首页 > 最新文献

High-Confidence Computing最新文献

英文 中文
Graph isomorphism—Characterization and efficient algorithms 图同构--特征和高效算法
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 Epub Date: 2024-03-26 DOI: 10.1016/j.hcc.2024.100224
The Graph isomorphism problem involves determining whether two graphs are isomorphic and the computational complexity required for this determination. In general, the problem is not known to be solvable in polynomial time, nor to be NP-complete. In this paper, by analyzing the algebraic properties of the adjacency matrices of the undirected graph, we first established the connection between graph isomorphism and matrix row and column interchanging operations. Then, we prove that for undirected graphs, the complexity in determining whether two graphs are isomorphic is at most O(n3).
图同构问题涉及确定两个图是否同构以及确定所需的计算复杂度。一般来说,这个问题既不能在多项式时间内求解,也不是 NP-完全问题。本文通过分析无向图邻接矩阵的代数性质,首先建立了图同构与矩阵行列互换操作之间的联系。然后,我们证明了对于无向图,判断两个图是否同构的复杂度最多为 O(n3)。
{"title":"Graph isomorphism—Characterization and efficient algorithms","authors":"","doi":"10.1016/j.hcc.2024.100224","DOIUrl":"10.1016/j.hcc.2024.100224","url":null,"abstract":"<div><div>The Graph isomorphism problem involves determining whether two graphs are isomorphic and the computational complexity required for this determination. In general, the problem is not known to be solvable in polynomial time, nor to be NP-complete. In this paper, by analyzing the algebraic properties of the adjacency matrices of the undirected graph, we first established the connection between graph isomorphism and matrix row and column interchanging operations. Then, we prove that for undirected graphs, the complexity in determining whether two graphs are isomorphic is at most <span><math><mrow><mi>O</mi><mrow><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>)</mo></mrow></mrow></math></span>.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100224"},"PeriodicalIF":3.2,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140402465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data cube-based storage optimization for resource-constrained edge computing 基于数据立方体的存储优化,适用于资源受限的边缘计算
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 Epub Date: 2024-02-28 DOI: 10.1016/j.hcc.2024.100212
In the evolving landscape of the digital era, edge computing emerges as an essential paradigm, especially critical for low-latency, real-time applications and Internet of Things (IoT) environments. Despite its advantages, edge computing faces severe limitations in storage capabilities and is fraught with reliability issues due to its resource-constrained nature and exposure to challenging conditions. To address these challenges, this work presents a tailored storage mechanism for edge computing, focusing on space efficiency and data reliability. Our method comprises three key steps: relation factorization, column clustering, and erasure encoding with compression. We successfully reduce the required storage space by deconstructing complex database tables and optimizing data organization within these sub-tables. We further add a layer of reliability through erasure encoding. Comprehensive experiments on TPC-H datasets substantiate our approach, demonstrating storage savings of up to 38.35% and time efficiency improvements by 3.96x in certain cases. Furthermore, our clustering technique shows a potential for additional storage reduction up to 40.41%.
在不断发展的数字时代,边缘计算成为一种重要的模式,对于低延迟、实时应用和物联网(IoT)环境尤为重要。尽管边缘计算具有诸多优势,但由于其资源受限的特性和暴露在挑战性条件下,边缘计算在存储能力方面面临着严重的限制,并且充满了可靠性问题。为了应对这些挑战,本研究提出了一种为边缘计算量身定制的存储机制,重点关注空间效率和数据可靠性。我们的方法包括三个关键步骤:关系因式分解、列聚类和压缩擦除编码。我们通过分解复杂的数据库表并优化这些子表内的数据组织,成功地减少了所需的存储空间。我们还通过擦除编码进一步增加了可靠性。在 TPC-H 数据集上进行的综合实验证实了我们的方法,在某些情况下,存储空间节省高达 38.35%,时间效率提高了 3.96 倍。此外,我们的聚类技术还显示出额外减少 40.41% 存储空间的潜力。
{"title":"Data cube-based storage optimization for resource-constrained edge computing","authors":"","doi":"10.1016/j.hcc.2024.100212","DOIUrl":"10.1016/j.hcc.2024.100212","url":null,"abstract":"<div><div>In the evolving landscape of the digital era, edge computing emerges as an essential paradigm, especially critical for low-latency, real-time applications and Internet of Things (IoT) environments. Despite its advantages, edge computing faces severe limitations in storage capabilities and is fraught with reliability issues due to its resource-constrained nature and exposure to challenging conditions. To address these challenges, this work presents a tailored storage mechanism for edge computing, focusing on space efficiency and data reliability. Our method comprises three key steps: relation factorization, column clustering, and erasure encoding with compression. We successfully reduce the required storage space by deconstructing complex database tables and optimizing data organization within these sub-tables. We further add a layer of reliability through erasure encoding. Comprehensive experiments on TPC-H datasets substantiate our approach, demonstrating storage savings of up to 38.35% and time efficiency improvements by 3.96x in certain cases. Furthermore, our clustering technique shows a potential for additional storage reduction up to 40.41%.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100212"},"PeriodicalIF":3.2,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140464490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised machine learning approach for tailoring educational content to individual student weaknesses 无监督机器学习法,针对学生个体弱点定制教育内容
