首页 > 最新文献

High-Confidence Computing最新文献

英文 中文
A survey for light field super-resolution 光场超分辨率调查
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.1016/j.hcc.2024.100206
Mingyuan Zhao , Hao Sheng , Da Yang , Sizhe Wang , Ruixuan Cong , Zhenglong Cui , Rongshan Chen , Tun Wang , Shuai Wang , Yang Huang , Jiahao Shen

Compared to 2D imaging data, the 4D light field (LF) data retains richer scene’s structure information, which can significantly improve the computer’s perception capability, including depth estimation, semantic segmentation, and LF rendering. However, there is a contradiction between spatial and angular resolution during the LF image acquisition period. To overcome the above problem, researchers have gradually focused on the light field super-resolution (LFSR). In the traditional solutions, researchers achieved the LFSR based on various optimization frameworks, such as Bayesian and Gaussian models. Deep learning-based methods are more popular than conventional methods because they have better performance and more robust generalization capabilities. In this paper, the present approach can mainly divided into conventional methods and deep learning-based methods. We discuss these two branches in light field spatial super-resolution (LFSSR), light field angular super-resolution (LFASR), and light field spatial and angular super-resolution (LFSASR), respectively. Subsequently, this paper also introduces the primary public datasets and analyzes the performance of the prevalent approaches on these datasets. Finally, we discuss the potential innovations of the LFSR to propose the progress of our research field.

