首页 > 最新文献

High-Confidence Computing最新文献

英文 中文
Spider monkey optimization based resource allocation and scheduling in fog computing environment 雾计算环境下基于蜘蛛猴优化的资源分配与调度
Pub Date : 2023-09-01 DOI: 10.1016/j.hcc.2023.100149
Shahid Sultan Hajam, Shabir Ahmad Sofi

Spider monkey optimization (SMO) is a quite popular and recent swarm intelligence algorithm for numerical optimization. SMO is Fission-Fusion social structure based algorithm inspired by spider monkey’s behavior. The algorithm proves to be very efficient in solving various constrained and unconstrained optimization problems. This paper presents the application of SMO in fog computing. We propose a heuristic initialization based spider monkey optimization algorithm for resource allocation and scheduling in a fog computing network. The algorithm minimizes the total cost (service time and monetary cost) of tasks by choosing the optimal fog nodes. Longest job fastest processor (LJFP), shortest job fastest processor (SJFP), and minimum completion time (MCT) based initialization of SMO are proposed and compared with each other. The performance is compared based on the parameters of average cost, average service time, average monetary cost, and the average cost per schedule. The results demonstrate the efficacy of MCT-SMO as compared to other heuristic initialization based SMO algorithms and Particle Swarm Optimization (PSO).

蜘蛛猴优化算法(SMO)是近年来流行的一种用于数值优化的群体智能算法。SMO是一种受蜘蛛猴行为启发的基于裂变融合社会结构的算法。该算法在求解各种有约束和无约束的优化问题时被证明是非常有效的。本文介绍了SMO在雾计算中的应用。我们提出了一种基于启发式初始化的蜘蛛猴优化算法,用于雾计算网络中的资源分配和调度。该算法通过选择最优雾节点来最小化任务的总成本(服务时间和货币成本)。提出了基于最长作业最快处理器(LJFP)、最短作业最快处理程序(SJFP)和最小完成时间(MCT)的SMO初始化方法,并进行了比较。基于平均成本、平均服务时间、平均货币成本和每个时间表的平均成本的参数来比较性能。与其他基于启发式初始化的SMO算法和粒子群优化算法(PSO)相比,结果证明了MCT-SMO的有效性。
{"title":"Spider monkey optimization based resource allocation and scheduling in fog computing environment","authors":"Shahid Sultan Hajam,&nbsp;Shabir Ahmad Sofi","doi":"10.1016/j.hcc.2023.100149","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100149","url":null,"abstract":"<div><p>Spider monkey optimization (SMO) is a quite popular and recent swarm intelligence algorithm for numerical optimization. SMO is Fission-Fusion social structure based algorithm inspired by spider monkey’s behavior. The algorithm proves to be very efficient in solving various constrained and unconstrained optimization problems. This paper presents the application of SMO in fog computing. We propose a heuristic initialization based spider monkey optimization algorithm for resource allocation and scheduling in a fog computing network. The algorithm minimizes the total cost (service time and monetary cost) of tasks by choosing the optimal fog nodes. Longest job fastest processor (LJFP), shortest job fastest processor (SJFP), and minimum completion time (MCT) based initialization of SMO are proposed and compared with each other. The performance is compared based on the parameters of average cost, average service time, average monetary cost, and the average cost per schedule. The results demonstrate the efficacy of MCT-SMO as compared to other heuristic initialization based SMO algorithms and Particle Swarm Optimization (PSO).</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50191223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trustworthy decentralized collaborative learning for edge intelligence: A survey 值得信赖的边缘智能去中心化协作学习:一项调查
Pub Date : 2023-09-01 DOI: 10.1016/j.hcc.2023.100150
Dongxiao Yu , Zhenzhen Xie , Yuan Yuan , Shuzhen Chen , Jing Qiao , Yangyang Wang , Yong Yu , Yifei Zou , Xiao Zhang

