首页 > 最新文献

High-Confidence Computing最新文献

英文 中文
A verifiable and efficient cross-chain calculation model for charging pile reputation 可验证、高效的充电桩信誉跨链计算模型
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-23 DOI: 10.1016/j.hcc.2023.100180
Cui Zhang , Yunhua He , Bin Wu , Hui Yang , Ke Xiao , Hong Li

To solve the current situation of low vehicle-to-pile ratio, charging pile (CP) operators incorporate private CPs into the shared charging system. However, the introduction of private CP has brought about the problem of poor service quality. Reputation is a common service evaluation scheme, in which the third-party reputation scheme has the issue of single point of failure; although the blockchain-based reputation scheme solves the single point of failure issue, it also brings the challenges of storage and query efficiency. It is a feasible solution to classify and store information on multiple chains, and at this time, reputation needs to be calculated in a cross-chain mode. Crosschain reputation calculation faces the problems of correctness verification, integrity verification and efficiency. Therefore, this paper proposes a verifiable and efficient cross-chain calculation model for CP reputation. Specially, in this model, we propose a verifiable cross-chain contract calculation scheme that adopts polynomial commitment to solve the problems of polynomial damage and tampering that may be encountered in the crosschain process of outsourced polynomials, so as to ensure the integrity and correctness of polynomial calculations. In addition, the miner selection and incentive mechanism algorithm in this scheme ensures the correctness of extracted information when the outsourced polynomial is calculated on the blockchain. The security analysis and experimental results demonstrate that this scheme is feasible in practice.

为解决车桩比低的现状,充电桩运营商将私人充电桩纳入共享充电系统。然而,私人充电桩的引入带来了服务质量不高的问题。信誉是一种常见的服务评价方案,其中第三方信誉方案存在单点故障问题;基于区块链的信誉方案虽然解决了单点故障问题,但也带来了存储和查询效率的挑战。在多条链上对信息进行分类存储是一种可行的方案,此时需要以跨链模式计算声誉。跨链信誉计算面临着正确性验证、完整性验证和效率等问题。因此,本文提出了一种可验证且高效的 CP 信誉跨链计算模型。具体而言,在该模型中,我们提出了一种可验证的跨链合约计算方案,该方案采用多项式承诺的方式,解决了外包多项式在跨链过程中可能遇到的多项式损坏和篡改问题,从而保证了多项式计算的完整性和正确性。此外,该方案中的矿工选择和激励机制算法保证了外包多项式在区块链上计算时提取信息的正确性。安全分析和实验结果表明,该方案在实践中是可行的。
{"title":"A verifiable and efficient cross-chain calculation model for charging pile reputation","authors":"Cui Zhang ,&nbsp;Yunhua He ,&nbsp;Bin Wu ,&nbsp;Hui Yang ,&nbsp;Ke Xiao ,&nbsp;Hong Li","doi":"10.1016/j.hcc.2023.100180","DOIUrl":"10.1016/j.hcc.2023.100180","url":null,"abstract":"<div><p>To solve the current situation of low vehicle-to-pile ratio, charging pile (CP) operators incorporate private CPs into the shared charging system. However, the introduction of private CP has brought about the problem of poor service quality. Reputation is a common service evaluation scheme, in which the third-party reputation scheme has the issue of single point of failure; although the blockchain-based reputation scheme solves the single point of failure issue, it also brings the challenges of storage and query efficiency. It is a feasible solution to classify and store information on multiple chains, and at this time, reputation needs to be calculated in a cross-chain mode. Crosschain reputation calculation faces the problems of correctness verification, integrity verification and efficiency. Therefore, this paper proposes a verifiable and efficient cross-chain calculation model for CP reputation. Specially, in this model, we propose a verifiable cross-chain contract calculation scheme that adopts polynomial commitment to solve the problems of polynomial damage and tampering that may be encountered in the crosschain process of outsourced polynomials, so as to ensure the integrity and correctness of polynomial calculations. In addition, the miner selection and incentive mechanism algorithm in this scheme ensures the correctness of extracted information when the outsourced polynomial is calculated on the blockchain. The security analysis and experimental results demonstrate that this scheme is feasible in practice.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100180"},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000788/pdfft?md5=46bf08c2626df49825af43279b2072d6&pid=1-s2.0-S2667295223000788-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139296339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coreference resolution helps visual dialogs to focus 解决核心问题有助于视觉对话聚焦
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-22 DOI: 10.1016/j.hcc.2023.100184
Tianwei Yue , Wenping Wang , Chen Liang, Dachi Chen, Congrui Hetang, Xuewei Wang

