首页 > 最新文献

Computer Science Review最新文献

英文 中文
Digital to quantum watermarking: A journey from past to present and into the future 数字到量子水印:从过去到现在再到未来的旅程
IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-14 DOI: 10.1016/j.cosrev.2024.100679
Swapnaneel Dhar, Aditya Kumar Sahu

With the amplification of digitization, the surge in multimedia content, such as text, video, audio, and images, is incredible. Concomitantly, the incidence of multimedia tampering is also apparently increasing. Digital watermarking (DW) is the means of achieving privacy and authentication of the received content while preserving integrity and copyright. Literature has produced a plethora of state-of-the-art DW techniques to achieve the right balance between its performance measuring parameters, including high imperceptibility, increased watermarking ability, and tamper-free recovery. Meanwhile, during the vertex of DW, scientific advances in quantum computing led to the emergence of quantum-based watermarking. Though quantum watermarking (QW) is in its nascent stage, it has become captivating among researchers to dive deep inside it. This study not only investigates the performance of existing DW techniques but also extensively assesses the recently devised QW techniques. It further presents how the principles of quantum entanglement and superposition can be decisive in achieving superior immunity against several watermarking attacks. To the best of our knowledge, this study is the unique one to present a comprehensive review of both DW as well as QW techniques. Therefore, the facts presented in this study could be a baseline for the researchers to devise a novel DW or QW technique.

随着数字化进程的加快,文本、视频、音频和图像等多媒体内容激增,令人难以置信。与此同时,多媒体被篡改的情况也明显增多。数字水印(DW)是在保持完整性和版权的同时,实现接收内容的隐私性和认证的一种手段。为了在其性能测量参数(包括高不可感知性、更强的水印能力和无篡改恢复)之间实现适当的平衡,文献中出现了大量最先进的数字水印技术。与此同时,在 DW 的顶点,量子计算的科学进步导致了基于量子的水印技术的出现。虽然量子水印(QW)还处于萌芽阶段,但它已经吸引了众多研究人员对其进行深入研究。本研究不仅调查了现有 DW 技术的性能,还广泛评估了最新设计的 QW 技术。它进一步介绍了量子纠缠和叠加原理如何在实现对多种水印攻击的卓越免疫力方面发挥决定性作用。据我们所知,本研究是对 DW 和 QW 技术进行全面评述的独一无二的研究。因此,本研究提出的事实可以作为研究人员设计新型 DW 或 QW 技术的基准。
{"title":"Digital to quantum watermarking: A journey from past to present and into the future","authors":"Swapnaneel Dhar,&nbsp;Aditya Kumar Sahu","doi":"10.1016/j.cosrev.2024.100679","DOIUrl":"10.1016/j.cosrev.2024.100679","url":null,"abstract":"<div><p>With the amplification of digitization, the surge in multimedia content, such as text, video, audio, and images, is incredible. Concomitantly, the incidence of multimedia tampering is also apparently increasing. Digital watermarking (DW) is the means of achieving privacy and authentication of the received content while preserving integrity and copyright. Literature has produced a plethora of state-of-the-art DW techniques to achieve the right balance between its performance measuring parameters, including high imperceptibility, increased watermarking ability, and tamper-free recovery. Meanwhile, during the vertex of DW, scientific advances in quantum computing led to the emergence of quantum-based watermarking. Though quantum watermarking (QW) is in its nascent stage, it has become captivating among researchers to dive deep inside it. This study not only investigates the performance of existing DW techniques but also extensively assesses the recently devised QW techniques. It further presents how the principles of quantum entanglement and superposition can be decisive in achieving superior immunity against several watermarking attacks. To the best of our knowledge, this study is the unique one to present a comprehensive review of both DW as well as QW techniques. Therefore, the facts presented in this study could be a baseline for the researchers to devise a novel DW or QW technique.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100679"},"PeriodicalIF":13.3,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142231726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISO/IEC quality standards for AI engineering ISO/IEC 人工智能工程质量标准
IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-14 DOI: 10.1016/j.cosrev.2024.100681
Jesús Oviedo , Moisés Rodriguez , Andrea Trenta , Dino Cannas , Domenico Natale , Mario Piattini

Artificial Intelligence (AI) plays a crucial role in the digital transformation of organizations, with the influence of AI applications expanding daily. Given this context, the development of these AI systems to guarantee their effective operation and usage is becoming more essential. To this end, numerous international standards have been introduced in recent years. This paper offers a broad review of these standards (mainly those defined by ISO/IEC), with a particular focus on the software aspects: at the level of process and product quality; and at the level of data quality of applications integrating AI systems.