Edge intelligence is an emerging technology that enables artificial intelligence on connected systems and devices in close proximity to the data sources. decentralized collaborative learning (DCL) is a novel edge intelligence technique that allows distributed clients to cooperatively train a global learning model without revealing their data. DCL has a wide range of applications in various domains, such as smart city and autonomous driving. However, DCL faces significant challenges in ensuring its trustworthiness, as data isolation and privacy issues make DCL systems vulnerable to adversarial attacks that aim to breach system confidentiality, undermine learning reliability or violate data privacy. Therefore, it is crucial to design DCL in a trustworthy manner, with a focus on security, robustness, and privacy. In this survey, we present a comprehensive review of existing efforts for designing trustworthy DCL systems from the three key aformentioned aspects: security, robustness, and privacy. We analyze the threats that affect the trustworthiness of DCL across different scenarios and assess specific technical solutions for achieving each aspect of trustworthy DCL (TDCL). Finally, we highlight open challenges and future directions for advancing TDCL research and practice.

边缘智能是一种新兴技术,可以在数据源附近的连接系统和设备上实现人工智能。去中心化协同学习(DCL)是一种新型的边缘智能技术,它允许分布式客户端在不泄露数据的情况下合作训练全局学习模型。DCL在智能城市、自动驾驶等各个领域有着广泛的应用。然而,DCL在确保其可信度方面面临重大挑战,因为数据隔离和隐私问题使DCL系统容易受到旨在破坏系统机密性、破坏学习可靠性或侵犯数据隐私的对抗性攻击。因此,以一种值得信赖的方式设计DCL,重点关注安全性、健壮性和隐私性,这一点至关重要。在这项调查中,我们从安全性、鲁棒性和隐私性这三个关键方面对设计值得信赖的DCL系统的现有努力进行了全面的回顾。我们分析了在不同场景中影响DCL可信度的威胁,并评估了实现可信DCL(TDCL)各个方面的具体技术解决方案。最后,我们强调了推进TDCL研究和实践的开放挑战和未来方向。
{"title":"Trustworthy decentralized collaborative learning for edge intelligence: A survey","authors":"Dongxiao Yu ,&nbsp;Zhenzhen Xie ,&nbsp;Yuan Yuan ,&nbsp;Shuzhen Chen ,&nbsp;Jing Qiao ,&nbsp;Yangyang Wang ,&nbsp;Yong Yu ,&nbsp;Yifei Zou ,&nbsp;Xiao Zhang","doi":"10.1016/j.hcc.2023.100150","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100150","url":null,"abstract":"<div><p>Edge intelligence is an emerging technology that enables artificial intelligence on connected systems and devices in close proximity to the data sources. decentralized collaborative learning (DCL) is a novel edge intelligence technique that allows distributed clients to cooperatively train a global learning model without revealing their data. DCL has a wide range of applications in various domains, such as smart city and autonomous driving. However, DCL faces significant challenges in ensuring its trustworthiness, as data isolation and privacy issues make DCL systems vulnerable to adversarial attacks that aim to breach system confidentiality, undermine learning reliability or violate data privacy. Therefore, it is crucial to design DCL in a trustworthy manner, with a focus on security, robustness, and privacy. In this survey, we present a comprehensive review of existing efforts for designing trustworthy DCL systems from the three key aformentioned aspects: security, robustness, and privacy. We analyze the threats that affect the trustworthiness of DCL across different scenarios and assess specific technical solutions for achieving each aspect of trustworthy DCL (TDCL). Finally, we highlight open challenges and future directions for advancing TDCL research and practice.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50191158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy-efficient resource allocation strategy in massive MIMO-enabled vehicular edge computing networks 大规模MIMO车载边缘计算网络中的节能资源分配策略
Pub Date : 2023-09-01 DOI: 10.1016/j.hcc.2023.100130
Yibin Xie , Lei Shi , Zhenchun Wei , Juan Xu , Yang Zhang

The vehicular edge computing (VEC) is a new paradigm that allows vehicles to offload computational tasks to base stations (BSs) with edge servers for computing. In general, the VEC paradigm uses the 5G for wireless communications, where the massive multi-input multi-output (MIMO) technique will be used. However, considering in the VEC environment with many vehicles, the energy consumption of BS may be very large. In this paper, we study the energy optimization problem for the massive MIMO-based VEC network. Aiming at reducing the relevant BS energy consumption, we first propose a joint optimization problem of computation resource allocation, beam allocation and vehicle grouping scheme. Since the original problem is hard to be solved directly, we try to split the original problem into two subproblems and then design a heuristic algorithm to solve them. Simulation results show that our proposed algorithm efficiently reduces the BS energy consumption compared to other schemes.

