首页 > 最新文献

Pervasive and Mobile Computing最新文献

英文 中文
A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation 利用全分布式行为指纹和安全授权的新型物联网信任模型
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-02-08 DOI: 10.1016/j.pmcj.2024.101889
Marco Arazzi , Serena Nicolazzo , Antonino Nocera

The pervasiveness and high number of Internet of Things (IoT) applications in people’s daily lives make this context a very critical attack surface for cyber threats. The high heterogeneity of involved entities, both in terms of hardware and software characteristics, does not allow the definition of uniform, global, and efficient security solutions. Therefore, researchers have started to investigate novel mechanisms, in which a super node (a gateway, a hub, or a router) analyzes the interactions of the target node with other peers in the network, to detect possible anomalies. The most recent of these strategies base such an analysis on the modeling of the fingerprint of a node behavior in an IoT; nevertheless, existing solutions do not cope with the fully distributed nature of the referring scenario.

In this paper, we try to provide a contribution in this setting, by designing a novel and fully distributed trust model exploiting point-to-point devices’ behavioral fingerprints, a distributed consensus mechanism, and Blockchain technology. In our solution we tackle the non-trivial issue of equipping smart things with a secure mechanism to evaluate, also through their neighbors, the trustworthiness of an object in the network before interacting with it. Beyond the detailed description of our framework, we also illustrate the security model associated with it and the tests carried out to evaluate its correctness and performance.

物联网(IoT)应用在人们日常生活中的普及和大量出现,使其成为网络威胁的一个非常关键的攻击面。由于所涉及的实体在硬件和软件特性方面存在高度异质性,因此无法定义统一、全面和高效的安全解决方案。因此,研究人员开始研究新的机制,其中超级节点(网关、集线器或路由器)分析目标节点与网络中其他对等节点的交互,以检测可能的异常情况。在本文中,我们利用点对点设备的行为指纹、分布式共识机制和区块链技术,设计了一种新颖的全分布式信任模型,试图在这种情况下做出贡献。在我们的解决方案中,我们解决了一个非同小可的问题,即为智能设备配备一种安全机制,以便在与网络中的对象交互之前,通过其邻居评估该对象的可信度。除了详细描述我们的框架外,我们还说明了与之相关的安全模型,以及为评估其正确性和性能而进行的测试。
{"title":"A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation","authors":"Marco Arazzi ,&nbsp;Serena Nicolazzo ,&nbsp;Antonino Nocera","doi":"10.1016/j.pmcj.2024.101889","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101889","url":null,"abstract":"<div><p>The pervasiveness and high number of Internet of Things (IoT) applications in people’s daily lives make this context a very critical attack surface for cyber threats. The high heterogeneity of involved entities, both in terms of hardware and software characteristics, does not allow the definition of uniform, global, and efficient security solutions. Therefore, researchers have started to investigate novel mechanisms, in which a super node (a gateway, a hub, or a router) analyzes the interactions of the target node with other peers in the network, to detect possible anomalies. The most recent of these strategies base such an analysis on the modeling of the fingerprint of a node behavior in an IoT; nevertheless, existing solutions do not cope with the fully distributed nature of the referring scenario.</p><p>In this paper, we try to provide a contribution in this setting, by designing a novel and fully distributed trust model exploiting point-to-point devices’ behavioral fingerprints, a distributed consensus mechanism, and Blockchain technology. In our solution we tackle the non-trivial issue of equipping smart things with a secure mechanism to evaluate, also through their neighbors, the trustworthiness of an object in the network before interacting with it. Beyond the detailed description of our framework, we also illustrate the security model associated with it and the tests carried out to evaluate its correctness and performance.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000154/pdfft?md5=e7b2906244cfb05dbee063203a65f60e&pid=1-s2.0-S1574119224000154-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139738296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of mobility sampling in dynamic networks using predictive wavelet analysis 利用预测小波分析优化动态网络中的移动采样
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.1016/j.pmcj.2024.101887
Peppino Fazio , Miralem Mehic , Floriano De Rango , Mauro Tropea , Miroslav Voznak

In the last decade, the investigation of mobility features has gained enormous significance in many scenarios as a result of the significant diffusion and deployment of mobile devices covered by high-speed technologies (e.g., 5G). Many contributions in the literature have attempted to discover mobility properties, but most studies are based on the time features of the mobility process. No study has yet considered the effects of setting a proper sampling frequency (generally set to 1 s), in order to avoid information loss. Following our previous works, we propose a novel predictive spectral approach for mobility sampling based on the concept of a predictive wavelet. With this method, the choice of sampling frequency is governed by the current spectral components of the mobility process and derived from an analysis of future, predicted components. To assess whether our proposal may yield a helpful method, we conducted several simulation campaigns to test sampling accuracy and obtained results that confirmed our expectations.

