Pub Date : 2023-01-01DOI: 10.32604/csse.2023.038664
Thien-Phuc Doan, Ngoc-Tu Chau, Jungsoo Park, Souhwan Jung
{"title":"The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android","authors":"Thien-Phuc Doan, Ngoc-Tu Chau, Jungsoo Park, Souhwan Jung","doi":"10.32604/csse.2023.038664","DOIUrl":"https://doi.org/10.32604/csse.2023.038664","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"26 7 1","pages":"3059-3073"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77099096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.029220
Rachana Arya, B. K. Singh
{"title":"Ring Oscillator for 60 Meter Bandwidth","authors":"Rachana Arya, B. K. Singh","doi":"10.32604/csse.2023.029220","DOIUrl":"https://doi.org/10.32604/csse.2023.029220","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"22 1","pages":"93-105"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81574806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.029074
B. Murugeshwari, S. Rajalakshmi, K. Sudharson
Imagine numerous clients, each with personal data; individual inputs are severely corrupt, and a server only concerns the collective, statistically essential facets of this data. In several data mining methods, privacy has become highly critical. As a result, various privacy-preserving data analysis technologies have emerged. Hence, we use the randomization process to reconstruct composite data attributes accurately. Also, we use privacy measures to estimate how much deception is required to guarantee privacy. There are several viable privacy protections; however, determining which one is the best is still a work in progress. This paper discusses the difficulty of measuring privacy while also offering numerous random sampling procedures and statistical and categorized data results. Furthermore, this paper investigates the use of arbitrary nature with perturbations in privacy preservation. According to the research, arbitrary objects (most notably random matrices) have "predicted" frequency patterns. It shows how to recover crucial information from a sample damaged by a random number using an arbitrary lattice spectral selection strategy. This filtration system's conceptual framework posits, and extensive practical findings indicate that sparse data distortions preserve relatively modest privacy protection in various situations. As a result, the research framework is efficient and effective in maintaining data privacy and security.
{"title":"Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation","authors":"B. Murugeshwari, S. Rajalakshmi, K. Sudharson","doi":"10.32604/csse.2023.029074","DOIUrl":"https://doi.org/10.32604/csse.2023.029074","url":null,"abstract":"Imagine numerous clients, each with personal data; individual inputs are severely corrupt, and a server only concerns the collective, statistically essential facets of this data. In several data mining methods, privacy has become highly critical. As a result, various privacy-preserving data analysis technologies have emerged. Hence, we use the randomization process to reconstruct composite data attributes accurately. Also, we use privacy measures to estimate how much deception is required to guarantee privacy. There are several viable privacy protections; however, determining which one is the best is still a work in progress. This paper discusses the difficulty of measuring privacy while also offering numerous random sampling procedures and statistical and categorized data results. Furthermore, this paper investigates the use of arbitrary nature with perturbations in privacy preservation. According to the research, arbitrary objects (most notably random matrices) have \"predicted\" frequency patterns. It shows how to recover crucial information from a sample damaged by a random number using an arbitrary lattice spectral selection strategy. This filtration system's conceptual framework posits, and extensive practical findings indicate that sparse data distortions preserve relatively modest privacy protection in various situations. As a result, the research framework is efficient and effective in maintaining data privacy and security.","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"5 1","pages":"2293-2307"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82032322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.032316
Alla Abbas Khadir, S. Hosseini-Seno, B. F. Dhahir, R. Budiarto
{"title":"Efficient-Cost Task Offloading Scheme in Fog-Internet of Vehicle Networks","authors":"Alla Abbas Khadir, S. Hosseini-Seno, B. F. Dhahir, R. Budiarto","doi":"10.32604/csse.2023.032316","DOIUrl":"https://doi.org/10.32604/csse.2023.032316","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"65 1","pages":"2223-2234"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84148890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.036106
A. N. Ahmed, Jinhyung Kim, Yun-Seung Nam, M. Abouhawwash
{"title":"Improved Hybrid Swarm Intelligence for Optimizing the Energy in WSN","authors":"A. N. Ahmed, Jinhyung Kim, Yun-Seung Nam, M. Abouhawwash","doi":"10.32604/csse.2023.036106","DOIUrl":"https://doi.org/10.32604/csse.2023.036106","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"418 1","pages":"2527-2542"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78159577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.037706
S. Zahir, R. Khan, M. Ullah, Muhammad Ishaq, Naqqash Dilshad, Amin Ullah, Mi Young Lee
{"title":"Robust Counting in Overcrowded Scenes Using Batch-Free Normalized Deep ConvNet","authors":"S. Zahir, R. Khan, M. Ullah, Muhammad Ishaq, Naqqash Dilshad, Amin Ullah, Mi Young Lee","doi":"10.32604/csse.2023.037706","DOIUrl":"https://doi.org/10.32604/csse.2023.037706","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"24 1","pages":"2741-2754"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74013922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.029040
S. Lavanya, N. Saravanakumar
{"title":"Graph-Based Replication and Two Factor Authentication in Cloud Computing","authors":"S. Lavanya, N. Saravanakumar","doi":"10.32604/csse.2023.029040","DOIUrl":"https://doi.org/10.32604/csse.2023.029040","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"37 1","pages":"2869-2883"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74194615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.034849
Mohammad Yamin, Saleh Bajaba, Sarah B. Basahel, E. Lydia
{"title":"Biometric Verification System Using Hyperparameter Tuned Deep Learning Model","authors":"Mohammad Yamin, Saleh Bajaba, Sarah B. Basahel, E. Lydia","doi":"10.32604/csse.2023.034849","DOIUrl":"https://doi.org/10.32604/csse.2023.034849","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"57 1","pages":"321-336"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74694257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.036916
Y. John, G. Ravi
{"title":"Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation","authors":"Y. John, G. Ravi","doi":"10.32604/csse.2023.036916","DOIUrl":"https://doi.org/10.32604/csse.2023.036916","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"7 1","pages":"3653-3666"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74813967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.037067
Lingyun Xiang, Rong Wang, Yuhang Liu, Yangfan Liu, Lina Tan
{"title":"A General Linguistic Steganalysis Framework Using Multi-Task Learning","authors":"Lingyun Xiang, Rong Wang, Yuhang Liu, Yangfan Liu, Lina Tan","doi":"10.32604/csse.2023.037067","DOIUrl":"https://doi.org/10.32604/csse.2023.037067","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"114 1","pages":"2383-2399"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74912360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}