首页 > 最新文献

High-Confidence Computing最新文献

英文 中文
Food safety testing by negentropy-sorted kernel independent component analysis based on infrared spectroscopy 基于红外光谱的负熵排序核独立成分分析法进行食品安全检测
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-28 DOI: 10.1016/j.hcc.2023.100197
Jing Liu, Limiao Deng, Zhongzhi Han

In the field of food safety testing, variety, brand, origin, and adulteration are four important factors. In this study, a novel food safety testing method based on infrared spectroscopy is proposed to investigate these factors. Fourier transform infrared spectroscopy data are analyzed using negentropy-sorted kernel independent component analysis (NS-kICA) as the feature optimization method. To rank the components, negentropy is performed to measure the non-Gaussian independent components. In our experiment, the proposed method was run on four datasets to comprehensively investigate the variety, brand, origin, and adulteration of agricultural products. The experimental results show that NS-kICA outperforms conventional feature selection methods. The support vector machine model outperforms the backpropagation artificial neural network and partial least squares models. The combination of NS-kICA and support vector machine (SVM) is the best method for achieving high, stable, and efficient recognition performance. These findings are of great importance for food safety testing.

在食品安全检测领域,品种、品牌、产地和掺假是四个重要因素。本研究提出了一种基于红外光谱的新型食品安全检测方法来研究这些因素。傅立叶变换红外光谱数据采用负熵排序核独立成分分析(NS-kICA)作为特征优化方法进行分析。为了对成分进行排序,采用了负熵来测量非高斯独立成分。在实验中,我们在四个数据集上运行了所提出的方法,以全面调查农产品的品种、品牌、产地和掺假情况。实验结果表明,NS-kICA 优于传统的特征选择方法。支持向量机模型优于反向传播人工神经网络和偏最小二乘法模型。NS-kICA 与支持向量机(SVM)的结合是实现高识别性能、稳定性和高效性的最佳方法。这些发现对食品安全检测具有重要意义。
{"title":"Food safety testing by negentropy-sorted kernel independent component analysis based on infrared spectroscopy","authors":"Jing Liu,&nbsp;Limiao Deng,&nbsp;Zhongzhi Han","doi":"10.1016/j.hcc.2023.100197","DOIUrl":"10.1016/j.hcc.2023.100197","url":null,"abstract":"<div><p>In the field of food safety testing, variety, brand, origin, and adulteration are four important factors. In this study, a novel food safety testing method based on infrared spectroscopy is proposed to investigate these factors. Fourier transform infrared spectroscopy data are analyzed using negentropy-sorted kernel independent component analysis (NS-kICA) as the feature optimization method. To rank the components, negentropy is performed to measure the non-Gaussian independent components. In our experiment, the proposed method was run on four datasets to comprehensively investigate the variety, brand, origin, and adulteration of agricultural products. The experimental results show that NS-kICA outperforms conventional feature selection methods. The support vector machine model outperforms the backpropagation artificial neural network and partial least squares models. The combination of NS-kICA and support vector machine (SVM) is the best method for achieving high, stable, and efficient recognition performance. These findings are of great importance for food safety testing.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100197"},"PeriodicalIF":0.0,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000958/pdfft?md5=b8bd33e2cea03cbd8890ca8538dee20c&pid=1-s2.0-S2667295223000958-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139188126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hierarchical byzantine fault tolerance consensus protocol for the Internet of Things 面向物联网的分层拜占庭容错共识协议
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-20 DOI: 10.1016/j.hcc.2023.100196
Rongxin Guo , Zhenping Guo , Zerui Lin , Wenxian Jiang

The inefficiency of Consensus protocols is a significant impediment to blockchain and IoT convergence development. To solve the problems like inefficiency and poor dynamics of the Practical Byzantine Fault Tolerance (PBFT) in IoT scenarios, a hierarchical consensus protocol called DCBFT is proposed. Above all, we propose an improved k-sums algorithm to build a two-level consensus cluster, achieving an hierarchical management for IoT devices. Next, A scalable two-level consensus protocol is proposed, which uses a multi-primary node mechanism to solve the single-point-of-failure problem. In addition, a data synchronization process is introduced to ensure the consistency of block data after view changes. Finally, A dynamic reputation evaluation model is introduced to update the nodes’ reputation values and complete the rotation of consensus nodes at the end of each consensus round. The experimental results show that DCBFT has a more robust dynamic and higher consensus efficiency. Moreover, After running for some time, the performance of DCBFT shows some improvement.

