首页 > 最新文献

Computer Standards & Interfaces最新文献

英文 中文
Consensus algorithms based on collusion resistant publicly verifiable random number seeds 基于抗串通、可公开验证的随机数种子的共识算法
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-12 DOI: 10.1016/j.csi.2024.103853
Ping Wang , Longhuai Cao , Yong Hu , Zhiwei Sun

Publicly verifiable random number seeds are widely used in distributed systems and applications, especially in consensus algorithms. The purpose was to distribute the tasks and benefits among the participants fairly. A secure and efficient consensus algorithm is the foundation and guarantee of blockchain. We have been working on more concise, fair, and secure blockchain consensus algorithms. In this paper, we propose a new, more concise, efficient, and publicly verifiable random number seed generation scheme based on the existing secret sharing scheme and one-way function. We combined it with two blockchain consensus algorithms to improve the security and efficiency of the original scheme.

可公开验证的随机数种子广泛应用于分布式系统和应用中,特别是共识算法中。其目的是在参与者之间公平分配任务和利益。安全高效的共识算法是区块链的基础和保障。我们一直致力于研究更简洁、公平、安全的区块链共识算法。在本文中,我们基于现有的秘密共享方案和单向函数,提出了一种新的、更简洁、高效、可公开验证的随机数种子生成方案。我们将其与两种区块链共识算法相结合,提高了原方案的安全性和效率。
{"title":"Consensus algorithms based on collusion resistant publicly verifiable random number seeds","authors":"Ping Wang ,&nbsp;Longhuai Cao ,&nbsp;Yong Hu ,&nbsp;Zhiwei Sun","doi":"10.1016/j.csi.2024.103853","DOIUrl":"10.1016/j.csi.2024.103853","url":null,"abstract":"<div><p>Publicly verifiable random number seeds are widely used in distributed systems and applications, especially in consensus algorithms. The purpose was to distribute the tasks and benefits among the participants fairly. A secure and efficient consensus algorithm is the foundation and guarantee of blockchain. We have been working on more concise, fair, and secure blockchain consensus algorithms. In this paper, we propose a new, more concise, efficient, and publicly verifiable random number seed generation scheme based on the existing secret sharing scheme and one-way function. We combined it with two blockchain consensus algorithms to improve the security and efficiency of the original scheme.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103853"},"PeriodicalIF":5.0,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140127120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-type requirements traceability prediction by code data augmentation and fine-tuning MS-CodeBERT 通过代码数据增强和微调进行多类型需求可追溯性预测 MS-CodeBERT
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-04 DOI: 10.1016/j.csi.2024.103850
Ali Majidzadeh, Mehrdad Ashtiani, Morteza Zakeri-Nasrabadi

Requirement traceability is a crucial quality factor that highly impacts the software evolution process and maintenance costs. Automated traceability links recovery techniques are required for a reliable and low-cost software development life cycle. Pre-trained language models have shown promising results on many natural language tasks. However, using such pre-trained models for requirement traceability needs large and quality traceability datasets and accurate fine-tuning mechanisms. This paper proposes code augmentation and fine-tuning techniques to prepare the MS-CodeBERT pre-trained language model for various types of requirements traceability prediction including documentation-to-method, issue-to-commit, and issue-to-method links. Three program transformation operations, namely, Rename Variable, Swap Operands, and Swap Statements are designed to generate new quality samples increasing the sample diversity of the traceability datasets. A 2-stage and 3-stage fine-tuning mechanism is proposed to fine-tune the language model for the three types of requirement traceability prediction on provided datasets. Experiments on 14 Java projects demonstrate a 6.2% to 8.5% improvement in the precision, 2.5% to 5.2% improvement in the recall, and 3.8% to 7.3% improvement in the F1 score of the traceability prediction models compared to the best results from the state-of-the-art methods.

