首页 > 最新文献

2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)最新文献

英文 中文
Mapping Method between 2D Landscape Image and 3D Spatial Data based on Adversarial Relative Depth Constraint Network 基于对抗相对深度约束网络的二维景观图像与三维空间数据映射方法
Shuhao Wang, Zhuoru Lin, Zhimo Weng, Anna Li
This paper proposes a mapping method of 2D image and 3D spatial data based on the adversarial relative depth constraint network. The steps are as follows: 1) Input pixel coordinates of key nodes of 2D landscape image, and conduct normalization preprocessing; 2) Input two-dimensional pixel coordinates into the depth prediction network and output the depth values of key nodes; 3) Using depth values and two-dimensional pixel coordinates to reconstruct three-dimensional coordinates of key nodes; 4) Input DEM data to the discriminator of the generated adversarial network to calculate the authenticity error value, and use the relative depth information between the attitude characteristics of mountain and hydrology and the corresponding key nodes of the image to calculate the relative depth error; 5) Add the authenticity error and relative depth error calculated above to get the total error, and feed back to the depth prediction network to get a more accurate mapping evaluation, so as to realize mapping discovery. The problems solved in this paper include: lack of characteristic pose data in the traditional geo-evidence-based process of 2D landscape images; The results of the generative adversarial network method do not conform to the relative depth relationship of feature points in 3D spatial data.
提出了一种基于对抗相对深度约束网络的二维图像与三维空间数据的映射方法。步骤如下:1)输入二维景观图像关键节点像素坐标,进行归一化预处理;2)将二维像素坐标输入深度预测网络,输出关键节点的深度值;3)利用深度值和二维像素坐标重构关键节点的三维坐标;4)将DEM数据输入到生成的对抗网络的鉴别器中计算真实性误差值,并利用山体和水文姿态特征与图像对应关键节点之间的相对深度信息计算相对深度误差;5)将上述计算的真实性误差和相对深度误差相加,得到总误差,并反馈给深度预测网络,得到更准确的测绘评价,从而实现测绘发现。本文解决的问题包括:传统的二维景观图像地理循证处理中缺少特征位姿数据;生成对抗网络方法的结果不符合三维空间数据中特征点的相对深度关系。
{"title":"Mapping Method between 2D Landscape Image and 3D Spatial Data based on Adversarial Relative Depth Constraint Network","authors":"Shuhao Wang, Zhuoru Lin, Zhimo Weng, Anna Li","doi":"10.1109/QRS-C57518.2022.00101","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00101","url":null,"abstract":"This paper proposes a mapping method of 2D image and 3D spatial data based on the adversarial relative depth constraint network. The steps are as follows: 1) Input pixel coordinates of key nodes of 2D landscape image, and conduct normalization preprocessing; 2) Input two-dimensional pixel coordinates into the depth prediction network and output the depth values of key nodes; 3) Using depth values and two-dimensional pixel coordinates to reconstruct three-dimensional coordinates of key nodes; 4) Input DEM data to the discriminator of the generated adversarial network to calculate the authenticity error value, and use the relative depth information between the attitude characteristics of mountain and hydrology and the corresponding key nodes of the image to calculate the relative depth error; 5) Add the authenticity error and relative depth error calculated above to get the total error, and feed back to the depth prediction network to get a more accurate mapping evaluation, so as to realize mapping discovery. The problems solved in this paper include: lack of characteristic pose data in the traditional geo-evidence-based process of 2D landscape images; The results of the generative adversarial network method do not conform to the relative depth relationship of feature points in 3D spatial data.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133255619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Research on Information Gravitation 关于信息引力的研究
K. Cai
In response to the advent of software defined world, this Fast Abstract introduces a new notion, information gravitation, with an attempt to unify and expand two related ones, information mass (related to the supposed fifth force) and data gravitation. This is motivated by the following question: is there a new kind of (gravitational) force between any two distinct pieces of information conveying messages. A possibly affirmative answer to this question of information gravitation, which is supposed to explore the theoretically and/or experimentally justified interplay between information and gravitation, might make significant sense for the software defined world being augmented with artificial intelligence and virtual reality in the age of information. Information induces gravitation. Information gravitation should be related to Newton's law of universal gravitation and Einstein's general theory of relativity, and even to gravitational waves and the unified theory of everything.