共识协议的低效率是区块链与物联网融合发展的一大障碍。为了解决实用拜占庭容错(PBFT)在物联网场景下的低效和动态性差等问题,我们提出了一种名为 DCBFT 的分层共识协议。首先,我们提出了一种改进的 k-sums 算法来构建两级共识集群,从而实现物联网设备的分级管理。接下来,我们提出了一种可扩展的两级共识协议,它采用多主节点机制来解决单点故障问题。此外,还引入了数据同步过程,以确保视图更改后块数据的一致性。最后,引入了动态声誉评估模型来更新节点的声誉值,并在每轮共识结束时完成共识节点的轮换。实验结果表明,DCBFT 具有更稳健的动态性和更高的共识效率。此外,在运行一段时间后,DCBFT 的性能有了一定的提高。
{"title":"A hierarchical byzantine fault tolerance consensus protocol for the Internet of Things","authors":"Rongxin Guo ,&nbsp;Zhenping Guo ,&nbsp;Zerui Lin ,&nbsp;Wenxian Jiang","doi":"10.1016/j.hcc.2023.100196","DOIUrl":"10.1016/j.hcc.2023.100196","url":null,"abstract":"<div><p>The inefficiency of Consensus protocols is a significant impediment to blockchain and IoT convergence development. To solve the problems like inefficiency and poor dynamics of the Practical Byzantine Fault Tolerance (PBFT) in IoT scenarios, a hierarchical consensus protocol called DCBFT is proposed. Above all, we propose an improved k-sums algorithm to build a two-level consensus cluster, achieving an hierarchical management for IoT devices. Next, A scalable two-level consensus protocol is proposed, which uses a multi-primary node mechanism to solve the single-point-of-failure problem. In addition, a data synchronization process is introduced to ensure the consistency of block data after view changes. Finally, A dynamic reputation evaluation model is introduced to update the nodes’ reputation values and complete the rotation of consensus nodes at the end of each consensus round. The experimental results show that DCBFT has a more robust dynamic and higher consensus efficiency. Moreover, After running for some time, the performance of DCBFT shows some improvement.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100196"},"PeriodicalIF":3.2,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000946/pdfft?md5=319d5156a64f46754b47a19c3c570818&pid=1-s2.0-S2667295223000946-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138992888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a reliable route protocol for mobile self-organization networks 为移动自组织网络开发可靠的路由协议
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-13 DOI: 10.1016/j.hcc.2023.100194
Shaohu Li, Bei Gong

Mobile ad hoc networks (MANETs), which correspond to a novel wireless technology, are widely used in Internet of Things (IoT) systems such as drones, wireless sensor networks, and military or disaster relief communication. From the perspective of communication and data collection, the success rate of collaborations between nodes in mobile ad hoc networks and reliability of data collection mainly depend on whether the nodes in the network operate normally, namely, according to the established network rules. However, mobile ad hoc networks are vulnerable to attacks targeting transmission channels and nodes owing to their dynamic evolution, openness, and distributed characteristics. Therefore, during the network operation, it is necessary to classify and detect the behavior and characteristics of each node. However, most existing research only analyzes and considers responses against a single or small number of attacks. To address these issues, this article first systematically analyzed and classified common active attacks in MANETs. Then, a node trust model was proposed based on the characteristics of various attacks; subsequently, a new secure routing protocol, namely, TC-AODV, was proposed. This protocol has minimal effect on the original communication dynamics and can effectively deal with Packet drop, wormhole, Session hijacking, and other main attacks in MANETs. The NS3 simulation results show that the proposed routing protocol attains good transmission performance, can effectively identify various attacks and bypass malicious nodes, and securely complete the communication process.

