首页 > 最新文献

Computer Standards & Interfaces最新文献

英文 中文
An environment-aware Q-learning-based trust evaluation scheme in Underwater Acoustic Sensor Networks (UASNs) 基于环境感知q学习的水声传感器网络信任评估方案
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-10-22 DOI: 10.1016/j.csi.2025.104087
Parisa Khoshvaght , Musaed Alhussein , Khursheed Aurangzeb , Efat Yousefpoor , Jan Lansky , Mehdi Hosseinzadeh
Underwater acoustic sensor networks (UASNs) have diverse applications in military and civilian domains but are vulnerable to various security threats due to their broadcast nature and challenging underwater environment. Trust mechanisms have emerged as effective solutions to enhance security and reliability in UASNs. However, existing trust models often lack efficient trust update mechanisms that can manage inevitable dynamic fluctuations in the underwater environment and various potential attacks. In this paper, an environment-aware Q-learning-based trust evaluation (EAQTE) scheme is presented in UASNs. EAQTE incorporates environmental features such as communication channel quality and node stability into the trust computation. Communication quality is assessed based on the variance in successful packet transmission probability, while node stability is measured through movement similarity. Each node collects three types of trust evidence — energy-based, data-based, and communication-based — by interacting with neighboring nodes. Energy-based evidence includes residual energy, current energy change rate, and the similarity of energy change sequences to normal patterns. Data-based evidence evaluates the consistency of collected data, and communication-based evidence considers successful and unsuccessful interactions. EAQTE uses a Q-learning algorithm with three trust states (belief, disbelief, uncertainty) to dynamically adapt trust levels. Simulation results demonstrate that EAQTE improves detection accuracy by 7.01% compared to TUMRL, ARTMM, and TMC based on simulation time. However, under attack mode switching scenarios, EAQTE’s detection accuracy is approximately 2.86% lower than TUMRL. Additionally, EAQTE reduces the false alarm rate by 19.65% relative to TUMRL when node speed varies, and by 11.8% compared to TUMRL under different node densities. Furthermore, EAQTE achieves higher energy efficiency and improves it by 5.19% over TUMRL when the percentage of compromised nodes increases, and by approximately 5.66% across varying node densities. These results indicate that EAQTE effectively balances adaptability, accuracy, and energy consumption in challenging underwater environments.
水声传感器网络(uasn)在军事和民用领域有着广泛的应用,但由于其广播性质和具有挑战性的水下环境,容易受到各种安全威胁。信任机制已成为提高usns安全性和可靠性的有效解决方案。然而,现有的信任模型往往缺乏有效的信任更新机制来管理水下环境中不可避免的动态波动和各种潜在攻击。提出了一种基于环境感知q学习的usns信任评估(EAQTE)方案。EAQTE将通信信道质量、节点稳定性等环境特征纳入到信任计算中。通过分组成功传输概率的方差来评估通信质量,通过运动相似度来衡量节点的稳定性。每个节点通过与相邻节点的交互收集三种类型的信任证据——基于能量的、基于数据的和基于通信的。基于能量的证据包括剩余能量、当前能量变化率以及能量变化序列与正常模式的相似性。基于数据的证据评估收集数据的一致性,基于通信的证据考虑成功和不成功的交互。EAQTE使用具有三种信任状态(相信、不相信、不确定)的q -学习算法来动态适应信任水平。仿真结果表明,基于仿真时间,与TUMRL、ARTMM和TMC相比,EAQTE的检测精度提高了7.01%。但在攻击模式切换场景下,EAQTE的检测准确率比TUMRL低约2.86%。在节点速度变化时,EAQTE比TUMRL的虚警率降低了19.65%,在不同节点密度下,与TUMRL相比,EAQTE的虚警率降低了11.8%。此外,EAQTE实现了更高的能源效率,当受损节点的百分比增加时,它比TUMRL提高了5.19%,在不同节点密度下提高了约5.66%。这些结果表明,EAQTE在具有挑战性的水下环境中有效地平衡了适应性、准确性和能耗。
{"title":"An environment-aware Q-learning-based trust evaluation scheme in Underwater Acoustic Sensor Networks (UASNs)","authors":"Parisa Khoshvaght ,&nbsp;Musaed Alhussein ,&nbsp;Khursheed Aurangzeb ,&nbsp;Efat Yousefpoor ,&nbsp;Jan Lansky ,&nbsp;Mehdi Hosseinzadeh","doi":"10.1016/j.csi.2025.104087","DOIUrl":"10.1016/j.csi.2025.104087","url":null,"abstract":"<div><div>Underwater acoustic sensor networks (UASNs) have diverse applications in military and civilian domains but are vulnerable to various security threats due to their broadcast nature and challenging underwater environment. Trust mechanisms have emerged as effective solutions to enhance security and reliability in UASNs. However, existing trust models often lack efficient trust update mechanisms that can manage inevitable dynamic fluctuations in the underwater environment and various potential attacks. In this paper, an environment-aware Q-learning-based trust evaluation (EAQTE) scheme is presented in UASNs. EAQTE incorporates environmental features such as communication channel quality and node stability into the trust computation. Communication quality is assessed based on the variance in successful packet transmission probability, while node stability is measured through movement similarity. Each node collects three types of trust evidence — energy-based, data-based, and communication-based — by interacting with neighboring nodes. Energy-based evidence includes residual energy, current energy change rate, and the similarity of energy change sequences to normal patterns. Data-based evidence evaluates the consistency of collected data, and communication-based evidence considers successful and unsuccessful interactions. EAQTE uses a Q-learning algorithm with three trust states (belief, disbelief, uncertainty) to dynamically adapt trust levels. Simulation results demonstrate that EAQTE improves detection accuracy by 7.01% compared to TUMRL, ARTMM, and TMC based on simulation time. However, under attack mode switching scenarios, EAQTE’s detection accuracy is approximately 2.86% lower than TUMRL. Additionally, EAQTE reduces the false alarm rate by 19.65% relative to TUMRL when node speed varies, and by 11.8% compared to TUMRL under different node densities. Furthermore, EAQTE achieves higher energy efficiency and improves it by 5.19% over TUMRL when the percentage of compromised nodes increases, and by approximately 5.66% across varying node densities. These results indicate that EAQTE effectively balances adaptability, accuracy, and energy consumption in challenging underwater environments.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104087"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145415861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPRING: Sign-then-prove ring signatures from lattices with compactness, extensibility, and efficiency SPRING:在格上签名然后证明环签名,具有紧凑性、可扩展性和效率