Visual Dialog is a multi-modal task involving both computer vision and dialog systems. The goal is to answer multiple questions in conversation style, given an image as the context. Neural networks with attention modules are widely used for this task, because of their effectiveness in reasoning the relevance between the texts and images. In this work, we study how to further improve the quality of such reasoning, which is an open challenge. Our baseline is the Recursive Visual Attention (RVA) model, which refines the vision-text attention by iteratively visiting the dialog history. Building on top of that, we propose to improve the attention mechanism with contrastive learning. We train a Matching-Aware Attention Kernel (MAAK) by aligning the deep feature embeddings of an image and its caption, to provide better attention scores. Experiments show consistent improvements from MAAK. In addition, we study the effect of using Multimodal Compact Bilinear (MCB) pooling as a three-way feature fusion for the visual, textual and dialog history embeddings. We analyze the performance of both methods in the discussion section, and propose further ideas to resolve current limitations.

视觉对话是一项涉及计算机视觉和对话系统的多模式任务。其目标是在以图像为背景的情况下,以对话的方式回答多个问题。带有注意力模块的神经网络在推理文本和图像之间的相关性方面非常有效,因此被广泛应用于这项任务。在这项工作中,我们将研究如何进一步提高这种推理的质量,这是一项公开的挑战。我们的基准是递归视觉注意力(RVA)模型,它通过反复访问对话历史记录来完善视觉-文本注意力。在此基础上,我们建议通过对比学习来改进注意力机制。我们通过对图像及其标题的深度特征嵌入进行对齐来训练匹配感知注意力内核(MAK),从而提供更好的注意力分数。实验表明,MAK 能带来一致的改进。此外,我们还研究了使用多模态紧凑双线性(MCB)池作为视觉、文本和对话历史嵌入的三方特征融合的效果。我们在讨论部分分析了这两种方法的性能,并提出了解决当前局限性的进一步想法。
{"title":"Coreference resolution helps visual dialogs to focus","authors":"Tianwei Yue ,&nbsp;Wenping Wang ,&nbsp;Chen Liang,&nbsp;Dachi Chen,&nbsp;Congrui Hetang,&nbsp;Xuewei Wang","doi":"10.1016/j.hcc.2023.100184","DOIUrl":"10.1016/j.hcc.2023.100184","url":null,"abstract":"<div><p>Visual Dialog is a multi-modal task involving both computer vision and dialog systems. The goal is to answer multiple questions in conversation style, given an image as the context. Neural networks with attention modules are widely used for this task, because of their effectiveness in reasoning the relevance between the texts and images. In this work, we study how to further improve the quality of such reasoning, which is an open challenge. Our baseline is the Recursive Visual Attention (RVA) model, which refines the vision-text attention by iteratively visiting the dialog history. Building on top of that, we propose to improve the attention mechanism with contrastive learning. We train a Matching-Aware Attention Kernel (MAAK) by aligning the deep feature embeddings of an image and its caption, to provide better attention scores. Experiments show consistent improvements from MAAK. In addition, we study the effect of using Multimodal Compact Bilinear (MCB) pooling as a three-way feature fusion for the visual, textual and dialog history embeddings. We analyze the performance of both methods in the discussion section, and propose further ideas to resolve current limitations.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100184"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266729522300082X/pdfft?md5=ab949d922d5965a06641ae36f6129271&pid=1-s2.0-S266729522300082X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139297162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Light field depth estimation: A comprehensive survey from principles to future 光场深度估计:从原理到未来的全面考察
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-22 DOI: 10.1016/j.hcc.2023.100187
Tun Wang , Hao Sheng , Rongshan Chen , Da Yang , Zhenglong Cui , Sizhe Wang , Ruixuan Cong , Mingyuan Zhao

Light Field (LF) depth estimation is an important research direction in the area of computer vision and computational photography, which aims to infer the depth information of different objects in three-dimensional scenes by capturing LF data. Given this new era of significance, this article introduces a survey of the key concepts, methods, novel applications, and future trends in this area. We summarize the LF depth estimation methods, which are usually based on the interaction of radiance from rays in all directions of the LF data, such as epipolar-plane, multi-view geometry, focal stack, and deep learning. We analyze the many challenges facing each of these approaches, including complex algorithms, large amounts of computation, and speed requirements. In addition, this survey summarizes most of the currently available methods, conducts some comparative experiments, discusses the results, and investigates the novel directions in LF depth estimation.