移动特设网络(MANET)是一种新型无线技术,被广泛应用于无人机、无线传感器网络、军事或救灾通信等物联网(IoT)系统中。从通信和数据收集的角度来看,移动 ad hoc 网络中节点间协作的成功率和数据收集的可靠性主要取决于网络中的节点是否正常运行,即是否按照既定的网络规则运行。然而,移动特设网络由于其动态演进、开放性和分布式等特点,很容易受到针对传输信道和节点的攻击。因此,在网络运行过程中,有必要对每个节点的行为和特征进行分类和检测。然而,现有研究大多只分析和考虑针对单一或少量攻击的应对措施。针对这些问题,本文首先对城域网中常见的主动攻击进行了系统分析和分类。然后,根据各种攻击的特点提出了节点信任模型;随后,提出了一种新的安全路由协议,即 TC-AODV。该协议对原有通信动态影响极小,能有效应对掉包、虫洞、会话劫持等城域网中的主要攻击。NS3 仿真结果表明,所提出的路由协议具有良好的传输性能,能有效识别各种攻击并绕过恶意节点,安全地完成通信过程。
{"title":"Developing a reliable route protocol for mobile self-organization networks","authors":"Shaohu Li,&nbsp;Bei Gong","doi":"10.1016/j.hcc.2023.100194","DOIUrl":"10.1016/j.hcc.2023.100194","url":null,"abstract":"<div><p>Mobile ad hoc networks (MANETs), which correspond to a novel wireless technology, are widely used in Internet of Things (IoT) systems such as drones, wireless sensor networks, and military or disaster relief communication. From the perspective of communication and data collection, the success rate of collaborations between nodes in mobile ad hoc networks and reliability of data collection mainly depend on whether the nodes in the network operate normally, namely, according to the established network rules. However, mobile ad hoc networks are vulnerable to attacks targeting transmission channels and nodes owing to their dynamic evolution, openness, and distributed characteristics. Therefore, during the network operation, it is necessary to classify and detect the behavior and characteristics of each node. However, most existing research only analyzes and considers responses against a single or small number of attacks. To address these issues, this article first systematically analyzed and classified common active attacks in MANETs. Then, a node trust model was proposed based on the characteristics of various attacks; subsequently, a new secure routing protocol, namely, TC-AODV, was proposed. This protocol has minimal effect on the original communication dynamics and can effectively deal with Packet drop, wormhole, Session hijacking, and other main attacks in MANETs. The NS3 simulation results show that the proposed routing protocol attains good transmission performance, can effectively identify various attacks and bypass malicious nodes, and securely complete the communication process.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100194"},"PeriodicalIF":3.2,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000922/pdfft?md5=53b7d00856a2e91f112b906eb37efea9&pid=1-s2.0-S2667295223000922-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fog-computing based mobility and resource management for resilient mobile networks 基于雾计算的移动性和资源管理,实现弹性移动网络
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-24 DOI: 10.1016/j.hcc.2023.100193
Hang Zhao, Shengling Wang, Hongwei Shi

Mobile networks are facing unprecedented challenges due to the traits of large scale, heterogeneity, and high mobility. Fortunately, the emergence of fog computing offers surprisingly perfect solutions considering the features of consumer proximity, wide-spread geographical distribution, and elastic resource sharing. In this paper, we propose a novel mobile networking framework based on fog computing which outperforms others in resilience. Our scheme is constituted of two parts: the personalized customization mobility management (MM) and the market-driven resource management (RM). The former provides a dynamically customized MM framework for any specific mobile node to optimize the handoff performance according to its traffic and mobility traits; the latter makes room for economic tussles to find out the competitive service providers offering a high level of service quality at sound prices. Synergistically, our proposed MM and RM schemes can holistically support a full-fledged resilient mobile network, which has been practically corroborated by numerical experiments.

移动网络因其大规模、异构性和高流动性等特点而面临着前所未有的挑战。幸运的是,雾计算的出现提供了令人惊喜的完美解决方案,它考虑到了消费者就近、广泛的地理分布和弹性资源共享等特点。在本文中,我们提出了一种基于雾计算的新型移动网络框架,该框架在弹性方面优于其他框架。我们的方案由两部分组成:个性化定制移动管理(MM)和市场驱动资源管理(RM)。前者为任何特定移动节点提供动态定制的移动性管理框架,以根据其流量和移动性特征优化切换性能;后者为经济角力留出空间,以找出以合理价格提供高水平服务质量的有竞争力的服务提供商。通过协同作用,我们提出的 MM 和 RM 方案可全面支持成熟的弹性移动网络,这一点已通过数值实验得到实际证实。
{"title":"Fog-computing based mobility and resource management for resilient mobile networks","authors":"Hang Zhao,&nbsp;Shengling Wang,&nbsp;Hongwei Shi","doi":"10.1016/j.hcc.2023.100193","DOIUrl":"10.1016/j.hcc.2023.100193","url":null,"abstract":"<div><p>Mobile networks are facing unprecedented challenges due to the traits of large scale, heterogeneity, and high mobility. Fortunately, the emergence of fog computing offers surprisingly perfect solutions considering the features of consumer proximity, wide-spread geographical distribution, and elastic resource sharing. In this paper, we propose a novel mobile networking framework based on fog computing which outperforms others in resilience. Our scheme is constituted of two parts: the personalized customization mobility management (MM) and the market-driven resource management (RM). The former provides a dynamically customized MM framework for any specific mobile node to optimize the handoff performance according to its traffic and mobility traits; the latter makes room for economic tussles to find out the competitive service providers offering a high level of service quality at sound prices. Synergistically, our proposed MM and RM schemes can holistically support a full-fledged resilient mobile network, which has been practically corroborated by numerical experiments.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100193"},"PeriodicalIF":0.0,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000910/pdfft?md5=14166eeafd4e4d042e4b4bbd39b389c3&pid=1-s2.0-S2667295223000910-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139297389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks 资源有限的无线传感器网络的匿名保护轻量级认证协议
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-24 DOI: 10.1016/j.hcc.2023.100178
Vincent Omollo Nyangaresi , Ganesh Keshaorao Yenurkar