与二维成像数据相比,四维光场(LF)数据保留了更丰富的场景结构信息,可显著提高计算机的感知能力,包括深度估计、语义分割和 LF 渲染。然而,在 LF 图像采集期间,空间分辨率和角度分辨率之间存在矛盾。为了克服上述问题,研究人员逐渐将目光投向了光场超分辨率(LFSR)。在传统解决方案中,研究人员基于贝叶斯模型和高斯模型等各种优化框架实现了 LFSR。与传统方法相比,基于深度学习的方法具有更好的性能和更强大的泛化能力,因此更受欢迎。在本文中,目前的方法主要分为传统方法和基于深度学习的方法。我们分别在光场空间超分辨率(LFSSR)、光场角度超分辨率(LFASR)和光场空间与角度超分辨率(LFSASR)中讨论这两个分支。随后,本文还介绍了主要的公共数据集,并分析了这些数据集上常用方法的性能。最后,我们讨论了 LFSR 的潜在创新,以提出我们研究领域的进展。
{"title":"A survey for light field super-resolution","authors":"Mingyuan Zhao ,&nbsp;Hao Sheng ,&nbsp;Da Yang ,&nbsp;Sizhe Wang ,&nbsp;Ruixuan Cong ,&nbsp;Zhenglong Cui ,&nbsp;Rongshan Chen ,&nbsp;Tun Wang ,&nbsp;Shuai Wang ,&nbsp;Yang Huang ,&nbsp;Jiahao Shen","doi":"10.1016/j.hcc.2024.100206","DOIUrl":"10.1016/j.hcc.2024.100206","url":null,"abstract":"<div><p>Compared to 2D imaging data, the 4D light field (LF) data retains richer scene’s structure information, which can significantly improve the computer’s perception capability, including depth estimation, semantic segmentation, and LF rendering. However, there is a contradiction between spatial and angular resolution during the LF image acquisition period. To overcome the above problem, researchers have gradually focused on the light field super-resolution (LFSR). In the traditional solutions, researchers achieved the LFSR based on various optimization frameworks, such as Bayesian and Gaussian models. Deep learning-based methods are more popular than conventional methods because they have better performance and more robust generalization capabilities. In this paper, the present approach can mainly divided into conventional methods and deep learning-based methods. We discuss these two branches in light field spatial super-resolution (LFSSR), light field angular super-resolution (LFASR), and light field spatial and angular super-resolution (LFSASR), respectively. Subsequently, this paper also introduces the primary public datasets and analyzes the performance of the prevalent approaches on these datasets. Finally, we discuss the potential innovations of the LFSR to propose the progress of our research field.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100206"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000096/pdfft?md5=71deba58809585186ae13284da5a82d9&pid=1-s2.0-S2667295224000096-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139631869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data cube-based storage optimization for resource-constrained edge computing 基于数据立方体的存储优化,适用于资源受限的边缘计算
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-28 DOI: 10.1016/j.hcc.2024.100212
In the evolving landscape of the digital era, edge computing emerges as an essential paradigm, especially critical for low-latency, real-time applications and Internet of Things (IoT) environments. Despite its advantages, edge computing faces severe limitations in storage capabilities and is fraught with reliability issues due to its resource-constrained nature and exposure to challenging conditions. To address these challenges, this work presents a tailored storage mechanism for edge computing, focusing on space efficiency and data reliability. Our method comprises three key steps: relation factorization, column clustering, and erasure encoding with compression. We successfully reduce the required storage space by deconstructing complex database tables and optimizing data organization within these sub-tables. We further add a layer of reliability through erasure encoding. Comprehensive experiments on TPC-H datasets substantiate our approach, demonstrating storage savings of up to 38.35% and time efficiency improvements by 3.96x in certain cases. Furthermore, our clustering technique shows a potential for additional storage reduction up to 40.41%.
在不断发展的数字时代,边缘计算成为一种重要的模式,对于低延迟、实时应用和物联网(IoT)环境尤为重要。尽管边缘计算具有诸多优势,但由于其资源受限的特性和暴露在挑战性条件下,边缘计算在存储能力方面面临着严重的限制,并且充满了可靠性问题。为了应对这些挑战,本研究提出了一种为边缘计算量身定制的存储机制,重点关注空间效率和数据可靠性。我们的方法包括三个关键步骤:关系因式分解、列聚类和压缩擦除编码。我们通过分解复杂的数据库表并优化这些子表内的数据组织,成功地减少了所需的存储空间。我们还通过擦除编码进一步增加了可靠性。在 TPC-H 数据集上进行的综合实验证实了我们的方法,在某些情况下,存储空间节省高达 38.35%,时间效率提高了 3.96 倍。此外,我们的聚类技术还显示出额外减少 40.41% 存储空间的潜力。