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-10-22 DOI: 10.1016/j.csi.2025.104084
Ruiteng Zhang , Pingbin Luo , Qiong Huang
Traditional constructions of compact ring signatures often rely on cryptographic tools like accumulators and zero-knowledge proofs, which usually depend on specific proof systems. In this work, we propose a more flexible and efficient construction of ring signatures based on module lattices, following the sign-then-prove structure and we name it SPRING, which is derived from the extraction of core commonalities in SMILE (CRYPTO 2021). Our construction achieves two key advantages: first, it is no longer tied to any specific ZK proof system, and its modular architecture enhances both scalability and adaptability to diverse practical scenarios. For example, we explicitly demonstrate how to extend our base scheme to support accountable ring signatures—all without modifying the underlying core signature structure. Second, by combining these distilled core commonalities with optimized Gaussian sampling techniques, our construction achieves smaller signature sizes than prior works.
紧凑环签名的传统构造通常依赖于累加器和零知识证明等加密工具,这些工具通常依赖于特定的证明系统。在这项工作中,我们提出了一种基于模块格的更灵活、更有效的环签名构建,遵循先签名后证明的结构,我们将其命名为SPRING,它来源于SMILE (CRYPTO 2021)中核心共性的提取。我们的构建实现了两个关键优势:首先,它不再与任何特定的ZK证明系统相关联,其模块化架构增强了可扩展性和对各种实际场景的适应性。例如,我们显式地演示了如何扩展我们的基本方案以支持可靠环签名—所有这些都不修改底层核心签名结构。其次,通过将这些核心共性与优化的高斯采样技术相结合,我们的构建实现了比以前更小的签名大小。
{"title":"SPRING: Sign-then-prove ring signatures from lattices with compactness, extensibility, and efficiency","authors":"Ruiteng Zhang ,&nbsp;Pingbin Luo ,&nbsp;Qiong Huang","doi":"10.1016/j.csi.2025.104084","DOIUrl":"10.1016/j.csi.2025.104084","url":null,"abstract":"<div><div>Traditional constructions of compact ring signatures often rely on cryptographic tools like accumulators and zero-knowledge proofs, which usually depend on specific proof systems. In this work, we propose a more flexible and efficient construction of <u>ring</u> signatures based on module lattices, following the <em><u>s</u>ign-then-<u>p</u>rove</em> structure and we name it SPRING, which is derived from the extraction of core commonalities in SMILE (CRYPTO 2021). Our construction achieves two key advantages: first, it is no longer tied to any specific ZK proof system, and its modular architecture enhances both scalability and adaptability to diverse practical scenarios. For example, we explicitly demonstrate how to extend our base scheme to support accountable ring signatures—all without modifying the underlying core signature structure. Second, by combining these distilled core commonalities with optimized Gaussian sampling techniques, our construction achieves smaller signature sizes than prior works.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104084"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145415862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BERE: Ensuring immutability and transparency with blockchain in real estate appraisal industry 这里:用区块链保证房地产估价行业的不变性和透明度
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-11-12 DOI: 10.1016/j.csi.2025.104095
Muruvvet Kalkan , Murat Karakus
Real estate appraisal plays a pivotal role in various financial transactions and regulatory processes, necessitating the assurance of unalterable and transparent Real Estate Appraisal rePorts (REA_Ps). Authorized appraisal experts employ diverse methodologies to ascertain the market value of real estate properties, contributing to critical decisions in property transactions, loans, taxation, insurance, financial reporting, and lease calculations. The standardized format and jurisdiction-compliant methodologies used in official REA_Ps emphasize the need for their preservation in an unaltered state. Despite the importance of official REA_Ps, the potential for unauthorized alterations poses a significant challenge when stored in centralized databases. With its inherent tamper-proof nature, Blockchain (BC) technology emerges as an ideal solution to safeguard integrity of the REA_Ps. This study proposes a Blockchain-Enhanced Real Estate appraisal management framework, BERE, to ensure the immutability of REA_Ps and enhance appraisal process transparency. The proposed BERE framework fosters trust among stakeholders in the real estate appraisal sector. By securely storing REA_Ps authored by on-field appraisal experts on the BC, the method prevents unauthorized modifications and ensures the confidentiality of private data. Simulations employ a variety of measures, such as BC size, transaction verification time, CPU usage, and message overhead on transaction generation, to assess system performance. The results indicate that the BERE framework successfully maintains the accuracy and reliability of REA_Ps. To the best of our knowledge, this is the first comprehensive study showcasing a practical application of BC technology to demonstrate its ability to transform the appraisal process and inspire trust in the accuracy of REA_Ps.