光场(LF)深度估计是计算机视觉和计算摄影领域的一个重要研究方向,旨在通过捕捉 LF 数据推断三维场景中不同物体的深度信息。鉴于这一新时代的重要意义,本文介绍了这一领域的关键概念、方法、新型应用和未来趋势。我们总结了低频深度估算方法,这些方法通常基于低频数据各个方向射线辐射的相互作用,如外极面、多视角几何、焦点堆栈和深度学习。我们分析了每种方法所面临的诸多挑战,包括复杂的算法、大量的计算和速度要求。此外,本调查还总结了目前可用的大多数方法,进行了一些对比实验,讨论了结果,并研究了 LF 深度估计的新方向。
{"title":"Light field depth estimation: A comprehensive survey from principles to future","authors":"Tun Wang ,&nbsp;Hao Sheng ,&nbsp;Rongshan Chen ,&nbsp;Da Yang ,&nbsp;Zhenglong Cui ,&nbsp;Sizhe Wang ,&nbsp;Ruixuan Cong ,&nbsp;Mingyuan Zhao","doi":"10.1016/j.hcc.2023.100187","DOIUrl":"10.1016/j.hcc.2023.100187","url":null,"abstract":"<div><p>Light Field (LF) depth estimation is an important research direction in the area of computer vision and computational photography, which aims to infer the depth information of different objects in three-dimensional scenes by capturing LF data. Given this new era of significance, this article introduces a survey of the key concepts, methods, novel applications, and future trends in this area. We summarize the LF depth estimation methods, which are usually based on the interaction of radiance from rays in all directions of the LF data, such as epipolar-plane, multi-view geometry, focal stack, and deep learning. We analyze the many challenges facing each of these approaches, including complex algorithms, large amounts of computation, and speed requirements. In addition, this survey summarizes most of the currently available methods, conducts some comparative experiments, discusses the results, and investigates the novel directions in LF depth estimation.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100187"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000855/pdfft?md5=995254b6e9fd71f7ac04f1e9668cefdf&pid=1-s2.0-S2667295223000855-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139294487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A self-driving solution for resource-constrained autonomous vehicles in parked areas 停放区资源受限自动驾驶车辆的自动驾驶解决方案
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-22 DOI: 10.1016/j.hcc.2023.100182
Jin Qian , Liang Zhang , Qiwei Huang , Xinyi Liu , Xiaoshuang Xing , Xuehan Li

Autonomous vehicles in industrial parks can provide intelligent, efficient, and environmentally friendly transportation services, making them crucial tools for solving internal transportation issues. Considering the characteristics of industrial park scenarios and limited resources, designing and implementing autonomous driving solutions for autonomous vehicles in these areas has become a research hotspot. This paper proposes an efficient autonomous driving solution based on path planning, target recognition, and driving decision-making as its core components. Detailed designs for path planning, lane positioning, driving decision-making, and anti-collision algorithms are presented. Performance analysis and experimental validation of the proposed solution demonstrate its effectiveness in meeting the autonomous driving needs within resource-constrained environments in industrial parks. This solution provides important references for enhancing the performance of autonomous vehicles in these areas.