{"title":"Data cube-based storage optimization for resource-constrained edge computing","authors":"","doi":"10.1016/j.hcc.2024.100212","DOIUrl":"10.1016/j.hcc.2024.100212","url":null,"abstract":"<div><div>In the evolving landscape of the digital era, edge computing emerges as an essential paradigm, especially critical for low-latency, real-time applications and Internet of Things (IoT) environments. Despite its advantages, edge computing faces severe limitations in storage capabilities and is fraught with reliability issues due to its resource-constrained nature and exposure to challenging conditions. To address these challenges, this work presents a tailored storage mechanism for edge computing, focusing on space efficiency and data reliability. Our method comprises three key steps: relation factorization, column clustering, and erasure encoding with compression. We successfully reduce the required storage space by deconstructing complex database tables and optimizing data organization within these sub-tables. We further add a layer of reliability through erasure encoding. Comprehensive experiments on TPC-H datasets substantiate our approach, demonstrating storage savings of up to 38.35% and time efficiency improvements by 3.96x in certain cases. Furthermore, our clustering technique shows a potential for additional storage reduction up to 40.41%.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100212"},"PeriodicalIF":3.2,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140464490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An investigation of the private-attribute leakage in WiFi sensing 对 WiFi 传感中私人属性泄露的调查
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-03 DOI: 10.1016/j.hcc.2024.100209
WiFi sensing is critical to many applications, such as localization, human activity recognition, and contact-less health monitoring. With metaverse and ubiquitous sensing advances, WiFi sensing becomes increasingly imperative. However, as shown in this paper, WiFi sensing data leaks users’ private attributes (e.g., height, weight, and gender), violating increasingly stricter privacy protection laws and regulations. To demonstrate the leakage of private attributes in WiFi sensing, we investigate two public WiFi sensing datasets and apply a deep learning model to recognize users’ private attributes. Our experimental results clearly show that our model can identify users’ private attributes in WiFi sensing data collected by general WiFi applications, with almost 100% accuracy for gender inference, less than 4 cm error for height inference, and about 4 kg error for weight inference, respectively. Our finding calls for research efforts to preserve data privacy while enabling WiFi sensing-based applications.
WiFi 传感对许多应用都至关重要,例如定位、人类活动识别和非接触式健康监测。随着元数据和无处不在的传感技术的发展,WiFi 传感变得越来越必要。然而,正如本文所示,WiFi 感知数据会泄露用户的私人属性(如身高、体重和性别),从而违反日益严格的隐私保护法律法规。为了证明 WiFi 感知中私人属性的泄露,我们研究了两个公共 WiFi 感知数据集,并应用深度学习模型来识别用户的私人属性。实验结果清楚地表明,我们的模型可以识别一般 WiFi 应用收集的 WiFi 感知数据中的用户隐私属性,性别推断的准确率几乎达到 100%,身高推断的误差小于 4 厘米,体重推断的误差约为 4 千克。我们的研究结果要求在实现基于 WiFi 感知的应用的同时,努力保护数据隐私。
{"title":"An investigation of the private-attribute leakage in WiFi sensing","authors":"","doi":"10.1016/j.hcc.2024.100209","DOIUrl":"10.1016/j.hcc.2024.100209","url":null,"abstract":"<div><div>WiFi sensing is critical to many applications, such as localization, human activity recognition, and contact-less health monitoring. With metaverse and ubiquitous sensing advances, WiFi sensing becomes increasingly imperative. However, as shown in this paper, WiFi sensing data leaks users’ private attributes (e.g., height, weight, and gender), violating increasingly stricter privacy protection laws and regulations. To demonstrate the leakage of private attributes in WiFi sensing, we investigate two public WiFi sensing datasets and apply a deep learning model to recognize users’ private attributes. Our experimental results clearly show that our model can identify users’ private attributes in WiFi sensing data collected by general WiFi applications, with almost 100% accuracy for gender inference, less than 4 cm error for height inference, and about 4 kg error for weight inference, respectively. Our finding calls for research efforts to preserve data privacy while enabling WiFi sensing-based applications.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100209"},"PeriodicalIF":3.2,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139817746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
H-hop independently submodular maximization problem with curvature 有曲率的 H 跳独立亚模态最大化问题
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-02 DOI: 10.1016/j.hcc.2024.100208
Yang Lv , Chenchen Wu , Dachuan Xu , Ruiqi Yang