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 Epub Date: 2024-04-16 DOI: 10.1016/j.hcc.2024.100228
By analyzing data gathered through Online Learning (OL) systems, data mining can be used to unearth hidden relationships between topics and trends in student performance. Here, in this paper, we show how data mining techniques such as clustering and association rule algorithms can be used on historical data to develop a unique recommendation system module. In our implementation, we utilize historical data to generate association rules specifically for student test marks below a threshold of 60%. By focusing on marks below this threshold, we aim to identify and establish associations based on the patterns of weakness observed in the past data. Additionally, we leverage K-means clustering to provide instructors with visual representations of the generated associations. This strategy aids instructors in better comprehending the information and associations produced by the algorithms. K-means clustering helps visualize and organize the data in a way that makes it easier for instructors to analyze and gain insights, enabling them to support the verification of the relationship between topics. This can be a useful tool to deliver better feedback to students as well as provide better insights to instructors when developing their pedagogy. This paper further shows a prototype implementation of the above-mentioned concepts to gain opinions and insights about the usability and viability of the proposed system.
通过分析在线学习(OL)系统收集到的数据,数据挖掘可以用来发现主题之间隐藏的关系和学生成绩的趋势。在本文中,我们展示了如何将聚类和关联规则算法等数据挖掘技术用于历史数据,以开发独特的推荐系统模块。在我们的实施过程中,我们利用历史数据生成关联规则,专门针对低于 60% 临界值的学生考试分数。通过关注低于这一阈值的分数,我们旨在根据过去数据中观察到的薄弱环节模式来识别和建立关联。此外,我们还利用 K 均值聚类为教师提供生成关联的可视化表示。这一策略有助于教师更好地理解算法生成的信息和关联。K-means 聚类有助于以可视化的方式组织数据,使教师更容易分析和洞察,从而为验证主题之间的关系提供支持。这可以成为一个有用的工具,为学生提供更好的反馈,并为教师在制定教学法时提供更好的见解。本文进一步展示了上述概念的原型实现,以获得有关拟议系统可用性和可行性的意见和见解。
{"title":"Unsupervised machine learning approach for tailoring educational content to individual student weaknesses","authors":"","doi":"10.1016/j.hcc.2024.100228","DOIUrl":"10.1016/j.hcc.2024.100228","url":null,"abstract":"<div><div>By analyzing data gathered through Online Learning (OL) systems, data mining can be used to unearth hidden relationships between topics and trends in student performance. Here, in this paper, we show how data mining techniques such as clustering and association rule algorithms can be used on historical data to develop a unique recommendation system module. In our implementation, we utilize historical data to generate association rules specifically for student test marks below a threshold of 60%. By focusing on marks below this threshold, we aim to identify and establish associations based on the patterns of weakness observed in the past data. Additionally, we leverage K-means clustering to provide instructors with visual representations of the generated associations. This strategy aids instructors in better comprehending the information and associations produced by the algorithms. K-means clustering helps visualize and organize the data in a way that makes it easier for instructors to analyze and gain insights, enabling them to support the verification of the relationship between topics. This can be a useful tool to deliver better feedback to students as well as provide better insights to instructors when developing their pedagogy. This paper further shows a prototype implementation of the above-mentioned concepts to gain opinions and insights about the usability and viability of the proposed system.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100228"},"PeriodicalIF":3.2,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140782041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of acoustic eavesdropping attacks: Principle, methods, and progress 声学窃听攻击调查:原理、方法和进展
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 Epub Date: 2024-05-18 DOI: 10.1016/j.hcc.2024.100241
