首页 > 最新文献

IEEE Transactions on Emerging Topics in Computing最新文献

英文 中文
A Novel Porcelain Fingerprinting Technique 一种新的陶瓷指纹识别技术
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-17 DOI: 10.1109/TETC.2025.3546602
Chengjie Wang;Yuejun Zhang;Ziyu Zhou
Porcelain, as a significant cultural heritage, embodies the wisdom of human civilization. However, existing anti-counterfeiting and authentication technologies for porcelain are often unreliable and costly. This paper proposes a physical unclonable functions (PUF) design based on crack physical feature extraction for the anti-counterfeiting and authentication of Gold-Wire porcelain. The proposed method generates PUF information by extracting inherent physical deviations in the surface cracks of Gold-Wire porcelain. First, a standard crack extraction process is established using digital image processing to obtain crack information from the porcelain surface. Then, a physical feature extraction model based on the chain code encoding technique and the Delaunay triangulation technique is used to derive the physical feature values from the cracks. Subsequently, a PUF encoding algorithm is designed to convert these physical feature values into a PUF response. Finally, the security and reliability of the designed PUF are evaluated, and a PUF-based porcelain authentication protocol is developed. Experimental results show that the proposed PUF exhibits 50.16% uniqueness and 98.85% reliability, and the PUF data successfully passed the NIST randomness test, demonstrating that the proposed technology can effectively achieve low-cost, high-reliability anti-counterfeiting for commercial porcelain.
瓷器作为一项重要的文化遗产,凝聚着人类文明的智慧。然而,现有的瓷器防伪和鉴定技术往往是不可靠和昂贵的。提出了一种基于裂纹物理特征提取的金丝瓷防伪认证物理不可克隆功能(PUF)设计。该方法通过提取金丝瓷表面裂纹中固有的物理偏差来生成PUF信息。首先,利用数字图像处理技术建立裂纹提取标准流程,获取裂纹信息;然后,采用基于链码编码技术和Delaunay三角剖分技术的物理特征提取模型,从裂缝中提取物理特征值;然后设计PUF编码算法,将这些物理特征值转换为PUF响应。最后,对所设计的PUF的安全性和可靠性进行了评估,并开发了基于PUF的瓷认证协议。实验结果表明,所提出的PUF具有50.16%的唯一性和98.85%的可靠性,并且PUF数据成功通过了NIST的随机性测试,表明所提出的技术可以有效地实现商品瓷器的低成本、高可靠性防伪。
{"title":"A Novel Porcelain Fingerprinting Technique","authors":"Chengjie Wang;Yuejun Zhang;Ziyu Zhou","doi":"10.1109/TETC.2025.3546602","DOIUrl":"https://doi.org/10.1109/TETC.2025.3546602","url":null,"abstract":"Porcelain, as a significant cultural heritage, embodies the wisdom of human civilization. However, existing anti-counterfeiting and authentication technologies for porcelain are often unreliable and costly. This paper proposes a physical unclonable functions (PUF) design based on crack physical feature extraction for the anti-counterfeiting and authentication of Gold-Wire porcelain. The proposed method generates PUF information by extracting inherent physical deviations in the surface cracks of Gold-Wire porcelain. First, a standard crack extraction process is established using digital image processing to obtain crack information from the porcelain surface. Then, a physical feature extraction model based on the chain code encoding technique and the Delaunay triangulation technique is used to derive the physical feature values from the cracks. Subsequently, a PUF encoding algorithm is designed to convert these physical feature values into a PUF response. Finally, the security and reliability of the designed PUF are evaluated, and a PUF-based porcelain authentication protocol is developed. Experimental results show that the proposed PUF exhibits 50.16% uniqueness and 98.85% reliability, and the PUF data successfully passed the NIST randomness test, demonstrating that the proposed technology can effectively achieve low-cost, high-reliability anti-counterfeiting for commercial porcelain.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"964-976"},"PeriodicalIF":5.4,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoSTA: Skill-Oriented Stable Task Assignment With Bidirectional Preferences in Crowdsourcing 众包中具有双向偏好的技能导向稳定任务分配
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-13 DOI: 10.1109/TETC.2025.3548672
Riya Samanta;Soumya K. Ghosh;Sajal K. Das
Traditional task assignment approaches in crowdsourcing platforms have focused on optimizing utility for workers or tasks, often neglecting the general utility of the platform and the influence of mutual preference considering skill availability and budget restrictions. This oversight can destabilize task allocation outcomes, diminishing user experience, and, ultimately, the platform’s long-term utility and gives rise to the Worker Task Stable Matching (WTSM) problem. To solve WTSM, we propose the Skill-oriented Stable Task Assignment with a Bi-directional Preference (SoSTA) method based on deferred acceptance strategy. SoSTA aims to generate stable allocations between tasks and workers considering mutually their preferences, optimizing overall utility while following skill and budget constraints. Our study redefines the general utility of the platform as an amalgamation of utilities on both the workers’ and tasks’ sides, incorporating the preference lists of each worker or task based on their respective utility scores for the other party. SoSTA incorporates Multi Skill-oriented Stable Worker Task Mapping (Multi-SoS-WTM) algorithm for contributions with multiple skills per worker. SoSTA is rational, non-wasteful, fair, and hence stable. SoSTA outperformed other approaches in the simulations of the MeetUp dataset. SoSTA improves execution speed by 80%, task completion rate by 60%, and user happiness by 8%.