The Connected Sensor Problem (CSP) presents a prevalent challenge in the realms of communication and Internet of Things (IoT) applications. Its primary aim is to maximize the coverage of users while maintaining connectivity among K sensors. Addressing the challenge of managing a large user base alongside a finite number of candidate locations, this paper proposes an extension to the CSP: the h-hop independently submodular maximization problem characterized by curvature α. We have developed an approximation algorithm that achieves a ratio of 1eα(2h+3)α. The efficacy of this algorithm is demonstrated on the CSP, where it shows superior performance over existing algorithms, marked by an average enhancement of 8.4%.

互联传感器问题(CSP)是通信和物联网(IoT)应用领域的一个普遍挑战。其主要目的是最大限度地扩大用户覆盖范围,同时保持 K 个传感器之间的连接。为了应对在有限的候选位置中管理庞大用户群的挑战,本文提出了 CSP 的扩展:以曲率 α 为特征的 h 跳独立亚模块最大化问题。我们在 CSP 上证明了这种算法的有效性,它比现有算法表现出更优越的性能,平均提高了 8.4%。
{"title":"H-hop independently submodular maximization problem with curvature","authors":"Yang Lv ,&nbsp;Chenchen Wu ,&nbsp;Dachuan Xu ,&nbsp;Ruiqi Yang","doi":"10.1016/j.hcc.2024.100208","DOIUrl":"10.1016/j.hcc.2024.100208","url":null,"abstract":"<div><p>The Connected Sensor Problem (CSP) presents a prevalent challenge in the realms of communication and Internet of Things (IoT) applications. Its primary aim is to maximize the coverage of users while maintaining connectivity among <em>K</em> sensors. Addressing the challenge of managing a large user base alongside a finite number of candidate locations, this paper proposes an extension to the CSP: the h-hop independently submodular maximization problem characterized by curvature <span><math><mi>α</mi></math></span>. We have developed an approximation algorithm that achieves a ratio of <span><math><mfrac><mrow><mn>1</mn><mo>−</mo><msup><mrow><mi>e</mi></mrow><mrow><mo>−</mo><mi>α</mi></mrow></msup></mrow><mrow><mrow><mo>(</mo><mn>2</mn><mi>h</mi><mo>+</mo><mn>3</mn><mo>)</mo></mrow><mi>α</mi></mrow></mfrac></math></span>. The efficacy of this algorithm is demonstrated on the CSP, where it shows superior performance over existing algorithms, marked by an average enhancement of 8.4%.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100208"},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000114/pdfft?md5=6545def2e75a2c91befd56e66f41423d&pid=1-s2.0-S2667295224000114-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139818439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bioinvasion risk analysis based on automatic identification system and marine ecoregion data 基于自动识别系统和海洋生态区数据的生物入侵风险分析
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-02 DOI: 10.1016/j.hcc.2024.100210
Hongwei Shi , Chenyu Wang , Hang Zhao , Shengling Wang , Yixian Chen
The global maritime trade plays a key role in propagating alien aquatic invasive species, which incurs side effects in terms of environment, human health and economy. The existing biosecurity methods did not take into account the invaded risk as well as the diffusion of invasive species at the same time, which may lead to inadequate bioinvasion control. In addition, the lack of considering the impact of bioinvasion control on shipping also makes their methods cost-ineffective. To solve the problems of the existing methods, we employ the automatic identification system (AIS) data, the ballast water data and the water temperature & salinity data to construct two networks: the species invasion network (SIN) and the global shipping network (GSN). The former is used to analyze the potential of a port in propagating marine invasive species while the latter is employed to evaluate the shipping importance of ports. Based on the analysis of SIN and GSN, two categories of biosecurity triggering mechanisms are proposed. The first category takes into consideration both being bioinvaded and spreading invasive species and the second one concerns the shipping value of each port besides its invasion risk. A lot of case studies have been done to discover the key ports needed to be controlled preferentially under the guide of the proposed biosecurity triggering mechanisms. Finally, our correlation analysis shows that closeness is most highly correlated to the invasion risk.
全球海上贸易在传播外来水生入侵物种方面发挥着关键作用,对环境、人类健康和经济造成了副作用。现有的生物安全方法没有同时考虑入侵风险和入侵物种的扩散,这可能导致生物入侵控制不力。此外,由于没有考虑生物入侵控制对航运的影响,其方法也不符合成本效益。为了解决现有方法存在的问题,我们利用自动识别系统(AIS)数据、压载水数据和水温& 盐度数据构建了两个网络:物种入侵网络(SIN)和全球航运网络(GSN)。前者用于分析港口传播海洋入侵物种的潜力,后者用于评估港口航运的重要性。根据对 SIN 和 GSN 的分析,提出了两类生物安全触发机制。第一类既考虑到生物入侵,也考虑到入侵物种的传播;第二类除了考虑入侵风险,还考虑到每个港口的航运价值。通过大量的案例研究,我们发现了在所提出的生物安全触发机制指导下需要优先控制的关键港口。最后,我们的相关性分析表明,近距离与入侵风险的相关性最高。
{"title":"Bioinvasion risk analysis based on automatic identification system and marine ecoregion data","authors":"Hongwei Shi ,&nbsp;Chenyu Wang ,&nbsp;Hang Zhao ,&nbsp;Shengling Wang ,&nbsp;Yixian Chen","doi":"10.1016/j.hcc.2024.100210","DOIUrl":"10.1016/j.hcc.2024.100210","url":null,"abstract":"<div><div>The global maritime trade plays a key role in propagating alien aquatic invasive species, which incurs side effects in terms of environment, human health and economy. The existing biosecurity methods did not take into account the invaded risk as well as the diffusion of invasive species at the same time, which may lead to inadequate bioinvasion control. In addition, the lack of considering the impact of bioinvasion control on shipping also makes their methods cost-ineffective. To solve the problems of the existing methods, we employ the automatic identification system (AIS) data, the ballast water data and the water temperature &amp; salinity data to construct two networks: the species invasion network (SIN) and the global shipping network (GSN). The former is used to analyze the potential of a port in propagating marine invasive species while the latter is employed to evaluate the shipping importance of ports. Based on the analysis of SIN and GSN, two categories of biosecurity triggering mechanisms are proposed. The first category takes into consideration both being bioinvaded and spreading invasive species and the second one concerns the shipping value of each port besides its invasion risk. A lot of case studies have been done to discover the key ports needed to be controlled preferentially under the guide of the proposed biosecurity triggering mechanisms. Finally, our correlation analysis shows that closeness is most highly correlated to the invasion risk.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100210"},"PeriodicalIF":3.2,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139816780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic anomaly detection algorithm for CAN bus using similarity analysis 使用相似性分析的 CAN 总线流量异常检测算法
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-24 DOI: 10.1016/j.hcc.2024.100207