为了应对软件定义世界的到来,本文引入了一个新的概念——信息引力,试图统一和扩展两个相关的概念,即信息质量(与假定的第五种力有关)和数据引力。这是由以下问题引起的:在任何两个不同的信息传递信息之间是否存在一种新的(引力)力?对于信息引力这个问题,一个可能的肯定答案,应该是探索理论和/或实验证明信息和引力之间的相互作用,可能对软件定义的世界在信息时代被人工智能和虚拟现实增强有重要意义。信息引起引力。信息万有引力应该与牛顿的万有引力定律和爱因斯坦的广义相对论有关,甚至与引力波和万有统一理论有关。
{"title":"Towards Research on Information Gravitation","authors":"K. Cai","doi":"10.1109/QRS-C57518.2022.00118","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00118","url":null,"abstract":"In response to the advent of software defined world, this Fast Abstract introduces a new notion, information gravitation, with an attempt to unify and expand two related ones, information mass (related to the supposed fifth force) and data gravitation. This is motivated by the following question: is there a new kind of (gravitational) force between any two distinct pieces of information conveying messages. A possibly affirmative answer to this question of information gravitation, which is supposed to explore the theoretically and/or experimentally justified interplay between information and gravitation, might make significant sense for the software defined world being augmented with artificial intelligence and virtual reality in the age of information. Information induces gravitation. Information gravitation should be related to Newton's law of universal gravitation and Einstein's general theory of relativity, and even to gravitational waves and the unified theory of everything.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133371265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elevator Maintenance Site Selection Optimization via Fine-Tuned K-Means 基于精细k均值的电梯维修选址优化
Yuegui Feng, Guangwei Qing, Qianfei Zhou
Elevator failure is a common problem scenario in real life, and arranging reasonable maintenance site locations is crucial to reduce the time to repair elevators. However, reasonable site selection for large-scale datasets remains a challenge in the present time. Considering the nature of clustering models that may naturally fit the requirements of the siting problem, we propose a siting method called Fine-tune K-means which called FTK-means. This approach is based on the K-means clustering method and fine-tunes the initial clustering results. It is worth mentioning that we take into account the fault properties of elevators and use the concept of fault center of mass when finding the mean value. Experiments prove that our method achieves better site selection on real elevator datasets, and in addition achieves site load fairness.
电梯故障是现实生活中常见的问题场景,合理安排维修现场位置对于减少电梯维修时间至关重要。然而,大规模数据集的合理选址仍然是当前的一个挑战。考虑到聚类模型的性质可能自然地适合选址问题的要求,我们提出了一种称为微调K-means的选址方法,称为FTK-means。该方法基于k均值聚类方法,对初始聚类结果进行微调。值得一提的是,我们在求均值时考虑了电梯的故障特性,并采用了故障质心的概念。实验证明,该方法在真实的电梯数据集上取得了较好的选址效果,并实现了站点负荷的公平性。
{"title":"Elevator Maintenance Site Selection Optimization via Fine-Tuned K-Means","authors":"Yuegui Feng, Guangwei Qing, Qianfei Zhou","doi":"10.1109/QRS-C57518.2022.00074","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00074","url":null,"abstract":"Elevator failure is a common problem scenario in real life, and arranging reasonable maintenance site locations is crucial to reduce the time to repair elevators. However, reasonable site selection for large-scale datasets remains a challenge in the present time. Considering the nature of clustering models that may naturally fit the requirements of the siting problem, we propose a siting method called Fine-tune K-means which called FTK-means. This approach is based on the K-means clustering method and fine-tunes the initial clustering results. It is worth mentioning that we take into account the fault properties of elevators and use the concept of fault center of mass when finding the mean value. Experiments prove that our method achieves better site selection on real elevator datasets, and in addition achieves site load fairness.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126063104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The IoT Service Agent Model based on Federated Learning to Improve Service Quality 基于联邦学习提高服务质量的物联网服务代理模型
Tse-Chuan Hsu, William C. Chu, Shyh-Wei Chen
The combination of learning analysis technology and terminal equipment can provide a rapidly imitating learning method between devices, and cognitive intelligence affects the learning effect. To enhance automated learning services, we can use federated learning methods to enable the training of different devices and enhance each other through devices. Using the training database to improve the quality of automated learning services. In this study, a novel agent-assisted active detection and data collection framework is designed. Monitoring agents can learn from each other to establish intelligent models, and through mutual communication between devices. Can check if established data can be applied to machine data model to get data. It can be used for intelligent manufacturing in the future. The agent may learn methods of learning and managing between devices having different properties. Obtaining experimental simulation and control data, and using machine learning to analyze growth progress and results allow for a deeper analysis of associated adjustments and anticipated changes.