在众包平台中,传统的任务分配方法侧重于优化工人或任务的效用,往往忽略了平台的一般效用以及考虑技能可用性和预算限制的相互偏好的影响。这种疏忽会破坏任务分配结果的稳定性,降低用户体验,最终影响平台的长期效用,并导致工作任务稳定匹配(Worker task stability Matching, WTSM)问题。为了解决WTSM问题,我们提出了基于延迟接受策略的双向偏好(SoSTA)的技能导向稳定任务分配方法。SoSTA的目标是在任务和工人之间产生稳定的分配,考虑他们的相互偏好,在遵循技能和预算约束的同时优化整体效用。我们的研究将平台的一般效用重新定义为工人和任务双方效用的合并,结合每个工人或任务的偏好列表,基于他们各自对另一方的效用得分。SoSTA结合了面向多技能的稳定工人任务映射(Multi- sos - wtm)算法,用于每个工人的多技能贡献。SoSTA是理性的、不浪费的、公平的,因此是稳定的。在MeetUp数据集的模拟中,SoSTA优于其他方法。SoSTA将执行速度提高了80%,任务完成率提高了60%,用户满意度提高了8%。
{"title":"SoSTA: Skill-Oriented Stable Task Assignment With Bidirectional Preferences in Crowdsourcing","authors":"Riya Samanta;Soumya K. Ghosh;Sajal K. Das","doi":"10.1109/TETC.2025.3548672","DOIUrl":"https://doi.org/10.1109/TETC.2025.3548672","url":null,"abstract":"Traditional task assignment approaches in crowdsourcing platforms have focused on optimizing utility for workers or tasks, often neglecting the general utility of the platform and the influence of mutual preference considering skill availability and budget restrictions. This oversight can destabilize task allocation outcomes, diminishing user experience, and, ultimately, the platform’s long-term utility and gives rise to the Worker Task Stable Matching (WTSM) problem. To solve WTSM, we propose the Skill-oriented Stable Task Assignment with a Bi-directional Preference (SoSTA) method based on deferred acceptance strategy. SoSTA aims to generate stable allocations between tasks and workers considering mutually their preferences, optimizing overall utility while following skill and budget constraints. Our study redefines the general utility of the platform as an amalgamation of utilities on both the workers’ and tasks’ sides, incorporating the preference lists of each worker or task based on their respective utility scores for the other party. SoSTA incorporates Multi Skill-oriented Stable Worker Task Mapping (Multi-SoS-WTM) algorithm for contributions with multiple skills per worker. SoSTA is rational, non-wasteful, fair, and hence stable. SoSTA outperformed other approaches in the simulations of the MeetUp dataset. SoSTA improves execution speed by 80%, task completion rate by 60%, and user happiness by 8%.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"947-963"},"PeriodicalIF":5.4,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10925570","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Aging Detection and Rejuvenation Assessment in Heterogeneous Virtual Networks 异构虚拟网络中软件老化检测与恢复评估
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-11 DOI: 10.1109/TETC.2025.3547612
Alberto Avritzer;Andrea Janes;Andrea Marin;Catia Trubiani;Andre van Hoorn;Matteo Camilli;Daniel S. Menasché;André B. Bondi
In this article, we report on the application of resiliency enforcement strategies that were applied to a microservices system running on a real-world deployment of a large cluster of heterogeneous Virtual Machines (VMs). We present the evaluation results obtained from measurement and modeling implementations. The measurement infrastructure was composed of 15 large and 15 extra-large VMs. The modeling approach used Markov Decision Processes (MDP). On the measurement testbed, we implemented three different levels of software rejuvenation granularity to achieve software resiliency. We have discovered two threats to resiliency in this environment. The first threat to resiliency was a memory leak that was part of the underlying open-source infrastructure in each VM. The second threat to resiliency was the result of the contention for resources in the physical host, which is dependent on the number and size of VMs deployed to the physical host. In the MDP modeling approach, we evaluated four strategies for assigning tasks to VMs with different configurations and different levels of parallelism. Using the large cluster under study, we compared our approach of using software aging and rejuvenation with the state-of-the-art approach of using a network of VMs deployed to a private cloud without software aging detection and rejuvenation. In summary, we show that in a private cloud with non-elastic resource allocation in the physical hosts, careful performance engineering needs to be performed to optimize the trade-offs between the number of VMs allocated and the total memory allocated to each VM.