Recently, vehicles have experienced a rise in networking and informatization, leading to increased security concerns. As the most widely used automotive bus network, the Controller Area Network (CAN) bus is vulnerable to attacks, as security was not considered in its original design. This paper proposes SIDuBzip2, a traffic anomaly detection method for the CAN bus based on the bzip2 compression algorithm. The proposed method utilizes the pseudo-periodic characteristics of CAN bus traffic, constructing time series of CAN IDs and calculating the similarity between adjacent time series to identify abnormal traffic. The method consists of three parts: the conversion of CAN ID values to characters, the calculation of similarity based on bzip2 compression, and the optimal solution of model parameters. The experimental results demonstrate that the proposed SIDuBzip2 method effectively detects various attacks, including Denial of Service , replay, basic injection, mixed injection, and suppression attacks. In addition, existing CAN bus traffic anomaly detection methods are compared with the proposed method in terms of performance and delay, demonstrating the feasibility of the proposed method.

近来,汽车网络化和信息化程度不断提高,导致安全问题日益突出。作为应用最广泛的汽车总线网络,控制器局域网(CAN)总线在最初设计时并没有考虑到安全问题,因此很容易受到攻击。本文提出了一种基于 bzip2 压缩算法的 CAN 总线流量异常检测方法 SIDuBzip2。该方法利用 CAN 总线流量的伪周期特性,构建 CAN ID 的时间序列,并计算相邻时间序列之间的相似性,从而识别异常流量。该方法由三部分组成:CAN ID 值到字符的转换、基于 bzip2 压缩的相似性计算以及模型参数的最优解。实验结果表明,所提出的 SIDuBzip2 方法能有效检测出各种攻击,包括拒绝服务攻击、重放攻击、基本注入攻击、混合注入攻击和抑制攻击。此外,还将现有的 CAN 总线流量异常检测方法与所提出的方法在性能和延迟方面进行了比较,证明了所提出方法的可行性。
{"title":"Traffic anomaly detection algorithm for CAN bus using similarity analysis","authors":"","doi":"10.1016/j.hcc.2024.100207","DOIUrl":"10.1016/j.hcc.2024.100207","url":null,"abstract":"<div><p>Recently, vehicles have experienced a rise in networking and informatization, leading to increased security concerns. As the most widely used automotive bus network, the Controller Area Network (CAN) bus is vulnerable to attacks, as security was not considered in its original design. This paper proposes SIDuBzip2, a traffic anomaly detection method for the CAN bus based on the bzip2 compression algorithm. The proposed method utilizes the pseudo-periodic characteristics of CAN bus traffic, constructing time series of CAN IDs and calculating the similarity between adjacent time series to identify abnormal traffic. The method consists of three parts: the conversion of CAN ID values to characters, the calculation of similarity based on bzip2 compression, and the optimal solution of model parameters. The experimental results demonstrate that the proposed SIDuBzip2 method effectively detects various attacks, including Denial of Service , replay, basic injection, mixed injection, and suppression attacks. In addition, existing CAN bus traffic anomaly detection methods are compared with the proposed method in terms of performance and delay, demonstrating the feasibility of the proposed method.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100207"},"PeriodicalIF":3.2,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000102/pdfft?md5=b2ff302140dd063117041177fe6d1399&pid=1-s2.0-S2667295224000102-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139631378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure blockchain bidding auction protocol against malicious adversaries 抵御恶意对手的安全区块链竞价拍卖协议
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-11 DOI: 10.1016/j.hcc.2024.100201
Xiaobing Dai , Jiajing Liu , Xin Liu , Xiaofen Tu , Ruexue Wang

In recent years, with the development of blockchain, electronic bidding auction has received more and more attention. Aiming at the possible problems of privacy leakage in the current electronic bidding and auction, this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries, which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party. The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography. It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants, which can solve the problem of resisting malicious adversary attacks. The security of the protocol is proved by the real/ideal model paradigm, and the efficiency of the protocol is analyzed. The efficiency of the protocol is verified by simulating experiments, and the protocol has practical value.