房地产评估在各种金融交易和监管过程中发挥着关键作用,因此需要确保房地产评估报告(REA_Ps)的不可更改和透明。授权评估专家采用多种方法来确定房地产的市场价值,为房地产交易、贷款、税收、保险、财务报告和租赁计算的关键决策做出贡献。官方rea_p中使用的标准化格式和符合管辖权的方法强调需要将它们保持在不变的状态。尽管官方rea_p很重要,但是当存储在集中式数据库中时,未经授权的更改的可能性构成了重大挑战。由于其固有的防篡改特性,区块链(BC)技术成为保护rea_p完整性的理想解决方案。本研究提出了一个区块链增强的房地产评估管理框架,即here,以确保rea_p的不变性,并提高评估过程的透明度。提议的BERE框架促进了房地产评估部门利益相关者之间的信任。通过将现场评估专家撰写的rea_p安全地存储在BC上,该方法可以防止未经授权的修改,并确保私人数据的机密性。模拟使用各种度量,例如BC大小、事务验证时间、CPU使用情况和事务生成时的消息开销,来评估系统性能。结果表明,该框架成功地保持了REA_Ps的准确性和可靠性。据我们所知,这是第一个全面的研究,展示了BC技术的实际应用,展示了它改变评估过程的能力,并激发了对rea_p准确性的信任。
{"title":"BERE: Ensuring immutability and transparency with blockchain in real estate appraisal industry","authors":"Muruvvet Kalkan ,&nbsp;Murat Karakus","doi":"10.1016/j.csi.2025.104095","DOIUrl":"10.1016/j.csi.2025.104095","url":null,"abstract":"<div><div>Real estate appraisal plays a pivotal role in various financial transactions and regulatory processes, necessitating the assurance of unalterable and transparent Real Estate Appraisal rePorts (REA_Ps). Authorized appraisal experts employ diverse methodologies to ascertain the market value of real estate properties, contributing to critical decisions in property transactions, loans, taxation, insurance, financial reporting, and lease calculations. The standardized format and jurisdiction-compliant methodologies used in official REA_Ps emphasize the need for their preservation in an unaltered state. Despite the importance of official REA_Ps, the potential for unauthorized alterations poses a significant challenge when stored in centralized databases. With its inherent tamper-proof nature, Blockchain (BC) technology emerges as an ideal solution to safeguard integrity of the REA_Ps. This study proposes a Blockchain-Enhanced Real Estate appraisal management framework, <em>BERE</em>, to ensure the immutability of REA_Ps and enhance appraisal process transparency. The proposed <em>BERE</em> framework fosters trust among stakeholders in the real estate appraisal sector. By securely storing REA_Ps authored by on-field appraisal experts on the BC, the method prevents unauthorized modifications and ensures the confidentiality of private data. Simulations employ a variety of measures, such as BC size, transaction verification time, CPU usage, and message overhead on transaction generation, to assess system performance. The results indicate that the <em>BERE</em> framework successfully maintains the accuracy and reliability of REA_Ps. To the best of our knowledge, this is the first comprehensive study showcasing a practical application of BC technology to demonstrate its ability to transform the appraisal process and inspire trust in the accuracy of REA_Ps.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104095"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145578672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing decision-making in Industry 5.0 through adaptive human–machine interfaces: A systematic literature review 通过自适应人机界面增强工业5.0中的决策:系统的文献综述
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-11-13 DOI: 10.1016/j.csi.2025.104091
Salima Meftah , M’hammed Sahnoun , Mourad Messaadia , Sidi-Mohamed Benslimane
In the dynamic landscape of Industry 5.0, adaptive human–machine interface (HMI) plays a pivotal role in shaping decision-making processes. This study constitutes a systematic literature review focusing on adaptive HMI in Industry 5.0, exploring their applications and implications within the decision-making context. The research objectives are structured around key questions, addressing the manifestation of adaptive HMI in the context of Industry 5.0, the evolutionary trajectory of HMI across industrial revolutions, relevant studies on adaptive HMI, the discernible impact of contextual use on HMI adaptation, emerging challenges of the new generation of HMI within Industry 5.0, and the integration of advanced technologies in adaptive HMI. Our findings identify key factors shaping decision-making in adaptive HMI, including acceptance and trust, transparency and reliability, privacy and security, human-centric design, long-term usability effects, accessibility, and decision support capabilities. We also highlight the role of enabling technologies—such as the Internet of Things (IoT), Internet of Humans (IoH), Virtual and Augmented Reality (VR/AR), Artificial Intelligence (AI), the Internet of Everything (IoE), and their synergistic integration in advancing adaptive HMI capabilities. This research provides valuable insights for designing and developing the next generation of adaptive HMI, specifically aimed at enhancing decision-making operators’ productivity and improving the quality of their decisions in smart manufacturing environments within Industry 5.0.