在本文中,我们将报告弹性实施策略的应用,这些策略应用于运行在大型异构虚拟机(vm)集群的实际部署上的微服务系统。我们给出了从测量和建模实现中获得的评估结果。测量基础设施由15个大型vm和15个超大型vm组成。建模方法采用马尔可夫决策过程(MDP)。在测量测试平台上,我们实现了三个不同级别的软件恢复粒度来实现软件弹性。在这种环境下,我们发现了对弹性的两大威胁。对弹性的第一个威胁是内存泄漏,这是每个VM中底层开源基础设施的一部分。对弹性的第二个威胁是物理主机上资源争用的结果,这取决于部署到物理主机上的虚拟机的数量和大小。在MDP建模方法中,我们评估了将任务分配给具有不同配置和不同并行度级别的vm的四种策略。使用所研究的大型集群,我们将使用软件老化和恢复的方法与使用部署到私有云的虚拟机网络的最先进方法进行了比较,而不进行软件老化检测和恢复。总之,我们展示了在物理主机中使用非弹性资源分配的私有云中,需要执行仔细的性能工程来优化分配给每个VM的VM数量和分配给每个VM的总内存之间的权衡。
{"title":"Software Aging Detection and Rejuvenation Assessment in Heterogeneous Virtual Networks","authors":"Alberto Avritzer;Andrea Janes;Andrea Marin;Catia Trubiani;Andre van Hoorn;Matteo Camilli;Daniel S. Menasché;André B. Bondi","doi":"10.1109/TETC.2025.3547612","DOIUrl":"https://doi.org/10.1109/TETC.2025.3547612","url":null,"abstract":"In this article, we report on the application of resiliency enforcement strategies that were applied to a microservices system running on a real-world deployment of a large cluster of heterogeneous Virtual Machines (VMs). We present the evaluation results obtained from measurement and modeling implementations. The measurement infrastructure was composed of 15 large and 15 extra-large VMs. The modeling approach used Markov Decision Processes (MDP). On the measurement testbed, we implemented three different levels of software rejuvenation granularity to achieve software resiliency. We have discovered two threats to resiliency in this environment. The first threat to resiliency was a memory leak that was part of the underlying open-source infrastructure in each VM. The second threat to resiliency was the result of the contention for resources in the physical host, which is dependent on the number and size of VMs deployed to the physical host. In the MDP modeling approach, we evaluated four strategies for assigning tasks to VMs with different configurations and different levels of parallelism. Using the large cluster under study, we compared our approach of using software aging and rejuvenation with the state-of-the-art approach of using a network of VMs deployed to a private cloud without software aging detection and rejuvenation. In summary, we show that in a private cloud with non-elastic resource allocation in the physical hosts, careful performance engineering needs to be performed to optimize the trade-offs between the number of VMs allocated and the total memory allocated to each VM.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 2","pages":"299-313"},"PeriodicalIF":5.1,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10923615","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144323162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FLCL: Feature-Level Contrastive Learning for Few-Shot Image Classification FLCL:基于特征级对比学习的少镜头图像分类
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-10 DOI: 10.1109/TETC.2025.3546366
Wenming Cao;Jiewen Zeng;Qifan Liu
Few-shot classification is the task of recognizing unseen classes using a limited number of samples. In this paper, we propose a new contrastive learning method called Feature-Level Contrastive Learning (FLCL). FLCL conducts contrastive learning at the feature level and leverages the subtle relationships between positive and negative samples to achieve more effective classification. Additionally, we address the challenges of requiring a large number of negative samples and the difficulty of selecting high-quality negative samples in traditional contrastive learning methods. For feature learning, we design a Feature Enhancement Coding (FEC) module to analyze the interactions and correlations between nonlinear features, enhancing the quality of feature representations. In the metric stage, we propose a centered hypersphere projection metric to map feature vectors onto the hypersphere, improving the comparison between the support and query sets. Experimental results on four few-shot classification benchmark datasets demonstrate that our method, while simple in design, outperforms previous methods and achieves state-of-the-art performance. A detailed ablation study further confirms the effectiveness of each component of our model.