近十年来,由于高速技术(如 5G)所覆盖的移动设备的大量普及和部署,对移动特性的研究在许多场景中都获得了巨大的意义。许多文献都试图发现移动特性,但大多数研究都是基于移动过程的时间特性。目前还没有研究考虑过设置适当的采样频率(一般设置为 1 秒)对避免信息丢失的影响。根据我们之前的研究成果,我们提出了一种基于预测小波概念的新型预测频谱流动性采样方法。利用这种方法,采样频率的选择受移动过程当前频谱成分的制约,并通过对未来预测成分的分析得出。为了评估我们的建议是否能产生一种有用的方法,我们进行了几次模拟活动来测试采样精度,结果证实了我们的预期。
{"title":"Optimization of mobility sampling in dynamic networks using predictive wavelet analysis","authors":"Peppino Fazio ,&nbsp;Miralem Mehic ,&nbsp;Floriano De Rango ,&nbsp;Mauro Tropea ,&nbsp;Miroslav Voznak","doi":"10.1016/j.pmcj.2024.101887","DOIUrl":"10.1016/j.pmcj.2024.101887","url":null,"abstract":"<div><p>In the last decade, the investigation of mobility features has gained enormous significance in many scenarios as a result of the significant diffusion and deployment of mobile devices covered by high-speed technologies (e.g., 5G). Many contributions in the literature have attempted to discover mobility properties, but most studies are based on the time features of the mobility process. No study has yet considered the effects of setting a proper sampling frequency (generally set to 1 s), in order to avoid information loss. Following our previous works, we propose a novel predictive spectral approach for mobility sampling based on the concept of a predictive wavelet. With this method, the choice of sampling frequency is governed by the current spectral components of the mobility process and derived from an analysis of future, predicted components. To assess whether our proposal may yield a helpful method, we conducted several simulation campaigns to test sampling accuracy and obtained results that confirmed our expectations.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000130/pdfft?md5=4ee4cc1275b8ee0647dbfa8fed17e7b2&pid=1-s2.0-S1574119224000130-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139669507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment B2auth:用于真实世界部署的上下文细粒度行为生物识别身份验证框架
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-24 DOI: 10.1016/j.pmcj.2024.101888
Ahmed Mahfouz , Ahmed Hamdy , Mohamed Alaa Eldin , Tarek M. Mahmoud

Several behavioral biometric authentication frameworks have been proposed to authenticate smartphone users based on the analysis of sensors and services. These authentication frameworks verify the user identity by extracting a set of behavioral traits such as touch, sensors and keystroke dynamics, and use machine learning and deep learning techniques to develop the authentication models. Unfortunately, it is not clear how these frameworks perform in the real world deployment and most of the experiments in the literature have been conducted with cooperative users in a controlled environment. In this paper, we present a novel behavioral biometric authentication framework, called B2auth, designed specifically for smartphone users. The framework leverages raw data collected from touchscreen on smartphone to extract behavioral traits for authentication. A Multilayer Perceptron (MLP) neural network is employed to develop authentication models. Unlike many existing experiments conducted in controlled environments with cooperative users, we focused on real-world deployment scenarios, collecting data from 60 participants using smartphones in an uncontrolled environment. The framework achieves promising results in differentiating the legitimate owner and an attacker across various app contexts, showcasing its potential in practical use cases. By utilizing minimalist data collection and cloud-based model generation, the B2auth framework offers an efficient and effective approach to behavioral biometric authentication for smartphones.

目前已提出了几种行为生物识别身份验证框架,根据对传感器和服务的分析对智能手机用户进行身份验证。这些认证框架通过提取一系列行为特征(如触摸、传感器和按键动态)来验证用户身份,并使用机器学习和深度学习技术来开发认证模型。遗憾的是,目前还不清楚这些框架在实际部署中的表现如何,文献中的大多数实验都是在受控环境中与合作用户进行的。在本文中,我们提出了一个新颖的行为生物识别身份验证框架,名为 B2auth,专门为智能手机用户设计。该框架利用从智能手机触摸屏收集到的原始数据提取行为特征,用于身份验证。该框架采用多层感知器(MLP)神经网络来开发身份验证模型。与许多在受控环境中与合作用户进行的现有实验不同,我们将重点放在真实世界的部署场景上,收集了 60 名在不受控环境中使用智能手机的参与者的数据。该框架在各种应用环境下区分合法所有者和攻击者方面取得了可喜的成果,展示了其在实际应用案例中的潜力。通过利用简约的数据收集和基于云的模型生成,B2auth 框架为智能手机的行为生物识别身份验证提供了一种高效、有效的方法。
{"title":"B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment","authors":"Ahmed Mahfouz ,&nbsp;Ahmed Hamdy ,&nbsp;Mohamed Alaa Eldin ,&nbsp;Tarek M. Mahmoud","doi":"10.1016/j.pmcj.2024.101888","DOIUrl":"10.1016/j.pmcj.2024.101888","url":null,"abstract":"<div><p>Several behavioral biometric authentication frameworks have been proposed to authenticate smartphone users based on the analysis of sensors and services. These authentication frameworks verify the user identity by extracting a set of behavioral traits such as touch, sensors and keystroke dynamics, and use machine learning and deep learning techniques to develop the authentication models. Unfortunately, it is not clear how these frameworks perform in the real world deployment and most of the experiments in the literature have been conducted with cooperative users in a controlled environment. In this paper, we present a novel behavioral biometric authentication framework, called B2auth, designed specifically for smartphone users. The framework leverages raw data collected from touchscreen on smartphone to extract behavioral traits for authentication. A Multilayer Perceptron (MLP) neural network is employed to develop authentication models. Unlike many existing experiments conducted in controlled environments with cooperative users, we focused on real-world deployment scenarios, collecting data from 60 participants using smartphones in an uncontrolled environment. The framework achieves promising results in differentiating the legitimate owner and an attacker across various app contexts, showcasing its potential in practical use cases. By utilizing minimalist data collection and cloud-based model generation, the B2auth framework offers an efficient and effective approach to behavioral biometric authentication for smartphones.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139578059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computation and communication efficient approach for federated learning based urban sensing applications against inference attacks 基于联合学习的城市感知应用对抗推理攻击的计算和通信高效方法
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-09 DOI: 10.1016/j.pmcj.2024.101875
Ayshika Kapoor, Dheeraj Kumar