在工业5.0的动态环境中,自适应人机界面(HMI)在塑造决策过程中起着关键作用。本研究对工业5.0中的自适应人机界面进行了系统的文献综述,探讨了它们在决策环境中的应用和影响。研究目标围绕以下关键问题展开:工业5.0背景下自适应HMI的表现、HMI在工业革命中的演变轨迹、适应性HMI的相关研究、情境使用对HMI适应的明显影响、工业5.0中新一代HMI面临的新挑战,以及先进技术在适应性HMI中的整合。我们的研究结果确定了影响自适应人机界面决策的关键因素,包括接受度和信任、透明度和可靠性、隐私和安全性、以人为本的设计、长期可用性影响、可访问性和决策支持能力。我们还强调了使能技术的作用,如物联网(IoT)、人联网(IoH)、虚拟和增强现实(VR/AR)、人工智能(AI)、万物互联(IoE),以及它们在推进自适应人机界面能力方面的协同整合。本研究为设计和开发下一代自适应人机界面提供了有价值的见解,特别是针对工业5.0智能制造环境中提高决策操作员的生产力和决策质量。
{"title":"Enhancing decision-making in Industry 5.0 through adaptive human–machine interfaces: A systematic literature review","authors":"Salima Meftah ,&nbsp;M’hammed Sahnoun ,&nbsp;Mourad Messaadia ,&nbsp;Sidi-Mohamed Benslimane","doi":"10.1016/j.csi.2025.104091","DOIUrl":"10.1016/j.csi.2025.104091","url":null,"abstract":"<div><div>In the dynamic landscape of Industry 5.0, adaptive human–machine interface (HMI) plays a pivotal role in shaping decision-making processes. This study constitutes a systematic literature review focusing on adaptive HMI in Industry 5.0, exploring their applications and implications within the decision-making context. The research objectives are structured around key questions, addressing the manifestation of adaptive HMI in the context of Industry 5.0, the evolutionary trajectory of HMI across industrial revolutions, relevant studies on adaptive HMI, the discernible impact of contextual use on HMI adaptation, emerging challenges of the new generation of HMI within Industry 5.0, and the integration of advanced technologies in adaptive HMI. Our findings identify key factors shaping decision-making in adaptive HMI, including acceptance and trust, transparency and reliability, privacy and security, human-centric design, long-term usability effects, accessibility, and decision support capabilities. We also highlight the role of enabling technologies—such as the Internet of Things (IoT), Internet of Humans (IoH), Virtual and Augmented Reality (VR/AR), Artificial Intelligence (AI), the Internet of Everything (IoE), and their synergistic integration in advancing adaptive HMI capabilities. This research provides valuable insights for designing and developing the next generation of adaptive HMI, specifically aimed at enhancing decision-making operators’ productivity and improving the quality of their decisions in smart manufacturing environments within Industry 5.0.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104091"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145578671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability techniques and architectures for blockchain-enabled internet of things: Current applications, systematic review, and future trends 支持区块链的物联网的可靠性技术和架构:当前应用,系统审查和未来趋势
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-09-02 DOI: 10.1016/j.csi.2025.104068
Xin Sun , Xinglong Yu , Qinlu Huang , Zhigang Wang , Jiahu Guo , Zhihao Huang , Fei Xie
The rapid proliferation of Internet of Things (IoT) devices across diverse sectors has amplified concerns regarding security, scalability, and trust, particularly due to the reliance on centralized architectures. Blockchain, with its decentralized structure and cryptographic foundations, has emerged as a potential enabler of secure, scalable, and accountable IoT ecosystems. Despite increasing interest, limited attention has been paid to the reliability and dependability mechanisms in blockchain-enabled IoT networks, especially in resource-constrained or developing regions. This study presents a systematic review of key publications, categorizing them into five principal groups: consensus mechanisms, fault-tolerant designs, data integrity techniques, multi-tier-based mechanisms, and lightweight blockchain-based mechanisms. By employing this taxonomy, the review investigates how different technical approaches ranging from advanced cryptography methods to symmetry-based architectural designs contribute to trust management, operational resilience, and data protection in IoT ecosystems. The findings suggest that although blockchain integration holds substantial potential for overcoming existing limitations in IoT infrastructures, it also presents new engineering and architectural challenges. Nevertheless, the diverse techniques identified in the literature demonstrate tangible progress in improving efficiency, reducing latency, and enhancing the overall reliability and security of decentralized IoT networks.