人工智能(AI)在企业的数字化转型中发挥着至关重要的作用,人工智能应用的影响力与日俱增。在此背景下,开发这些人工智能系统以确保其有效运行和使用变得越来越重要。为此,近年来出台了许多国际标准。本文对这些标准(主要是 ISO/IEC 定义的标准)进行了广泛评述,尤其侧重于软件方面:流程和产品质量层面;以及集成了人工智能系统的应用程序的数据质量层面。
{"title":"ISO/IEC quality standards for AI engineering","authors":"Jesús Oviedo ,&nbsp;Moisés Rodriguez ,&nbsp;Andrea Trenta ,&nbsp;Dino Cannas ,&nbsp;Domenico Natale ,&nbsp;Mario Piattini","doi":"10.1016/j.cosrev.2024.100681","DOIUrl":"10.1016/j.cosrev.2024.100681","url":null,"abstract":"<div><p>Artificial Intelligence (AI) plays a crucial role in the digital transformation of organizations, with the influence of AI applications expanding daily. Given this context, the development of these AI systems to guarantee their effective operation and usage is becoming more essential. To this end, numerous international standards have been introduced in recent years. This paper offers a broad review of these standards (mainly those defined by ISO/IEC), with a particular focus on the software aspects: at the level of process and product quality; and at the level of data quality of applications integrating AI systems.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100681"},"PeriodicalIF":13.3,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142229789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive survey on resource allocation for edge-computing-enabled metaverse 边缘计算支持的元宇宙资源分配综合调查
IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-09 DOI: 10.1016/j.cosrev.2024.100680
Tanmay Baidya, Sangman Moh

With the rapid evaluation of virtual and augmented reality, massive Internet of Things networks and upcoming 6 G communication give rise to an emerging concept termed the “metaverse,” which promises to revolutionize how we interact with the digital world by offering immersive experiences between reality and virtuality. Edge computing, another novel paradigm, propels the metaverse functionality by enhancing real-time interaction and reducing latency, providing a responsive and seamless virtual environment. However, realizing the full potential of the metaverse requires dynamic and efficient resource-allocation strategies to handle the immense demand for communicational, computational, and storage resources required by its diverse applications. This survey comprehensively explores resource-allocation strategies in the context of an edge-computing-enabled metaverse, investigating various challenges, existing techniques, and emerging trends in this rapidly expanding field. We first explore the underlying metaverse characteristics and pivotal role of edge computing, after which we investigate various types of resources and their key issues and challenges. We also provide a brief discussion on offloading and caching strategies, which are the most prominent research issues in this context. In this study, we compare and analyze 35 different resource-allocation strategies, benchmark 19 algorithms, and investigate their suitability across diverse metaverse scenarios, offering a broader scope than existing surveys. The survey aims to serve as a comprehensive guide for researchers and practitioners, helping them navigate the complexities of resource allocation in the metaverse and supporting the development of more efficient, scalable, and user-centric virtual environments.

随着虚拟现实和增强现实技术的快速发展,大规模物联网网络和即将到来的 6 G 通信催生了一个名为 "元宇宙 "的新兴概念,它有望通过提供介于现实和虚拟之间的沉浸式体验,彻底改变我们与数字世界的交互方式。边缘计算是另一种新模式,它通过增强实时交互和减少延迟,提供反应灵敏、无缝衔接的虚拟环境,从而推动元宇宙功能的发展。然而,要充分发挥元宇宙的潜力,需要动态、高效的资源分配策略,以应对各种应用对通信、计算和存储资源的巨大需求。本研究全面探讨了边缘计算支持的元宇宙背景下的资源分配策略,研究了这一快速发展领域的各种挑战、现有技术和新兴趋势。我们首先探讨了元宇宙的基本特征和边缘计算的关键作用,然后研究了各种类型的资源及其关键问题和挑战。我们还简要讨论了卸载和缓存策略,这也是这方面最突出的研究课题。在本研究中,我们对 35 种不同的资源分配策略进行了比较和分析,对 19 种算法进行了基准测试,并调查了它们在各种元数据场景中的适用性,提供了比现有调查更广泛的范围。该调查旨在为研究人员和从业人员提供全面指导,帮助他们应对元海外资源分配的复杂性,支持开发更高效、可扩展和以用户为中心的虚拟环境。
{"title":"Comprehensive survey on resource allocation for edge-computing-enabled metaverse","authors":"Tanmay Baidya,&nbsp;Sangman Moh","doi":"10.1016/j.cosrev.2024.100680","DOIUrl":"10.1016/j.cosrev.2024.100680","url":null,"abstract":"<div><p>With the rapid evaluation of virtual and augmented reality, massive Internet of Things networks and upcoming 6 G communication give rise to an emerging concept termed the “metaverse,” which promises to revolutionize how we interact with the digital world by offering immersive experiences between reality and virtuality. Edge computing, another novel paradigm, propels the metaverse functionality by enhancing real-time interaction and reducing latency, providing a responsive and seamless virtual environment. However, realizing the full potential of the metaverse requires dynamic and efficient resource-allocation strategies to handle the immense demand for communicational, computational, and storage resources required by its diverse applications. This survey comprehensively explores resource-allocation strategies in the context of an edge-computing-enabled metaverse, investigating various challenges, existing techniques, and emerging trends in this rapidly expanding field. We first explore the underlying metaverse characteristics and pivotal role of edge computing, after which we investigate various types of resources and their key issues and challenges. We also provide a brief discussion on offloading and caching strategies, which are the most prominent research issues in this context. In this study, we compare and analyze 35 different resource-allocation strategies, benchmark 19 algorithms, and investigate their suitability across diverse metaverse scenarios, offering a broader scope than existing surveys. The survey aims to serve as a comprehensive guide for researchers and practitioners, helping them navigate the complexities of resource allocation in the metaverse and supporting the development of more efficient, scalable, and user-centric virtual environments.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100680"},"PeriodicalIF":13.3,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges 物联网应用的量子安全认证和密钥协议:全面调查与公开挑战
IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-31 DOI: 10.1016/j.cosrev.2024.100676
Ponnuru Raveendra Babu , Sathish A.P. Kumar , Alavalapati Goutham Reddy , Ashok Kumar Das