少射分类是使用有限数量的样本识别未见类的任务。本文提出了一种新的对比学习方法——特征级对比学习(FLCL)。FLCL在特征层面进行对比学习,利用正样本和负样本之间的微妙关系来实现更有效的分类。此外,我们还解决了传统对比学习方法中需要大量负样本和难以选择高质量负样本的挑战。对于特征学习,我们设计了一个特征增强编码(FEC)模块来分析非线性特征之间的相互作用和相关性,提高特征表示的质量。在度量阶段,我们提出了一个中心超球投影度量,将特征向量映射到超球上,提高了支持集和查询集之间的可比性。在4个小样本分类基准数据集上的实验结果表明,该方法设计简单,但性能优于现有方法。详细的消融研究进一步证实了我们模型的每个组成部分的有效性。
{"title":"FLCL: Feature-Level Contrastive Learning for Few-Shot Image Classification","authors":"Wenming Cao;Jiewen Zeng;Qifan Liu","doi":"10.1109/TETC.2025.3546366","DOIUrl":"https://doi.org/10.1109/TETC.2025.3546366","url":null,"abstract":"Few-shot classification is the task of recognizing unseen classes using a limited number of samples. In this paper, we propose a new contrastive learning method called Feature-Level Contrastive Learning (FLCL). FLCL conducts contrastive learning at the feature level and leverages the subtle relationships between positive and negative samples to achieve more effective classification. Additionally, we address the challenges of requiring a large number of negative samples and the difficulty of selecting high-quality negative samples in traditional contrastive learning methods. For feature learning, we design a Feature Enhancement Coding (FEC) module to analyze the interactions and correlations between nonlinear features, enhancing the quality of feature representations. In the metric stage, we propose a centered hypersphere projection metric to map feature vectors onto the hypersphere, improving the comparison between the support and query sets. Experimental results on four few-shot classification benchmark datasets demonstrate that our method, while simple in design, outperforms previous methods and achieves state-of-the-art performance. A detailed ablation study further confirms the effectiveness of each component of our model.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"935-946"},"PeriodicalIF":5.4,"publicationDate":"2025-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MALITE: Lightweight Malware Detection and Classification for Constrained Devices MALITE:用于受限设备的轻量级恶意软件检测和分类
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-08 DOI: 10.1109/TETC.2025.3566370
Sidharth Anand;Barsha Mitra;Soumyadeep Dey;Abhinav Rao;Rupsha Dhar;Jaideep Vaidya
Today, malware is one of the primary cyber threats to organizations, pervading all types of computing devices, including resource constrained devices such as mobile phones, tablets and embedded devices like Internet-of-Things (IoT) devices. In recent years, researchers have leveraged machine learning based strategies for malware detection and classification. However, malware analysis approaches can only be employed in resource constrained environments if the methods are lightweight in nature. In this paper, we present MALITE, a lightweight malware analysis system, that can distinguish between benign and malicious binaries and classify various malware families. MALITE converts a binary into a grayscale or an RGB image requiring low memory and battery power consumption and uses computationally inexpensive malware analysis strategies. We have designed MALITE-MN, a lightweight neural network based architecture and MALITE-HRF, an ultra lightweight random forest based method that uses histogram features extracted by a sliding window. An extensive empirical evaluation is conducted on seven publicly available datasets (Malimg, Microsoft BIG, Dumpware10, MOTIF, Drebin, CICAndMal2017 and MalNet), and performance is compared to four state-of-the-art baselines. The results show that MALITE-MN and MALITE-HRF not only accurately identify and classify malware but also respectively consume several orders of magnitude lower resources (in terms of both memory as well as computation capabilities), making them much more suitable for resource constrained environments.