Federated learning based participatory sensing has gained much attention lately for the vital task of urban sensing due to privacy and security issues in conventional machine learning. However, inference attacks by the honest-but-curious application server or a malicious adversary can leak the personal attributes of the participants, such as their home and workplace locations, routines, and habits. Approaches proposed in the literature to prevent such information leakage, such as secure multi-party computation and homomorphic encryption, are infeasible for urban sensing applications owing to high communication and computation costs due to multiple rounds of communication between the user and the server. Moreover, for effective modeling of urban sensing phenomenon, the application model needs to be updated frequently — every few minutes or hours, resulting in periodic data-intensive updates by the participants, which severely strains the already limited resources of their mobile devices. This paper proposes a novel low-cost privacy-preserving framework for enhanced protection against the inference of participants’ personal and private attributes from the data leaked through inference attacks. We propose a novel approach of strategically leaking selected location traces by providing computation and communication-light direct (local) model updates, whereas the rest of the model updates (when the user is at sensitive locations) are provided using secure multi-party computation. We propose two new methods based on spatiotemporal entropy and Kullback–Leibler divergence for automatically deciding which model updates need to be sent through secure multi-party computation and which can be sent directly. The proposed approach significantly reduces the computation and communication overhead for participants compared to the fully secure multi-party computation protocols. It provides enhanced protection against the deduction of personal attributes from inferred location traces compared to the direct model updates by confusing the application server or malicious adversary while inferring personal attributes from location traces. Numerical experiments on the popular Geolife GPS trajectories dataset validate our proposed approach by reducing the computation and communication requirements by the participants significantly and, at the same time, enhancing privacy by decreasing the number of inferred sensitive and private locations of participants.

由于传统机器学习存在隐私和安全问题,基于联合学习的参与式传感在城市传感这一重要任务中近来备受关注。然而,诚实但好奇的应用服务器或恶意对手的推理攻击可能会泄露参与者的个人属性,例如他们的家庭和工作地点、日常活动和习惯。文献中提出的防止此类信息泄露的方法,如安全多方计算和同态加密,由于用户和服务器之间的多轮通信导致通信和计算成本较高,因此在城市感知应用中并不可行。此外,为了对城市感知现象进行有效建模,应用模型需要频繁更新--每隔几分钟或几小时更新一次,这就导致参与者需要定期进行数据密集型更新,从而严重消耗了移动设备本已有限的资源。本文提出了一种新颖的低成本隐私保护框架,以加强保护,防止通过推理攻击从泄露的数据中推断出参与者的个人隐私属性。我们提出了一种新方法,通过提供计算和通信量较少的直接(本地)模型更新,战略性地泄露选定的位置痕迹,而其余的模型更新(当用户处于敏感位置时)则通过安全的多方计算来提供。我们提出了两种基于时空熵和库尔贝-莱布勒发散的新方法,用于自动决定哪些模型更新需要通过安全多方计算发送,哪些可以直接发送。与完全安全的多方计算协议相比,所提出的方法大大减少了参与者的计算和通信开销。与直接模型更新相比,该方法在从位置轨迹推断个人属性时,通过混淆应用服务器或恶意对手,增强了对从推断位置轨迹推断个人属性的保护。在流行的 Geolife GPS 轨迹数据集上进行的数值实验验证了我们提出的方法,它大大降低了参与者的计算和通信要求,同时通过减少推断出的参与者敏感和隐私位置的数量来提高隐私性。
{"title":"Computation and communication efficient approach for federated learning based urban sensing applications against inference attacks","authors":"Ayshika Kapoor,&nbsp;Dheeraj Kumar","doi":"10.1016/j.pmcj.2024.101875","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101875","url":null,"abstract":"<div><p><span><span>Federated learning based participatory sensing has gained much attention lately for the vital task of urban sensing due to privacy and security issues in conventional </span>machine learning<span><span><span>. However, inference attacks by the honest-but-curious application server or a </span>malicious adversary<span> can leak the personal attributes of the participants, such as their home and workplace locations, routines, and habits. Approaches proposed in the literature to prevent such information leakage, such as secure multi-party computation and </span></span>homomorphic encryption<span>, are infeasible for urban sensing applications owing to high communication and computation costs due to multiple rounds of communication between the user and the server. Moreover, for effective modeling of urban sensing phenomenon, the application model needs to be updated frequently — every few minutes or hours, resulting in periodic data-intensive updates by the participants, which severely strains the already limited resources of their mobile devices<span>. This paper proposes a novel low-cost privacy-preserving framework for enhanced protection against the inference of participants’ personal and private attributes from the data leaked through inference attacks. We propose a novel approach of </span></span></span></span><em>strategically</em><span> leaking selected location traces by providing computation and communication-light direct (local) model updates, whereas the rest of the model updates (when the user is at sensitive locations) are provided using secure multi-party computation. We propose two new methods based on spatiotemporal entropy and Kullback–Leibler divergence for automatically deciding which model updates need to be sent through secure multi-party computation and which can be sent directly. The proposed approach significantly reduces the computation and communication overhead for participants compared to the fully secure multi-party computation protocols. It provides enhanced protection against the deduction of personal attributes from inferred location traces compared to the direct model updates by confusing the application server or malicious adversary while inferring personal attributes from location traces. Numerical experiments on the popular Geolife GPS trajectories dataset validate our proposed approach by reducing the computation and communication requirements by the participants significantly and, at the same time, enhancing privacy by decreasing the number of inferred sensitive and private locations of participants.</span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139433384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensor-based agitation prediction in institutionalized people with dementia A systematic review 基于传感器的痴呆症住院患者躁动预测系统综述
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-07 DOI: 10.1016/j.pmcj.2024.101876
Jan Kleine Deters , Sarah Janus , Jair A. Lima Silva , Heinrich J. Wörtche , Sytse U. Zuidema