需求可追溯性是一个重要的质量因素,对软件开发过程和维护成本有很大影响。要实现可靠、低成本的软件开发生命周期,就必须采用自动追溯链接恢复技术。在许多自然语言任务中,预训练语言模型都显示出良好的效果。然而,将这种预训练模型用于需求可追溯性需要大量高质量的可追溯性数据集和精确的微调机制。本文提出了代码增强和微调技术,以准备 MS-CodeBERT 预训练语言模型,用于各种类型的需求可追溯性预测,包括文档到方法、问题到承诺和问题到方法链接。设计了三种程序转换操作,即重命名变量、交换操作数和交换语句,以生成新的高质量样本,增加可追溯性数据集的样本多样性。此外,还提出了一种两阶段和三阶段微调机制,用于在所提供的数据集上针对三种类型的需求可追溯性预测对语言模型进行微调。14 个 Java 项目的实验表明,与最先进方法的最佳结果相比,可追溯性预测模型的精确度提高了 6.2% 至 8.5%,召回率提高了 2.5% 至 5.2%,F1 分数提高了 3.8% 至 7.3%。
{"title":"Multi-type requirements traceability prediction by code data augmentation and fine-tuning MS-CodeBERT","authors":"Ali Majidzadeh,&nbsp;Mehrdad Ashtiani,&nbsp;Morteza Zakeri-Nasrabadi","doi":"10.1016/j.csi.2024.103850","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103850","url":null,"abstract":"<div><p>Requirement traceability is a crucial quality factor that highly impacts the software evolution process and maintenance costs. Automated traceability links recovery techniques are required for a reliable and low-cost software development life cycle. Pre-trained language models have shown promising results on many natural language tasks. However, using such pre-trained models for requirement traceability needs large and quality traceability datasets and accurate fine-tuning mechanisms. This paper proposes code augmentation and fine-tuning techniques to prepare the MS-CodeBERT pre-trained language model for various types of requirements traceability prediction including documentation-to-method, issue-to-commit, and issue-to-method links. Three program transformation operations, namely, Rename Variable, Swap Operands, and Swap Statements are designed to generate new quality samples increasing the sample diversity of the traceability datasets. A 2-stage and 3-stage fine-tuning mechanism is proposed to fine-tune the language model for the three types of requirement traceability prediction on provided datasets. Experiments on 14 Java projects demonstrate a 6.2% to 8.5% improvement in the precision, 2.5% to 5.2% improvement in the recall, and 3.8% to 7.3% improvement in the F1 score of the traceability prediction models compared to the best results from the state-of-the-art methods.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103850"},"PeriodicalIF":5.0,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140030669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is mouse dynamics information credible for user behavior research? An empirical investigation 用户行为研究中的鼠标动态信息可信吗?实证调查
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-04 DOI: 10.1016/j.csi.2024.103849
Eduard Kuric , Peter Demcak , Matus Krajcovic , Peter Nemcek

Mouse dynamics, information on user’s interaction with a computer mouse, are in vogue in machine learning for purposes such as recommendations, personalization, prediction of user characteristics and behavioral biometrics. We point out a blind spot in current works involving mouse dynamics that originates in underestimating the gravity of the characteristics of the mouse device and configuration on the data that mouse dynamics are inferred from. In a controlled study with N=32 participants, across three kinds of mouse interaction activities, we collect data for mouse dynamics utilizing a variety of mouse parameter configurations. We show that mouse dynamics commonly used in studies can be significantly altered by differences in mouse parameters. Out of 108 evaluated mouse dynamics metrics, 95 and 84 are affected between two conducted studies. A machine learning model’s performance can be warped by the mouse parameters being used. We demonstrate on a prediction task that mouse parameters cannot be approached uniformly and without consideration. We discuss methodological implications — how mouse dynamics studies should account for the diversity of mouse-related conditions.