车辆边缘计算(VEC)是一种新的范式,允许车辆将计算任务卸载到具有边缘服务器的基站(BS)进行计算。一般来说,VEC范式将5G用于无线通信,其中将使用大规模多输入多输出(MIMO)技术。然而,考虑到在车辆众多的VEC环境中,BS的能耗可能非常大。在本文中,我们研究了大规模基于MIMO的VEC网络的能量优化问题。为了降低相关的基站能耗,我们首先提出了计算资源分配、波束分配和车辆分组方案的联合优化问题。由于原始问题很难直接求解,我们试图将原始问题拆分为两个子问题,然后设计启发式算法来求解它们。仿真结果表明,与其他方案相比,我们提出的算法有效地降低了基站的能耗。
{"title":"An energy-efficient resource allocation strategy in massive MIMO-enabled vehicular edge computing networks","authors":"Yibin Xie ,&nbsp;Lei Shi ,&nbsp;Zhenchun Wei ,&nbsp;Juan Xu ,&nbsp;Yang Zhang","doi":"10.1016/j.hcc.2023.100130","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100130","url":null,"abstract":"<div><p>The vehicular edge computing (VEC) is a new paradigm that allows vehicles to offload computational tasks to base stations (BSs) with edge servers for computing. In general, the VEC paradigm uses the 5G for wireless communications, where the massive multi-input multi-output (MIMO) technique will be used. However, considering in the VEC environment with many vehicles, the energy consumption of BS may be very large. In this paper, we study the energy optimization problem for the massive MIMO-based VEC network. Aiming at reducing the relevant BS energy consumption, we first propose a joint optimization problem of computation resource allocation, beam allocation and vehicle grouping scheme. Since the original problem is hard to be solved directly, we try to split the original problem into two subproblems and then design a heuristic algorithm to solve them. Simulation results show that our proposed algorithm efficiently reduces the BS energy consumption compared to other schemes.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50191218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reaching consensus for membership dynamic in secret sharing and its application to cross-chain 秘密共享中成员动态达成共识及其在跨链中的应用
Pub Date : 2023-09-01 DOI: 10.1016/j.hcc.2023.100131
Yan Zhu , Bingyu Li , Zhenyang Ding , Yang Yang , Qianhong Wu , Haibin Zheng

The communication efficiency optimization, censorship resilience, and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant (BFT) consensus. The membership in consensus in a blockchain scenario supports dynamic changes, which effectively prevents the corruption of consensus participants. Especially in cross-chain protocols, the dynamic access to different blockchains will inevitably bring about the demand for member dynamic. Most existing threshold cryptography schemes rely on redefined key shares, leading to a static set of secret sharing participants. In this paper, we propose a general approach to coupling blockchain consensus and dynamic secret sharing. The committee performs consensus confirmation of both dynamic secret sharing and transaction proposals. Our scheme facilitates threshold cryptography membership dynamic, thus underlying support for membership dynamic of threshold cryptography-based BFT consensus schemes. We instantiate a dynamic HotStuff consensus to demonstrate the effectiveness of the scheme. After the correctness and security proof, our scheme achieves the secrecy and integrity of the threshold key shares while ensuring consensus liveness and safety. Experimental results prove that our scheme obtains dynamic membership with negligible overhead.