Wireless sensor networks have been deployed in areas such as healthcare, military, transportation and home automation to collect data and forward it to remote users for further processing. Since open wireless communication channels are utilized for data transmissions, the exchanged messages are vulnerable to various threats such as eavesdropping and message falsifications. Therefore, many security solutions have been introduced to address these challenges. However, the resource-constrained nature of the sensor nodes makes it inefficient to deploy the conventional security schemes which require long keys for improved security. Therefore, lightweight authentication protocols have been presented. Unfortunately, majority of these schemes are still insecure while others incur relatively higher energy, computation, communication and storage complexities. In this paper, a protocol that deploys only lightweight one-way hashing and exclusive OR operations is presented. Its formal security analysis using Real-or Random (ROR) model demonstrates its capability to uphold the security of the derived session keys. In addition, its semantic security evaluation shows that it offers user privacy, anonymity, untraceability, authentication, session key agreement and key secrecy. Moreover, it is shown to resist attacks such as side-channeling, physical capture, eavesdropping, offline guessing, spoofing, password loss, session key disclosure, forgery and impersonations. In terms of performance, it has relatively lower communication overheads and improves the computation costs and supported security characteristics by 31.56% and 33.33% respectively.

无线传感器网络已被部署在医疗保健、军事、交通和家庭自动化等领域,用于收集数据并转发给远程用户进行进一步处理。由于数据传输使用的是开放式无线通信信道,交换的信息很容易受到窃听和信息伪造等各种威胁。因此,许多安全解决方案被引入以应对这些挑战。然而,由于传感器节点的资源有限,部署传统安全方案的效率很低,因为传统安全方案需要较长的密钥才能提高安全性。因此,轻量级认证协议应运而生。遗憾的是,这些方案大多仍不安全,而其他方案则会产生相对较高的能源、计算、通信和存储复杂性。本文介绍了一种仅部署轻量级单向散列和排他性 OR 操作的协议。利用实或随机(ROR)模型对其进行的正式安全性分析表明,该协议有能力维护衍生会话密钥的安全性。此外,其语义安全性评估表明,它提供了用户隐私、匿名性、不可追踪性、身份验证、会话密钥协议和密钥保密性。此外,它还能抵御侧信道、物理捕获、窃听、离线猜测、欺骗、密码丢失、会话密钥泄露、伪造和假冒等攻击。在性能方面,它的通信开销相对较低,计算成本和支持的安全特性分别提高了 31.56% 和 33.33%。
{"title":"Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks","authors":"Vincent Omollo Nyangaresi ,&nbsp;Ganesh Keshaorao Yenurkar","doi":"10.1016/j.hcc.2023.100178","DOIUrl":"10.1016/j.hcc.2023.100178","url":null,"abstract":"<div><p>Wireless sensor networks have been deployed in areas such as healthcare, military, transportation and home automation to collect data and forward it to remote users for further processing. Since open wireless communication channels are utilized for data transmissions, the exchanged messages are vulnerable to various threats such as eavesdropping and message falsifications. Therefore, many security solutions have been introduced to address these challenges. However, the resource-constrained nature of the sensor nodes makes it inefficient to deploy the conventional security schemes which require long keys for improved security. Therefore, lightweight authentication protocols have been presented. Unfortunately, majority of these schemes are still insecure while others incur relatively higher energy, computation, communication and storage complexities. In this paper, a protocol that deploys only lightweight one-way hashing and exclusive OR operations is presented. Its formal security analysis using Real-or Random (ROR) model demonstrates its capability to uphold the security of the derived session keys. In addition, its semantic security evaluation shows that it offers user privacy, anonymity, untraceability, authentication, session key agreement and key secrecy. Moreover, it is shown to resist attacks such as side-channeling, physical capture, eavesdropping, offline guessing, spoofing, password loss, session key disclosure, forgery and impersonations. In terms of performance, it has relatively lower communication overheads and improves the computation costs and supported security characteristics by 31.56% and 33.33% respectively.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100178"},"PeriodicalIF":0.0,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000764/pdfft?md5=d761183b678601441d00478ed3ce897b&pid=1-s2.0-S2667295223000764-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph reasoning over explicit semantic relation 明确语义关系的图推理
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-24 DOI: 10.1016/j.hcc.2023.100190
Tianyou Zhu, Shi Liu, Bo Li, Junjian Liu, Pufan Liu, Fei Zheng

Multi-hop reasoning over language or graphs represents a significant challenge in contemporary research, particularly with the reliance on deep neural networks. These networks are integral to text reasoning processes, yet they present challenges in extracting and representing domain or commonsense knowledge, and they often lack robust logical reasoning capabilities. To address these issues, we introduce an innovative text reasoning framework. This framework is grounded in the use of a semantic relation graph and a graph neural network, designed to enhance the model’s ability to encapsulate knowledge and facilitate complex multi-hop reasoning.