In today’s information age, eavesdropping has been one of the most serious privacy threats in information security, such as exodus spyware (Rudie et al., 2021) and pegasus spyware (Anatolyevich, 2020). And the main one of them is acoustic eavesdropping. Acoustic eavesdropping (George and Sagayarajan, 2023) is a technology that uses microphones, sensors, or other devices to collect and process sound signals and convert them into readable information. Although much research has been done in this area, there is still a lack of comprehensive investigation into the timeliness of this technology, given the continuous advancement of technology and the rapid development of eavesdropping methods. In this article, we have given a selective overview of acoustic eavesdropping, focusing on the methods of acoustic eavesdropping. More specifically, we divide acoustic eavesdropping into three categories: motion sensor-based acoustic eavesdropping, optical sensor-based acoustic eavesdropping, and RF-based acoustic eavesdropping. Within these three representative frameworks, we review the results of acoustic eavesdropping according to the type of equipment they use and the physical principles of each. Secondly, we also introduce several important but challenging applications of these acoustic eavesdropping methods. In addition, we compared the systems that meet the requirements of acoustic eavesdropping in real-world scenarios from multiple perspectives, including whether they are non-intrusive, whether they can achieve unconstrained word eavesdropping, and whether they use machine learning, etc. The general template of our article is as follows: firstly, we systematically review and classify the existing eavesdropping technologies, elaborate on their working mechanisms, and give corresponding formulas. Then, these eavesdropping methods were compared and analyzed, and each method’s effectiveness and technical difficulty were evaluated from multiple dimensions. In addition to an assessment of the current state of the field, we discuss the current shortcomings and challenges and give a fruitful direction for the future of acoustic eavesdropping research. We hope to continue to inspire researchers in this direction.
在当今的信息时代,窃听已成为信息安全领域最严重的隐私威胁之一,如exodus间谍软件(Rudie等人,2021年)和pegasus间谍软件(Anatolyevich,2020年)。其中最主要的是声学窃听。声学窃听(George 和 Sagayarajan,2023 年)是一种利用麦克风、传感器或其他设备收集和处理声音信号并将其转换为可读信息的技术。尽管在这一领域已经做了很多研究,但鉴于技术的不断进步和窃听方法的快速发展,对这一技术的时效性仍然缺乏全面的调查。在本文中,我们对声学窃听进行了选择性概述,重点介绍了声学窃听的方法。具体来说,我们将声学窃听分为三类:基于运动传感器的声学窃听、基于光学传感器的声学窃听和基于射频的声学窃听。在这三个具有代表性的框架内,我们将根据它们使用的设备类型和各自的物理原理回顾声学窃听的成果。其次,我们还介绍了这些声学窃听方法的几个重要但具有挑战性的应用。此外,我们还从是否具有非侵入性、是否能实现无约束的文字窃听、是否使用了机器学习等多个角度,比较了符合实际场景中声学窃听要求的系统。我们文章的总体模板如下:首先,我们对现有的窃听技术进行了系统的回顾和分类,阐述了它们的工作机制,并给出了相应的公式。然后,对这些窃听方法进行对比分析,从多个维度评价每种方法的有效性和技术难度。除了对该领域的现状进行评估外,我们还讨论了当前的不足和挑战,并为声学窃听研究的未来发展指明了富有成效的方向。我们希望能继续激励研究人员朝这个方向努力。
{"title":"A survey of acoustic eavesdropping attacks: Principle, methods, and progress","authors":"","doi":"10.1016/j.hcc.2024.100241","DOIUrl":"10.1016/j.hcc.2024.100241","url":null,"abstract":"<div><div>In today’s information age, eavesdropping has been one of the most serious privacy threats in information security, such as exodus spyware (Rudie et al., 2021) and pegasus spyware (Anatolyevich, 2020). And the main one of them is acoustic eavesdropping. Acoustic eavesdropping (George and Sagayarajan, 2023) is a technology that uses microphones, sensors, or other devices to collect and process sound signals and convert them into readable information. Although much research has been done in this area, there is still a lack of comprehensive investigation into the timeliness of this technology, given the continuous advancement of technology and the rapid development of eavesdropping methods. In this article, we have given a selective overview of acoustic eavesdropping, focusing on the methods of acoustic eavesdropping. More specifically, we divide acoustic eavesdropping into three categories: motion sensor-based acoustic eavesdropping, optical sensor-based acoustic eavesdropping, and RF-based acoustic eavesdropping. Within these three representative frameworks, we review the results of acoustic eavesdropping according to the type of equipment they use and the physical principles of each. Secondly, we also introduce several important but challenging applications of these acoustic eavesdropping methods. In addition, we compared the systems that meet the requirements of acoustic eavesdropping in real-world scenarios from multiple perspectives, including whether they are non-intrusive, whether they can achieve unconstrained word eavesdropping, and whether they use machine learning, etc. The general template of our article is as follows: firstly, we systematically review and classify the existing eavesdropping technologies, elaborate on their working mechanisms, and give corresponding formulas. Then, these eavesdropping methods were compared and analyzed, and each method’s effectiveness and technical difficulty were evaluated from multiple dimensions. In addition to an assessment of the current state of the field, we discuss the current shortcomings and challenges and give a fruitful direction for the future of acoustic eavesdropping research. We hope to continue to inspire researchers in this direction.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100241"},"PeriodicalIF":3.2,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141138505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent edge CDN with smart contract-aided local IoT sharing 利用智能合约辅助本地物联网共享的智能边缘 CDN