通信效率的优化、审查弹性和共享随机性的产生与现有拜占庭容错(BFT)共识中的阈值密码学密不可分。区块链场景中的共识成员支持动态变化,有效防止了共识参与者的腐败。特别是在跨链协议中,对不同区块链的动态访问必然会带来对成员动态的需求。大多数现有的阈值密码方案都依赖于重新定义的密钥共享,从而产生一组静态的秘密共享参与者。在本文中,我们提出了一种耦合区块链共识和动态秘密共享的通用方法。委员会对动态秘密共享和交易提案进行一致确认。我们的方案促进了阈值密码学的成员动态,从而为基于阈值密码学的BFT共识方案的成员动态提供了基础支持。我们实例化了一个动态的HotStuff共识来证明该方案的有效性。经过正确性和安全性的证明,我们的方案在保证共识有效性和安全的同时,实现了阈值密钥共享的保密性和完整性。实验结果证明,我们的方案在开销可忽略的情况下获得了动态隶属度。
{"title":"Reaching consensus for membership dynamic in secret sharing and its application to cross-chain","authors":"Yan Zhu ,&nbsp;Bingyu Li ,&nbsp;Zhenyang Ding ,&nbsp;Yang Yang ,&nbsp;Qianhong Wu ,&nbsp;Haibin Zheng","doi":"10.1016/j.hcc.2023.100131","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100131","url":null,"abstract":"<div><p>The communication efficiency optimization, censorship resilience, and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant (BFT) consensus. The membership in consensus in a blockchain scenario supports dynamic changes, which effectively prevents the corruption of consensus participants. Especially in cross-chain protocols, the dynamic access to different blockchains will inevitably bring about the demand for member dynamic. Most existing threshold cryptography schemes rely on redefined key shares, leading to a static set of secret sharing participants. In this paper, we propose a general approach to coupling blockchain consensus and dynamic secret sharing. The committee performs consensus confirmation of both dynamic secret sharing and transaction proposals. Our scheme facilitates threshold cryptography membership dynamic, thus underlying support for membership dynamic of threshold cryptography-based BFT consensus schemes. We instantiate a dynamic HotStuff consensus to demonstrate the effectiveness of the scheme. After the correctness and security proof, our scheme achieves the secrecy and integrity of the threshold key shares while ensuring consensus liveness and safety. Experimental results prove that our scheme obtains dynamic membership with negligible overhead.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50191219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UltraJam: Ultrasonic adaptive jammer based on nonlinearity effect of microphone circuits UltraJam:基于麦克风电路非线性效应的超声自适应干扰器
Pub Date : 2023-09-01 DOI: 10.1016/j.hcc.2023.100129
Zhicheng Han , Jun Ma , Chao Xu , Guoming Zhang

The widely used devices (e.g. smartphones, recorders) equipped with microphones have posed a severe threat to confidential conversations. In this paper, we design an inaudible anti-eavesdropping method: UltraJam, to reduce the risk of unwanted and secret recordings. UltraJam uses the ultrasonic signal to mask conversation. By leveraging the nonlinear effect of microphone circuits, the adaptive ultrasonic signal can be recorded and demodulated into low-frequency which can effectively squash the sound. Based on the characteristics of the attenuation coefficient and frequency response, we construct a number of jamming signals with different bandwidths and designed a wideband signal injection array, meanwhile adaptively adjust the power at each bandwidth signal to cover more frequency bands and increase usage scenarios. To verify the security of the microphone jamming system, we also utilize several audio recovery methods to recover the raw signal from jamming noise. The experimental results show that less than 1% of the words are recognized in the jamming recording, and even with the audio recovery method, 99% of the words still cannot be recognized in the recovered jamming recording.