近年来,随着区块链的发展,电子竞价拍卖受到越来越多的关注。针对目前电子竞价拍卖中可能存在的隐私泄露问题,本文提出了一种基于区块链的对抗恶意对手的电子竞价拍卖系统,利用安全多方计算实现无可信第三方的安全竞价拍卖协议。本文提出的协议是一种基于阈值椭圆曲线密码学的电子竞价拍卖方案。它可以在没有任何第三方的情况下,针对参与者的一些恶意行为完成竞价拍卖,解决了抵御恶意对手攻击的问题。通过真实/理想模型范式证明了协议的安全性,并分析了协议的效率。通过模拟实验验证了协议的效率,协议具有实用价值。
{"title":"Secure blockchain bidding auction protocol against malicious adversaries","authors":"Xiaobing Dai ,&nbsp;Jiajing Liu ,&nbsp;Xin Liu ,&nbsp;Xiaofen Tu ,&nbsp;Ruexue Wang","doi":"10.1016/j.hcc.2024.100201","DOIUrl":"10.1016/j.hcc.2024.100201","url":null,"abstract":"<div><p>In recent years, with the development of blockchain, electronic bidding auction has received more and more attention. Aiming at the possible problems of privacy leakage in the current electronic bidding and auction, this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries, which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party. The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography. It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants, which can solve the problem of resisting malicious adversary attacks. The security of the protocol is proved by the real/ideal model paradigm, and the efficiency of the protocol is analyzed. The efficiency of the protocol is verified by simulating experiments, and the protocol has practical value.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100201"},"PeriodicalIF":0.0,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000047/pdfft?md5=319168477025da7fd78f5308eb341778&pid=1-s2.0-S2667295224000047-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139635497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cognitive spectrum allocation scheme for data transmission in smart distribution grids 用于智能配电网数据传输的认知频谱分配方案
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-11 DOI: 10.1016/j.hcc.2024.100198
Zhongguo Zhou , You Li , Ziming Zhu , Qinghe Gao , Sisi Xiao , Tao Yan , Yan Huo

As the communication needs in the smart distribution grid continue to rise, using existing resources to meet this growing demand poses a significant challenge. This paper researches on spectrum allocation strategies utilizing cognitive radio (CR) technology. We consider a model containing strong time-sensitive and regular communication service requirements such as distribution terminal communication services, which can be seen as a user with primary data (PD) and weak time-sensitive services such as power quality monitoring, which can be seen as a user with secondary data (SD). To fit the diversity of services in smart distribution grids (SDGs), we formulate an optimization problem with two indicators, including the sum of SD transmission rates and the maximum latency of them. Then, we analyze the two convex sub-problems and utilize convex optimization methods to obtain the optimal power and frequency bandwidth allocation for the users with SD. The simulation results indicate that, when the available transmission power of SD is low, Maximization of Transmission Sum Rate (MTSR) achieves lower maximum transmit time. Conversely, when the available transmission power is high, the performance of Minimization of the Maximum Latency (MML) is better, compared with MTSR.