Our framework operates by extracting knowledge from a broad range of texts. It constructs a semantic relationship graph based on the logical relationships inherent in the reasoning process. Beginning with the core question, the framework methodically deduces key knowledge, using it as a guide to iteratively establish a complete evidence chain, thereby determining the final answer. Leveraging the advanced reasoning capabilities of the graph neural network, this approach is adept at multi-hop logical reasoning. It demonstrates strong performance in tasks like machine reading comprehension and question answering, while also clearly delineating the path of logical reasoning.

语言或图形上的多跳推理是当代研究中的一项重大挑战,尤其是对深度神经网络的依赖。这些网络在文本推理过程中不可或缺,但它们在提取和表示领域或常识性知识方面存在挑战,而且往往缺乏强大的逻辑推理能力。为了解决这些问题,我们引入了一个创新的文本推理框架。该框架以语义关系图和图神经网络的使用为基础,旨在增强模型封装知识和促进复杂多跳推理的能力。它根据推理过程中固有的逻辑关系构建语义关系图。从核心问题开始,该框架有条不紊地推导出关键知识,并以此为指导,反复建立完整的证据链,从而确定最终答案。利用图神经网络的高级推理能力,这种方法擅长多跳逻辑推理。它在机器阅读理解和问题解答等任务中表现出强劲的性能,同时还清晰地勾勒出逻辑推理的路径。
{"title":"Graph reasoning over explicit semantic relation","authors":"Tianyou Zhu,&nbsp;Shi Liu,&nbsp;Bo Li,&nbsp;Junjian Liu,&nbsp;Pufan Liu,&nbsp;Fei Zheng","doi":"10.1016/j.hcc.2023.100190","DOIUrl":"10.1016/j.hcc.2023.100190","url":null,"abstract":"<div><p>Multi-hop reasoning over language or graphs represents a significant challenge in contemporary research, particularly with the reliance on deep neural networks. These networks are integral to text reasoning processes, yet they present challenges in extracting and representing domain or commonsense knowledge, and they often lack robust logical reasoning capabilities. To address these issues, we introduce an innovative text reasoning framework. This framework is grounded in the use of a semantic relation graph and a graph neural network, designed to enhance the model’s ability to encapsulate knowledge and facilitate complex multi-hop reasoning.</p><p>Our framework operates by extracting knowledge from a broad range of texts. It constructs a semantic relationship graph based on the logical relationships inherent in the reasoning process. Beginning with the core question, the framework methodically deduces key knowledge, using it as a guide to iteratively establish a complete evidence chain, thereby determining the final answer. Leveraging the advanced reasoning capabilities of the graph neural network, this approach is adept at multi-hop logical reasoning. It demonstrates strong performance in tasks like machine reading comprehension and question answering, while also clearly delineating the path of logical reasoning.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100190"},"PeriodicalIF":0.0,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000880/pdfft?md5=828625193dc2302f5c9c29c69fed0f34&pid=1-s2.0-S2667295223000880-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data collection of wireless sensor network based on trajectory optimization of laser-charged UAV 基于激光充电无人机轨迹优化的无线传感器网络数据采集
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-24 DOI: 10.1016/j.hcc.2023.100181
Chuanwen Luo , Jian Zhang , Jin Qian , Yi Hong , Zhibo Chen , Yunan Hou , Xiujuan Zhang , Yuqing Zhu

Unmanned Aerial Vehicle (UAV) can be used as wireless aerial mobile base station for collecting data from sensors in UAV-based Wireless Sensor Networks (WSNs), which is crucial for providing seamless services and improving the performance in the next generation wireless networks. However, since the UAV are powered by batteries with limited energy capacity, the UAV cannot complete data collection tasks of all sensors without energy replenishment when a large number of sensors are deployed over large monitoring areas. To overcome this problem, we study the Real-time Data Collection with Laser-charging UAV (RDCL) problem, where the UAV is utilized to collect data from a specified WSN and is recharged using Laser Beam Directors (LBDs). This problem aims to collect all sensory data from the WSN and transport it to the base station by optimizing the flight trajectory of UAV such that real-time data performance is ensured It has been proven that the RDCL problem is NP-hard. To address this, we initially focus on studying two sub-problems, the Trajectory Optimization of UAV for Data Collection (TODC) problem and the Charging Trajectory Optimization of UAV (CTO) problem, whose objectives are to find the optimal flight plans of UAV in the data collection areas and charging areas, respectively. Then we propose an approximation algorithm to solve each of them with the constant factor. Subsequently, we present an approximation algorithm that utilizes the solutions obtained from TODC and CTO problems to address the RDCL problem. Finally, the proposed algorithm is verified by extensive simulations.