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 Epub Date: 2024-04-04 DOI: 10.1016/j.hcc.2024.100225
A content delivery network (CDN) aims to reduce the content delivery latency to end-users by using distributed cache servers. Nevertheless, deploying and maintaining cache servers on a large scale is very expensive. To solve this problem, CDN providers have developed a new content delivery strategy: allowing end-users’s IoT edge devices to share their storage/bandwidth resources. This new edge CDN platform must address two core questions: (1) how can we incentivize end users to share IoT devices? (2) how can we facilitate a safe and transparent content transaction environment for end users? This paper introduces SmartSharing, a new content delivery network solution to address these questions. In smartSharing, the over-the-top (OTT) IoT devices belonging to end-users are used as mini-cache servers. To motivate end users to share the idle devices and storage/bandwidth resources, SmartSharing designs the content delivery schedule and the pricing scheme based on game theory and machine learning algorithms (specifically, a tailored expectation-maximization (EM) algorithm). To facilitate content trading among end users, SmartSharing creates a secure and transparent transaction platform based on smart contracts in Ethereum. In addition, SmartSharing’s performance evaluation is through trace-driven simulations in the real world and a prototype using content metadata and the achieved pricing schemes. The evaluation results show that CDN providers, end users and content providers can all benefit from our SmartSharing framework.
内容分发网络(CDN)旨在通过使用分布式缓存服务器,减少向终端用户分发内容的延迟。然而,大规模部署和维护缓存服务器非常昂贵。为了解决这个问题,CDN 提供商开发了一种新的内容交付策略:允许终端用户的物联网边缘设备共享其存储/带宽资源。这种新的边缘 CDN 平台必须解决两个核心问题:(1)如何激励终端用户共享物联网设备?(2) 如何为终端用户提供安全透明的内容交易环境?本文介绍了解决这些问题的新型内容交付网络解决方案 SmartSharing。在 SmartSharing 中,终端用户的 OTT 物联网设备被用作小型缓存服务器。为了激励终端用户共享闲置设备和存储/带宽资源,SmartSharing 基于博弈论和机器学习算法(特别是定制的期望最大化(EM)算法)设计了内容交付计划和定价方案。为促进终端用户之间的内容交易,SmartSharing 基于以太坊智能合约创建了一个安全透明的交易平台。此外,SmartSharing 的性能评估是通过现实世界中的跟踪驱动模拟以及使用内容元数据和已实现定价方案的原型进行的。评估结果表明,CDN 提供商、终端用户和内容提供商都能从我们的 SmartSharing 框架中受益。
{"title":"Intelligent edge CDN with smart contract-aided local IoT sharing","authors":"","doi":"10.1016/j.hcc.2024.100225","DOIUrl":"10.1016/j.hcc.2024.100225","url":null,"abstract":"<div><div>A content delivery network (CDN) aims to reduce the content delivery latency to end-users by using distributed cache servers. Nevertheless, deploying and maintaining cache servers on a large scale is very expensive. To solve this problem, CDN providers have developed a new content delivery strategy: allowing end-users’s IoT edge devices to share their storage/bandwidth resources. This new edge CDN platform must address two core questions: (1) how can we incentivize end users to share IoT devices? (2) how can we facilitate a safe and transparent content transaction environment for end users? This paper introduces SmartSharing, a new content delivery network solution to address these questions. In smartSharing, the over-the-top (OTT) IoT devices belonging to end-users are used as mini-cache servers. To motivate end users to share the idle devices and storage/bandwidth resources, SmartSharing designs the content delivery schedule and the pricing scheme based on game theory and machine learning algorithms (specifically, a tailored expectation-maximization (EM) algorithm). To facilitate content trading among end users, SmartSharing creates a secure and transparent transaction platform based on smart contracts in Ethereum. In addition, SmartSharing’s performance evaluation is through trace-driven simulations in the real world and a prototype using content metadata and the achieved pricing schemes. The evaluation results show that CDN providers, end users and content providers can all benefit from our SmartSharing framework.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100225"},"PeriodicalIF":3.2,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140771215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bioinvasion risk analysis based on automatic identification system and marine ecoregion data 基于自动识别系统和海洋生态区数据的生物入侵风险分析
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 Epub Date: 2024-02-02 DOI: 10.1016/j.hcc.2024.100210
Hongwei Shi , Chenyu Wang , Hang Zhao , Shengling Wang , Yixian Chen