This study provides an in-depth survey of quantum secure authentication and key agreement protocols, investigating the dynamic landscape of cryptographic techniques within the realm of quantum computing. With the potential threat posed by quantum computing advancements to classical cryptographic protocols, the exploration of secure authentication and key agreement in the quantum era becomes imperative for safeguarding communication systems. The research scrutinizes evolving methodologies and innovations designed to enhance the security of authentication processes and key agreements in the context of quantum computing. A comprehensive examination of existing protocols is conducted, elucidating their strengths, limitations, and potential vulnerabilities. The research includes a comparative assessment of security features and computational burdens associated with various quantum secure authentication and key agreement protocols. The survey concludes by underscoring the urgent need for further research in the development of secure and efficient quantum cloud computing environments, as well as lightweight post-quantum cryptographic primitives, to ensure the viability of quantum secure authentication protocols on a universal scale. This comprehensive overview serves as a valuable resource for researchers, practitioners, and policymakers in the rapidly evolving field of quantum secure communication.

本研究深入探讨了量子安全认证和密钥协议,研究了量子计算领域密码技术的动态发展。由于量子计算的进步对经典密码协议构成了潜在威胁,因此探索量子时代的安全认证和密钥协议对于保护通信系统来说势在必行。这项研究仔细研究了不断发展的方法和创新,旨在加强量子计算背景下身份验证过程和密钥协议的安全性。研究全面考察了现有协议,阐明了它们的优势、局限性和潜在漏洞。研究包括对各种量子安全认证和密钥协议的安全特性和计算负担进行比较评估。调查最后强调,迫切需要进一步研究开发安全高效的量子云计算环境以及轻量级后量子加密基元,以确保量子安全认证协议在全球范围内的可行性。本综述是快速发展的量子安全通信领域研究人员、从业人员和决策者的宝贵资源。
{"title":"Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges","authors":"Ponnuru Raveendra Babu ,&nbsp;Sathish A.P. Kumar ,&nbsp;Alavalapati Goutham Reddy ,&nbsp;Ashok Kumar Das","doi":"10.1016/j.cosrev.2024.100676","DOIUrl":"10.1016/j.cosrev.2024.100676","url":null,"abstract":"<div><p>This study provides an in-depth survey of quantum secure authentication and key agreement protocols, investigating the dynamic landscape of cryptographic techniques within the realm of quantum computing. With the potential threat posed by quantum computing advancements to classical cryptographic protocols, the exploration of secure authentication and key agreement in the quantum era becomes imperative for safeguarding communication systems. The research scrutinizes evolving methodologies and innovations designed to enhance the security of authentication processes and key agreements in the context of quantum computing. A comprehensive examination of existing protocols is conducted, elucidating their strengths, limitations, and potential vulnerabilities. The research includes a comparative assessment of security features and computational burdens associated with various quantum secure authentication and key agreement protocols. The survey concludes by underscoring the urgent need for further research in the development of secure and efficient quantum cloud computing environments, as well as lightweight post-quantum cryptographic primitives, to ensure the viability of quantum secure authentication protocols on a universal scale. This comprehensive overview serves as a valuable resource for researchers, practitioners, and policymakers in the rapidly evolving field of quantum secure communication.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100676"},"PeriodicalIF":13.3,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain 万物互联与元世界:用区块链连接物理世界和虚拟世界
IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.cosrev.2024.100678
Wajid Rafique , Junaid Qadir

The Metaverse is an evolving technology that leverages the Internet infrastructure and the massively connected Internet of Everything (IoE) to create an immersive virtual world. In the Metaverse, humans engage in activities similar to those in the real world, such as socializing, working, attending events, exploring virtual landscapes, creating and trading digital assets, participating in virtual economies, and experiencing entertainment and cultural activities. By using advanced technologies such as IoE, extended reality (XR), artificial intelligence (AI), machine learning (ML), and 6G communication, along with blockchain technology, the Metaverse bridges the physical and virtual worlds. In particular, Blockchain-Enabled IoE (BIoE) will play a crucial role in Metaverse applications by ensuring secure service provisioning through the integration of blockchain with IoE. It efficiently manages the massive connectivity of physical world objects and enhances security, integrity, and decentralization of trust, while increasing resilience against failures, thus securing and fostering trust in both physical and virtual Metaverse networks. While some view the Metaverse as a detached virtual world, technologies like mixed reality and digital twins highlight the need for complementarity and interactive co-existence between the physical and virtual worlds. Blockchain facilitates this co-existence by providing a secure and trusted framework for integrating and synchronizing data and activities across both environments, developing trust through the reliability and authenticity of interactions and transactions. However, despite substantial advancements in related fields, there remains a significant gap in comprehensive surveys that address the integration of AI/ML, 6G, and blockchain in the Metaverse. In this paper, we fill this gap by examining BIoE’s capabilities in bridging the physical and virtual worlds and securing Metaverse applications across various domains, such as immersive energy grids, immersive healthcare, and immersive living. We explore BIoE’s role in service provisioning in the Metaverse, including access control, privacy protection, authentication, attack identification, and trust management. Additionally, we present a detailed taxonomy of existing literature, discuss novel use cases, and explore the synergies and practical implementations of BIoE in Metaverse applications. Finally, we address current challenges and propose future research directions to advance the field of BIoE in the Metaverse.