工业园区内的自动驾驶汽车可提供智能、高效、环保的交通服务,是解决园区内部交通问题的重要工具。考虑到工业园区的场景特点和有限的资源,在这些区域设计和实现自动驾驶车辆的自动驾驶解决方案已成为研究热点。本文以路径规划、目标识别和驾驶决策为核心组件,提出了一种高效的自动驾驶解决方案。本文介绍了路径规划、车道定位、驾驶决策和防碰撞算法的详细设计。对提出的解决方案进行的性能分析和实验验证证明,该方案能有效满足工业园区资源有限环境下的自动驾驶需求。该解决方案为提高自动驾驶汽车在这些领域的性能提供了重要参考。
{"title":"A self-driving solution for resource-constrained autonomous vehicles in parked areas","authors":"Jin Qian ,&nbsp;Liang Zhang ,&nbsp;Qiwei Huang ,&nbsp;Xinyi Liu ,&nbsp;Xiaoshuang Xing ,&nbsp;Xuehan Li","doi":"10.1016/j.hcc.2023.100182","DOIUrl":"10.1016/j.hcc.2023.100182","url":null,"abstract":"<div><p>Autonomous vehicles in industrial parks can provide intelligent, efficient, and environmentally friendly transportation services, making them crucial tools for solving internal transportation issues. Considering the characteristics of industrial park scenarios and limited resources, designing and implementing autonomous driving solutions for autonomous vehicles in these areas has become a research hotspot. This paper proposes an efficient autonomous driving solution based on path planning, target recognition, and driving decision-making as its core components. Detailed designs for path planning, lane positioning, driving decision-making, and anti-collision algorithms are presented. Performance analysis and experimental validation of the proposed solution demonstrate its effectiveness in meeting the autonomous driving needs within resource-constrained environments in industrial parks. This solution provides important references for enhancing the performance of autonomous vehicles in these areas.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100182"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000806/pdfft?md5=6cc55cff8f575313ade27c7955e65ccd&pid=1-s2.0-S2667295223000806-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139292239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural-based inexact graph de-anonymization 基于神经的非精确图形去匿名化
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-22 DOI: 10.1016/j.hcc.2023.100186
Guangxi Lu , Kaiyang Li , Xiaotong Wang , Ziyue Liu , Zhipeng Cai , Wei Li

Graph de-anonymization is a technique used to reveal connections between entities in anonymized graphs, which is crucial in detecting malicious activities, network analysis, social network analysis, and more. Despite its paramount importance, conventional methods often grapple with inefficiencies and challenges tied to obtaining accurate query graph data. This paper introduces a neural-based inexact graph de-anonymization, which comprises an embedding phase, a comparison phase, and a matching procedure. The embedding phase uses a graph convolutional network to generate embedding vectors for both the query and anonymized graphs. The comparison phase uses a neural tensor network to ascertain node resemblances. The matching procedure employs a refined greedy algorithm to discern optimal node pairings. Additionally, we comprehensively evaluate its performance via well-conducted experiments on various real datasets. The results demonstrate the effectiveness of our proposed approach in enhancing the efficiency and performance of graph de-anonymization through the use of graph embedding vectors.

图去匿名化是一种用于揭示匿名图中实体间联系的技术,在检测恶意活动、网络分析、社交网络分析等方面至关重要。尽管它极为重要,但传统方法在获取准确的查询图数据时往往效率低下、困难重重。本文介绍了一种基于神经的非精确图去匿名化方法,包括嵌入阶段、比较阶段和匹配过程。嵌入阶段使用图卷积网络为查询图和匿名图生成嵌入向量。比较阶段使用神经张量网络来确定节点的相似性。匹配程序采用了一种精炼的贪婪算法来识别最佳节点配对。此外,我们还通过在各种真实数据集上进行的良好实验对其性能进行了全面评估。结果表明,我们提出的方法通过使用图嵌入向量,有效提高了图去匿名化的效率和性能。
{"title":"Neural-based inexact graph de-anonymization","authors":"Guangxi Lu ,&nbsp;Kaiyang Li ,&nbsp;Xiaotong Wang ,&nbsp;Ziyue Liu ,&nbsp;Zhipeng Cai ,&nbsp;Wei Li","doi":"10.1016/j.hcc.2023.100186","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100186","url":null,"abstract":"<div><p>Graph de-anonymization is a technique used to reveal connections between entities in anonymized graphs, which is crucial in detecting malicious activities, network analysis, social network analysis, and more. Despite its paramount importance, conventional methods often grapple with inefficiencies and challenges tied to obtaining accurate query graph data. This paper introduces a neural-based inexact graph de-anonymization, which comprises an embedding phase, a comparison phase, and a matching procedure. The embedding phase uses a graph convolutional network to generate embedding vectors for both the query and anonymized graphs. The comparison phase uses a neural tensor network to ascertain node resemblances. The matching procedure employs a refined greedy algorithm to discern optimal node pairings. Additionally, we comprehensively evaluate its performance via well-conducted experiments on various real datasets. The results demonstrate the effectiveness of our proposed approach in enhancing the efficiency and performance of graph de-anonymization through the use of graph embedding vectors.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100186"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000843/pdfft?md5=0d8fc958c3885f06c72a47da20a82a5f&pid=1-s2.0-S2667295223000843-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139033378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An insider user authentication method based on improved temporal convolutional network 一种基于改进时间卷积网络的内部用户认证方法
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-13 DOI: 10.1016/j.hcc.2023.100169
Xiaoling Tao, Yuelin Yu, Lianyou Fu, Jianxiang Liu, Yunhao Zhang