如今,恶意软件是企业面临的主要网络威胁之一,它渗透到所有类型的计算设备中,包括资源受限的设备,如移动电话、平板电脑和物联网(IoT)设备等嵌入式设备。近年来,研究人员利用基于机器学习的策略进行恶意软件检测和分类。然而,恶意软件分析方法只能在资源受限的环境中使用,如果这些方法本质上是轻量级的。在本文中,我们提出了一个轻量级的恶意软件分析系统MALITE,它可以区分良性和恶意二进制文件,并对各种恶意软件进行分类。MALITE将二进制转换为灰度或RGB图像,需要低内存和电池功耗,并使用计算廉价的恶意软件分析策略。我们设计了基于轻量级神经网络的架构MALITE-MN和基于超轻量级随机森林的方法MALITE-HRF,该方法利用滑动窗口提取直方图特征。对七个公开可用的数据集(Malimg、Microsoft BIG、Dumpware10、MOTIF、Drebin、CICAndMal2017和MalNet)进行了广泛的实证评估,并与四个最先进的基线进行了比较。结果表明,MALITE-MN和MALITE-HRF不仅可以准确地识别和分类恶意软件,而且消耗的资源(在内存和计算能力方面)分别降低了几个数量级,使它们更适合资源受限的环境。
{"title":"MALITE: Lightweight Malware Detection and Classification for Constrained Devices","authors":"Sidharth Anand;Barsha Mitra;Soumyadeep Dey;Abhinav Rao;Rupsha Dhar;Jaideep Vaidya","doi":"10.1109/TETC.2025.3566370","DOIUrl":"https://doi.org/10.1109/TETC.2025.3566370","url":null,"abstract":"Today, malware is one of the primary cyber threats to organizations, pervading all types of computing devices, including resource constrained devices such as mobile phones, tablets and embedded devices like Internet-of-Things (IoT) devices. In recent years, researchers have leveraged machine learning based strategies for malware detection and classification. However, malware analysis approaches can only be employed in resource constrained environments if the methods are lightweight in nature. In this paper, we present MALITE, a lightweight malware analysis system, that can distinguish between benign and malicious binaries and classify various malware families. MALITE converts a binary into a grayscale or an RGB image requiring low memory and battery power consumption and uses computationally inexpensive malware analysis strategies. We have designed MALITE-MN, a lightweight neural network based architecture and MALITE-HRF, an ultra lightweight random forest based method that uses histogram features extracted by a sliding window. An extensive empirical evaluation is conducted on seven publicly available datasets (Malimg, Microsoft BIG, Dumpware10, MOTIF, Drebin, CICAndMal2017 and MalNet), and performance is compared to four state-of-the-art baselines. The results show that MALITE-MN and MALITE-HRF not only accurately identify and classify malware but also respectively consume several orders of magnitude lower resources (in terms of both memory as well as computation capabilities), making them much more suitable for resource constrained environments.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1099-1112"},"PeriodicalIF":5.4,"publicationDate":"2025-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Implementation and Analysis of SHA-2 and SHA-3 SHA-2和SHA-3的量子实现与分析
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-07 DOI: 10.1109/TETC.2025.3546648
Kyungbae Jang;Sejin Lim;Yujin Oh;Hyunjun Kim;Anubhab Baksi;Sumanta Chakraborty;Hwajeong Seo
Quantum computers have the potential to solve a number of hard problems that are believed to be almost impossible to solve by classical computers. This observation has sparked a surge of research to apply quantum algorithms against the cryptographic systems to evaluate its quantum resistance. In assessing the security strength of the cryptographic algorithms against the upcoming quantum threats, it is crucial to precisely estimate the quantum resource requirement (generally in terms of circuit depth and quantum bit count). The National Institute of Standards and Technology by the US government specified five quantum security levels so that the relative quantum strength of a given cipher can be compared to the standard ones. There have been some progress in the NIST-specified quantum security levels for the odd levels (i.e., 1, 3 and 5), following the work of Jaques et al. (Eurocrypt’20). However, levels 2 and 4, which correspond to the quantum collision finding attacks for the SHA-2 and SHA-3 hash functions, quantum attack complexities are arguably not well-studied. This is where our article fits in. In this article, we present novel techniques for optimizing the quantum circuit implementations for SHA-2 and SHA-3 algorithms in all the categories specified by NIST. After that, we evaluate the quantum circuits of target cryptographic hash functions for quantum collision search. Finally, we define the quantum attack complexity for levels 2 and 4, and comment on the security strength of the extended level. We present new concepts to optimize the quantum circuits at the component level and the architecture level.