鼠标动态是用户与电脑鼠标交互的信息,在机器学习中非常流行,用于推荐、个性化、预测用户特征和行为生物识别等目的。我们指出了目前涉及鼠标动态的研究中存在的一个盲点,即低估了鼠标设备和配置特征对鼠标动态推断数据的影响。在一项有 32 名参与者参加的对照研究中,我们通过三种鼠标交互活动,收集了使用各种鼠标参数配置的鼠标动态数据。我们的研究表明,研究中常用的小鼠动态会因小鼠参数的不同而发生显著变化。在 108 个受评估的鼠标动态指标中,分别有 95 和 84 个指标在两项研究中受到影响。机器学习模型的性能也会受到所用小鼠参数的影响。我们在一项预测任务中证明,小鼠参数不能一概而论,也不能不加考虑。我们讨论了方法论的意义--小鼠动力学研究应如何考虑与小鼠相关的条件的多样性。
{"title":"Is mouse dynamics information credible for user behavior research? An empirical investigation","authors":"Eduard Kuric ,&nbsp;Peter Demcak ,&nbsp;Matus Krajcovic ,&nbsp;Peter Nemcek","doi":"10.1016/j.csi.2024.103849","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103849","url":null,"abstract":"<div><p>Mouse dynamics, information on user’s interaction with a computer mouse, are in vogue in machine learning for purposes such as recommendations, personalization, prediction of user characteristics and behavioral biometrics. We point out a blind spot in current works involving mouse dynamics that originates in underestimating the gravity of the characteristics of the mouse device and configuration on the data that mouse dynamics are inferred from. In a controlled study with <span><math><mrow><mi>N</mi><mo>=</mo><mn>32</mn></mrow></math></span> participants, across three kinds of mouse interaction activities, we collect data for mouse dynamics utilizing a variety of mouse parameter configurations. We show that mouse dynamics commonly used in studies can be significantly altered by differences in mouse parameters. Out of 108 evaluated mouse dynamics metrics, 95 and 84 are affected between two conducted studies. A machine learning model’s performance can be warped by the mouse parameters being used. We demonstrate on a prediction task that mouse parameters cannot be approached uniformly and without consideration. We discuss methodological implications — how mouse dynamics studies should account for the diversity of mouse-related conditions.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103849"},"PeriodicalIF":5.0,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000187/pdfft?md5=22261c4aa60a750f67561046e5e7ba1b&pid=1-s2.0-S0920548924000187-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140041900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revocable certificateless Provable Data Possession with identity privacy in cloud storage 云存储中具有身份隐私的可撤销无证书可证明数据拥有权
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-02-28 DOI: 10.1016/j.csi.2024.103848
Kai Zhang , Zirui Guo , Liangliang Wang , Lei Zhang , Lifei Wei

Provable Data Possession (PDP) has gained widespread adoption for ensuring the integrity of data in remote cloud storage, where a data owner can delegate a third party auditor (TPA) to perform data auditing. To eliminate key escrow problem or complicated certificate management in classic solutions, numerous certificateless PDP schemes have been proposed while they failed to achieve efficient user revocation and protect user identity privacy. Therefore, we propose ReCIP, a revocable certificateless PDP scheme with identity privacy, where a TPA can perform public data integrity batch verification for a user while learning no useful knowledge about user identity privacy. Technically, we introduce a new user revocation strategy that directly revokes users’ secret keys, with no correlation to the number of data blocks in place for revocation time cost. To further boost the efficiency of ReCIP, we employ a semi-generic online–offline strategy to obtain an online–offline ReCIP (ReCIPoo) to reduce the time cost of tag generation. Moreover, we conduct a formal security proof of ReCIP, where the security is reduced to simple computational Diffie–Hellman problem and discrete logistic problem. Compared to state-of-the-art solutions, our ReCIPoo achieves comparable computation and communication cost while still achieving user revocation and protecting user identity privacy.