With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management. In the current network environment, user behavioral bio-data presents the characteristics of nonlinearity and temporal sequence. Most of the existing research on authentication based on user behavioral biometrics adopts the method of manual feature extraction. They do not adequately capture the nonlinear and time-sequential dependencies of behavioral bio-data, and also do not adequately reflect the personalized usage characteristics of users, leading to bottlenecks in the performance of the authentication algorithm. In order to solve the above problems, this paper proposes a Temporal Convolutional Network method based on an Efficient Channel Attention mechanism (ECA-TCN) to extract user mouse dynamics features and constructs an one-class Support Vector Machine (OCSVM) for each user for authentication. Experimental results show that compared with four existing deep learning algorithms, the method retains more adequate key information and improves the classification performance of the neural network. In the final authentication, the Area Under the Curve (AUC) can reach 96%.

随着信息技术的飞速发展,信息系统安全和内部威胁检测已成为组织管理的重要课题。在当前的网络环境下,用户行为生物数据呈现出非线性和时序性的特点。现有的基于用户行为生物识别的身份认证研究大多采用人工特征提取的方法。它们不能充分捕捉行为生物数据的非线性和时间顺序依赖性,也不能充分反映用户的个性化使用特征,从而导致认证算法的性能瓶颈。为了解决上述问题,本文提出了一种基于高效通道注意机制(ECA-TCN)的时间卷积网络方法,提取用户鼠标动态特征,并为每个用户构建一个单类支持向量机(OCSVM)进行认证。实验结果表明,与现有的四种深度学习算法相比,该方法保留了更充分的关键信息,提高了神经网络的分类性能。最终认证时,曲线下面积(Area Under the Curve, AUC)可达96%。
{"title":"An insider user authentication method based on improved temporal convolutional network","authors":"Xiaoling Tao,&nbsp;Yuelin Yu,&nbsp;Lianyou Fu,&nbsp;Jianxiang Liu,&nbsp;Yunhao Zhang","doi":"10.1016/j.hcc.2023.100169","DOIUrl":"10.1016/j.hcc.2023.100169","url":null,"abstract":"<div><p>With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management. In the current network environment, user behavioral bio-data presents the characteristics of nonlinearity and temporal sequence. Most of the existing research on authentication based on user behavioral biometrics adopts the method of manual feature extraction. They do not adequately capture the nonlinear and time-sequential dependencies of behavioral bio-data, and also do not adequately reflect the personalized usage characteristics of users, leading to bottlenecks in the performance of the authentication algorithm. In order to solve the above problems, this paper proposes a Temporal Convolutional Network method based on an Efficient Channel Attention mechanism (ECA-TCN) to extract user mouse dynamics features and constructs an one-class Support Vector Machine (OCSVM) for each user for authentication. Experimental results show that compared with four existing deep learning algorithms, the method retains more adequate key information and improves the classification performance of the neural network. In the final authentication, the Area Under the Curve (AUC) can reach 96%.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 4","pages":"Article 100169"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000673/pdfft?md5=e3a2018fd567973462b834311553fa94&pid=1-s2.0-S2667295223000673-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135714997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of unique and secure routing protocol (USRP) in flying Adhoc Networks for healthcare applications 用于医疗保健应用的飞行 Adhoc 网络中独特安全路由协议 (USRP) 的性能
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-11 DOI: 10.1016/j.hcc.2023.100170
J. Vijitha Ananthi, P. Subha Hency Jose

Nowadays, Flying Adhoc Networks play a vital role due to its high efficiency in fast communication. Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication. In healthcare applications, wireless body area network transmits the data, whereas the security, which is the most important concern to be focused in a flying adhoc network is not satisfactory. Many intruders tamper the network, degrading the overall network performance. To avoid security issues, a unique and secure routing protocol that provides a single solution for five different types of attacks such as, black hole attacks, grey hole attacks, yoyo attacks, conjoint attack and jamming attacks, is proposed. The simulation results analyses the network performance by using the proposed routing table. In comparison to the other solutions rendered to resolve the affected network, this proposed routing protocol has a higher throughput, higher delivery rate, and lower delay. The Unique and Secure Routing Protocol (USRP) provides an integrated solution for an efficient and secure communication in a flying adhoc network.