量子计算机有潜力解决许多被认为是经典计算机几乎不可能解决的难题。这一观察结果引发了将量子算法应用于加密系统以评估其量子抗性的研究热潮。在评估针对即将到来的量子威胁的加密算法的安全强度时,精确估计量子资源需求(通常在电路深度和量子比特计数方面)至关重要。美国政府的国家标准与技术研究所规定了五个量子安全级别,以便将给定密码的相对量子强度与标准密码进行比较。在Jaques等人(Eurocrypt ' 20)的工作之后,nist指定的奇数级别(即1,3和5)的量子安全级别取得了一些进展。然而,级别2和级别4对应于SHA-2和SHA-3哈希函数的量子碰撞查找攻击,量子攻击的复杂性可以说没有得到很好的研究。这正是我们的文章适合的地方。在本文中,我们提出了在NIST指定的所有类别中优化SHA-2和SHA-3算法的量子电路实现的新技术。然后,我们评估了量子碰撞搜索中目标密码哈希函数的量子电路。最后,我们定义了第2层和第4层的量子攻击复杂度,并对扩展层的安全强度进行了评价。我们提出了在元件级和体系结构级优化量子电路的新概念。
{"title":"Quantum Implementation and Analysis of SHA-2 and SHA-3","authors":"Kyungbae Jang;Sejin Lim;Yujin Oh;Hyunjun Kim;Anubhab Baksi;Sumanta Chakraborty;Hwajeong Seo","doi":"10.1109/TETC.2025.3546648","DOIUrl":"https://doi.org/10.1109/TETC.2025.3546648","url":null,"abstract":"Quantum computers have the potential to solve a number of hard problems that are believed to be almost impossible to solve by classical computers. This observation has sparked a surge of research to apply quantum algorithms against the cryptographic systems to evaluate its quantum resistance. In assessing the security strength of the cryptographic algorithms against the upcoming quantum threats, it is crucial to precisely estimate the quantum resource requirement (generally in terms of circuit depth and quantum bit count). The National Institute of Standards and Technology by the US government specified five quantum security levels so that the relative quantum strength of a given cipher can be compared to the standard ones. There have been some progress in the NIST-specified quantum security levels for the odd levels (i.e., 1, 3 and 5), following the work of Jaques et al. (Eurocrypt’20). However, levels 2 and 4, which correspond to the quantum collision finding attacks for the SHA-2 and SHA-3 hash functions, quantum attack complexities are arguably not well-studied. This is where our article fits in. In this article, we present novel techniques for optimizing the quantum circuit implementations for SHA-2 and SHA-3 algorithms in all the categories specified by NIST. After that, we evaluate the quantum circuits of target cryptographic hash functions for quantum collision search. Finally, we define the quantum attack complexity for levels 2 and 4, and comment on the security strength of the extended level. We present new concepts to optimize the quantum circuits at the component level and the architecture level.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"919-934"},"PeriodicalIF":5.4,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Emerging Topics in Computing Publication Information IEEE计算出版信息新兴主题汇刊
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-07 DOI: 10.1109/TETC.2025.3543119
{"title":"IEEE Transactions on Emerging Topics in Computing Publication Information","authors":"","doi":"10.1109/TETC.2025.3543119","DOIUrl":"https://doi.org/10.1109/TETC.2025.3543119","url":null,"abstract":"","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 1","pages":"C2-C2"},"PeriodicalIF":5.1,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10918568","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143570651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2024 Reviewers List* 2024审稿人名单*
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-07 DOI: 10.1109/TETC.2025.3530016
We thank the following reviewers for the time and energy they have given to TETC:
我们感谢以下审稿人为TETC付出的时间和精力:
{"title":"2024 Reviewers List*","authors":"","doi":"10.1109/TETC.2025.3530016","DOIUrl":"https://doi.org/10.1109/TETC.2025.3530016","url":null,"abstract":"We thank the following reviewers for the time and energy they have given to <italic>TETC</i>:","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 1","pages":"276-278"},"PeriodicalIF":5.1,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10918565","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143570757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial Special Section on Emerging Edge AI for Human-in-the-Loop Cyber Physical Systems 编辑专题:面向人在环网络物理系统的新兴边缘人工智能
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-07 DOI: 10.1109/TETC.2024.3472428
Radu Marculescu;Jorge Sá Silva
Edge Artificial Intelligence (AI) enables us to deploy distributed AI models, optimize computational and energy resources, minimize communication demands, and, most importantly, meet privacy requirements for Internet of Things (IoT) applications. Since data remains on the end-devices and only model parameters are shared with the server, it becomes possible to leverage the vast amount of data collected from smartphones and IoT devices without compromising the user's privacy. However, Federated Learning (FL) solutions also have well-known limitations. In particular, as systems that account for human behaviour become increasingly vital, future technologies need to become attuned to human behaviours. Indeed, we are already witnessing unparalleled advancements in technology that empower our tools and devices with intelligence, sensory abilities, and communication features. At the same time, continued advances in the miniaturization of computational capabilities can enable us to go far beyond the simple tagging and identification, towards integrating computational resources directly into these objects, thus making our tools “intelligent”. Yet, there is limited scientific work that considers humans as an integral part of these IoT-powered cyber-physical systems.