随着智能配电网的通信需求不断增加,如何利用现有资源满足日益增长的需求成为一项重大挑战。本文研究了利用认知无线电(CR)技术的频谱分配策略。我们考虑了一个包含强时间敏感性和常规通信服务需求的模型,如配电终端通信服务,它可以被看作是拥有一次数据(PD)的用户,以及弱时间敏感性服务,如电能质量监测,它可以被看作是拥有二次数据(SD)的用户。为了适应智能配电网(SDGs)中服务的多样性,我们提出了一个优化问题,其中包含两个指标,包括 SD 传输速率之和及其最大延迟。然后,我们分析了这两个凸子问题,并利用凸优化方法获得了标清用户的最优功率和频率带宽分配。仿真结果表明,当 SD 的可用传输功率较低时,最大化传输总和速率(MTSR)能获得较低的最大传输时间。相反,当可用传输功率较高时,最大延迟最小化(MML)与 MTSR 相比性能更好。
{"title":"A cognitive spectrum allocation scheme for data transmission in smart distribution grids","authors":"Zhongguo Zhou ,&nbsp;You Li ,&nbsp;Ziming Zhu ,&nbsp;Qinghe Gao ,&nbsp;Sisi Xiao ,&nbsp;Tao Yan ,&nbsp;Yan Huo","doi":"10.1016/j.hcc.2024.100198","DOIUrl":"10.1016/j.hcc.2024.100198","url":null,"abstract":"<div><p>As the communication needs in the smart distribution grid continue to rise, using existing resources to meet this growing demand poses a significant challenge. This paper researches on spectrum allocation strategies utilizing cognitive radio (CR) technology. We consider a model containing strong time-sensitive and regular communication service requirements such as distribution terminal communication services, which can be seen as a user with primary data (PD) and weak time-sensitive services such as power quality monitoring, which can be seen as a user with secondary data (SD). To fit the diversity of services in smart distribution grids (SDGs), we formulate an optimization problem with two indicators, including the sum of SD transmission rates and the maximum latency of them. Then, we analyze the two convex sub-problems and utilize convex optimization methods to obtain the optimal power and frequency bandwidth allocation for the users with SD. The simulation results indicate that, when the available transmission power of SD is low, <em>Maximization of Transmission Sum Rate</em> (MTSR) achieves lower maximum transmit time. Conversely, when the available transmission power is high, the performance of <em>Minimization of the Maximum Latency</em> (MML) is better, compared with MTSR.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100198"},"PeriodicalIF":0.0,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000011/pdfft?md5=1b5e9cb9577d5d4bd670a7738919fe96&pid=1-s2.0-S2667295224000011-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139632186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of fault tolerant consensus in wireless networks 无线网络容错共识调查
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-09 DOI: 10.1016/j.hcc.2024.100202
Yifei Zou , Li Yang , Guanlin Jing , Ruirui Zhang , Zhenzhen Xie , Huiqun Li , Dongxiao Yu

Wireless networks have become integral to modern communication systems, enabling the seamless exchange of information across a myriad of applications. However, the inherent characteristics of wireless channels, such as fading, interference, and openness, pose significant challenges to achieving fault-tolerant consensus within these networks. Fault-tolerant consensus, a critical aspect of distributed systems, ensures that network nodes collectively agree on a consistent value even in the presence of faulty or compromised components. This survey paper provides a comprehensive overview of fault-tolerant consensus mechanisms specifically tailored for wireless networks. We explore the diverse range of consensus protocols and techniques that have been developed to address the unique challenges of wireless environments. The paper systematically categorizes these consensus mechanisms based on their underlying principles, communication models, and fault models. It investigates how these mechanisms handle various types of faults, including communication errors, node failures, and malicious attacks. It highlights key use cases, such as sensor networks, Internet of Things (IoT) applications, wireless blockchain, and vehicular networks, where fault-tolerant consensus plays a pivotal role in ensuring reliable and accurate data dissemination.

无线网络已成为现代通信系统中不可或缺的一部分,可在无数应用中实现信息的无缝交换。然而,无线信道的固有特性,如衰减、干扰和开放性,给在这些网络中实现容错共识带来了巨大挑战。容错共识是分布式系统的一个重要方面,它能确保网络节点即使在组件出现故障或受损的情况下,也能就一致的值达成集体共识。本调查报告全面概述了专为无线网络量身定制的容错共识机制。我们探讨了为应对无线环境的独特挑战而开发的各种共识协议和技术。本文根据这些共识机制的基本原理、通信模型和故障模型对其进行了系统分类。它研究了这些机制如何处理各种类型的故障,包括通信错误、节点故障和恶意攻击。论文重点介绍了传感器网络、物联网(IoT)应用、无线区块链和车载网络等关键用例,在这些用例中,容错共识在确保数据传播的可靠性和准确性方面发挥着关键作用。
{"title":"A survey of fault tolerant consensus in wireless networks","authors":"Yifei Zou ,&nbsp;Li Yang ,&nbsp;Guanlin Jing ,&nbsp;Ruirui Zhang ,&nbsp;Zhenzhen Xie ,&nbsp;Huiqun Li ,&nbsp;Dongxiao Yu","doi":"10.1016/j.hcc.2024.100202","DOIUrl":"10.1016/j.hcc.2024.100202","url":null,"abstract":"<div><p>Wireless networks have become integral to modern communication systems, enabling the seamless exchange of information across a myriad of applications. However, the inherent characteristics of wireless channels, such as fading, interference, and openness, pose significant challenges to achieving fault-tolerant consensus within these networks. Fault-tolerant consensus, a critical aspect of distributed systems, ensures that network nodes collectively agree on a consistent value even in the presence of faulty or compromised components. This survey paper provides a comprehensive overview of fault-tolerant consensus mechanisms specifically tailored for wireless networks. We explore the diverse range of consensus protocols and techniques that have been developed to address the unique challenges of wireless environments. The paper systematically categorizes these consensus mechanisms based on their underlying principles, communication models, and fault models. It investigates how these mechanisms handle various types of faults, including communication errors, node failures, and malicious attacks. It highlights key use cases, such as sensor networks, Internet of Things (IoT) applications, wireless blockchain, and vehicular networks, where fault-tolerant consensus plays a pivotal role in ensuring reliable and accurate data dissemination.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100202"},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000059/pdfft?md5=7d04cf1493be0e5575ab310a74881d83&pid=1-s2.0-S2667295224000059-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139457898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outlier item detection in bundle recommendation via the attention mechanism 通过关注机制检测捆绑推荐中的异常项目
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-05 DOI: 10.1016/j.hcc.2024.100200
Yuan Liang