学习分析技术与终端设备相结合,可以提供设备间快速模仿的学习方法,认知智能影响学习效果。为了增强自动化学习服务,我们可以使用联邦学习方法来实现对不同设备的训练,并通过设备相互增强。利用训练数据库提高自动化学习服务的质量。在本研究中,设计了一种新的智能体辅助主动检测和数据收集框架。监控代理可以相互学习建立智能模型,并通过设备之间的相互通信。可以检查所建立的数据是否可以应用到机器数据模型中以获得数据。它可以用于未来的智能制造。代理可以学习具有不同属性的设备之间的学习和管理方法。获得实验模拟和控制数据,并使用机器学习来分析生长过程和结果,可以更深入地分析相关的调整和预期的变化。
{"title":"The IoT Service Agent Model based on Federated Learning to Improve Service Quality","authors":"Tse-Chuan Hsu, William C. Chu, Shyh-Wei Chen","doi":"10.1109/QRS-C57518.2022.00113","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00113","url":null,"abstract":"The combination of learning analysis technology and terminal equipment can provide a rapidly imitating learning method between devices, and cognitive intelligence affects the learning effect. To enhance automated learning services, we can use federated learning methods to enable the training of different devices and enhance each other through devices. Using the training database to improve the quality of automated learning services. In this study, a novel agent-assisted active detection and data collection framework is designed. Monitoring agents can learn from each other to establish intelligent models, and through mutual communication between devices. Can check if established data can be applied to machine data model to get data. It can be used for intelligent manufacturing in the future. The agent may learn methods of learning and managing between devices having different properties. Obtaining experimental simulation and control data, and using machine learning to analyze growth progress and results allow for a deeper analysis of associated adjustments and anticipated changes.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122018082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Trust Relationships in Blockchain Applications: The Case of Reconfigurable Systems-on-Chip 区块链应用中的信任关系建模:以可重构的片上系统为例
M. Méré, F. Jouault, Loïc Pallardy, R. Perdriau
Nowadays, System-on-Chip (SoC) components are found everywhere in all kinds of smart devices. Each System-on-Chip contains many different blocks that provide specific functionalities, such as WiFi or Bluetooth connectivity. Whereas integrating each such block in a SoC typically requires paying some royalties, not all blocks are necessary for all applications, or throughout a device's lifecycle. Moreover, it is not possible to manufacture a specific SoC for each application. Significant advantages are therefore expected to be gained by enabling trustworthy remote SoC reconfiguration throughout their life cycles. A few approaches attempting to address this challenge have been proposed in the literature. They are typically based on Blockchain technology in order to support decentralization without relinquishing trust. Reviewing these approaches lead us to identify a potential flaw in the proposed protocols. Indeed, a SoC should be able to trust Blockchain information that it is given, without requiring any centralization. In order to validate our suspicions, we propose in this paper to use Verifpal: a cryptographic protocol verification tool that works from textual protocol models. We use it in a slightly unorthodox way in order to model the trust relationships in one of the approaches from the literature, and to verify it. The results show that, under some assumptions, a flaw is indeed present. We propose and model several possible fixes, and present their respective limitations.