元宇宙是一种不断发展的技术,它利用互联网基础设施和大规模连接的万物互联(IoE)来创建一个身临其境的虚拟世界。在元宇宙中,人类从事与现实世界类似的活动,如社交、工作、参加活动、探索虚拟景观、创建和交易数字资产、参与虚拟经济以及体验娱乐和文化活动。通过使用物联网(IoE)、扩展现实(XR)、人工智能(AI)、机器学习(ML)和 6G 通信等先进技术以及区块链技术,Metaverse 将物理世界和虚拟世界连接起来。其中,区块链物联网(Blockchain-Enabled IoE,BIoE)将在 Metaverse 应用中发挥关键作用,通过将区块链与 IoE 相结合,确保安全提供服务。它能有效管理物理世界对象的大规模连接,增强安全性、完整性和去中心化信任,同时提高故障恢复能力,从而确保物理和虚拟 Metaverse 网络的安全并促进信任。虽然有些人认为元宇宙是一个独立的虚拟世界,但混合现实和数字双胞胎等技术强调了物理世界和虚拟世界之间互补和互动共存的必要性。区块链提供了一个安全可信的框架,用于整合和同步两个环境中的数据和活动,通过互动和交易的可靠性和真实性建立信任,从而促进这种共存。然而,尽管相关领域取得了长足进步,但针对人工智能/ML、6G 和区块链在 Metaverse 中的整合的全面调查仍存在巨大差距。在本文中,我们通过研究 BIoE 在连接物理世界和虚拟世界方面的能力,以及确保 Metaverse 应用在各个领域(如沉浸式能源网、沉浸式医疗保健和沉浸式生活)的安全,填补了这一空白。我们探讨了 BIoE 在 Metaverse 服务供应中的作用,包括访问控制、隐私保护、身份验证、攻击识别和信任管理。此外,我们还对现有文献进行了详细分类,讨论了新的使用案例,并探讨了 BIoE 在元宇宙应用中的协同作用和实际应用。最后,我们探讨了当前面临的挑战,并提出了未来的研究方向,以推动元数据中的 BIoE 领域的发展。
{"title":"Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain","authors":"Wajid Rafique ,&nbsp;Junaid Qadir","doi":"10.1016/j.cosrev.2024.100678","DOIUrl":"10.1016/j.cosrev.2024.100678","url":null,"abstract":"<div><p>The Metaverse is an evolving technology that leverages the Internet infrastructure and the massively connected Internet of Everything (IoE) to create an immersive virtual world. In the Metaverse, humans engage in activities similar to those in the real world, such as socializing, working, attending events, exploring virtual landscapes, creating and trading digital assets, participating in virtual economies, and experiencing entertainment and cultural activities. By using advanced technologies such as IoE, extended reality (XR), artificial intelligence (AI), machine learning (ML), and 6G communication, along with blockchain technology, the Metaverse bridges the physical and virtual worlds. In particular, <em>Blockchain-Enabled IoE</em> (BIoE) will play a crucial role in Metaverse applications by ensuring secure service provisioning through the integration of blockchain with IoE. It efficiently manages the massive connectivity of physical world objects and enhances security, integrity, and decentralization of trust, while increasing resilience against failures, thus securing and fostering trust in both physical and virtual Metaverse networks. While some view the Metaverse as a detached virtual world, technologies like mixed reality and digital twins highlight the need for complementarity and interactive co-existence between the physical and virtual worlds. Blockchain facilitates this co-existence by providing a secure and trusted framework for integrating and synchronizing data and activities across both environments, developing trust through the reliability and authenticity of interactions and transactions. However, despite substantial advancements in related fields, there remains a significant gap in comprehensive surveys that address the integration of AI/ML, 6G, and blockchain in the Metaverse. In this paper, we fill this gap by examining BIoE’s capabilities in bridging the physical and virtual worlds and securing Metaverse applications across various domains, such as immersive energy grids, immersive healthcare, and immersive living. We explore BIoE’s role in service provisioning in the Metaverse, including access control, privacy protection, authentication, attack identification, and trust management. Additionally, we present a detailed taxonomy of existing literature, discuss novel use cases, and explore the synergies and practical implementations of BIoE in Metaverse applications. Finally, we address current challenges and propose future research directions to advance the field of BIoE in the Metaverse.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100678"},"PeriodicalIF":13.3,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis 人体生理学和面部生物力学对构建稳健的深度伪造检测器的作用:全面调查与分析
IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.cosrev.2024.100677
Rajat Chakraborty, Ruchira Naskar

AI based multimedia content generation, already having achieved hyper-realism, deeply influences human perception and trust. Since emerging around late 2017, deepfake technology has rapidly gained popularity due to its diverse applications, raising significant concerns regarding its malicious and unethical use. Although many deepfake detectors have been developed by forensic researchers in recent years, there is an urgent need for robust detectors that can overcome demographic, social, and cultural barriers in identifying deepfakes. To identify a human as a human, to distinguish a person from a synthetic entity, the literature faces compelling necessity to introduce deepfake detectors that can withstand all forms of demographic and social biases. (Multiple researches have been conducted in recent times to prove the existence of social and demographic biases in synthetic media detectors.) In this article, we examine human physiological signals as the foundation for robust deepfake detectors, and present a survey of recent developments in deepfake detection research that relies on human physiological signals and facial biomechanics. We perform in-depth analysis of the techniques to understand the contribution of human physiology in deepfake detection. Hence, we comprehend how human physiology based deepfake detectors fare by exploiting the inherent robustness of physiological signals, in contrast to other existing detectors.