物联网(IoT)设备在不同领域的快速扩散加剧了对安全性、可扩展性和信任的担忧,特别是由于对集中式架构的依赖。区块链凭借其分散的结构和加密基础,已成为安全、可扩展和负责任的物联网生态系统的潜在推动者。尽管人们越来越感兴趣,但对支持区块链的物联网网络的可靠性和可靠性机制的关注有限,特别是在资源受限或发展中地区。本研究对关键出版物进行了系统回顾,将其分为五个主要类别:共识机制、容错设计、数据完整性技术、基于多层的机制和基于轻量级区块链的机制。通过采用这种分类法,本文研究了从先进的加密方法到基于对称的架构设计等不同的技术方法如何有助于物联网生态系统中的信任管理、操作弹性和数据保护。研究结果表明,尽管区块链集成具有克服物联网基础设施现有限制的巨大潜力,但它也提出了新的工程和架构挑战。然而,文献中确定的各种技术在提高效率、减少延迟和增强分散物联网网络的整体可靠性和安全性方面取得了切实进展。
{"title":"Reliability techniques and architectures for blockchain-enabled internet of things: Current applications, systematic review, and future trends","authors":"Xin Sun ,&nbsp;Xinglong Yu ,&nbsp;Qinlu Huang ,&nbsp;Zhigang Wang ,&nbsp;Jiahu Guo ,&nbsp;Zhihao Huang ,&nbsp;Fei Xie","doi":"10.1016/j.csi.2025.104068","DOIUrl":"10.1016/j.csi.2025.104068","url":null,"abstract":"<div><div>The rapid proliferation of Internet of Things (IoT) devices across diverse sectors has amplified concerns regarding security, scalability, and trust, particularly due to the reliance on centralized architectures. Blockchain, with its decentralized structure and cryptographic foundations, has emerged as a potential enabler of secure, scalable, and accountable IoT ecosystems. Despite increasing interest, limited attention has been paid to the reliability and dependability mechanisms in blockchain-enabled IoT networks, especially in resource-constrained or developing regions. This study presents a systematic review of key publications, categorizing them into five principal groups: consensus mechanisms, fault-tolerant designs, data integrity techniques, multi-tier-based mechanisms, and lightweight blockchain-based mechanisms. By employing this taxonomy, the review investigates how different technical approaches ranging from advanced cryptography methods to symmetry-based architectural designs contribute to trust management, operational resilience, and data protection in IoT ecosystems. The findings suggest that although blockchain integration holds substantial potential for overcoming existing limitations in IoT infrastructures, it also presents new engineering and architectural challenges. Nevertheless, the diverse techniques identified in the literature demonstrate tangible progress in improving efficiency, reducing latency, and enhancing the overall reliability and security of decentralized IoT networks.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104068"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From manual to automated systematic review: Key attributes influencing the duration of systematic reviews in software engineering 从手动到自动的系统评审:影响软件工程中系统评审持续时间的关键属性
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-09-12 DOI: 10.1016/j.csi.2025.104073
Diana Kalibatiene , Jolanta Miliauskaitė

Context

It is widely accepted that a systematic literature review (SLR) is an effective, comprehensive, repeatable, less biased, and transparent method for gathering and condensing knowledge from existing scientific publications. The SLR method facilitates the identification of gaps for new research opportunities, fostering decision-making based on evidence. At the same time, SLR is a time and effort-consuming task that is threatened by the increasing volume of publications. However, there is a lack of comprehension about which factors directly impact manually conducted SLR performance, limiting researchers to better plan and optimize their processes.

Objective

To enhance the understanding of the attributes that directly influence the SLR process in terms of time consumption.

Methods

We performed a tertiary study that (i) identified 138 secondary studies, (ii) mapped the possible influential attributes for SLR performance, (iii) extracted data from SLR reports and metadata, synthesized and analysed their influence, providing an overview of core trends related to those attributes over time.

Results

Our SLR mapped four main attributes influencing the performance time of the SLR process – number of authors, number of initially retrieved papers from databases, number of included papers for data synthesis, and usage of the snowballing techniques. We noticed a trend for smaller research groups (2–5 persons) using 4–6 different databases and processing to process a large number of studies, and an increasing adoption of the snowballing technique.

Conclusion

This paper reveals a bottleneck in manually conducted SLR, reinforcing the need for evolving automation. Mapping the attributes is only the first step to making the SLR process more measurable regarding its resource consumption. We contribute by providing recommendations to assist scientists and practitioners in planning their future SLRs and IT projects, including SLRs, particularly in the evolving landscape of digital transformation and innovations.
人们普遍认为,系统文献综述(SLR)是一种有效、全面、可重复、较少偏见和透明的方法,可以从现有的科学出版物中收集和浓缩知识。SLR方法有助于识别新的研究机会的差距,促进基于证据的决策。与此同时,单反是一项耗时费力的任务,受到越来越多的出版物的威胁。然而,对于哪些因素会直接影响手动单反相机的性能,人们缺乏理解,这限制了研究人员更好地规划和优化他们的过程。目的提高对直接影响单反过程的时间消耗属性的认识。方法我们进行了一项三级研究,其中(i)确定了138项二级研究,(ii)绘制了可能影响SLR性能的属性图,(iii)从SLR报告和元数据中提取数据,综合并分析了它们的影响,概述了与这些属性相关的核心趋势。结果我们的SLR映射了影响SLR过程性能时间的四个主要属性:作者数量、数据库初始检索论文数量、数据综合纳入论文数量和滚雪球技术的使用。我们注意到一个趋势,小型研究小组(2-5人)使用4-6个不同的数据库和处理方法来处理大量的研究,并且越来越多地采用滚雪球技术。本文揭示了人工单反的瓶颈,加强了自动化发展的必要性。映射属性只是使SLR过程在其资源消耗方面更加可测量的第一步。我们的贡献是为科学家和从业者提供建议,帮助他们规划未来的单反和IT项目,包括单反,特别是在不断发展的数字化转型和创新环境中。