The global maritime trade plays a key role in propagating alien aquatic invasive species, which incurs side effects in terms of environment, human health and economy. The existing biosecurity methods did not take into account the invaded risk as well as the diffusion of invasive species at the same time, which may lead to inadequate bioinvasion control. In addition, the lack of considering the impact of bioinvasion control on shipping also makes their methods cost-ineffective. To solve the problems of the existing methods, we employ the automatic identification system (AIS) data, the ballast water data and the water temperature & salinity data to construct two networks: the species invasion network (SIN) and the global shipping network (GSN). The former is used to analyze the potential of a port in propagating marine invasive species while the latter is employed to evaluate the shipping importance of ports. Based on the analysis of SIN and GSN, two categories of biosecurity triggering mechanisms are proposed. The first category takes into consideration both being bioinvaded and spreading invasive species and the second one concerns the shipping value of each port besides its invasion risk. A lot of case studies have been done to discover the key ports needed to be controlled preferentially under the guide of the proposed biosecurity triggering mechanisms. Finally, our correlation analysis shows that closeness is most highly correlated to the invasion risk.
全球海上贸易在传播外来水生入侵物种方面发挥着关键作用,对环境、人类健康和经济造成了副作用。现有的生物安全方法没有同时考虑入侵风险和入侵物种的扩散,这可能导致生物入侵控制不力。此外,由于没有考虑生物入侵控制对航运的影响,其方法也不符合成本效益。为了解决现有方法存在的问题,我们利用自动识别系统(AIS)数据、压载水数据和水温& 盐度数据构建了两个网络:物种入侵网络(SIN)和全球航运网络(GSN)。前者用于分析港口传播海洋入侵物种的潜力,后者用于评估港口航运的重要性。根据对 SIN 和 GSN 的分析,提出了两类生物安全触发机制。第一类既考虑到生物入侵,也考虑到入侵物种的传播;第二类除了考虑入侵风险,还考虑到每个港口的航运价值。通过大量的案例研究,我们发现了在所提出的生物安全触发机制指导下需要优先控制的关键港口。最后,我们的相关性分析表明,近距离与入侵风险的相关性最高。
{"title":"Bioinvasion risk analysis based on automatic identification system and marine ecoregion data","authors":"Hongwei Shi ,&nbsp;Chenyu Wang ,&nbsp;Hang Zhao ,&nbsp;Shengling Wang ,&nbsp;Yixian Chen","doi":"10.1016/j.hcc.2024.100210","DOIUrl":"10.1016/j.hcc.2024.100210","url":null,"abstract":"<div><div>The global maritime trade plays a key role in propagating alien aquatic invasive species, which incurs side effects in terms of environment, human health and economy. The existing biosecurity methods did not take into account the invaded risk as well as the diffusion of invasive species at the same time, which may lead to inadequate bioinvasion control. In addition, the lack of considering the impact of bioinvasion control on shipping also makes their methods cost-ineffective. To solve the problems of the existing methods, we employ the automatic identification system (AIS) data, the ballast water data and the water temperature &amp; salinity data to construct two networks: the species invasion network (SIN) and the global shipping network (GSN). The former is used to analyze the potential of a port in propagating marine invasive species while the latter is employed to evaluate the shipping importance of ports. Based on the analysis of SIN and GSN, two categories of biosecurity triggering mechanisms are proposed. The first category takes into consideration both being bioinvaded and spreading invasive species and the second one concerns the shipping value of each port besides its invasion risk. A lot of case studies have been done to discover the key ports needed to be controlled preferentially under the guide of the proposed biosecurity triggering mechanisms. Finally, our correlation analysis shows that closeness is most highly correlated to the invasion risk.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100210"},"PeriodicalIF":3.2,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139816780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AIDCT: An AI service development and composition tool for constructing trustworthy intelligent systems AIDCT:用于构建可信智能系统的人工智能服务开发和组合工具
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 Epub Date: 2024-05-10 DOI: 10.1016/j.hcc.2024.100227
The growing prevalence of AI services on cloud platforms is driving the demand for technologies and tools which enable the integration of multiple AI services to handle intricate tasks. Traditional methods of evaluating intelligent systems focus mainly on the performance of AI components, without providing comprehensive metrics for the system as a whole. Additionally, as these AI components are often sourced from third-party providers, users may face challenges due to inconsistent quality assurance and limitations in further developing AI models, and dealing with third-party service providers’ limitations. These limitations often involve quality assurance and a lack of capability for secondary development and training of services. To address these issues, we have developed a tool based on our previous work. It can autonomously build Intelligent systems from AI services while tackling the issues mentioned above. This tool not only creates service composition solutions that align with user-defined functional requirements and performance metrics but also executes these solutions to verify if the metrics meet user requirements. We have demonstrated the effectiveness of this tool in constructing trustworthy intelligent systems through a series of case studies.