如今,飞行 Adhoc 网络因其在快速通信方面的高效率而发挥着重要作用。无人飞行器传输数据的速度比其他网络快得多,在通信的各个方面都很有用。在医疗保健应用中,无线体域网络可以传输数据,但飞行 adhoc 网络最需要关注的安全问题却并不令人满意。许多入侵者会篡改网络,降低整体网络性能。为了避免安全问题,我们提出了一种独特而安全的路由协议,它能为五种不同类型的攻击(如黑洞攻击、灰洞攻击、悠悠攻击、联合攻击和干扰攻击)提供单一的解决方案。仿真结果分析了使用拟议路由表的网络性能。与其他解决受影响网络的方案相比,该路由协议具有更高的吞吐量、更高的传输速率和更低的延迟。独特安全路由协议(USRP)为飞行 adhoc 网络中的高效安全通信提供了综合解决方案。
{"title":"Performance of unique and secure routing protocol (USRP) in flying Adhoc Networks for healthcare applications","authors":"J. Vijitha Ananthi,&nbsp;P. Subha Hency Jose","doi":"10.1016/j.hcc.2023.100170","DOIUrl":"10.1016/j.hcc.2023.100170","url":null,"abstract":"<div><p>Nowadays, Flying Adhoc Networks play a vital role due to its high efficiency in fast communication. Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication. In healthcare applications, wireless body area network transmits the data, whereas the security, which is the most important concern to be focused in a flying adhoc network is not satisfactory. Many intruders tamper the network, degrading the overall network performance. To avoid security issues, a unique and secure routing protocol that provides a single solution for five different types of attacks such as, black hole attacks, grey hole attacks, yoyo attacks, conjoint attack and jamming attacks, is proposed. The simulation results analyses the network performance by using the proposed routing table. In comparison to the other solutions rendered to resolve the affected network, this proposed routing protocol has a higher throughput, higher delivery rate, and lower delay. The Unique and Secure Routing Protocol (USRP) provides an integrated solution for an efficient and secure communication in a flying adhoc network.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100170"},"PeriodicalIF":0.0,"publicationDate":"2023-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000685/pdfft?md5=71d26afc95d290cd3a4efa882f8e618a&pid=1-s2.0-S2667295223000685-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135663879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption 具有访问控制功能的可重删联盟区块链:利用变色龙哈希和基于属性的多授权加密技术
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-07 DOI: 10.1016/j.hcc.2023.100168
Yueyan Dong, Yifang Li, Ye Cheng, Dongxiao Yu

A redactable blockchain allows authorized individuals to remove or replace undesirable content, offering the ability to remove illegal or unwanted information. Access control is a mechanism that limits data visibility and ensures that only authorized users can decrypt and access encrypted information, playing a crucial role in addressing privacy concerns and securing the data stored on a blockchain. Redactability and access control are both essential components when implementing a regulated consortium blockchain in real-world situations to ensure the secure sharing of data while removing undesirable content. We propose a decentralized consortium blockchain system prototype that supports redactability and access control. Through the development of a prototype blockchain system, we investigate the feasibility of combining these approaches and demonstrate that it is possible to implement a redactable blockchain with access control in a consortium blockchain setting.