如今,系统芯片(SoC)组件在各种智能设备中无处不在。每个片上系统包含许多不同的模块,提供特定的功能,如WiFi或蓝牙连接。虽然将每个这样的模块集成到SoC中通常需要支付一些版税,但并非所有模块对于所有应用程序或整个设备生命周期都是必需的。此外,不可能为每个应用制造特定的SoC。因此,通过在整个生命周期内启用可信赖的远程SoC重新配置,有望获得显著优势。文献中已经提出了一些尝试解决这一挑战的方法。它们通常基于区块链技术,以便在不放弃信任的情况下支持去中心化。回顾这些方法,我们发现了拟议协议中的一个潜在缺陷。事实上,SoC应该能够信任所提供的区块链信息,而不需要任何集中化。为了验证我们的怀疑,我们在本文中建议使用Verifpal:一种基于文本协议模型的加密协议验证工具。我们以一种稍微不正统的方式使用它,以便在文献中的一种方法中建立信任关系的模型,并验证它。结果表明,在某些假设下,缺陷确实存在。我们提出并模拟了几种可能的修复方法,并指出了它们各自的局限性。
{"title":"Modeling Trust Relationships in Blockchain Applications: The Case of Reconfigurable Systems-on-Chip","authors":"M. Méré, F. Jouault, Loïc Pallardy, R. Perdriau","doi":"10.1109/QRS-C57518.2022.00020","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00020","url":null,"abstract":"Nowadays, System-on-Chip (SoC) components are found everywhere in all kinds of smart devices. Each System-on-Chip contains many different blocks that provide specific functionalities, such as WiFi or Bluetooth connectivity. Whereas integrating each such block in a SoC typically requires paying some royalties, not all blocks are necessary for all applications, or throughout a device's lifecycle. Moreover, it is not possible to manufacture a specific SoC for each application. Significant advantages are therefore expected to be gained by enabling trustworthy remote SoC reconfiguration throughout their life cycles. A few approaches attempting to address this challenge have been proposed in the literature. They are typically based on Blockchain technology in order to support decentralization without relinquishing trust. Reviewing these approaches lead us to identify a potential flaw in the proposed protocols. Indeed, a SoC should be able to trust Blockchain information that it is given, without requiring any centralization. In order to validate our suspicions, we propose in this paper to use Verifpal: a cryptographic protocol verification tool that works from textual protocol models. We use it in a slightly unorthodox way in order to model the trust relationships in one of the approaches from the literature, and to verify it. The results show that, under some assumptions, a flaw is indeed present. We propose and model several possible fixes, and present their respective limitations.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TrustAuction: A TEE based Privacy Protection Framework for Auction Contracts 委托:基于TEE的拍卖合同隐私保护框架
Jiahao He, Dongyu Cao, Ying Zhou
Auctions are particularly favored as a means of financial transaction for high-value commodities. The Turing-complete script provided by the Ethereum platform facilitates different types of auctions. However, the transparency of Ethereum may lead to threats to the privacy of financial transactions, which is also the biggest obstacle to the practical application of blockchain. This paper proposes an auction contract privacy protection method named TrustAuction, which protects the transaction data privacy and user identity privacy in the auction process through the Trusted Execution Environment(TEE). Specifically, TEE is used to generate new identities for users in the auction process, and the bids submitted by users using the new identities exist are encrypted outside the TEE.