云平台上的人工智能服务日益普及,推动了对能够整合多种人工智能服务以处理复杂任务的技术和工具的需求。传统的智能系统评估方法主要关注人工智能组件的性能,而不提供系统整体的综合指标。此外,由于这些人工智能组件通常来自第三方提供商,用户在进一步开发人工智能模型和处理第三方服务提供商的限制时,可能会面临质量保证不一致和限制等挑战。这些限制往往涉及质量保证以及缺乏二次开发和培训服务的能力。为了解决这些问题,我们在以往工作的基础上开发了一种工具。它可以自主地从人工智能服务中构建智能系统,同时解决上述问题。该工具不仅能创建符合用户定义的功能要求和性能指标的服务组成解决方案,还能执行这些解决方案,以验证指标是否符合用户要求。我们通过一系列案例研究证明了该工具在构建值得信赖的智能系统方面的有效性。
{"title":"AIDCT: An AI service development and composition tool for constructing trustworthy intelligent systems","authors":"","doi":"10.1016/j.hcc.2024.100227","DOIUrl":"10.1016/j.hcc.2024.100227","url":null,"abstract":"<div><div>The growing prevalence of AI services on cloud platforms is driving the demand for technologies and tools which enable the integration of multiple AI services to handle intricate tasks. Traditional methods of evaluating intelligent systems focus mainly on the performance of AI components, without providing comprehensive metrics for the system as a whole. Additionally, as these AI components are often sourced from third-party providers, users may face challenges due to inconsistent quality assurance and limitations in further developing AI models, and dealing with third-party service providers’ limitations. These limitations often involve quality assurance and a lack of capability for secondary development and training of services. To address these issues, we have developed a tool based on our previous work. It can autonomously build Intelligent systems from AI services while tackling the issues mentioned above. This tool not only creates service composition solutions that align with user-defined functional requirements and performance metrics but also executes these solutions to verify if the metrics meet user requirements. We have demonstrated the effectiveness of this tool in constructing trustworthy intelligent systems through a series of case studies.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100227"},"PeriodicalIF":3.2,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141028150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hierarchical byzantine fault tolerance consensus protocol for the Internet of Things 面向物联网的分层拜占庭容错共识协议
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2023-12-20 DOI: 10.1016/j.hcc.2023.100196
Rongxin Guo , Zhenping Guo , Zerui Lin , Wenxian Jiang

The inefficiency of Consensus protocols is a significant impediment to blockchain and IoT convergence development. To solve the problems like inefficiency and poor dynamics of the Practical Byzantine Fault Tolerance (PBFT) in IoT scenarios, a hierarchical consensus protocol called DCBFT is proposed. Above all, we propose an improved k-sums algorithm to build a two-level consensus cluster, achieving an hierarchical management for IoT devices. Next, A scalable two-level consensus protocol is proposed, which uses a multi-primary node mechanism to solve the single-point-of-failure problem. In addition, a data synchronization process is introduced to ensure the consistency of block data after view changes. Finally, A dynamic reputation evaluation model is introduced to update the nodes’ reputation values and complete the rotation of consensus nodes at the end of each consensus round. The experimental results show that DCBFT has a more robust dynamic and higher consensus efficiency. Moreover, After running for some time, the performance of DCBFT shows some improvement.