基于人工智能的多媒体内容生成已经实现了超逼真,深深影响着人类的感知和信任。自 2017 年底左右出现以来,deepfake 技术因其多样化的应用而迅速走红,引起了人们对其恶意和不道德使用的极大关注。尽管近年来法医研究人员已经开发出许多深度伪造检测器,但仍迫切需要能够克服人口、社会和文化障碍的强大检测器来识别深度伪造。为了识别人的真伪,区分人与合成实体,文献迫切需要引入能够抵御各种形式的人口和社会偏见的深度伪造检测器。(近来已有多项研究证明合成媒体检测器存在社会和人口偏见)。在本文中,我们将人体生理信号作为鲁棒性深度防伪检测器的基础进行研究,并对依赖于人体生理信号和面部生物力学的深度防伪检测研究的最新进展进行了调查。我们对这些技术进行了深入分析,以了解人体生理在深度防伪检测中的贡献。因此,与其他现有检测器相比,我们通过利用生理信号固有的鲁棒性,了解了基于人体生理的深度防伪检测器的性能如何。
{"title":"Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis","authors":"Rajat Chakraborty,&nbsp;Ruchira Naskar","doi":"10.1016/j.cosrev.2024.100677","DOIUrl":"10.1016/j.cosrev.2024.100677","url":null,"abstract":"<div><p>AI based multimedia content generation, already having achieved hyper-realism, deeply influences human perception and trust. Since emerging around late 2017, deepfake technology has rapidly gained popularity due to its diverse applications, raising significant concerns regarding its malicious and unethical use. Although many deepfake detectors have been developed by forensic researchers in recent years, there is an urgent need for robust detectors that can overcome demographic, social, and cultural barriers in identifying deepfakes. To identify a human as a human, to distinguish a person from a synthetic entity, the literature faces compelling necessity to introduce deepfake detectors that can withstand all forms of demographic and social biases. (Multiple researches have been conducted in recent times to prove the existence of social and demographic biases in synthetic media detectors.) In this article, we examine human physiological signals as the foundation for robust deepfake detectors, and present a survey of recent developments in deepfake detection research that relies on human physiological signals and facial biomechanics. We perform in-depth analysis of the techniques to understand the contribution of human physiology in deepfake detection. Hence, we comprehend how human physiology based deepfake detectors fare by exploiting the inherent robustness of physiological signals, in contrast to other existing detectors.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100677"},"PeriodicalIF":13.3,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic literature review on chaotic maps-based image security techniques 基于混沌图的图像安全技术系统文献综述
IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1016/j.cosrev.2024.100659
Dilbag Singh , Sharanpreet Kaur , Mandeep Kaur , Surender Singh , Manjit Kaur , Heung-No Lee

Images play a substantial role in various applications such as medical imaging, satellite imaging, and military communications. These images often contain confidential and sensitive information, and are typically transmitted over public networks. As a result, they are vulnerable to various security threats. Therefore, efficient image security techniques are necessary to protect these images from unauthorized access and modification. This paper aims to present a systematic study of chaotic map-based image security techniques. Due to poor selection criteria, existing studies on image security techniques suffer from high overlap among the reviewed methods. Moreover, these reviews often lack depth and cover a limited number of articles. In this paper, we study three well-known chaotic map-based image security models: image encryption, image steganography, and image watermarking. Articles were selected from reputable databases such as IEEE Xplore, Scopus, and Web of Science (WOS). This paper provides a systematic analysis of the fundamental concepts, performance metrics, and security aspects of chaotic map-based image security techniques. Comparisons are drawn among the existing techniques to evaluate their relative strengths. From this extensive review, various issues associated with the current chaotic map-based image security techniques are highlighted. Finally, future directions in the field of chaotic map-based image security are discussed, which can guide researchers in their future work.