Early detection of agitation in individuals with dementia can lead to timely interventions, preventing the worsening of situations and enhancing their quality of life. The emergence of multi-modal sensing and advances in artificial intelligence make it feasible to explore and apply technology for this goal. We conducted a literature review to understand the current technical developments and challenges of its integration in caregiving institutions. Our systematic review used the Pubmed and IEEE scientific databases, considering studies from 2017 onwards. We included studies focusing on linking sensor data to vocal and/or physical manifestations of agitation. Out of 1622 identified studies, 12 were selected for the final review. Analysis was conducted on study design, technology, decisional data, and data analytics. We identified a gap in the standardized semantic representation of both behavioral descriptions and system event generation configurations. This research highlighted initiatives that leverage existing information in a caregiver's routine, such as correlating electronic health records with sensor data. As predictive systems become more integrated into caregiving routines, false positive reduction needs to be addressed as those will discourage their adoption. Therefore, to ensure adaptive predictive capacity and personalized system re-configuration, we suggest future work to evaluate a framework that incorporates a human-in-the-loop approach for detecting and predicting agitation.

及早发现痴呆症患者的躁动,可以及时采取干预措施,防止情况恶化,提高他们的生活质量。多模态传感技术的出现和人工智能的进步使得探索和应用技术来实现这一目标成为可能。我们进行了一次文献综述,以了解当前的技术发展及其在护理机构中的应用挑战。我们的系统性综述使用了 Pubmed 和 IEEE 科学数据库,考虑了 2017 年以来的研究。我们纳入的研究侧重于将传感器数据与躁动的声音和/或身体表现联系起来。在1622项已确定的研究中,有12项被选中进行最终审查。我们对研究设计、技术、决策数据和数据分析进行了分析。我们发现在行为描述和系统事件生成配置的标准化语义表述方面存在差距。这项研究强调了利用护理人员日常工作中现有信息的举措,例如将电子健康记录与传感器数据相关联。随着预测系统越来越多地集成到护理日常工作中,需要解决减少误报的问题,因为误报会阻碍系统的采用。因此,为了确保自适应预测能力和个性化系统重新配置,我们建议在未来的工作中评估一个框架,该框架将人在环中的方法纳入到躁动的检测和预测中。
{"title":"Sensor-based agitation prediction in institutionalized people with dementia A systematic review","authors":"Jan Kleine Deters ,&nbsp;Sarah Janus ,&nbsp;Jair A. Lima Silva ,&nbsp;Heinrich J. Wörtche ,&nbsp;Sytse U. Zuidema","doi":"10.1016/j.pmcj.2024.101876","DOIUrl":"10.1016/j.pmcj.2024.101876","url":null,"abstract":"<div><p>Early detection of agitation in individuals with dementia can lead to timely interventions, preventing the worsening of situations and enhancing their quality of life. The emergence of multi-modal sensing and advances in artificial intelligence make it feasible to explore and apply technology for this goal. We conducted a literature review to understand the current technical developments and challenges of its integration in caregiving institutions. Our systematic review used the Pubmed and IEEE scientific databases, considering studies from 2017 onwards. We included studies focusing on linking sensor data to vocal and/or physical manifestations of agitation. Out of 1622 identified studies, 12 were selected for the final review. Analysis was conducted on study design, technology, decisional data, and data analytics. We identified a gap in the standardized semantic representation of both behavioral descriptions and system event generation configurations. This research highlighted initiatives that leverage existing information in a caregiver's routine, such as correlating electronic health records with sensor data. As predictive systems become more integrated into caregiving routines, false positive reduction needs to be addressed as those will discourage their adoption. Therefore, to ensure adaptive predictive capacity and personalized system re-configuration, we suggest future work to evaluate a framework that incorporates a human-in-the-loop approach for detecting and predicting agitation.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000026/pdfft?md5=f6a8397ac6e02acc44ce653a7d1a2e87&pid=1-s2.0-S1574119224000026-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139456701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images 从智能手机图像中检测 mpox 的迁移学习和可解释解决方案
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-06 DOI: 10.1016/j.pmcj.2023.101874
Mattia Giovanni Campana , Marco Colussi , Franca Delmastro , Sergio Mascetti , Elena Pagani

Monkeypox (mpox) virus has become a “public health emergency of international concern” in the last few months, as declared by the World Health Organization, especially for low-income countries. A symptom of mpox infection is the appearance of rashes and skin eruptions, which can lead people to seek medical advice. A technology that might help perform a preliminary screening based on the aspect of skin lesions is the use of Machine Learning for image classification. However, to make this technology suitable on a large scale, it should be usable directly on people mobile devices, with a possible notification to a remote medical expert.