Bundle recommendation offers users more holistic insights by recommending multiple compatible items at once. However, the intricate correlations between items, varied user preferences, and the pronounced data sparsity in combinations present significant challenges for bundle recommendation algorithms. Furthermore, current bundle recommendation methods fail to identify mismatched items within a given set, a process termed as “outlier item detection”. These outlier items are those with the weakest correlations within a bundle. Identifying them can aid users in refining their item combinations. While the correlation among items can predict the detection of such outliers, the adaptability of combinations might not be adequately responsive to shifts in individual items during the learning phase. This limitation can hinder the algorithm’s performance. To tackle these challenges, we introduce an encoder–decoder architecture tailored for outlier item detection. The encoder learns potential item correlations through a self-attention mechanism. Concurrently, the decoder garners efficient inference frameworks by directly assessing item anomalies. We have validated the efficacy and efficiency of our proposed algorithm using real-world datasets.

捆绑推荐通过同时推荐多个兼容项目为用户提供更全面的洞察。然而,项目之间错综复杂的相关性、不同的用户偏好以及组合中明显的数据稀疏性给捆绑推荐算法带来了巨大挑战。此外,当前的捆绑推荐方法无法识别给定集合中不匹配的项目,这一过程被称为 "离群项目检测"。这些离群项是捆绑推荐中相关性最弱的项目。识别它们可以帮助用户完善其项目组合。虽然项目之间的相关性可以预测这类离群项的检测,但在学习阶段,组合的适应性可能无法充分应对单个项目的变化。这种局限性会妨碍算法的性能。为了应对这些挑战,我们引入了一种为离群项检测量身定制的编码器-解码器架构。编码器通过自我关注机制学习潜在的项目相关性。同时,解码器通过直接评估项目异常情况来获得高效的推理框架。我们利用现实世界的数据集验证了我们提出的算法的功效和效率。
{"title":"Outlier item detection in bundle recommendation via the attention mechanism","authors":"Yuan Liang","doi":"10.1016/j.hcc.2024.100200","DOIUrl":"10.1016/j.hcc.2024.100200","url":null,"abstract":"<div><p>Bundle recommendation offers users more holistic insights by recommending multiple compatible items at once. However, the intricate correlations between items, varied user preferences, and the pronounced data sparsity in combinations present significant challenges for bundle recommendation algorithms. Furthermore, current bundle recommendation methods fail to identify mismatched items within a given set, a process termed as “outlier item detection”. These outlier items are those with the weakest correlations within a bundle. Identifying them can aid users in refining their item combinations. While the correlation among items can predict the detection of such outliers, the adaptability of combinations might not be adequately responsive to shifts in individual items during the learning phase. This limitation can hinder the algorithm’s performance. To tackle these challenges, we introduce an encoder–decoder architecture tailored for outlier item detection. The encoder learns potential item correlations through a self-attention mechanism. Concurrently, the decoder garners efficient inference frameworks by directly assessing item anomalies. We have validated the efficacy and efficiency of our proposed algorithm using real-world datasets.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100200"},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000035/pdfft?md5=efa091405aad1bbcc69d7febeec7012b&pid=1-s2.0-S2667295224000035-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139393106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
High-Confidence Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1