图像在医疗成像、卫星成像和军事通信等各种应用中发挥着重要作用。这些图像通常包含机密和敏感信息,通常通过公共网络传输。因此,它们很容易受到各种安全威胁。因此,有必要采用高效的图像安全技术来保护这些图像免遭未经授权的访问和修改。本文旨在对基于混沌图的图像安全技术进行系统研究。由于选择标准不完善,现有的图像安全技术研究存在方法高度重叠的问题。此外,这些综述往往缺乏深度,涵盖的文章数量有限。本文研究了三种著名的基于混沌图的图像安全模型:图像加密、图像隐写术和图像水印。文章选自 IEEE Xplore、Scopus 和 Web of Science (WOS) 等著名数据库。本文对基于混沌图的图像安全技术的基本概念、性能指标和安全方面进行了系统分析。对现有技术进行了比较,以评估它们的相对优势。通过广泛的综述,本文强调了与当前基于混沌图的图像安全技术相关的各种问题。最后,讨论了基于混沌图的图像安全领域的未来发展方向,为研究人员今后的工作提供指导。
{"title":"A systematic literature review on chaotic maps-based image security techniques","authors":"Dilbag Singh ,&nbsp;Sharanpreet Kaur ,&nbsp;Mandeep Kaur ,&nbsp;Surender Singh ,&nbsp;Manjit Kaur ,&nbsp;Heung-No Lee","doi":"10.1016/j.cosrev.2024.100659","DOIUrl":"10.1016/j.cosrev.2024.100659","url":null,"abstract":"<div><p>Images play a substantial role in various applications such as medical imaging, satellite imaging, and military communications. These images often contain confidential and sensitive information, and are typically transmitted over public networks. As a result, they are vulnerable to various security threats. Therefore, efficient image security techniques are necessary to protect these images from unauthorized access and modification. This paper aims to present a systematic study of chaotic map-based image security techniques. Due to poor selection criteria, existing studies on image security techniques suffer from high overlap among the reviewed methods. Moreover, these reviews often lack depth and cover a limited number of articles. In this paper, we study three well-known chaotic map-based image security models: image encryption, image steganography, and image watermarking. Articles were selected from reputable databases such as IEEE Xplore, Scopus, and Web of Science (WOS). This paper provides a systematic analysis of the fundamental concepts, performance metrics, and security aspects of chaotic map-based image security techniques. Comparisons are drawn among the existing techniques to evaluate their relative strengths. From this extensive review, various issues associated with the current chaotic map-based image security techniques are highlighted. Finally, future directions in the field of chaotic map-based image security are discussed, which can guide researchers in their future work.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100659"},"PeriodicalIF":13.3,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142075949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing 从朦胧到无朦胧:多图像、单图像和基于 CNN 的去雾算法综合概览
IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1016/j.cosrev.2024.100669
Jehoiada Jackson , Kwame Obour Agyekum , kwabena Sarpong , Chiagoziem Ukwuoma , Rutherford Patamia , Zhiguang Qin

The natural and artificial dispersal of climatic particles transforms images obtained in open-air conditions. Due to visibility diminishing aerosols, unfavorable climate situations such as mist, fog, and haze cause color change and reduce the contrast of the obtained image. Images seem deformed and inadequate in contrast saturation, affecting computer vision techniques considerably. Haze removal aims to decrease uncertainty inside a hazy image and enhance the visual effects for post-processing applications. However, dehazing is highly challenging due to its mathematical obscurity. This paper reviews the primary algorithms for image dehazing proposed over the past decade. The paper presents the basis for hazy image degradation, followed by a novel classification of dehazing algorithms into enhancement-based, joint-based, and Image repair methods. All techniques are evaluated, and the respective subsections are presented according to their attributes. Next, we categorize and elaborate on the various quality assessment methods using structural similarity index measure(SSIM), haze result, PSNR, and degradation score to evaluate some unique algorithms. Ultimately, some concerns about drawbacks and future research scope in haze removal methods are examined.

自然和人工散布的气候颗粒会改变在露天条件下获得的图像。由于能见度降低的气溶胶,雾、雾和霾等不利的气候条件会导致色彩变化,并降低所获图像的对比度。图像看起来会变形,对比度饱和度不足,对计算机视觉技术造成很大影响。去雾霾的目的是减少雾霾图像内部的不确定性,并增强后处理应用的视觉效果。然而,去雾霾因其数学上的模糊性而极具挑战性。本文回顾了过去十年间提出的主要图像去雾算法。论文介绍了图像降级的基础,然后将去雾算法分为基于增强的方法、基于联合的方法和图像修复方法。本文对所有技术进行了评估,并根据它们的属性介绍了相应的小节。接下来,我们使用结构相似性指数测量法(SSIM)、雾度结果、PSNR 和退化分数对各种质量评估方法进行分类和阐述,以评估一些独特的算法。最后,我们探讨了去雾霾方法的一些缺点和未来的研究范围。
{"title":"Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing","authors":"Jehoiada Jackson ,&nbsp;Kwame Obour Agyekum ,&nbsp;kwabena Sarpong ,&nbsp;Chiagoziem Ukwuoma ,&nbsp;Rutherford Patamia ,&nbsp;Zhiguang Qin","doi":"10.1016/j.cosrev.2024.100669","DOIUrl":"10.1016/j.cosrev.2024.100669","url":null,"abstract":"<div><p>The natural and artificial dispersal of climatic particles transforms images obtained in open-air conditions. Due to visibility diminishing aerosols, unfavorable climate situations such as mist, fog, and haze cause color change and reduce the contrast of the obtained image. Images seem deformed and inadequate in contrast saturation, affecting computer vision techniques considerably. Haze removal aims to decrease uncertainty inside a hazy image and enhance the visual effects for post-processing applications. However, dehazing is highly challenging due to its mathematical obscurity. This paper reviews the primary algorithms for image dehazing proposed over the past decade. The paper presents the basis for hazy image degradation, followed by a novel classification of dehazing algorithms into enhancement-based, joint-based, and Image repair methods. All techniques are evaluated, and the respective subsections are presented according to their attributes. Next, we categorize and elaborate on the various quality assessment methods using structural similarity index measure(SSIM), haze result, PSNR, and degradation score to evaluate some unique algorithms. Ultimately, some concerns about drawbacks and future research scope in haze removal methods are examined.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100669"},"PeriodicalIF":13.3,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142076002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges 可重构智能表面辅助多接入边缘计算网络调查:技术现状与未来挑战
IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1016/j.cosrev.2024.100668
Manzoor Ahmed , Salman Raza , Aized Amin Soofi , Feroz Khan , Wali Ullah Khan , Fang Xu , Symeon Chatzinotas , Octavia A. Dobre , Zhu Han

