noor Aziz","doi":"10.1016/j.jobb.2024.06.005","DOIUrl":"10.1016/j.jobb.2024.06.005","url":null,"abstract":"<div><p>This research aims to understand the effect of human awareness and the use of bed nets on malaria control programs. A deterministic host-vector mathematical model was utilized and simplified using the Quasi-Steady State Approximation, assuming the mosquito population is at equilibrium due to its fast, dynamic behavior. The model reveals two equilibrium states: the malaria-free equilibrium and the endemic equilibrium. The malaria-free equilibrium is locally asymptotically stable when the basic reproduction number is less than one and unstable if it is larger than one. Conversely, the malaria-endemic equilibrium is unique and stable if the reproduction number exceeds one and does not exist otherwise. Based on incidence data from Papua, parameter estimation and sensitivity analyses indicate that human awareness and the use of bed nets significantly reduce the reproduction number. To address budget constraints for interventions, the model was reformulated as an optimal control problem, characterized using the Pontryagin Maximum Principle, and solved with the forward–backward sweep method. Numerical experiments were conducted to assess the impact of various scenarios on the malaria control program. Cost-effectiveness analyses employing ACER, ICER, and IAR metrics suggest that while the combined implementation of awareness campaigns and bed nets effectively reduces infections, it incurs high costs. In contrast, implementing human awareness campaigns alone emerges as the best strategy based on ACER, ICER, and IAR standards. This study demonstrates that enhancing human awareness and promoting the use of bed nets are effective strategies for controlling malaria. However, due to budget constraints, focusing solely on awareness campaigns proves to be the most cost-effective intervention. This approach not only reduces malaria transmission but also optimizes resource allocation, highlighting the importance of targeted educational programs in public health initiatives for malaria control.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"6 3","pages":"Pages 196-210"},"PeriodicalIF":0.0,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000359/pdfft?md5=286803da5b7a0c85dfa5ff19326db67a&pid=1-s2.0-S2588933824000359-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PrivySeC: A secure and privacy-compliant distributed framework for personal data sharing in IoT ecosystems PrivySeC:物联网生态系统中个人数据共享的安全且符合隐私标准的分布式框架
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-09 DOI: 10.1016/j.bcra.2024.100220
Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Massimo Piccardi, Daniel Franklin
The contemporary era is experiencing an unprecedented dependence on data generated by individuals via an array of interconnected devices constituting the Internet of Things (IoT). The information amassed through IoT devices serves many objectives, including prescriptive analytics and predictive maintenance, preemptive healthcare measures, disaster mitigation, operational efficiency, and increased yield. In contrast, most applications or systems that rely on user-generated data to fulfill their business objectives face challenges in adhering to privacy protocols. Consequently, users are exposed to many privacy risks. Such infringements upon privacy provisions give rise to apprehensions regarding the authenticity of the processed data. Hence, this paper presents the weaknesses and challenges in current practices and proposes “PrivySeC”, a Distributed Ledger Technology (DLT)-based framework for privacy preserving and secure sharing of personally and non-personally identifiable information. The security analysis indicates that the proposed solution ensures data privacy by design and complies with most of the requirements mandated by various privacy regulations. Similarly, PrivySeC promises low transaction latency and provides high throughput. Although we have created a privacy-preserving solution for sharing smart farm data, it can be customized to meet the specific privacy requirements of individual applications.
当今时代,人们对个人通过构成物联网(IoT)的一系列互联设备产生的数据的依赖程度前所未有。通过物联网设备积累的信息可实现许多目标,包括规范性分析和预测性维护、先发制人的医疗保健措施、减灾、运营效率和提高产量。相比之下,大多数依赖用户生成的数据来实现业务目标的应用程序或系统在遵守隐私协议方面都面临挑战。因此,用户面临许多隐私风险。这种对隐私条款的侵犯会引起人们对所处理数据真实性的担忧。因此,本文介绍了当前实践中的弱点和挑战,并提出了 "PrivySeC"--一种基于分布式账本技术(DLT)的框架,用于保护隐私并安全共享个人和非个人身份信息。安全分析表明,拟议的解决方案从设计上确保了数据隐私,并符合各种隐私法规规定的大多数要求。同样,PrivySeC 承诺交易延迟低,吞吐量高。虽然我们已经为共享智能农场数据创建了一个保护隐私的解决方案,但它还可以进行定制,以满足个别应用的特定隐私要求。
{"title":"PrivySeC: A secure and privacy-compliant distributed framework for personal data sharing in IoT ecosystems","authors":"Imran Makhdoom,&nbsp;Mehran Abolhasan,&nbsp;Justin Lipman,&nbsp;Massimo Piccardi,&nbsp;Daniel Franklin","doi":"10.1016/j.bcra.2024.100220","DOIUrl":"10.1016/j.bcra.2024.100220","url":null,"abstract":"<div><div>The contemporary era is experiencing an unprecedented dependence on data generated by individuals via an array of interconnected devices constituting the Internet of Things (IoT). The information amassed through IoT devices serves many objectives, including prescriptive analytics and predictive maintenance, preemptive healthcare measures, disaster mitigation, operational efficiency, and increased yield. In contrast, most applications or systems that rely on user-generated data to fulfill their business objectives face challenges in adhering to privacy protocols. Consequently, users are exposed to many privacy risks. Such infringements upon privacy provisions give rise to apprehensions regarding the authenticity of the processed data. Hence, this paper presents the weaknesses and challenges in current practices and proposes “PrivySeC”, a Distributed Ledger Technology (DLT)-based framework for privacy preserving and secure sharing of personally and non-personally identifiable information. The security analysis indicates that the proposed solution ensures data privacy by design and complies with most of the requirements mandated by various privacy regulations. Similarly, PrivySeC promises low transaction latency and provides high throughput. Although we have created a privacy-preserving solution for sharing smart farm data, it can be customized to meet the specific privacy requirements of individual applications.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 4","pages":"Article 100220"},"PeriodicalIF":6.9,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141697045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 科技通报 计算机与应用化学 电子工业专用设备 河北工业科技 Journal of Applied Sciences 中国科学技术大学学报 印制电路信息 Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 南京邮电大学学报(自然科学版) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 华南理工大学学报(自然科学版) 中国图象图形学报 雷达学报 信息与控制 数据采集与处理 机器人 西北工业大学学报 High Technology Letters Journal of Cybersecurity 中国科学:信息科学 Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art 清华大学学报(自然科学版) 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 信息通信技术 数据分析和信息处理(英文)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1