{"title":"From manual to automated systematic review: Key attributes influencing the duration of systematic reviews in software engineering","authors":"Diana Kalibatiene ,&nbsp;Jolanta Miliauskaitė","doi":"10.1016/j.csi.2025.104073","DOIUrl":"10.1016/j.csi.2025.104073","url":null,"abstract":"<div><h3>Context</h3><div>It is widely accepted that a systematic literature review (SLR) is an effective, comprehensive, repeatable, less biased, and transparent method for gathering and condensing knowledge from existing scientific publications. The SLR method facilitates the identification of gaps for new research opportunities, fostering decision-making based on evidence. At the same time, SLR is a time and effort-consuming task that is threatened by the increasing volume of publications. However, there is a lack of comprehension about which factors directly impact manually conducted SLR performance, limiting researchers to better plan and optimize their processes.</div></div><div><h3>Objective</h3><div>To enhance the understanding of the attributes that directly influence the SLR process in terms of time consumption.</div></div><div><h3>Methods</h3><div>We performed a tertiary study that (i) identified 138 secondary studies, (ii) mapped the possible influential attributes for SLR performance, (iii) extracted data from SLR reports and metadata, synthesized and analysed their influence, providing an overview of core trends related to those attributes over time.</div></div><div><h3>Results</h3><div>Our SLR mapped four main attributes influencing the performance time of the SLR process – number of authors, number of initially retrieved papers from databases, number of included papers for data synthesis, and usage of the snowballing techniques. We noticed a trend for smaller research groups (2–5 persons) using 4–6 different databases and processing to process a large number of studies, and an increasing adoption of the snowballing technique.</div></div><div><h3>Conclusion</h3><div>This paper reveals a bottleneck in manually conducted SLR, reinforcing the need for evolving automation. Mapping the attributes is only the first step to making the SLR process more measurable regarding its resource consumption. We contribute by providing recommendations to assist scientists and practitioners in planning their future SLRs and IT projects, including SLRs, particularly in the evolving landscape of digital transformation and innovations.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104073"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning-based automated segmentation of brain tumors using synthetic MR images generated with DCGAN 使用DCGAN生成的合成MR图像,基于深度学习的脑肿瘤自动分割
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-08-08 DOI: 10.1016/j.csi.2025.104054
Ercüment Güvenç , Mevlüt Ersoy , Gürcan Çetin
Early detection of a brain tumor significantly increases the likelihood that treatment will begin in a timely manner. Because it is difficult to detect tumor tissue with visual inspection, the magnetic resonance (MR) imaging method was developed. The analysis of MR images largely dependent on the radiologist's experience and visual interpretation. The primary reason for this is that brain tumors can vary in form and size. Deep learning (DL)-based techniques have accelerated medical image segmentation research thanks to their self-learning capabilities. When large amounts of training data are presented, these methods can achieve high success rates. ImageNet, CIFAR10/100, PASCAL VOC, MS COCO, and BRaTS benchmark datasets are extensively used for brain tumor segmentation. However, the limited amount of data in these datasets restricts the performance of DL models. The outstanding performance of Generative Adversarial Networks (GAN) in the field of medical image generation has attracted the interest of academics in recent years. In the study, we present a deep learning model that creates synthetic brain MR images using a Deep Convolutional GAN (DCGAN). The BRaTS2018 dataset's FLAIR sequence training data has been utilized as input. After a certain number of epochs, the learning model generated realistic and high-quality brain MR images. The FID score was used to evaluate the performance of the GAN model. Tumor regions on the generated MR images have been segmented automatically using the K-means algorithm and produced a high-dimensional dataset of 782 images. The study examined to what extent synthetic MR images enhanced the tumor region segmentation performance of the UNet, ResUNet, ResNet50, VGG16, and VGG19 models. According to the findings of the study, the ResNet50 model outperformed the other DL models. In terms of model performance, accuracy improved from 98.99% to 99.26%, the dice coefficient score moved from 57.33% to 81.32%, and the IoU increased from 40.89% to 66.86%.
脑肿瘤的早期发现大大增加了及时开始治疗的可能性。由于肉眼很难检测到肿瘤组织,因此发展了磁共振成像方法。MR图像的分析很大程度上依赖于放射科医生的经验和视觉解释。造成这种情况的主要原因是脑肿瘤的形式和大小各不相同。基于深度学习(DL)技术的自学习能力加速了医学图像分割研究。当训练数据量较大时,这些方法可以获得较高的成功率。ImageNet、CIFAR10/100、PASCAL VOC、MS COCO、BRaTS等基准数据集被广泛用于脑肿瘤分割。然而,这些数据集中有限的数据量限制了深度学习模型的性能。近年来,生成对抗网络(GAN)在医学图像生成领域的突出表现引起了学术界的关注。在这项研究中,我们提出了一个使用深度卷积GAN (DCGAN)创建合成脑磁共振图像的深度学习模型。使用BRaTS2018数据集的FLAIR序列训练数据作为输入。经过一定次数的epoch后,学习模型生成了逼真的高质量脑MR图像。FID评分用于评估GAN模型的性能。利用K-means算法对生成的MR图像上的肿瘤区域进行自动分割,生成782张图像的高维数据集。研究考察了合成MR图像在多大程度上增强了UNet、ResUNet、ResNet50、VGG16和VGG19模型的肿瘤区域分割性能。根据研究结果,ResNet50模型优于其他DL模型。在模型性能方面,准确率从98.99%提高到99.26%,骰子系数得分从57.33%提高到81.32%,IoU从40.89%提高到66.86%。