This survey provides a comprehensive analysis of the integration of Reconfigurable Intelligent Surfaces (RIS) with edge computing, underscoring RIS’s critical role in advancing wireless communication networks. The examination begins by demystifying edge computing, contrasting it with traditional cloud computing, and categorizing it into several types. It further delves into advanced edge computing models like Multi-Access Edge Computing (MEC), Vehicle Fog Computing (VFC), and Vehicle Edge Computing (VEC) and challenges. Progressing deeper, the survey explores RIS technology, categorizing it into passive, active, and hybrid RIS, and offers an in-depth analysis of Beyond Diagonal RIS (BD-RIS), including reflective, transmissive, and Simultaneous Transmit and Reflect (STAR) modes. Subsequently, the study assesses RIS’s applications within edge computing, revealing its diverse use cases and strategies for performance analysis. The discussion comprises how RIS-driven computation can elevate rates, reduce latency, and contribute to an eco-friendly edge computing approach through better Energy Efficiency (EE). The survey also scrutinizes RIS’s role in bolstering security within edge computing. To aid comprehension, each subsection is complemented by summary tables that meticulously elaborate on, compare, and evaluate the literature, focusing on aspects like system models, scenarios, RIS details, Channel State Information (CSI), offloading types, employed schemes, methodologies, and proposed solutions. This organized approach ensures a cohesive and thorough exploration of the survey’s diverse topics. By illustrating the synergy between RIS and edge computing, the study provides valuable insights or lessons learned for enhancing wireless networks, paving the way for future breakthroughs in communication technologies. Before conclusion, the survey also identifies ongoing challenges and future research directions in RIS-assisted edge computing, emphasizing the vast potential of this field.

本调查报告全面分析了可重构智能表面(RIS)与边缘计算的整合,强调了 RIS 在推动无线通信网络发展中的关键作用。研究首先揭开了边缘计算的神秘面纱,将其与传统云计算进行对比,并将其分为几种类型。报告进一步深入探讨了先进的边缘计算模型,如多接入边缘计算(MEC)、车载雾计算(VFC)和车载边缘计算(VEC)以及面临的挑战。随着研究的深入,该报告探讨了RIS技术,将其分为被动式、主动式和混合式RIS,并深入分析了超对角线RIS(BD-RIS),包括反射式、透射式和同步传输与反射(STAR)模式。随后,研究评估了 RIS 在边缘计算中的应用,揭示了其不同的使用案例和性能分析策略。讨论内容包括 RIS 驱动的计算如何提高速率、减少延迟,以及如何通过提高能效 (EE) 促进生态友好型边缘计算方法。调查还仔细研究了 RIS 在增强边缘计算安全性方面的作用。为了帮助理解,每个小节都配有摘要表,对文献进行细致的阐述、比较和评估,重点关注系统模型、场景、RIS 详情、信道状态信息 (CSI)、卸载类型、采用的方案、方法和建议的解决方案等方面。这种有条不紊的方法确保了对调查的不同主题进行连贯而深入的探讨。通过说明 RIS 与边缘计算之间的协同作用,本研究为增强无线网络提供了宝贵的见解或经验教训,为未来通信技术的突破铺平了道路。最后,调查还指出了 RIS 辅助边缘计算所面临的挑战和未来的研究方向,强调了这一领域的巨大潜力。
{"title":"A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges","authors":"Manzoor Ahmed ,&nbsp;Salman Raza ,&nbsp;Aized Amin Soofi ,&nbsp;Feroz Khan ,&nbsp;Wali Ullah Khan ,&nbsp;Fang Xu ,&nbsp;Symeon Chatzinotas ,&nbsp;Octavia A. Dobre ,&nbsp;Zhu Han","doi":"10.1016/j.cosrev.2024.100668","DOIUrl":"10.1016/j.cosrev.2024.100668","url":null,"abstract":"<div><p>This survey provides a comprehensive analysis of the integration of Reconfigurable Intelligent Surfaces (RIS) with edge computing, underscoring RIS’s critical role in advancing wireless communication networks. The examination begins by demystifying edge computing, contrasting it with traditional cloud computing, and categorizing it into several types. It further delves into advanced edge computing models like Multi-Access Edge Computing (MEC), Vehicle Fog Computing (VFC), and Vehicle Edge Computing (VEC) and challenges. Progressing deeper, the survey explores RIS technology, categorizing it into passive, active, and hybrid RIS, and offers an in-depth analysis of Beyond Diagonal RIS (BD-RIS), including reflective, transmissive, and Simultaneous Transmit and Reflect (STAR) modes. Subsequently, the study assesses RIS’s applications within edge computing, revealing its diverse use cases and strategies for performance analysis. The discussion comprises how RIS-driven computation can elevate rates, reduce latency, and contribute to an eco-friendly edge computing approach through better Energy Efficiency (EE). The survey also scrutinizes RIS’s role in bolstering security within edge computing. To aid comprehension, each subsection is complemented by summary tables that meticulously elaborate on, compare, and evaluate the literature, focusing on aspects like system models, scenarios, RIS details, Channel State Information (CSI), offloading types, employed schemes, methodologies, and proposed solutions. This organized approach ensures a cohesive and thorough exploration of the survey’s diverse topics. By illustrating the synergy between RIS and edge computing, the study provides valuable insights or lessons learned for enhancing wireless networks, paving the way for future breakthroughs in communication technologies. Before conclusion, the survey also identifies ongoing challenges and future research directions in RIS-assisted edge computing, emphasizing the vast potential of this field.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100668"},"PeriodicalIF":13.3,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142076003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of blockchain, artificial intelligence, and edge computing for Web 3.0 针对 Web 3.0 的区块链、人工智能和边缘计算调查
IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.cosrev.2024.100667
Jianjun Zhu, Fan Li, Jinyuan Chen