无人飞行器(UAV)可用作无线空中移动基站,用于收集基于无人飞行器的无线传感器网络(WSN)中传感器的数据,这对于提供无缝服务和提高下一代无线网络的性能至关重要。然而,由于无人机由能量有限的电池供电,当大量传感器部署在大面积监测区域时,无人机在没有能量补充的情况下无法完成所有传感器的数据收集任务。为了克服这一问题,我们研究了激光充电无人机实时数据收集(RDCL)问题,即利用无人机从指定的 WSN 收集数据,并使用激光束导引器(LBD)为无人机充电。该问题旨在通过优化无人机的飞行轨迹,从 WSN 收集所有感知数据并传输到基站,从而确保数据的实时性。为此,我们首先重点研究了两个子问题,即无人机数据采集轨迹优化(TODC)问题和无人机充电轨迹优化(CTO)问题,其目标分别是找到无人机在数据采集区域和充电区域的最优飞行计划。然后,我们提出了一种近似算法来求解这两个问题。随后,我们提出了一种近似算法,利用从 TODC 和 CTO 问题中获得的解来解决 RDCL 问题。最后,我们通过大量仿真验证了所提出的算法。
{"title":"Data collection of wireless sensor network based on trajectory optimization of laser-charged UAV","authors":"Chuanwen Luo ,&nbsp;Jian Zhang ,&nbsp;Jin Qian ,&nbsp;Yi Hong ,&nbsp;Zhibo Chen ,&nbsp;Yunan Hou ,&nbsp;Xiujuan Zhang ,&nbsp;Yuqing Zhu","doi":"10.1016/j.hcc.2023.100181","DOIUrl":"10.1016/j.hcc.2023.100181","url":null,"abstract":"<div><p>Unmanned Aerial Vehicle (UAV) can be used as wireless aerial mobile base station for collecting data from sensors in UAV-based Wireless Sensor Networks (WSNs), which is crucial for providing seamless services and improving the performance in the next generation wireless networks. However, since the UAV are powered by batteries with limited energy capacity, the UAV cannot complete data collection tasks of all sensors without energy replenishment when a large number of sensors are deployed over large monitoring areas. To overcome this problem, we study the Real-time Data Collection with Laser-charging UAV (RDCL) problem, where the UAV is utilized to collect data from a specified WSN and is recharged using Laser Beam Directors (LBDs). This problem aims to collect all sensory data from the WSN and transport it to the base station by optimizing the flight trajectory of UAV such that real-time data performance is ensured It has been proven that the RDCL problem is NP-hard. To address this, we initially focus on studying two sub-problems, the Trajectory Optimization of UAV for Data Collection (TODC) problem and the Charging Trajectory Optimization of UAV (CTO) problem, whose objectives are to find the optimal flight plans of UAV in the data collection areas and charging areas, respectively. Then we propose an approximation algorithm to solve each of them with the constant factor. Subsequently, we present an approximation algorithm that utilizes the solutions obtained from TODC and CTO problems to address the RDCL problem. Finally, the proposed algorithm is verified by extensive simulations.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100181"},"PeriodicalIF":0.0,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266729522300079X/pdfft?md5=3775a80148dcbf7a3e65166e29bb5334&pid=1-s2.0-S266729522300079X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedQMIX: Communication-efficient federated learning via multi-agent reinforcement learning FedQMIX:通过多代理强化学习实现通信效率高的联合学习
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-23 DOI: 10.1016/j.hcc.2023.100179
Shaohua Cao , Hanqing Zhang , Tian Wen , Hongwei Zhao , Quancheng Zheng , Weishan Zhang , Danyang Zheng

Since the data samples on client devices are usually non-independent and non-identically distributed (non-IID), this will challenge the convergence of federated learning (FL) and reduce communication efficiency. This paper proposes FedQMIX, a node selection algorithm based on multi-agent reinforcement learning(MARL), to address these challenges. Firstly, we observe a connection between model weights and data distribution, and a clustering algorithm can group clients with similar data distribution into the same cluster. Secondly, we propose a QMIX-based mechanism that learns to select devices from clustering results in each communication round to maximize the reward, penalizing the use of more communication rounds and thereby improving the communication efficiency of FL. Finally, experiments show that FedQMIX can reduce the number of communication rounds by 11% and 30% on the MNIST and CIFAR-10 datasets, respectively, compared to the baseline algorithm (Favor).