边缘人工智能(AI)使我们能够部署分布式AI模型,优化计算和能源资源,最大限度地减少通信需求,最重要的是,满足物联网(IoT)应用的隐私要求。由于数据保留在终端设备上,只有模型参数与服务器共享,因此可以在不损害用户隐私的情况下利用从智能手机和物联网设备收集的大量数据。然而,联邦学习(FL)解决方案也有众所周知的局限性。特别是,随着解释人类行为的系统变得越来越重要,未来的技术需要适应人类的行为。事实上,我们已经见证了前所未有的技术进步,使我们的工具和设备具有智能、感官能力和通信功能。与此同时,计算能力小型化的持续进步使我们能够远远超越简单的标记和识别,将计算资源直接集成到这些对象中,从而使我们的工具“智能化”。然而,将人类视为这些物联网驱动的网络物理系统的组成部分的科学工作有限。
{"title":"Editorial Special Section on Emerging Edge AI for Human-in-the-Loop Cyber Physical Systems","authors":"Radu Marculescu;Jorge Sá Silva","doi":"10.1109/TETC.2024.3472428","DOIUrl":"https://doi.org/10.1109/TETC.2024.3472428","url":null,"abstract":"Edge Artificial Intelligence (AI) enables us to deploy distributed AI models, optimize computational and energy resources, minimize communication demands, and, most importantly, meet privacy requirements for Internet of Things (IoT) applications. Since data remains on the end-devices and only model parameters are shared with the server, it becomes possible to leverage the vast amount of data collected from smartphones and IoT devices without compromising the user's privacy. However, Federated Learning (FL) solutions also have well-known limitations. In particular, as systems that account for human behaviour become increasingly vital, future technologies need to become attuned to human behaviours. Indeed, we are already witnessing unparalleled advancements in technology that empower our tools and devices with intelligence, sensory abilities, and communication features. At the same time, continued advances in the miniaturization of computational capabilities can enable us to go far beyond the simple tagging and identification, towards integrating computational resources directly into these objects, thus making our tools “intelligent”. Yet, there is limited scientific work that considers humans as an integral part of these IoT-powered cyber-physical systems.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 1","pages":"3-4"},"PeriodicalIF":5.1,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10918564","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143570699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NegCPARBP: Enhancing Privacy Protection for Cross-Project Aging-Related Bug Prediction Based on Negative Database NegCPARBP:基于负数据库的跨项目老化相关Bug预测隐私保护
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-06 DOI: 10.1109/TETC.2025.3546549
Dongdong Zhao;Zhihui Liu;Fengji Zhang;Lei Liu;Jacky Wai Keung;Xiao Yu
The emergence of Aging-Related Bugs (ARBs) poses a significant challenge to software systems, resulting in performance degradation and increased error rates in resource-intensive systems. Consequently, numerous ARB prediction methods have been developed to mitigate these issues. However, in scenarios where training data is limited, the effectiveness of ARB prediction is often suboptimal. To address this problem, Cross-Project Aging-Related Bug Prediction (CPARBP) is proposed, which utilizes data from other projects (i.e., source projects) to train a model aimed at predicting potential ARBs in a target project. However, the use of source-project data raises privacy concerns and discourages companies from sharing their data. Therefore, we propose a method called Cross-Project Aging-Related Bug Prediction based on Negative Database (NegCPARBP) for privacy protection. NegCPARBP first converts the feature vector of a software file into a binary string. Second, the corresponding Negative DataBase (NDB) is generated based on this binary string, containing data that is significantly more expressive from the original feature vector. Furthermore, to ensure more accurate prediction of ARB-prone and ARB-free files based on privacy-protected data (i.e., maintain the data utility), we propose a novel negative database generation algorithm that captures more information about important features, using information gain as a measure. Finally, NegCPARBP extracts a new feature vector from the NDB to represent the original feature vector, facilitating data sharing and ARB prediction objectives. Experimental results on Linux, MySQL, and NetBSD datasets demonstrate that NegCPARBP achieves a high defense against attacks (privacy protection performance reaching 0.97) and better data utility compared to existing privacy protection methods.