广泛使用的配备麦克风的设备(如智能手机、录音机)对保密对话构成了严重威胁。在本文中,我们设计了一种听不见的反窃听方法:UltraJam,以降低不需要和秘密录音的风险。UltraJam使用超声波信号来屏蔽对话。利用麦克风电路的非线性效应,可以将自适应超声信号记录并解调为低频信号,从而有效地压制声音。根据衰减系数和频率响应的特点,我们构造了多个不同带宽的干扰信号,并设计了宽带信号注入阵列,同时自适应地调整每个带宽信号的功率,以覆盖更多的频带,增加使用场景。为了验证麦克风干扰系统的安全性,我们还利用几种音频恢复方法从干扰噪声中恢复原始信号。实验结果表明,在干扰录音中,只有不到1%的单词被识别,即使采用音频恢复方法,在恢复的干扰录音中仍有99%的单词无法被识别。
{"title":"UltraJam: Ultrasonic adaptive jammer based on nonlinearity effect of microphone circuits","authors":"Zhicheng Han ,&nbsp;Jun Ma ,&nbsp;Chao Xu ,&nbsp;Guoming Zhang","doi":"10.1016/j.hcc.2023.100129","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100129","url":null,"abstract":"<div><p>The widely used devices (e.g. smartphones, recorders) equipped with microphones have posed a severe threat to confidential conversations. In this paper, we design an inaudible anti-eavesdropping method: UltraJam, to reduce the risk of unwanted and secret recordings. UltraJam uses the ultrasonic signal to mask conversation. By leveraging the nonlinear effect of microphone circuits, the adaptive ultrasonic signal can be recorded and demodulated into low-frequency which can effectively squash the sound. Based on the characteristics of the attenuation coefficient and frequency response, we construct a number of jamming signals with different bandwidths and designed a wideband signal injection array, meanwhile adaptively adjust the power at each bandwidth signal to cover more frequency bands and increase usage scenarios. To verify the security of the microphone jamming system, we also utilize several audio recovery methods to recover the raw signal from jamming noise. The experimental results show that less than 1% of the words are recognized in the jamming recording, and even with the audio recovery method, 99% of the words still cannot be recognized in the recovered jamming recording.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50191220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BC driven IoT-based food quality traceability system for dairy product using deep learning model 基于深度学习模型的BC驱动的基于物联网的乳制品食品质量追溯系统
Pub Date : 2023-09-01 DOI: 10.1016/j.hcc.2023.100121
Noothi Manisha, Madiraju Jagadeeshwar

Food traceability is a critical factor that can ensure food safety for enhancing the credibility of the product, thus achieving heightened user satisfaction and loyalty. The Perishable Food SC (PFSC) requires paramount care for ensuring quality owing to the limited product life. The PFSC comprises of multiple organizations with varied interests and is more likely to be hesitant in sharing the traceability details among one another owing to a lack of trust, which can be overcome by using Blockchain (BC). In this research, an efficient scheme using BC-Deep Residual Network (BC-DRN) is developed to provide food traceability for dairy products. Here, food traceability is determined by using various modules, like the Internet of Things (IoT), BC data management, Food traceability BC architecture, and DRN-based food quality evaluation modules. The devised BC-DRN-based food quality traceability system is examined based on its performance metrics, like sensitivity, response time, and testing accuracy, and it has attained better values of 0.939, 109.564 s, and 0.931.

食品可追溯性是确保食品安全的关键因素,可以提高产品的可信度,从而提高用户满意度和忠诚度。易腐食品SC(PFSC)由于产品寿命有限,因此需要高度重视确保质量。PFSC由多个利益不同的组织组成,由于缺乏信任,在彼此之间共享可追溯性细节时更可能犹豫不决,这可以通过使用区块链(BC)来克服。在本研究中,开发了一种利用BC深度残差网络(BC-DRN)为乳制品提供食品可追溯性的有效方案。在这里,食品可追溯性是通过使用各种模块来确定的,如物联网(IoT)、BC数据管理、食品可追溯BC架构和基于DRN的食品质量评估模块。设计的基于BC DRN的食品质量可追溯系统基于其性能指标(如灵敏度、响应时间和测试准确性)进行了检查,并获得了更好的值0.939、109.564 s和0.931。
{"title":"BC driven IoT-based food quality traceability system for dairy product using deep learning model","authors":"Noothi Manisha,&nbsp;Madiraju Jagadeeshwar","doi":"10.1016/j.hcc.2023.100121","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100121","url":null,"abstract":"<div><p>Food traceability is a critical factor that can ensure food safety for enhancing the credibility of the product, thus achieving heightened user satisfaction and loyalty. The Perishable Food SC (PFSC) requires paramount care for ensuring quality owing to the limited product life. The PFSC comprises of multiple organizations with varied interests and is more likely to be hesitant in sharing the traceability details among one another owing to a lack of trust, which can be overcome by using Blockchain (BC). In this research, an efficient scheme using BC-Deep Residual Network (BC-DRN) is developed to provide food traceability for dairy products. Here, food traceability is determined by using various modules, like the Internet of Things (IoT), BC data management, Food traceability BC architecture, and DRN-based food quality evaluation modules. The devised BC-DRN-based food quality traceability system is examined based on its performance metrics, like sensitivity, response time, and testing accuracy, and it has attained better values of 0.939, 109.564 s, and 0.931.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50191191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEFEAT: A decentralized federated learning against gradient attacks DEFEAT:一种针对梯度攻击的去中心化联合学习
Pub Date : 2023-09-01 DOI: 10.1016/j.hcc.2023.100128
Guangxi Lu , Zuobin Xiong , Ruinian Li , Nael Mohammad , Yingshu Li , Wei Li