由于客户端设备上的数据样本通常是非独立和非同分布的(non-IID),这将对联合学习(FL)的收敛性提出挑战,并降低通信效率。本文提出了一种基于多代理强化学习(MARL)的节点选择算法 FedQMIX,以应对这些挑战。首先,我们观察到模型权重与数据分布之间存在联系,而聚类算法可以将数据分布相似的客户端归入同一个群组。其次,我们提出了一种基于 QMIX 的机制,该机制在每一轮通信中学习从聚类结果中选择设备,使奖励最大化,惩罚使用更多通信轮次,从而提高 FL 的通信效率。最后,实验表明,与基线算法(Favor)相比,FedQMIX 在 MNIST 和 CIFAR-10 数据集上可分别减少 11% 和 30% 的通信轮数。
{"title":"FedQMIX: Communication-efficient federated learning via multi-agent reinforcement learning","authors":"Shaohua Cao ,&nbsp;Hanqing Zhang ,&nbsp;Tian Wen ,&nbsp;Hongwei Zhao ,&nbsp;Quancheng Zheng ,&nbsp;Weishan Zhang ,&nbsp;Danyang Zheng","doi":"10.1016/j.hcc.2023.100179","DOIUrl":"10.1016/j.hcc.2023.100179","url":null,"abstract":"<div><p>Since the data samples on client devices are usually non-independent and non-identically distributed (non-IID), this will challenge the convergence of federated learning (FL) and reduce communication efficiency. This paper proposes FedQMIX, a node selection algorithm based on multi-agent reinforcement learning(MARL), to address these challenges. Firstly, we observe a connection between model weights and data distribution, and a clustering algorithm can group clients with similar data distribution into the same cluster. Secondly, we propose a QMIX-based mechanism that learns to select devices from clustering results in each communication round to maximize the reward, penalizing the use of more communication rounds and thereby improving the communication efficiency of FL. Finally, experiments show that FedQMIX can reduce the number of communication rounds by 11% and 30% on the MNIST and CIFAR-10 datasets, respectively, compared to the baseline algorithm (Favor).</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100179"},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000776/pdfft?md5=9424588f5b02e7d1cae86ff00cee768b&pid=1-s2.0-S2667295223000776-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139293479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: Privacy-preserving smart contract SoK:隐私保护智能合约
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-23 DOI: 10.1016/j.hcc.2023.100183
Huayi Qi, Minghui Xu, Dongxiao Yu, Xiuzhen Cheng

The privacy concern in smart contract applications continues to grow, leading to the proposal of various schemes aimed at developing comprehensive and universally applicable privacy-preserving smart contract (PPSC) schemes. However, the existing research in this area is fragmented and lacks a comprehensive system overview. This paper aims to bridge the existing research gap on PPSC schemes by systematizing previous studies in this field. The primary focus is on two categories: PPSC schemes based on cryptographic tools like zero-knowledge proofs, as well as schemes based on trusted execution environments. In doing so, we aim to provide a condensed summary of the different approaches taken in constructing PPSC schemes. Additionally, we also offer a comparative analysis of these approaches, highlighting the similarities and differences between them. Furthermore, we shed light on the challenges that developers face when designing and implementing PPSC schemes. Finally, we delve into potential future directions for improving and advancing these schemes, discussing possible avenues for further research and development.

人们对智能合约应用中的隐私问题日益关注,因此提出了各种旨在开发全面、普遍适用的隐私保护智能合约(PPSC)方案。然而,该领域的现有研究比较零散,缺乏全面的系统概述。本文旨在通过系统梳理该领域的前人研究,弥补现有关于 PPSC 方案的研究空白。主要关注两类问题:基于零知识证明等加密工具的 PPSC 方案,以及基于可信执行环境的方案。在此过程中,我们旨在简要总结构建 PPSC 方案的不同方法。此外,我们还对这些方法进行了比较分析,强调了它们之间的异同。此外,我们还阐明了开发人员在设计和实施 PPSC 方案时所面临的挑战。最后,我们深入探讨了改进和推进这些方案的潜在未来方向,讨论了进一步研究和开发的可能途径。
{"title":"SoK: Privacy-preserving smart contract","authors":"Huayi Qi,&nbsp;Minghui Xu,&nbsp;Dongxiao Yu,&nbsp;Xiuzhen Cheng","doi":"10.1016/j.hcc.2023.100183","DOIUrl":"10.1016/j.hcc.2023.100183","url":null,"abstract":"<div><p>The privacy concern in smart contract applications continues to grow, leading to the proposal of various schemes aimed at developing comprehensive and universally applicable privacy-preserving smart contract (PPSC) schemes. However, the existing research in this area is fragmented and lacks a comprehensive system overview. This paper aims to bridge the existing research gap on PPSC schemes by systematizing previous studies in this field. The primary focus is on two categories: PPSC schemes based on cryptographic tools like zero-knowledge proofs, as well as schemes based on trusted execution environments. In doing so, we aim to provide a condensed summary of the different approaches taken in constructing PPSC schemes. Additionally, we also offer a comparative analysis of these approaches, highlighting the similarities and differences between them. Furthermore, we shed light on the challenges that developers face when designing and implementing PPSC schemes. Finally, we delve into potential future directions for improving and advancing these schemes, discussing possible avenues for further research and development.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100183"},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000818/pdfft?md5=96a73c8999524817c0dd436879500b02&pid=1-s2.0-S2667295223000818-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139296441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial attacks against dynamic graph neural networks via node injection 通过节点注入对动态图神经网络的恶意攻击
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-23 DOI: 10.1016/j.hcc.2023.100185
Yanan Jiang, Hui Xia