可编辑区块链允许经授权的个人删除或替换不需要的内容,从而提供删除非法或不需要的信息的能力。访问控制是一种限制数据可见性的机制,确保只有授权用户才能解密和访问加密信息,在解决隐私问题和确保区块链上存储的数据安全方面发挥着至关重要的作用。在现实世界中实施受监管的联盟区块链时,可重编性和访问控制都是确保数据安全共享的重要组成部分,同时还能删除不受欢迎的内容。我们提出了一个支持可编辑性和访问控制的去中心化联盟区块链系统原型。通过开发一个原型区块链系统,我们研究了将这些方法结合起来的可行性,并证明了在联盟区块链环境中实施带有访问控制的可编辑区块链是可能的。
{"title":"Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption","authors":"Yueyan Dong,&nbsp;Yifang Li,&nbsp;Ye Cheng,&nbsp;Dongxiao Yu","doi":"10.1016/j.hcc.2023.100168","DOIUrl":"10.1016/j.hcc.2023.100168","url":null,"abstract":"<div><p>A redactable blockchain allows authorized individuals to remove or replace undesirable content, offering the ability to remove illegal or unwanted information. Access control is a mechanism that limits data visibility and ensures that only authorized users can decrypt and access encrypted information, playing a crucial role in addressing privacy concerns and securing the data stored on a blockchain. Redactability and access control are both essential components when implementing a regulated consortium blockchain in real-world situations to ensure the secure sharing of data while removing undesirable content. We propose a decentralized consortium blockchain system prototype that supports redactability and access control. Through the development of a prototype blockchain system, we investigate the feasibility of combining these approaches and demonstrate that it is possible to implement a redactable blockchain with access control in a consortium blockchain setting.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100168"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000661/pdfft?md5=354cdeda692d0ad1d062d3b27e03c072&pid=1-s2.0-S2667295223000661-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135510456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security defense strategy algorithm for Internet of Things based on deep reinforcement learning 基于深度强化学习的物联网安全防御策略算法
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-12 DOI: 10.1016/j.hcc.2023.100167
Xuecai Feng, Jikai Han, Rui Zhang, Shuo Xu, Hui Xia

Currently, important privacy data of the Internet of Things (IoT) face extremely high risks of leakage. Attackers persistently engage in continuous attacks on terminal devices to obtain private data of crucial importance. Although significant progress has been made in recent years in deep reinforcement learning defense strategies, most defense methods still face problems such as low defense resource allocation efficiency and insufficient defense coordination capabilities. To solve the above problems, this paper constructs a novel adversarial security scenario and proposes a security game model that integrates defense resource allocation and patrol inspection. Regarding the above game model, this paper designs a deep reinforcement learning algorithm named SDSA to calculate its security defense strategy. SDSA calculates the allocation strategy of the best patrolling strategy that is most suitable for the defender by searching the policy on a multi-dimensional discrete action space, and enables multiple defense agents to cooperate efficiently by training a multi-intelligent Dueling Double Deep Q-Network (D3QN) with prioritized experience replay. Finally, the experimental results show that the SDSA-learned security defense strategy can provide a feasible and effective security protection strategy for defenders against attacks compared to the MADDPG and OptGradFP methods.

目前,物联网(IoT)的重要隐私数据面临极高的泄漏风险。攻击者持续不断地对终端设备进行攻击,以获取至关重要的隐私数据。尽管近年来在深度强化学习防御策略方面取得了重大进展,但大多数防御方法仍面临防御资源分配效率低、防御协调能力不足等问题。为解决上述问题,本文构建了一个新颖的对抗性安全场景,并提出了一种集防御资源分配和巡逻检查于一体的安全博弈模型。针对上述博弈模型,本文设计了一种名为 SDSA 的深度强化学习算法来计算其安全防御策略。SDSA 通过在多维离散行动空间上搜索策略,计算出最适合防御方的最佳巡逻策略分配策略,并通过训练具有优先级经验重放的多智能对决双深度 Q 网络(D3QN),实现多个防御代理的高效合作。最后,实验结果表明,与 MADDPG 和 OptGradFP 方法相比,SDSA 学习的安全防御策略能为防御者提供一种可行且有效的安全防护策略,以抵御攻击。
{"title":"Security defense strategy algorithm for Internet of Things based on deep reinforcement learning","authors":"Xuecai Feng,&nbsp;Jikai Han,&nbsp;Rui Zhang,&nbsp;Shuo Xu,&nbsp;Hui Xia","doi":"10.1016/j.hcc.2023.100167","DOIUrl":"10.1016/j.hcc.2023.100167","url":null,"abstract":"<div><p>Currently, important privacy data of the Internet of Things (IoT) face extremely high risks of leakage. Attackers persistently engage in continuous attacks on terminal devices to obtain private data of crucial importance. Although significant progress has been made in recent years in deep reinforcement learning defense strategies, most defense methods still face problems such as low defense resource allocation efficiency and insufficient defense coordination capabilities. To solve the above problems, this paper constructs a novel adversarial security scenario and proposes a security game model that integrates defense resource allocation and patrol inspection. Regarding the above game model, this paper designs a deep reinforcement learning algorithm named SDSA to calculate its security defense strategy. SDSA calculates the allocation strategy of the best patrolling strategy that is most suitable for the defender by searching the policy on a multi-dimensional discrete action space, and enables multiple defense agents to cooperate efficiently by training a multi-intelligent Dueling Double Deep Q-Network (D3QN) with prioritized experience replay. Finally, the experimental results show that the SDSA-learned security defense strategy can provide a feasible and effective security protection strategy for defenders against attacks compared to the MADDPG and OptGradFP methods.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100167"},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266729522300065X/pdfft?md5=5ba5e4cf27f862d15547b114a55810e3&pid=1-s2.0-S266729522300065X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135707986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning job failure analysis and prediction model for the cloud environment 面向云环境的机器学习作业失效分析与预测模型
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-27 DOI: 10.1016/j.hcc.2023.100165
Harikrishna Bommala , Uma Maheswari V. , Rajanikanth Aluvalu , Swapna Mudrakola