In this work, we investigate the adoption of Deep Learning to detect mpox from skin lesion images derived from smartphone cameras. The proposal leverages Transfer Learning to cope with the scarce availability of mpox image datasets. As a first step, a homogeneous, unpolluted, dataset was produced by manual selection and preprocessing of available image data, publicly released for research purposes. Subsequently, we compared multiple Convolutional Neural Networks (CNNs) using a rigorous 10-fold stratified cross-validation approach and we conducted an analysis to evaluate the models’ fairness towards different skin tones. The best models have been then optimized through quantization for use on mobile devices; measures of classification quality, memory footprint, and processing times validated the feasibility of our proposal. The most favorable outcomes have been achieved by MobileNetV3Large, attaining an F-1 score of 0.928 in the binary task and 0.879 in the multi-class task. Furthermore, the application of quantization led to a reduction in the model size to less than one-third, while simultaneously decreasing the inference time from 0.016 to 0.014 s, with only a marginal loss of 0.004 in F-1 score. Additionally, the use of eXplainable AI has been investigated as a suitable instrument to both technically and clinically validate classification outcomes.

近几个月来,猴痘病毒已成为世界卫生组织宣布的 "国际关注的突发公共卫生事件",尤其是在低收入国家。感染猴痘的症状之一是出现皮疹和皮肤糜烂,这可能导致人们寻求医疗建议。机器学习图像分类技术可能有助于根据皮损方面进行初步筛查。在这项工作中,我们研究了采用深度学习从智能手机摄像头获取的皮损图像中检测痘痘的方法。该提案利用迁移学习技术来应对痘痘图像数据集稀缺的问题。第一步,我们通过手动选择和预处理公开发布的用于研究目的的可用图像数据,制作了一个同质、未受污染的数据集。随后,我们使用严格的 10 倍分层交叉验证方法比较了多个卷积神经网络(CNN),并进行了分析,以评估模型对不同肤色的公平性。然后,我们对最佳模型进行了量化优化,以便在移动设备上使用;对分类质量、内存占用和处理时间的测量验证了我们建议的可行性。MobileNetV3Large 取得了最理想的结果,在二元任务中的 F-1 得分为 0.928,在多类任务中的 F-1 得分为 0.879。此外,量化技术的应用还将模型规模缩小到了三分之一以下,同时将推理时间从 0.016 秒缩短到了 0.014 秒,F-1 分数仅损失了 0.004 分。此外,还研究了使用可解释人工智能(eXplainable AI)作为技术和临床验证分类结果的合适工具。
{"title":"A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images","authors":"Mattia Giovanni Campana ,&nbsp;Marco Colussi ,&nbsp;Franca Delmastro ,&nbsp;Sergio Mascetti ,&nbsp;Elena Pagani","doi":"10.1016/j.pmcj.2023.101874","DOIUrl":"10.1016/j.pmcj.2023.101874","url":null,"abstract":"<div><p>Monkeypox (mpox) virus has become a “public health emergency of international concern” in the last few months, as declared by the World Health Organization, especially for low-income countries. A symptom of mpox infection is the appearance of rashes and skin eruptions, which can lead people to seek medical advice. A technology that might help perform a preliminary screening based on the aspect of skin lesions is the use of Machine Learning<span><span> for image classification. However, to make this technology suitable on a large scale, it should be usable directly on people </span>mobile devices, with a possible notification to a remote medical expert.</span></p><p><span>In this work, we investigate the adoption of Deep Learning<span> to detect mpox from skin lesion images derived from smartphone cameras. The proposal leverages Transfer Learning to cope with the scarce availability of mpox image datasets. As a first step, a homogeneous, unpolluted, dataset was produced by manual selection and preprocessing of available image data, publicly released for research purposes. Subsequently, we compared multiple </span></span>Convolutional Neural Networks<span> (CNNs) using a rigorous 10-fold stratified cross-validation approach and we conducted an analysis to evaluate the models’ fairness towards different skin tones. The best models have been then optimized through quantization for use on mobile devices; measures of classification quality, memory footprint<span>, and processing times validated the feasibility of our proposal. The most favorable outcomes have been achieved by MobileNetV3Large, attaining an F-1 score of 0.928 in the binary task and 0.879 in the multi-class task. Furthermore, the application of quantization led to a reduction in the model size to less than one-third, while simultaneously decreasing the inference time from 0.016 to 0.014 s, with only a marginal loss of 0.004 in F-1 score. Additionally, the use of eXplainable AI has been investigated as a suitable instrument to both technically and clinically validate classification outcomes.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139372790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based access control architecture for multi-domain environments 基于区块链的多域环境访问控制架构
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-06 DOI: 10.1016/j.pmcj.2024.101878
Zhiqiang Du , Yunliang Li , Yanfang Fu , Xianghan Zheng