As one of the most promising machine learning frameworks emerging in recent years, Federated learning (FL) has received lots of attention. The main idea of centralized FL is to train a global model by aggregating local model parameters and maintain the private data of users locally. However, recent studies have shown that traditional centralized federated learning is vulnerable to various attacks, such as gradient attacks, where a malicious server collects local model gradients and uses them to recover the private data stored on the client. In this paper, we propose a decentralized federated learning against aTtacks (DEFEAT) framework and use it to defend the gradient attack. The decentralized structure adopted by this paper uses a peer-to-peer network to transmit, aggregate, and update local models. In DEFEAT, the participating clients only need to communicate with their single-hop neighbors to learn the global model, in which the model accuracy and communication cost during the training process of DEFEAT are well balanced. Through a series of experiments and detailed case studies on real datasets, we evaluate the excellent model performance of DEFEAT and the privacy preservation capability against gradient attacks.

联邦学习作为近年来出现的最有前途的机器学习框架之一,受到了广泛的关注。集中式FL的主要思想是通过聚合本地模型参数来训练全局模型,并在本地维护用户的私有数据。然而,最近的研究表明,传统的集中式联合学习容易受到各种攻击,例如梯度攻击,恶意服务器收集本地模型梯度,并使用它们来恢复存储在客户端上的私有数据。在本文中,我们提出了一种针对aTtacks的去中心化联合学习(DEFEAT)框架,并使用它来防御梯度攻击。本文采用的去中心化结构使用对等网络来传输、聚合和更新本地模型。在DEFEAT中,参与的客户端只需要与他们的单跳邻居进行通信就可以学习全局模型,其中DEFEAT训练过程中的模型精度和通信成本得到了很好的平衡。通过在真实数据集上进行的一系列实验和详细的案例研究,我们评估了DEFEAT出色的模型性能和对梯度攻击的隐私保护能力。
{"title":"DEFEAT: A decentralized federated learning against gradient attacks","authors":"Guangxi Lu ,&nbsp;Zuobin Xiong ,&nbsp;Ruinian Li ,&nbsp;Nael Mohammad ,&nbsp;Yingshu Li ,&nbsp;Wei Li","doi":"10.1016/j.hcc.2023.100128","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100128","url":null,"abstract":"<div><p>As one of the most promising machine learning frameworks emerging in recent years, Federated learning (FL) has received lots of attention. The main idea of centralized FL is to train a global model by aggregating local model parameters and maintain the private data of users locally. However, recent studies have shown that traditional centralized federated learning is vulnerable to various attacks, such as gradient attacks, where a malicious server collects local model gradients and uses them to recover the private data stored on the client. In this paper, we propose a decentralized federated learning against aTtacks (DEFEAT) framework and use it to defend the gradient attack. The decentralized structure adopted by this paper uses a peer-to-peer network to transmit, aggregate, and update local models. In DEFEAT, the participating clients only need to communicate with their single-hop neighbors to learn the global model, in which the model accuracy and communication cost during the training process of DEFEAT are well balanced. Through a series of experiments and detailed case studies on real datasets, we evaluate the excellent model performance of DEFEAT and the privacy preservation capability against gradient attacks.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50191222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient identity-based signature protocol over lattices for the smart grid 智能电网中一种有效的基于身份的格签名协议
Pub Date : 2023-08-19 DOI: 10.1016/j.hcc.2023.100147
Longzhu Zhu , Fan Jiang , Min Luo , Quanrun Li

As the promising next-generation power grid, the smart grid has developed rapidly in recent years. The smart grid enables energy to be stored and delivered more efficiently and safely, but user data’s integrity protection has been an important security issue in the smart grid. Although lots of digital signature protocols for the smart grid have been proposed to resolve this problem, they are vulnerable to quantum attacks. To deal with this problem, an efficient identity-based signature protocol on lattices is proposed in this paper. To improve our protocol’s efficiency, the tree of commitments is utilized. Moreover, a detailed performance evaluation of the proposed protocol is made. The performance analysis demonstrates that the potential utility of our protocol in the smart grid is huge.