共识协议的低效率是区块链与物联网融合发展的一大障碍。为了解决实用拜占庭容错(PBFT)在物联网场景下的低效和动态性差等问题,我们提出了一种名为 DCBFT 的分层共识协议。首先,我们提出了一种改进的 k-sums 算法来构建两级共识集群,从而实现物联网设备的分级管理。接下来,我们提出了一种可扩展的两级共识协议,它采用多主节点机制来解决单点故障问题。此外,还引入了数据同步过程,以确保视图更改后块数据的一致性。最后,引入了动态声誉评估模型来更新节点的声誉值,并在每轮共识结束时完成共识节点的轮换。实验结果表明,DCBFT 具有更稳健的动态性和更高的共识效率。此外,在运行一段时间后,DCBFT 的性能有了一定的提高。
{"title":"A hierarchical byzantine fault tolerance consensus protocol for the Internet of Things","authors":"Rongxin Guo ,&nbsp;Zhenping Guo ,&nbsp;Zerui Lin ,&nbsp;Wenxian Jiang","doi":"10.1016/j.hcc.2023.100196","DOIUrl":"10.1016/j.hcc.2023.100196","url":null,"abstract":"<div><p>The inefficiency of Consensus protocols is a significant impediment to blockchain and IoT convergence development. To solve the problems like inefficiency and poor dynamics of the Practical Byzantine Fault Tolerance (PBFT) in IoT scenarios, a hierarchical consensus protocol called DCBFT is proposed. Above all, we propose an improved k-sums algorithm to build a two-level consensus cluster, achieving an hierarchical management for IoT devices. Next, A scalable two-level consensus protocol is proposed, which uses a multi-primary node mechanism to solve the single-point-of-failure problem. In addition, a data synchronization process is introduced to ensure the consistency of block data after view changes. Finally, A dynamic reputation evaluation model is introduced to update the nodes’ reputation values and complete the rotation of consensus nodes at the end of each consensus round. The experimental results show that DCBFT has a more robust dynamic and higher consensus efficiency. Moreover, After running for some time, the performance of DCBFT shows some improvement.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100196"},"PeriodicalIF":3.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000946/pdfft?md5=319d5156a64f46754b47a19c3c570818&pid=1-s2.0-S2667295223000946-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138992888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Personalized Internet of Things (PIoT), social connectivity, and Artificial Social Intelligence (ASI): A survey 探索个性化物联网(PIoT)、社交连接和人工智能(ASI):调查
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2024-05-20 DOI: 10.1016/j.hcc.2024.100242

Pervasive Computing has become more personal with the widespread adoption of the Internet of Things (IoT) in our day-to-day lives. The emerging domain that encompasses devices, sensors, storage, and computing of personal use and surroundings leads to Personal IoT (PIoT). PIoT offers users high levels of personalization, automation, and convenience. This proliferation of PIoT technology has extended into society, social engagement, and the interconnectivity of PIoT objects, resulting in the emergence of the Social Internet of Things (SIoT). The combination of PIoT and SIoT has spurred the need for autonomous learning, comprehension, and understanding of both the physical and social worlds. Current research on PIoT is dedicated to enabling seamless communication among devices, striking a balance between observation, sensing, and perceiving the extended physical and social environment, and facilitating information exchange. Furthermore, the virtualization of independent learning from the social environment has given rise to Artificial Social Intelligence (ASI) in PIoT systems. However, autonomous data communication between different nodes within a social setup presents various resource management challenges that require careful consideration. This paper provides a comprehensive review of the evolving domains of PIoT, SIoT, and ASI. Moreover, the paper offers insightful modeling and a case study exploring the role of PIoT in post-COVID scenarios. This study contributes to a deeper understanding of the intricacies of PIoT and its various dimensions, paving the way for further advancements in this transformative field.