Numerous users from diverse domains access information and perform various operations in multi-domain environments. These users have complex permissions that increase the risk of identity falsification, unauthorized access, and privacy breaches during cross-domain interactions. Consequently, implementing an access control architecture to prevent users from engaging in illicit activities is imperative. This paper proposes a novel blockchain-based access control architecture for multi-domain environments. By integrating the multi-domain environment within a federated chain, the architecture utilizes Decentralized Identifiers (DIDs) for user identification and relies on public/secret key pairs for operational execution. Verifiable credentials are used to authorize permissions and release resources, thereby ensuring authentication and preventing tampering and forgery. In addition, the architecture automates the authorization and access control processes through smart contracts, thereby eliminating human intervention. Finally, we performed a simulation evaluation of the architecture. The most time-consuming process had a runtime of 1074 ms, primarily attributed to interactions with the blockchain. Concurrent testing revealed that with a concurrency level of 2000 demonstrated that the response times for read and write operations were maintained within 1000 ms and 4600 ms, respectively. In terms of storage efficiency, except for user registration, which incurred two gas charges, all the other processes required only one charge.

在多领域环境中,来自不同领域的众多用户访问信息并执行各种操作。这些用户拥有复杂的权限,增加了跨域交互过程中身份伪造、未经授权访问和隐私泄露的风险。因此,实施访问控制架构以防止用户从事非法活动势在必行。本文为多域环境提出了一种基于区块链的新型访问控制架构。通过将多域环境整合到联盟链中,该架构利用去中心化标识符(DID)进行用户识别,并依靠公钥/秘钥对进行操作执行。可验证的凭证用于授权权限和释放资源,从而确保身份验证并防止篡改和伪造。此外,该架构还通过智能合约实现了授权和访问控制流程的自动化,从而消除了人工干预。最后,我们对该架构进行了模拟评估。最耗时的流程的运行时间为 1074 毫秒,主要归因于与区块链的交互。并发测试表明,在并发水平为 2000 的情况下,读取和写入操作的响应时间分别保持在 1000 毫秒和 4600 毫秒以内。在存储效率方面,除了用户注册会产生两次气体费用外,其他所有进程都只需要一次费用。
{"title":"Blockchain-based access control architecture for multi-domain environments","authors":"Zhiqiang Du ,&nbsp;Yunliang Li ,&nbsp;Yanfang Fu ,&nbsp;Xianghan Zheng","doi":"10.1016/j.pmcj.2024.101878","DOIUrl":"10.1016/j.pmcj.2024.101878","url":null,"abstract":"<div><p><span>Numerous users from diverse domains access information and perform various operations in multi-domain environments. These users have complex permissions that increase the risk of identity falsification, unauthorized access, and privacy breaches during cross-domain interactions. Consequently, implementing an access control architecture to prevent users from engaging in illicit activities is imperative. This paper proposes a novel blockchain-based access control architecture for multi-domain environments. By integrating the multi-domain environment within a federated chain, the architecture utilizes Decentralized Identifiers (DIDs) for user identification and relies on public/secret key pairs for operational execution. Verifiable credentials are used to authorize permissions and release resources, thereby ensuring </span>authentication<span> and preventing tampering and forgery. In addition, the architecture automates the authorization and access control processes through smart contracts<span>, thereby eliminating human intervention. Finally, we performed a simulation evaluation of the architecture. The most time-consuming process had a runtime of 1074 ms, primarily attributed to interactions with the blockchain. Concurrent testing revealed that with a concurrency level of 2000 demonstrated that the response times for read and write operations were maintained within 1000 ms and 4600 ms, respectively. In terms of storage efficiency, except for user registration, which incurred two gas charges, all the other processes required only one charge.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139372834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things 用于触觉式工业物联网的安全实用的端到端认证方案
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-06 DOI: 10.1016/j.pmcj.2024.101877
Yimin Guo , Yajun Guo , Ping Xiong , Fan Yang , Chengde Zhang

In the Industrial Internet of Things (IIoT), haptic control of machines or robots can be managed remotely. However, with the emergence of Tactile Industrial Internet of Things (TIIoT), the transmission of haptic data over public channels has raised security and privacy concerns. In such an environment, mutual authentication between haptic users and remotely controlled entities is crucial to prevent illegal control by adversaries. Therefore, we propose an end-to-end authentication scheme, SecTIIoT, to establish secure communication between haptic users and remote IoT devices. The scheme addresses security issues by using lightweight hash cryptographic primitives and employs a useful piggyback strategy to improve authentication efficiency. We demonstrate that SecTIIoT is resilient to various known attacks with formal security proofs and informal security analysis. Furthermore, our detailed performance analysis shows that SecTIIoT outperforms existing lightweight authentication schemes as it provides more security features while reducing computation and communication costs.