拍卖作为高价值商品的金融交易手段尤其受欢迎。以太坊平台提供的图灵完备脚本促进了不同类型的拍卖。然而,以太坊的透明度可能会导致金融交易的隐私受到威胁,这也是区块链实际应用的最大障碍。本文提出了一种名为trustaution的拍卖合同隐私保护方法,通过可信执行环境(Trusted Execution Environment, TEE)保护拍卖过程中的交易数据隐私和用户身份隐私。具体来说,TEE用于在拍卖过程中为用户生成新的身份,使用新身份存在的用户提交的投标在TEE之外进行加密。
{"title":"TrustAuction: A TEE based Privacy Protection Framework for Auction Contracts","authors":"Jiahao He, Dongyu Cao, Ying Zhou","doi":"10.1109/QRS-C57518.2022.00125","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00125","url":null,"abstract":"Auctions are particularly favored as a means of financial transaction for high-value commodities. The Turing-complete script provided by the Ethereum platform facilitates different types of auctions. However, the transparency of Ethereum may lead to threats to the privacy of financial transactions, which is also the biggest obstacle to the practical application of blockchain. This paper proposes an auction contract privacy protection method named TrustAuction, which protects the transaction data privacy and user identity privacy in the auction process through the Trusted Execution Environment(TEE). Specifically, TEE is used to generate new identities for users in the auction process, and the bids submitted by users using the new identities exist are encrypted outside the TEE.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129684655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization 一种基于语法感知和粒子群优化的覆盖引导灰盒模糊方法
Shengran Wang, Jinfu Chen, Saihua Cai, Chi Zhang, Haibo Chen
Coverage-guided Greybox Fuzzing (CGF) as a popular testing approach has been widely used in software testing. However, the existing CGF has some problems, for example, the testing efficiency is often poor in the face of structured input. To solve this problem, Grammar-Aware Greybox Fuzzing (GAGF) has gained attention for its use of abstract syntax trees (AST) to help processing the structured inputs and it has achieved higher fuzzing efficiency than CGF. However, the improvement of efficiency may not be enough. Therefore, we proposed a particle swarm optimization algorithm to help GAGF to further improving the efficiency. The proposed algorithm can selectively optimize the mutation operator in GAGF mutation stage, as well as accelerate the mutation efficiency of fuzzing to achieve more higher code coverage.
灰盒模糊测试作为一种流行的测试方法,在软件测试中得到了广泛的应用。然而,现有的CGF存在一些问题,如面对结构化输入时,测试效率往往较差。为了解决这一问题,语法感知灰盒模糊(Grammar-Aware Greybox Fuzzing, GAGF)利用抽象语法树(abstract syntax trees, AST)来帮助处理结构化输入,并取得了比CGF更高的模糊效率,从而引起了人们的关注。然而,效率的提高可能还不够。因此,我们提出了一种粒子群优化算法来帮助GAGF进一步提高效率。该算法可以选择性地优化GAGF突变阶段的突变算子,提高模糊化的突变效率,实现更高的代码覆盖率。
{"title":"A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization","authors":"Shengran Wang, Jinfu Chen, Saihua Cai, Chi Zhang, Haibo Chen","doi":"10.1109/QRS-C57518.2022.00132","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00132","url":null,"abstract":"Coverage-guided Greybox Fuzzing (CGF) as a popular testing approach has been widely used in software testing. However, the existing CGF has some problems, for example, the testing efficiency is often poor in the face of structured input. To solve this problem, Grammar-Aware Greybox Fuzzing (GAGF) has gained attention for its use of abstract syntax trees (AST) to help processing the structured inputs and it has achieved higher fuzzing efficiency than CGF. However, the improvement of efficiency may not be enough. Therefore, we proposed a particle swarm optimization algorithm to help GAGF to further improving the efficiency. The proposed algorithm can selectively optimize the mutation operator in GAGF mutation stage, as well as accelerate the mutation efficiency of fuzzing to achieve more higher code coverage.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122851493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-Based Non-Interactive Privacy-Protected Crowd-Sourcing Software Testing Engineer Selection Mechanism 基于属性的非交互式隐私保护众包软件测试工程师选择机制
Qiliang Yang, Lizhi Cai, Jiayu Gong, Minlu Tang, Yi Lin
The central management platforms in traditional crowd-sourced software testing networks are easy to become the target of attack by the enemies, and when the central management platform is attacked, it is easy to cause a single point of failure and bring the whole system down. In addition, when selecting software testing engineers for crowd-sourcing software testing tasks, most mechanisms select engineers based on their credits. This approach is too one-sided and fails to achieve fine-grained engineer selection. In order to solve above problems, we have proposed a non-interactive and fine-grained crowd-sourcing software testing engineer selection mechanism. In our mechanism, the task publisher can select engineers according to their attributes. Next, we have given an implementation of our non-interactive software testing engineer selection mechanism by applying QAP. The privacy of task publisher and engineers is protected. The security proof is also given. Simulation results show that our mechanism is feasible.