智能电网作为有发展前景的下一代电网,近年来发展迅速。智能电网使能源能够更高效、更安全地储存和输送,但用户数据的完整性保护一直是智能电网中的一个重要安全问题。尽管已经提出了许多用于智能电网的数字签名协议来解决这个问题,但它们很容易受到量子攻击。针对这一问题,本文提出了一种有效的基于身份的格签名协议。为了提高我们的议定书的效率,使用了承诺树。此外,还对所提出的协议进行了详细的性能评估。性能分析表明,我们的协议在智能电网中的潜在效用是巨大的。
{"title":"An efficient identity-based signature protocol over lattices for the smart grid","authors":"Longzhu Zhu ,&nbsp;Fan Jiang ,&nbsp;Min Luo ,&nbsp;Quanrun Li","doi":"10.1016/j.hcc.2023.100147","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100147","url":null,"abstract":"<div><p>As the promising next-generation power grid, the smart grid has developed rapidly in recent years. The smart grid enables energy to be stored and delivered more efficiently and safely, but user data’s integrity protection has been an important security issue in the smart grid. Although lots of digital signature protocols for the smart grid have been proposed to resolve this problem, they are vulnerable to quantum attacks. To deal with this problem, an efficient identity-based signature protocol on lattices is proposed in this paper. To improve our protocol’s efficiency, the tree of commitments is utilized. Moreover, a detailed performance evaluation of the proposed protocol is made. The performance analysis demonstrates that the potential utility of our protocol in the smart grid is huge.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50193402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent 基于智能代理强化学习的云边界网络主动防御决策方法研究
Pub Date : 2023-08-11 DOI: 10.1016/j.hcc.2023.100145
Huan Wang , Yunlong Tang , Yan Wang , Ning Wei , Junyi Deng , Zhiyan Bin , Weilong Li

The cloud boundary network environment is characterized by a passive defense strategy, discrete defense actions, and delayed defense feedback in the face of network attacks, ignoring the influence of the external environment on defense decisions, thus resulting in poor defense effectiveness. Therefore, this paper proposes a cloud boundary network active defense model and decision method based on the reinforcement learning of intelligent agent, designs the network structure of the intelligent agent attack and defense game, and depicts the attack and defense game process of cloud boundary network; constructs the observation space and action space of reinforcement learning of intelligent agent in the non-complete information environment, and portrays the interaction process between intelligent agent and environment; establishes the reward mechanism based on the attack and defense gain, and encourage intelligent agents to learn more effective defense strategies. the designed active defense decision intelligent agent based on deep reinforcement learning can solve the problems of border dynamics, interaction lag, and control dispersion in the defense decision process of cloud boundary networks, and improve the autonomy and continuity of defense decisions.