Dynamic graph neural networks (DGNNs) have demonstrated their extraordinary value in many practical applications. Nevertheless, the vulnerability of DNNs is a serious hidden danger as a small disturbance added to the model can markedly reduce its performance. At the same time, current adversarial attack schemes are implemented on static graphs, and the variability of attack models prevents these schemes from transferring to dynamic graphs. In this paper, we use the diffused attack of node injection to attack the DGNNs, and first propose the node injection attack based on structural fragility against DGNNs, named Structural Fragility-based Dynamic Graph Node Injection Attack (SFIA). SFIA firstly determines the target time based on the period weight. Then, it introduces a structural fragile edge selection strategy to establish the target nodes set and link them with the malicious node using serial inject. Finally, an optimization function is designed to generate adversarial features for malicious nodes. Experiments on datasets from four different fields show that SFIA is significantly superior to many comparative approaches. When the graph is injected with 1% of the original total number of nodes through SFIA, the link prediction Recall and MRR of the target DGNN link decrease by 17.4% and 14.3% respectively, and the accuracy of node classification decreases by 8.7%.

动态图神经网络(DGNN)已在许多实际应用中展示了其非凡的价值。然而,动态图神经网络的脆弱性是一个严重的隐患,因为在模型中加入一个微小的干扰就会明显降低其性能。同时,目前的对抗性攻击方案是在静态图上实现的,攻击模型的可变性使这些方案无法转移到动态图上。本文利用节点注入的扩散攻击来攻击 DGNN,并首次提出了针对 DGNN 的基于结构脆性的节点注入攻击,命名为基于结构脆性的动态图节点注入攻击(SFIA)。SFIA 首先根据周期权重确定目标时间。然后,它引入了结构脆弱边选择策略来建立目标节点集,并使用串行注入将它们与恶意节点连接起来。最后,设计一个优化函数来生成恶意节点的对抗特征。在四个不同领域的数据集上进行的实验表明,SFIA 明显优于许多比较方法。当通过 SFIA 向图注入原始节点总数的 1%时,目标 DGNN 链接的链接预测 Recall 和 MRR 分别降低了 17.4% 和 14.3%,节点分类的准确率降低了 8.7%。
{"title":"Adversarial attacks against dynamic graph neural networks via node injection","authors":"Yanan Jiang,&nbsp;Hui Xia","doi":"10.1016/j.hcc.2023.100185","DOIUrl":"10.1016/j.hcc.2023.100185","url":null,"abstract":"<div><p>Dynamic graph neural networks (DGNNs) have demonstrated their extraordinary value in many practical applications. Nevertheless, the vulnerability of DNNs is a serious hidden danger as a small disturbance added to the model can markedly reduce its performance. At the same time, current adversarial attack schemes are implemented on static graphs, and the variability of attack models prevents these schemes from transferring to dynamic graphs. In this paper, we use the diffused attack of node injection to attack the DGNNs, and first propose the node injection attack based on structural fragility against DGNNs, named Structural Fragility-based Dynamic Graph Node Injection Attack (SFIA). SFIA firstly determines the target time based on the period weight. Then, it introduces a structural fragile edge selection strategy to establish the target nodes set and link them with the malicious node using serial inject. Finally, an optimization function is designed to generate adversarial features for malicious nodes. Experiments on datasets from four different fields show that SFIA is significantly superior to many comparative approaches. When the graph is injected with 1% of the original total number of nodes through SFIA, the link prediction Recall and MRR of the target DGNN link decrease by 17.4% and 14.3% respectively, and the accuracy of node classification decreases by 8.7%.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100185"},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000831/pdfft?md5=63dbda3afe972e585f8cc26ab595cb00&pid=1-s2.0-S2667295223000831-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139305330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
High-Confidence Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1