在工业物联网(IIoT)中,可以远程管理机器或机器人的触觉控制。然而,随着触觉工业物联网(TIIoT)的出现,通过公共通道传输触觉数据引发了安全和隐私问题。在这种环境下,触觉用户和远程控制实体之间的相互认证对于防止对手非法控制至关重要。因此,我们提出了一种端到端认证方案 SecTIIoT,以建立触觉用户与远程物联网设备之间的安全通信。该方案通过使用轻量级哈希加密原语来解决安全问题,并采用有用的捎带策略来提高认证效率。通过正式的安全证明和非正式的安全分析,我们证明了 SecTIIoT 能够抵御各种已知攻击。此外,我们详细的性能分析表明,SecTIIoT 优于现有的轻量级身份验证方案,因为它在降低计算和通信成本的同时提供了更多的安全功能。
{"title":"A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things","authors":"Yimin Guo ,&nbsp;Yajun Guo ,&nbsp;Ping Xiong ,&nbsp;Fan Yang ,&nbsp;Chengde Zhang","doi":"10.1016/j.pmcj.2024.101877","DOIUrl":"10.1016/j.pmcj.2024.101877","url":null,"abstract":"<div><p><span>In the Industrial Internet of Things (IIoT), </span>haptic<span><span><span> control of machines or robots can be managed remotely. However, with the emergence of Tactile Industrial Internet of Things (TIIoT), the transmission of haptic data over public channels has raised security and privacy concerns. In such an environment, mutual authentication between haptic users and remotely controlled entities is crucial to prevent illegal control by adversaries. Therefore, we propose an end-to-end </span>authentication scheme, SecTIIoT, to establish secure communication between haptic users and remote </span>IoT<span> devices. The scheme addresses security issues by using lightweight hash cryptographic primitives and employs a useful piggyback strategy to improve authentication efficiency. We demonstrate that SecTIIoT is resilient to various known attacks with formal security proofs and informal security analysis. Furthermore, our detailed performance analysis shows that SecTIIoT outperforms existing lightweight authentication schemes as it provides more security features while reducing computation and communication costs.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139372835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication SMARTCOPE:用于持续验证的智能手机所有权变更评估
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-01 DOI: 10.1016/j.pmcj.2023.101873
Nicholas Cariello , Seth Levine , Gang Zhou , Blair Hoplight , Paolo Gasti , Kiran S. Balagani

The goal of continuous smartphone authentication is to detect when the adversary has gained possession of the user’s device post-login. This is achieved by triggering re-authentication at fixed, frequent intervals. However, these intervals do not take into account external information that might indicate that the impostor has gained physical access to the user’s device. Continuous smartphone authentication typically relies on behavioral cues, such as hand movement and touchscreen swipes, that can be collected without interrupting the user’s activity. Because these behavioral signals are characterized by relatively high error rates compared to physiological biometrics, their use at fixed intervals leads to unnecessary interruptions to the user’s activity in case of a false reject, and to not recognizing the impostor in case of a false accept.

To address these issues, in this paper we introduce a novel framework called SMARTCOPE: Smartphone Change Of Possession Evaluation. In this work, SMARTCOPE leverages smartphone movement signals collected during user activity to determine when the smartphone is no longer in the hands of its owner. When this occurs, SMARTCOPE triggers re-authentication. By using these signals, we are able to reduce the total number of re-authentication points while simultaneously lowering re-authentication error rates. Our analysis shows that our technique can reduce equal error rates by over 40%, from 7.8% to 4.6% using movement and keystroke features. Further, we show that SMARTCOPE can be used to transform a static (login-time) authentication system, such as face recognition, to a continuous re-authentication system, with a significant increase in security and limited impact on usability.

持续智能手机身份验证的目标是在用户登录后,检测对手是否已获得用户设备的所有权。要做到这一点,就必须在固定、频繁的时间间隔内触发重新认证。然而,这些时间间隔并没有考虑到可能表明冒名顶替者已获得用户设备物理访问权的外部信息。连续的智能手机身份验证通常依赖于行为线索,如手部动作和触摸屏轻扫,这些线索可以在不中断用户活动的情况下收集。与生理生物识别技术相比,这些行为信号具有误差率相对较高的特点,因此在固定时间间隔内使用这些信号会导致在出现错误拒绝时不必要地中断用户活动,以及在出现错误接受时无法识别冒名顶替者:为了解决这些问题,我们在本文中提出了一个新颖的框架,称为 SMARTCOPE:智能手机占有权变更评估。在这项工作中,SMARTCOPE 利用在用户活动期间收集到的智能手机移动信号来确定智能手机何时不再在其所有者手中。当这种情况发生时,SMARTCOPE 会触发重新认证。通过使用这些信号,我们能够减少重新认证点的总数,同时降低重新认证错误率。我们的分析表明,利用移动和按键特征,我们的技术可以将相等的错误率降低 40% 以上,从 7.8% 降至 4.6%。此外,我们还表明,SMARTCOPE 可用于将静态(登录时)身份验证系统(如人脸识别)转换为连续的重新身份验证系统,从而显著提高安全性,并对可用性产生有限的影响。
{"title":"SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication","authors":"Nicholas Cariello ,&nbsp;Seth Levine ,&nbsp;Gang Zhou ,&nbsp;Blair Hoplight ,&nbsp;Paolo Gasti ,&nbsp;Kiran S. Balagani","doi":"10.1016/j.pmcj.2023.101873","DOIUrl":"10.1016/j.pmcj.2023.101873","url":null,"abstract":"<div><p><span><span>The goal of continuous smartphone authentication is to detect when the adversary has gained possession of the user’s device post-login. This is achieved by triggering re-authentication at fixed, frequent intervals. However, these intervals do not take into account external information that might indicate that the impostor has gained physical access to the user’s device. Continuous smartphone authentication typically relies on behavioral cues, such as hand movement and touchscreen swipes, that can be collected without interrupting the user’s activity. Because these behavioral signals are characterized by relatively high error rates compared to physiological </span>biometrics, their use at fixed intervals leads to unnecessary interruptions to the user’s activity in case of a false reject, </span><em>and</em> to not recognizing the impostor in case of a false accept.</p><p>To address these issues, in this paper we introduce a novel framework called SMARTCOPE: <em>Smartphone Change Of Possession Evaluation</em><span>. In this work, SMARTCOPE leverages smartphone movement signals collected during user activity to determine when the smartphone is no longer in the hands of its owner. When this occurs, SMARTCOPE triggers re-authentication. By using these signals, we are able to reduce the total number of re-authentication points while simultaneously lowering re-authentication error rates. Our analysis shows that our technique can reduce equal error rates<span> by over 40%, from 7.8% to 4.6% using movement and keystroke features. Further, we show that SMARTCOPE can be used to transform a static (login-time) authentication system, such as face recognition, to a continuous re-authentication system, with a significant increase in security and limited impact on usability.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139027832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Lightweight Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic Method 基于低功耗和有损网络的新型移动物联网轻量级路由协议--使用模糊逻辑方法
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-01 DOI: 10.1016/j.pmcj.2023.101872
Zahra Ghanbari , Nima Jafari Navimipour , Mehdi Hosseinzadeh , Hassan Shakeri , Aso Darwesh