云边界网络环境的特点是防御策略被动,防御行动离散,面对网络攻击时防御反馈延迟,忽视了外部环境对防御决策的影响,从而导致防御效果不佳。因此,本文提出了基于智能代理强化学习的云边界网络主动防御模型和决策方法,设计了智能代理攻防博弈的网络结构,刻画了云边界网络的攻防博弈过程;构建了非完全信息环境下智能代理强化学习的观测空间和行动空间,刻画了智能代理与环境的交互过程;建立了基于攻防收益的奖励机制,鼓励智能代理学习更有效的防御策略。所设计的基于深度强化学习的主动防御决策智能代理可以解决云边界网络防御决策过程中的边界动态、交互滞后、控制分散等问题,提高防御决策的自主性和连续性。
{"title":"Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent","authors":"Huan Wang ,&nbsp;Yunlong Tang ,&nbsp;Yan Wang ,&nbsp;Ning Wei ,&nbsp;Junyi Deng ,&nbsp;Zhiyan Bin ,&nbsp;Weilong Li","doi":"10.1016/j.hcc.2023.100145","DOIUrl":"10.1016/j.hcc.2023.100145","url":null,"abstract":"<div><p>The cloud boundary network environment is characterized by a passive defense strategy, discrete defense actions, and delayed defense feedback in the face of network attacks, ignoring the influence of the external environment on defense decisions, thus resulting in poor defense effectiveness. Therefore, this paper proposes a cloud boundary network active defense model and decision method based on the reinforcement learning of intelligent agent, designs the network structure of the intelligent agent attack and defense game, and depicts the attack and defense game process of cloud boundary network; constructs the observation space and action space of reinforcement learning of intelligent agent in the non-complete information environment, and portrays the interaction process between intelligent agent and environment; establishes the reward mechanism based on the attack and defense gain, and encourage intelligent agents to learn more effective defense strategies. the designed active defense decision intelligent agent based on deep reinforcement learning can solve the problems of border dynamics, interaction lag, and control dispersion in the defense decision process of cloud boundary networks, and improve the autonomy and continuity of defense decisions.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000430/pdfft?md5=3999db4a0c52cf4973ef09d3cfb36ff6&pid=1-s2.0-S2667295223000430-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75345400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JFinder: A novel architecture for java vulnerability identification based quad self-attention and pre-training mechanism JFinder:一种基于quad自注意和预训练机制的java漏洞识别新架构
Pub Date : 2023-08-09 DOI: 10.1016/j.hcc.2023.100148
Jin Wang , Zishan Huang , Hui Xiao, Yinhao Xiao

Software vulnerabilities pose significant risks to computer systems, impacting our daily lives, productivity, and even our health. Identifying and addressing security vulnerabilities in a timely manner is crucial to prevent hacking and data breaches. Unfortunately, current vulnerability identification methods, including classical and deep learning-based approaches, exhibit critical drawbacks that prevent them from meeting the demands of the contemporary software industry. To tackle these issues, we present JFinder, a novel architecture for Java vulnerability identification that leverages quad self-attention and pre-training mechanisms to combine structural information and semantic representations. Experimental results demonstrate that JFinder outperforms all baseline methods, achieving an accuracy of 0.97 on the CWE dataset and an F1 score of 0.84 on the PROMISE dataset. Furthermore, a case study reveals that JFinder can accurately identify four cases of vulnerabilities after patching.

软件漏洞对计算机系统构成重大风险,影响我们的日常生活、生产力,甚至健康。及时识别和解决安全漏洞对于防止黑客攻击和数据泄露至关重要。不幸的是,目前的漏洞识别方法,包括经典的和基于深度学习的方法,都存在严重缺陷,无法满足当代软件行业的需求。为了解决这些问题,我们提出了JFinder,这是一种新的Java漏洞识别体系结构,它利用四元自关注和预训练机制来组合结构信息和语义表示。实验结果表明,JFinder优于所有基线方法,在CWE数据集上实现了0.97的准确度,在PROMISE数据集中实现了0.84的F1分数。此外,一项案例研究表明,JFinder在修补后可以准确识别四种漏洞。
{"title":"JFinder: A novel architecture for java vulnerability identification based quad self-attention and pre-training mechanism","authors":"Jin Wang ,&nbsp;Zishan Huang ,&nbsp;Hui Xiao,&nbsp;Yinhao Xiao","doi":"10.1016/j.hcc.2023.100148","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100148","url":null,"abstract":"<div><p>Software vulnerabilities pose significant risks to computer systems, impacting our daily lives, productivity, and even our health. Identifying and addressing security vulnerabilities in a timely manner is crucial to prevent hacking and data breaches. Unfortunately, current vulnerability identification methods, including classical and deep learning-based approaches, exhibit critical drawbacks that prevent them from meeting the demands of the contemporary software industry. To tackle these issues, we present JFinder, a novel architecture for Java vulnerability identification that leverages quad self-attention and pre-training mechanisms to combine structural information and semantic representations. Experimental results demonstrate that JFinder outperforms all baseline methods, achieving an accuracy of 0.97 on the CWE dataset and an F1 score of 0.84 on the PROMISE dataset. Furthermore, a case study reveals that JFinder can accurately identify four cases of vulnerabilities after patching.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50193404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
High-Confidence Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1