随着物联网(IoT)在日常生活中的广泛应用,普适计算变得更加个性化。个人物联网(PIoT)是一个新兴领域,包括个人使用和周围环境的设备、传感器、存储和计算。PIoT 为用户提供了高度的个性化、自动化和便利性。PIoT 技术的扩散已延伸到社会、社会参与和 PIoT 物体的互联性,从而导致了社会物联网(SIoT)的出现。PIoT 和 SIoT 的结合激发了人们对自主学习、理解和认识物理世界和社会世界的需求。目前有关 PIoT 的研究致力于实现设备之间的无缝通信,在观察、感知和感知扩展物理和社会环境之间取得平衡,并促进信息交流。此外,从社会环境中自主学习的虚拟化技术也催生了 PIoT 系统中的人工社会智能(ASI)。然而,社交环境中不同节点之间的自主数据通信带来了各种资源管理挑战,需要仔细考虑。本文对不断发展的 PIoT、SIoT 和 ASI 领域进行了全面回顾。此外,本文还提供了深入的建模和案例研究,探讨了 PIoT 在后 COVID 场景中的作用。本研究有助于加深对 PIoT 复杂性及其各个层面的理解,为这一变革性领域的进一步发展铺平道路。
{"title":"Exploring Personalized Internet of Things (PIoT), social connectivity, and Artificial Social Intelligence (ASI): A survey","authors":"","doi":"10.1016/j.hcc.2024.100242","DOIUrl":"10.1016/j.hcc.2024.100242","url":null,"abstract":"<div><p>Pervasive Computing has become more personal with the widespread adoption of the Internet of Things (IoT) in our day-to-day lives. The emerging domain that encompasses devices, sensors, storage, and computing of personal use and surroundings leads to Personal IoT (PIoT). PIoT offers users high levels of personalization, automation, and convenience. This proliferation of PIoT technology has extended into society, social engagement, and the interconnectivity of PIoT objects, resulting in the emergence of the Social Internet of Things (SIoT). The combination of PIoT and SIoT has spurred the need for autonomous learning, comprehension, and understanding of both the physical and social worlds. Current research on PIoT is dedicated to enabling seamless communication among devices, striking a balance between observation, sensing, and perceiving the extended physical and social environment, and facilitating information exchange. Furthermore, the virtualization of independent learning from the social environment has given rise to Artificial Social Intelligence (ASI) in PIoT systems. However, autonomous data communication between different nodes within a social setup presents various resource management challenges that require careful consideration. This paper provides a comprehensive review of the evolving domains of PIoT, SIoT, and ASI. Moreover, the paper offers insightful modeling and a case study exploring the role of PIoT in post-COVID scenarios. This study contributes to a deeper understanding of the intricacies of PIoT and its various dimensions, paving the way for further advancements in this transformative field.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100242"},"PeriodicalIF":3.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266729522400045X/pdfft?md5=b97b12cf0359158d875f2dc4cb6bbd8d&pid=1-s2.0-S266729522400045X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141138835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure blockchain bidding auction protocol against malicious adversaries 抵御恶意对手的安全区块链竞价拍卖协议
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2024-01-11 DOI: 10.1016/j.hcc.2024.100201
Xiaobing Dai , Jiajing Liu , Xin Liu , Xiaofen Tu , Ruexue Wang

In recent years, with the development of blockchain, electronic bidding auction has received more and more attention. Aiming at the possible problems of privacy leakage in the current electronic bidding and auction, this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries, which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party. The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography. It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants, which can solve the problem of resisting malicious adversary attacks. The security of the protocol is proved by the real/ideal model paradigm, and the efficiency of the protocol is analyzed. The efficiency of the protocol is verified by simulating experiments, and the protocol has practical value.

近年来,随着区块链的发展,电子竞价拍卖受到越来越多的关注。针对目前电子竞价拍卖中可能存在的隐私泄露问题,本文提出了一种基于区块链的对抗恶意对手的电子竞价拍卖系统,利用安全多方计算实现无可信第三方的安全竞价拍卖协议。本文提出的协议是一种基于阈值椭圆曲线密码学的电子竞价拍卖方案。它可以在没有任何第三方的情况下,针对参与者的一些恶意行为完成竞价拍卖,解决了抵御恶意对手攻击的问题。通过真实/理想模型范式证明了协议的安全性,并分析了协议的效率。通过模拟实验验证了协议的效率,协议具有实用价值。
{"title":"Secure blockchain bidding auction protocol against malicious adversaries","authors":"Xiaobing Dai ,&nbsp;Jiajing Liu ,&nbsp;Xin Liu ,&nbsp;Xiaofen Tu ,&nbsp;Ruexue Wang","doi":"10.1016/j.hcc.2024.100201","DOIUrl":"10.1016/j.hcc.2024.100201","url":null,"abstract":"<div><p>In recent years, with the development of blockchain, electronic bidding auction has received more and more attention. Aiming at the possible problems of privacy leakage in the current electronic bidding and auction, this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries, which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party. The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography. It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants, which can solve the problem of resisting malicious adversary attacks. The security of the protocol is proved by the real/ideal model paradigm, and the efficiency of the protocol is analyzed. The efficiency of the protocol is verified by simulating experiments, and the protocol has practical value.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100201"},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000047/pdfft?md5=319168477025da7fd78f5308eb341778&pid=1-s2.0-S2667295224000047-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139635497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
High-Confidence Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1