{"title":"Deep learning-based automated segmentation of brain tumors using synthetic MR images generated with DCGAN","authors":"Ercüment Güvenç ,&nbsp;Mevlüt Ersoy ,&nbsp;Gürcan Çetin","doi":"10.1016/j.csi.2025.104054","DOIUrl":"10.1016/j.csi.2025.104054","url":null,"abstract":"<div><div>Early detection of a brain tumor significantly increases the likelihood that treatment will begin in a timely manner. Because it is difficult to detect tumor tissue with visual inspection, the magnetic resonance (MR) imaging method was developed. The analysis of MR images largely dependent on the radiologist's experience and visual interpretation. The primary reason for this is that brain tumors can vary in form and size. Deep learning (DL)-based techniques have accelerated medical image segmentation research thanks to their self-learning capabilities. When large amounts of training data are presented, these methods can achieve high success rates. ImageNet, CIFAR10/100, PASCAL VOC, MS COCO, and BRaTS benchmark datasets are extensively used for brain tumor segmentation. However, the limited amount of data in these datasets restricts the performance of DL models. The outstanding performance of Generative Adversarial Networks (GAN) in the field of medical image generation has attracted the interest of academics in recent years. In the study, we present a deep learning model that creates synthetic brain MR images using a Deep Convolutional GAN (DCGAN). The BRaTS2018 dataset's FLAIR sequence training data has been utilized as input. After a certain number of epochs, the learning model generated realistic and high-quality brain MR images. The FID score was used to evaluate the performance of the GAN model. Tumor regions on the generated MR images have been segmented automatically using the K-means algorithm and produced a high-dimensional dataset of 782 images. The study examined to what extent synthetic MR images enhanced the tumor region segmentation performance of the UNet, ResUNet, ResNet50, VGG16, and VGG19 models. According to the findings of the study, the ResNet50 model outperformed the other DL models. In terms of model performance, accuracy improved from 98.99% to 99.26%, the dice coefficient score moved from 57.33% to 81.32%, and the IoU increased from 40.89% to 66.86%.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104054"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144902953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest editorial: Special issue on “human factors in cyber security” 嘉宾社论:“网络安全中的人为因素”特刊
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-10-02 DOI: 10.1016/j.csi.2025.104080
Sabarathinam Chockalingam , Ricardo Colomo-Palacios , Eunkyoung Jee , Nathan Lau
{"title":"Guest editorial: Special issue on “human factors in cyber security”","authors":"Sabarathinam Chockalingam ,&nbsp;Ricardo Colomo-Palacios ,&nbsp;Eunkyoung Jee ,&nbsp;Nathan Lau","doi":"10.1016/j.csi.2025.104080","DOIUrl":"10.1016/j.csi.2025.104080","url":null,"abstract":"","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104080"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145623565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing security, privacy, and usability in social robots: A software development framework 增强社交机器人的安全性、隐私性和可用性:一个软件开发框架
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-08-16 DOI: 10.1016/j.csi.2025.104052
Samson O. Oruma , Mary Sánchez-Gordón , Vasileios Gkioulos
The field of social robotics is witnessing a transformative shift in public interaction and service provision with the advent of Social Robots in Public Spaces (SRPS). However, this progress brings forth significant software security challenges. Developers and stakeholders struggle with designing secure SRPS software without specific standards and frameworks. Existing Secure Software Development Life Cycles fall short in addressing the intricate security needs of SRPS, often prioritizing functionality over security. Integrating various technologies within SRPS and the dynamic nature of public spaces compounds the challenge of ensuring security and user acceptance. To bridge this gap, this study proposes SecuRoPS, a framework designed specifically to address the unique security, safety, and usability requirements of SRPS throughout the software development lifecycle by emphasizing stakeholder engagement, regulatory compliance, and continuous iterative improvements. Built on a robust technology transfer model, the framework is validated through expert interviews, real-world use cases, and laboratory testing, ensuring practical applicability and adaptability to evolving threats. This iterative framework aims to guide various stakeholders, including software developers, organizations, researchers, and end-users, fostering wider acceptance and facilitating the safe integration of social robots into everyday life.
随着公共空间社交机器人(SRPS)的出现,社交机器人领域正在见证公共互动和服务提供的变革转变。然而,这一进展也带来了重大的软件安全挑战。在没有特定标准和框架的情况下,开发人员和涉众努力设计安全的SRPS软件。现有的安全软件开发生命周期在处理SRPS复杂的安全需求方面存在不足,通常优先考虑功能而不是安全性。在SRPS和公共空间的动态特性中集成各种技术,使确保安全性和用户接受度的挑战复杂化。为了弥合这一差距,本研究提出了SecuRoPS,这是一个专门设计的框架,通过强调涉众参与、法规遵从性和持续迭代改进,来解决SRPS在整个软件开发生命周期中独特的安全性、安全性和可用性需求。该框架建立在健壮的技术转移模型之上,通过专家访谈、真实用例和实验室测试进行验证,确保了对不断变化的威胁的实际适用性和适应性。这个迭代框架旨在指导各种利益相关者,包括软件开发人员、组织、研究人员和最终用户,促进更广泛的接受并促进社交机器人安全集成到日常生活中。
{"title":"Enhancing security, privacy, and usability in social robots: A software development framework","authors":"Samson O. Oruma ,&nbsp;Mary Sánchez-Gordón ,&nbsp;Vasileios Gkioulos","doi":"10.1016/j.csi.2025.104052","DOIUrl":"10.1016/j.csi.2025.104052","url":null,"abstract":"<div><div>The field of social robotics is witnessing a transformative shift in public interaction and service provision with the advent of Social Robots in Public Spaces (SRPS). However, this progress brings forth significant software security challenges. Developers and stakeholders struggle with designing secure SRPS software without specific standards and frameworks. Existing Secure Software Development Life Cycles fall short in addressing the intricate security needs of SRPS, often prioritizing functionality over security. Integrating various technologies within SRPS and the dynamic nature of public spaces compounds the challenge of ensuring security and user acceptance. To bridge this gap, this study proposes SecuRoPS, a framework designed specifically to address the unique security, safety, and usability requirements of SRPS throughout the software development lifecycle by emphasizing stakeholder engagement, regulatory compliance, and continuous iterative improvements. Built on a robust technology transfer model, the framework is validated through expert interviews, real-world use cases, and laboratory testing, ensuring practical applicability and adaptability to evolving threats. This iterative framework aims to guide various stakeholders, including software developers, organizations, researchers, and end-users, fostering wider acceptance and facilitating the safe integration of social robots into everyday life.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104052"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144886894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence in web accessibility: A systematic mapping study web可访问性中的人工智能:一个系统的映射研究