传统众包软件测试网络中的集中管理平台很容易成为敌人攻击的目标,当集中管理平台受到攻击时,很容易造成单点故障,导致整个系统瘫痪。此外,在为众包软件测试任务选择软件测试工程师时,大多数机制是根据他们的学分来选择工程师的。这种方法过于片面,无法实现细粒度的工程师选择。为了解决上述问题,我们提出了一种非交互式、细粒度的众包软件测试工程师选拔机制。在我们的机制中,任务发布者可以根据工程师的属性选择工程师。接下来,我们通过应用QAP给出了非交互式软件测试工程师选择机制的实现。任务发布者和工程师的隐私受到保护。并给出了安全性证明。仿真结果表明,该方法是可行的。
{"title":"Attribute-Based Non-Interactive Privacy-Protected Crowd-Sourcing Software Testing Engineer Selection Mechanism","authors":"Qiliang Yang, Lizhi Cai, Jiayu Gong, Minlu Tang, Yi Lin","doi":"10.1109/QRS-C57518.2022.00040","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00040","url":null,"abstract":"The central management platforms in traditional crowd-sourced software testing networks are easy to become the target of attack by the enemies, and when the central management platform is attacked, it is easy to cause a single point of failure and bring the whole system down. In addition, when selecting software testing engineers for crowd-sourcing software testing tasks, most mechanisms select engineers based on their credits. This approach is too one-sided and fails to achieve fine-grained engineer selection. In order to solve above problems, we have proposed a non-interactive and fine-grained crowd-sourcing software testing engineer selection mechanism. In our mechanism, the task publisher can select engineers according to their attributes. Next, we have given an implementation of our non-interactive software testing engineer selection mechanism by applying QAP. The privacy of task publisher and engineers is protected. The security proof is also given. Simulation results show that our mechanism is feasible.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RandomMix: An Effective Framework to Protect User Privacy Information on Ethereum RandomMix:一个保护以太坊用户隐私信息的有效框架
Hao Yin, Dongyu Cao, Ying Zhou
With the wide application of blockchain technology, the user privacy information involved in Ethereum is increasingly rich. But with the introduction of de-anonymization technologies, more and more attacks may lead to the disclosure of user privacy information. In this paper, as a user privacy protection approach, RandomMix is proposed based on account mixing and transaction value encryption. We conduct experiments on the real transactions on Ethereum and find out that RandomMix can resist account clustering attack, transaction fingerprint analysis attack and Sybil attack. Meanwhile, RandomMix consume less gas compared with other approaches.