Web 3.0, as the third generation of the World Wide Web, aims to solve contemporary problems of trust, centralization, and data ownership. Driven by the latest advances in cutting-edge technologies, Web 3.0 is moving towards a more open, decentralized, intelligent, and interconnected network. Currently, increasingly widespread data breaches have raised awareness of online privacy and security of personal data. Additionally, since Web 3.0 is a complex integration, the technical details are not as clear as the characteristics it presents. In this survey, we conduct an in-depth exploration of Web 3.0 from the perspectives of blockchain, artificial intelligence, and edge computing. The methodology includes a comprehensive literature review, using specific keywords to identify relevant studies and applying strict inclusion and exclusion criteria to ensure a focus on high-quality literature. The main contributions include identifying the key challenges of Web 3.0, examining the fundamental role of each underlying technology, and surveying state-of-the-art practical applications within this ecosystem. Moreover, we introduce an innovative decentralized storage solution that facilitates secure communication and data processing without relying on centralized servers. We also introduce a novel decentralized computing solution that enhances the capabilities of Web 3.0 by enabling edge devices to perform data analysis locally, reducing dependence on traditional centralized servers. Finally, we highlight key challenges and potential research directions. Through the combination and mutual complementation of multiple technologies, Web 3.0 is expected to give users more control and ownership of data and digital assets.

Web 3.0 作为万维网的第三代,旨在解决信任、集中化和数据所有权等当代问题。在最新尖端技术的推动下,Web 3.0 正朝着更加开放、分散、智能和互联的网络方向发展。目前,越来越广泛的数据泄露事件提高了人们对网络隐私和个人数据安全的认识。此外,由于 Web 3.0 是一种复杂的整合,其技术细节并不像它所呈现的特征那样清晰。在本调查中,我们从区块链、人工智能和边缘计算的角度对 Web 3.0 进行了深入探讨。研究方法包括全面的文献综述,使用特定关键词识别相关研究,并采用严格的纳入和排除标准,以确保关注高质量文献。主要贡献包括确定 Web 3.0 的关键挑战、研究每种基础技术的基本作用以及调查该生态系统中的最新实际应用。此外,我们还介绍了一种创新的去中心化存储解决方案,无需依赖中心化服务器即可实现安全通信和数据处理。我们还介绍了一种新颖的分散式计算解决方案,通过让边缘设备在本地执行数据分析,减少对传统集中式服务器的依赖,从而增强 Web 3.0 的功能。最后,我们强调了主要挑战和潜在的研究方向。通过多种技术的结合与互补,Web 3.0 预计将赋予用户对数据和数字资产更多的控制权和所有权。
{"title":"A survey of blockchain, artificial intelligence, and edge computing for Web 3.0","authors":"Jianjun Zhu,&nbsp;Fan Li,&nbsp;Jinyuan Chen","doi":"10.1016/j.cosrev.2024.100667","DOIUrl":"10.1016/j.cosrev.2024.100667","url":null,"abstract":"<div><p>Web 3.0, as the third generation of the World Wide Web, aims to solve contemporary problems of trust, centralization, and data ownership. Driven by the latest advances in cutting-edge technologies, Web 3.0 is moving towards a more open, decentralized, intelligent, and interconnected network. Currently, increasingly widespread data breaches have raised awareness of online privacy and security of personal data. Additionally, since Web 3.0 is a complex integration, the technical details are not as clear as the characteristics it presents. In this survey, we conduct an in-depth exploration of Web 3.0 from the perspectives of blockchain, artificial intelligence, and edge computing. The methodology includes a comprehensive literature review, using specific keywords to identify relevant studies and applying strict inclusion and exclusion criteria to ensure a focus on high-quality literature. The main contributions include identifying the key challenges of Web 3.0, examining the fundamental role of each underlying technology, and surveying state-of-the-art practical applications within this ecosystem. Moreover, we introduce an innovative decentralized storage solution that facilitates secure communication and data processing without relying on centralized servers. We also introduce a novel decentralized computing solution that enhances the capabilities of Web 3.0 by enabling edge devices to perform data analysis locally, reducing dependence on traditional centralized servers. Finally, we highlight key challenges and potential research directions. Through the combination and mutual complementation of multiple technologies, Web 3.0 is expected to give users more control and ownership of data and digital assets.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100667"},"PeriodicalIF":13.3,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142058577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Science Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1