老化相关bug (Aging-Related Bugs, ARBs)的出现对软件系统提出了重大挑战,导致资源密集型系统的性能下降和错误率增加。因此,已经开发了许多ARB预测方法来缓解这些问题。然而,在训练数据有限的情况下,ARB预测的有效性往往不是最优的。为了解决这个问题,提出了跨项目老化相关Bug预测(CPARBP),它利用来自其他项目(即源项目)的数据来训练一个旨在预测目标项目中潜在arb的模型。然而,使用源项目数据引发了隐私问题,并阻碍了公司共享数据。为此,我们提出了一种基于负数据库的跨项目老化相关Bug预测方法(NegCPARBP),用于隐私保护。NegCPARBP首先将软件文件的特征向量转换为二进制字符串。其次,基于该二进制字符串生成相应的负数据库(NDB),其中包含比原始特征向量更具表现力的数据。此外,为了确保基于隐私保护数据(即维护数据效用)更准确地预测有arb倾向和无arb的文件,我们提出了一种新的负数据库生成算法,该算法使用信息增益作为度量来捕获有关重要特征的更多信息。最后,NegCPARBP从NDB中提取新的特征向量来表示原始特征向量,促进数据共享和ARB预测目标的实现。在Linux、MySQL和NetBSD数据集上的实验结果表明,与现有的隐私保护方法相比,NegCPARBP具有较高的防御攻击能力(隐私保护性能达到0.97)和更好的数据利用率。
{"title":"NegCPARBP: Enhancing Privacy Protection for Cross-Project Aging-Related Bug Prediction Based on Negative Database","authors":"Dongdong Zhao;Zhihui Liu;Fengji Zhang;Lei Liu;Jacky Wai Keung;Xiao Yu","doi":"10.1109/TETC.2025.3546549","DOIUrl":"https://doi.org/10.1109/TETC.2025.3546549","url":null,"abstract":"The emergence of <underline>A</u>ging-<underline>R</u>elated <underline>B</u>ug<underline>s</u> (ARBs) poses a significant challenge to software systems, resulting in performance degradation and increased error rates in resource-intensive systems. Consequently, numerous ARB prediction methods have been developed to mitigate these issues. However, in scenarios where training data is limited, the effectiveness of ARB prediction is often suboptimal. To address this problem, <underline>C</u>ross-<underline>P</u>roject <underline>A</u>ging-<underline>R</u>elated <underline>B</u>ug <underline>P</u>rediction (CPARBP) is proposed, which utilizes data from other projects (i.e., source projects) to train a model aimed at predicting potential ARBs in a target project. However, the use of source-project data raises privacy concerns and discourages companies from sharing their data. Therefore, we propose a method called <underline>C</u>ross-<underline>P</u>roject <underline>A</u>ging-<underline>R</u>elated <underline>B</u>ug <underline>P</u>rediction based on <underline>Neg</u>ative Database (NegCPARBP) for privacy protection. NegCPARBP first converts the feature vector of a software file into a binary string. Second, the corresponding <underline>N</u>egative <underline>D</u>ata<underline>B</u>ase (<italic>NDB</i>) is generated based on this binary string, containing data that is significantly more expressive from the original feature vector. Furthermore, to ensure more accurate prediction of ARB-prone and ARB-free files based on privacy-protected data (i.e., maintain the data utility), we propose a novel negative database generation algorithm that captures more information about important features, using information gain as a measure. Finally, NegCPARBP extracts a new feature vector from the <italic>NDB</i> to represent the original feature vector, facilitating data sharing and ARB prediction objectives. Experimental results on Linux, MySQL, and NetBSD datasets demonstrate that NegCPARBP achieves a high defense against attacks (privacy protection performance reaching 0.97) and better data utility compared to existing privacy protection methods.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 2","pages":"283-298"},"PeriodicalIF":5.1,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144323167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Emerging Topics in Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1