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-08-29 DOI: 10.1016/j.csi.2025.104055
Milton Campoverde-Molina , Sergio Luján-Mora
The popularization and new renaissance of artificial intelligence (AI) have inspired the creation of new applications that help developers improve website accessibility that benefits users with and without disabilities. Therefore, this research presents a systematic mapping study (SMS) because AI in web accessibility has been gaining more interest nowadays with the exposure of works that require an SMS to systematize and consolidate the literature. Through a literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA), 53 studies from ACM Digital Library, IEEE Xplore, Scopus, and Web of Science were identified for inclusion in this review. The main results of this SMS are APIs with AI, web applications and plugins with AI, image and voice recognition with AI, limitations and challenges of AI in web accessibility, correction and testing of web accessibility with AI, automatic correction of web accessibility with AI, web navigation with conversational agents with AI, web and mobile application accessibility with AI, good practices in web accessibility for AI, accessibility of web forms and elements with AI. According to the results, in the studies, alternative texts were created for the images of the websites, AI helped generate accessible HTML code using well-defined prompts, AI tools must comply with Web Content Accessibility Guidelines (WCAG), machine learning was the most used approach, the most used language models were large language models (LLM) and accessibility barrier correction using ChatGPT. The primary contribution of this SMS lies in its analysis of the current state of AI research related to web accessibility and the identification of trends and gaps in this research area. This SMS is intended for researchers, programmers, and software development companies that may use language models, AI tools, or emerging technologies in web accessibility to mitigate website accessibility barriers.
人工智能(AI)的普及和新复兴激发了新的应用程序的创建,这些应用程序帮助开发人员提高网站的可访问性,使残疾和非残疾用户受益。因此,本研究提出了一个系统的地图研究(SMS),因为人工智能在网页可访问性方面已经获得了越来越多的兴趣,现在需要一个SMS来系统化和巩固文献。通过使用系统评价和荟萃分析首选报告项目(PRISMA)进行文献综述,从ACM数字图书馆、IEEE Xplore、Scopus和Web of Science中确定了53项研究纳入本综述。该SMS的主要成果是带有AI的api、带有AI的web应用程序和插件、带有AI的图像和语音识别、AI在web可访问性方面的限制和挑战、带有AI的web可访问性的校正和测试、带有AI的web可访问性的自动校正、带有AI的会话代理的web导航、带有AI的web和移动应用程序可访问性、用于AI的web可访问性的良好实践、带有AI的web表单和元素的可访问性。根据研究结果,在研究中,为网站的图像创建了替代文本,人工智能使用定义良好的提示帮助生成可访问的HTML代码,人工智能工具必须遵守Web内容可访问性指南(WCAG),机器学习是最常用的方法,最常用的语言模型是大型语言模型(LLM)和使用ChatGPT的可访问性障碍校正。本SMS的主要贡献在于分析了与网络可访问性相关的人工智能研究的现状,并确定了该研究领域的趋势和差距。本短信适用于研究人员、程序员和软件开发公司,他们可能会使用语言模型、人工智能工具或网络可访问性中的新兴技术来减轻网站可访问性障碍。
{"title":"Artificial intelligence in web accessibility: A systematic mapping study","authors":"Milton Campoverde-Molina ,&nbsp;Sergio Luján-Mora","doi":"10.1016/j.csi.2025.104055","DOIUrl":"10.1016/j.csi.2025.104055","url":null,"abstract":"<div><div>The popularization and new renaissance of artificial intelligence (AI) have inspired the creation of new applications that help developers improve website accessibility that benefits users with and without disabilities. Therefore, this research presents a systematic mapping study (SMS) because AI in web accessibility has been gaining more interest nowadays with the exposure of works that require an SMS to systematize and consolidate the literature. Through a literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA), 53 studies from ACM Digital Library, IEEE Xplore, Scopus, and Web of Science were identified for inclusion in this review. The main results of this SMS are APIs with AI, web applications and plugins with AI, image and voice recognition with AI, limitations and challenges of AI in web accessibility, correction and testing of web accessibility with AI, automatic correction of web accessibility with AI, web navigation with conversational agents with AI, web and mobile application accessibility with AI, good practices in web accessibility for AI, accessibility of web forms and elements with AI. According to the results, in the studies, alternative texts were created for the images of the websites, AI helped generate accessible HTML code using well-defined prompts, AI tools must comply with Web Content Accessibility Guidelines (WCAG), machine learning was the most used approach, the most used language models were large language models (LLM) and accessibility barrier correction using ChatGPT. The primary contribution of this SMS lies in its analysis of the current state of AI research related to web accessibility and the identification of trends and gaps in this research area. This SMS is intended for researchers, programmers, and software development companies that may use language models, AI tools, or emerging technologies in web accessibility to mitigate website accessibility barriers.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104055"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144933212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Standards & Interfaces
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1