The IoT devices with embedded mobile devices create the Internet of Mobile Things (IoMT) paradigm. Mobility is not supported by the routing protocol for low-power and lossy networks (RPL) created for static networks. IoMT has raised routing challenges such as link failure, instability, energy depletion, packet loss, and handover delay in the network. In this context, IoMT Fuzzy-based RPL (IoMT-FRPL) is proposed in this paper to enhance routing performance. Receiving Signal Strength Indicator (RSSI), Euclidean distance, Hop Count, and Expected Transmission Count (ETX) metrics are built into the fuzzy interface system for the mobile nodes in the network to conserve energy. The IoMT-FRPL consists of the following three key steps: The first steps are data transmission and motion investigation, the second is fuzzy-based prediction of a new static parent for the mobile node, and the third is verifying the unique attachment point. When conventional RPL, mRPL, and EMA-RPL were compared to IoMT-performance FRPL's in Cooja/Contiki 2.7, the simulation results revealed improvements in energy consumption, handover delay, packet delivery rate (PDR), and signaling cost.

带有嵌入式移动设备的物联网设备创造了移动物联网(IoMT)模式。为静态网络创建的低功耗和有损网络路由协议(RPL)不支持移动性。IoMT 带来了路由挑战,如网络中的链路故障、不稳定性、能量耗尽、数据包丢失和切换延迟。在这种情况下,本文提出了基于 IoMT Fuzzy 的 RPL(IoMT-FRPL),以提高路由性能。接收信号强度指示器(RSSI)、欧氏距离、跳数和预期传输数(ETX)指标被内置到网络中移动节点的模糊接口系统中,以节约能源。IoMT-FRPL 包括以下三个关键步骤:第一步是数据传输和运动调查,第二步是基于模糊预测移动节点的新静态父节点,第三步是验证唯一附着点。在 Cooja/Contiki 2.7 中,将传统的 RPL、mRPL 和 EMA-RPL 与 IoMT 性能 FRPL 进行比较,仿真结果表明在能耗、移交延迟、数据包交付率 (PDR) 和信令成本方面都有所改善。
{"title":"A New Lightweight Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic Method","authors":"Zahra Ghanbari ,&nbsp;Nima Jafari Navimipour ,&nbsp;Mehdi Hosseinzadeh ,&nbsp;Hassan Shakeri ,&nbsp;Aso Darwesh","doi":"10.1016/j.pmcj.2023.101872","DOIUrl":"10.1016/j.pmcj.2023.101872","url":null,"abstract":"<div><p><span><span>The IoT<span> devices with embedded mobile devices create the Internet of Mobile Things (IoMT) paradigm. Mobility is not supported by the routing protocol for low-power and lossy networks (RPL) created for static networks. IoMT has raised routing challenges such as link failure, instability, energy depletion, </span></span>packet loss<span>, and handover delay in the network. In this context, IoMT Fuzzy-based RPL (IoMT-FRPL) is proposed in this paper to enhance routing performance. Receiving Signal Strength Indicator (RSSI), </span></span>Euclidean distance<span>, Hop Count, and Expected Transmission Count (ETX) metrics are built into the fuzzy interface system for the mobile nodes in the network to conserve energy. The IoMT-FRPL consists of the following three key steps: The first steps are data transmission and motion investigation, the second is fuzzy-based prediction of a new static parent for the mobile node, and the third is verifying the unique attachment point. When conventional RPL, mRPL, and EMA-RPL were compared to IoMT-performance FRPL's in Cooja/Contiki 2.7, the simulation results revealed improvements in energy consumption, handover delay, packet delivery rate (PDR), and signaling cost.</span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139021172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pervasive and Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1