Reliable and accessible cloud applications are essential for the future of ubiquitous computing, smart appliances, and electronic health. Owing to the vastness and diversity of the cloud, a most cloud services, both physical and logical services have failed. Using currently accessible traces, we assessed and characterized the behaviors of successful and unsuccessful activities. We devised and implemented a method to forecast which jobs will fail. The proposed method optimizes cloud applications more efficiently in terms of resource usage. Using Google Cluster, Mustang, and Trinity traces, which are publicly available, an in-depth evaluation of the proposed model was conducted. The traces were also fed into several different machine learning models to select the most reliable model. Our efficiency analysis proves that the model performs well in terms of accuracy, F1-score, and recall. Several factors, such as failure of forecasting work, design of scheduling algorithms, modification of priority criteria, and restriction of task resubmission, may increase cloud service dependability and availability.

可靠和可访问的云应用程序对于无处不在的计算、智能设备和电子健康的未来至关重要。由于云的浩瀚和多样性,大多数云服务,包括物理服务和逻辑服务都失败了。使用当前可访问的痕迹,我们评估并描述了成功和不成功活动的行为。我们设计并实施了一种方法来预测哪些工作将失败。提出的方法在资源使用方面更有效地优化了云应用程序。使用公开可用的Google Cluster、Mustang和Trinity跟踪,对所提议的模型进行了深入的评估。这些轨迹也被输入到几个不同的机器学习模型中,以选择最可靠的模型。我们的效率分析证明,该模型在准确率、f1分数和召回率方面表现良好。预测工作的失败、调度算法的设计、优先级标准的修改和任务重新提交的限制等几个因素可能会增加云服务的可靠性和可用性。
{"title":"Machine learning job failure analysis and prediction model for the cloud environment","authors":"Harikrishna Bommala ,&nbsp;Uma Maheswari V. ,&nbsp;Rajanikanth Aluvalu ,&nbsp;Swapna Mudrakola","doi":"10.1016/j.hcc.2023.100165","DOIUrl":"10.1016/j.hcc.2023.100165","url":null,"abstract":"<div><p>Reliable and accessible cloud applications are essential for the future of ubiquitous computing, smart appliances, and electronic health. Owing to the vastness and diversity of the cloud, a most cloud services, both physical and logical services have failed. Using currently accessible traces, we assessed and characterized the behaviors of successful and unsuccessful activities. We devised and implemented a method to forecast which jobs will fail. The proposed method optimizes cloud applications more efficiently in terms of resource usage. Using Google Cluster, Mustang, and Trinity traces, which are publicly available, an in-depth evaluation of the proposed model was conducted. The traces were also fed into several different machine learning models to select the most reliable model. Our efficiency analysis proves that the model performs well in terms of accuracy, F1-score, and recall. Several factors, such as failure of forecasting work, design of scheduling algorithms, modification of priority criteria, and restriction of task resubmission, may increase cloud service dependability and availability.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 4","pages":"Article 100165"},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000636/pdfft?md5=bfe61b5b8fb7fd53b685e1c9be60171b&pid=1-s2.0-S2667295223000636-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134995410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
High-Confidence Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1