随着区块链技术的广泛应用,以太坊所涉及的用户隐私信息也越来越丰富。但随着去匿名化技术的引入,越来越多的攻击可能导致用户隐私信息的泄露。本文提出了一种基于账户混合和交易值加密的用户隐私保护方法RandomMix。我们对以太坊上的真实交易进行了实验,发现RandomMix可以抵抗账户聚类攻击、交易指纹分析攻击和Sybil攻击。同时,与其他方法相比,RandomMix消耗更少的气体。
{"title":"RandomMix: An Effective Framework to Protect User Privacy Information on Ethereum","authors":"Hao Yin, Dongyu Cao, Ying Zhou","doi":"10.1109/QRS-C57518.2022.00124","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00124","url":null,"abstract":"With the wide application of blockchain technology, the user privacy information involved in Ethereum is increasingly rich. But with the introduction of de-anonymization technologies, more and more attacks may lead to the disclosure of user privacy information. In this paper, as a user privacy protection approach, RandomMix is proposed based on account mixing and transaction value encryption. We conduct experiments on the real transactions on Ethereum and find out that RandomMix can resist account clustering attack, transaction fingerprint analysis attack and Sybil attack. Meanwhile, RandomMix consume less gas compared with other approaches.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115357224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability Analysis of a Computer-Based Interlocking System with a Double 2-out-of-2 Redundancy Structure using Algebraic Binary Decision Diagrams 基于代数二元决策图的双2 / 2冗余结构计算机联锁系统可靠性分析
Wenjia Long, Kaizhi Wang, Xuan Wang
The computer-based interlocking (CBI) system of urban rail is a safe-critical system. To keep the high reliability of the CBI system of urban rail, reliability analysis is very necessary and important work. The double 2-out-of-2 redun-dancy structure has been widely used in the CBI system which is a core part of control signal equipment in urban rail. The dynamic fault tree (DFT) is an extension of the static fault tree (SFT), which is widely used for the reliability modeling of dynamic systems. An algebraic binary decision diagram (ABDD) is an extension of a binary decision diagram (BDD) which introduces a kind of node denoting a sequence-dependency between events. The DFT can be evaluated by the ABDD. This paper firstly presents a reliability analysis of the CBI system in urban rail by using the ABDD-based method. The CBI system is modeled by the DFT, then the DFT is converted into a function based on a temporal algebraic framework. According to the temporal function, the ABDD can be built for reliability analysis. Compared to the Markov-based method, the ABDD-based method can avoid space-state explosion and have no limitation on the exponential distribution of component failure. A case study related to the CBI system is presented to show the advantage of using our method.
城市轨道计算机联锁系统是一个安全关键系统。为了保证城市轨道CBI系统的高可靠性,可靠性分析是非常必要和重要的工作。双2 / 2冗余结构在城市轨道交通控制信号设备的核心部分CBI系统中得到了广泛的应用。动态故障树(DFT)是静态故障树(SFT)的扩展,广泛应用于动态系统的可靠性建模。代数二元决策图(ABDD)是对二元决策图(BDD)的扩展,它引入了一种节点来表示事件之间的序列依赖关系。DFT可以用ABDD来计算。本文首先采用基于abdd的方法对城市轨道CBI系统进行了可靠性分析。首先利用DFT对CBI系统进行建模,然后将DFT转化为基于时间代数框架的函数。根据时间函数,建立ABDD进行可靠性分析。与基于马尔可夫的方法相比,基于abdd的方法可以避免空间状态爆炸,并且不受部件失效指数分布的限制。最后以CBI系统为例说明了该方法的优越性。
{"title":"Reliability Analysis of a Computer-Based Interlocking System with a Double 2-out-of-2 Redundancy Structure using Algebraic Binary Decision Diagrams","authors":"Wenjia Long, Kaizhi Wang, Xuan Wang","doi":"10.1109/QRS-C57518.2022.00073","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00073","url":null,"abstract":"The computer-based interlocking (CBI) system of urban rail is a safe-critical system. To keep the high reliability of the CBI system of urban rail, reliability analysis is very necessary and important work. The double 2-out-of-2 redun-dancy structure has been widely used in the CBI system which is a core part of control signal equipment in urban rail. The dynamic fault tree (DFT) is an extension of the static fault tree (SFT), which is widely used for the reliability modeling of dynamic systems. An algebraic binary decision diagram (ABDD) is an extension of a binary decision diagram (BDD) which introduces a kind of node denoting a sequence-dependency between events. The DFT can be evaluated by the ABDD. This paper firstly presents a reliability analysis of the CBI system in urban rail by using the ABDD-based method. The CBI system is modeled by the DFT, then the DFT is converted into a function based on a temporal algebraic framework. According to the temporal function, the ABDD can be built for reliability analysis. Compared to the Markov-based method, the ABDD-based method can avoid space-state explosion and have no limitation on the exponential distribution of component failure. A case study related to the CBI system is presented to show the advantage of using our method.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115833951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1