可证明数据拥有权(PDP)已被广泛采用,用于确保远程云存储中数据的完整性,数据拥有者可委托第三方审计员(TPA)执行数据审计。为了消除传统解决方案中的密钥托管问题或复杂的证书管理,人们提出了许多无证书 PDP 方案,但这些方案无法实现高效的用户撤销和保护用户身份隐私。因此,我们提出了具有身份隐私的可撤销无证书 PDP 方案 ReCIP,在该方案中,TPA 可以为用户执行公开数据完整性批量验证,同时不会了解用户身份隐私的有用知识。在技术上,我们引入了一种新的用户撤销策略,直接撤销用户的秘钥,撤销时间成本与到位数据块的数量无关。为了进一步提高 ReCIP 的效率,我们采用了一种半通用的在线-离线策略,得到了一种在线-离线 ReCIP(ReCIPoo),以降低标签生成的时间成本。此外,我们还对 ReCIP 进行了正式的安全性证明,将安全性简化为简单的计算 Diffie-Hellman 问题和离散逻辑问题。与最先进的解决方案相比,我们的 ReCIPoo 在实现用户撤销和保护用户身份隐私的同时,实现了相当的计算和通信成本。
{"title":"Revocable certificateless Provable Data Possession with identity privacy in cloud storage","authors":"Kai Zhang ,&nbsp;Zirui Guo ,&nbsp;Liangliang Wang ,&nbsp;Lei Zhang ,&nbsp;Lifei Wei","doi":"10.1016/j.csi.2024.103848","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103848","url":null,"abstract":"<div><p>Provable Data Possession (PDP) has gained widespread adoption for ensuring the integrity of data in remote cloud storage, where a data owner can delegate a third party auditor (TPA) to perform data auditing. To eliminate key escrow problem or complicated certificate management in classic solutions, numerous certificateless PDP schemes have been proposed while they failed to achieve efficient user revocation and protect user identity privacy. Therefore, we propose ReCIP, a revocable certificateless PDP scheme with identity privacy, where a TPA can perform public data integrity batch verification for a user while learning no useful knowledge about user identity privacy. Technically, we introduce a new user revocation strategy that directly revokes users’ secret keys, with no correlation to the number of data blocks in place for revocation time cost. To further boost the efficiency of ReCIP, we employ a semi-generic online–offline strategy to obtain an online–offline ReCIP (ReCIPoo) to reduce the time cost of tag generation. Moreover, we conduct a formal security proof of ReCIP, where the security is reduced to simple computational Diffie–Hellman problem and discrete logistic problem. Compared to state-of-the-art solutions, our ReCIPoo achieves comparable computation and communication cost while still achieving user revocation and protecting user identity privacy.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103848"},"PeriodicalIF":5.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139992786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid collaborative filtering using matrix factorization and XGBoost for movie recommendation 利用矩阵因式分解和 XGBoost 混合协同过滤技术推荐电影
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-02-22 DOI: 10.1016/j.csi.2024.103847
Gopal Behera , Sanjaya Kumar Panda , Meng-Yen Hsieh , Kuan-Ching Li

Nowadays, e-commerce platforms, such as Amazon, Flipkart, Netflix and YouTube, extensively use recommender systems (RS) techniques. Collaborative filtering (CF) is used widely among all RS techniques. A CF analyzes the user’s preference from past data, like ratings, and then suggests actual items to the intended user. The existing techniques compute the similarity between users/items and predict the ratings. However, most of them indicate the user’s preference for the items using a single technique, which may produce poor results. This paper proposes a hybrid CF technique to enhance the movie recommendation (HCFMR). The HCFMR consists of two modules. The first module finds the prediction score with the help of matrix factorization (MF) and passes the prediction score as input to the prediction algorithm, i.e., extreme gradient boosting (XGBoost). The second module generates handcrafted features, such as similar users and movies, along with the user, item and global average. Finally, these features are supplied to the XGBoost to predict the rating score of the movie and recommend the topmost movie to the user. We conduct various simulations on real-world datasets to verify the effectiveness of the proposed technique against the baseline techniques. The exploratory outcomes signify that the HCFMR technique outperforms the baselines and provides a better prediction on the benchmark datasets.

如今,亚马逊、Flipkart、Netflix 和 YouTube 等电子商务平台广泛使用推荐系统(RS)技术。在所有推荐系统技术中,协作过滤(CF)被广泛使用。协同过滤从过去的数据(如评分)中分析用户的偏好,然后向目标用户推荐实际项目。现有技术会计算用户/项目之间的相似度,并预测评分。然而,它们大多使用单一技术来显示用户对项目的偏好,这可能会产生较差的结果。本文提出了一种增强电影推荐效果的混合 CF 技术(HCFMR)。HCFMR 由两个模块组成。第一个模块借助矩阵因式分解(MF)找到预测得分,并将预测得分作为预测算法(即极梯度提升算法(XGBoost))的输入。第二个模块生成手工制作的特征,如相似用户和电影,以及用户、项目和全局平均值。最后,这些特征被提供给 XGBoost,以预测电影的评分得分,并向用户推荐评分最高的电影。我们在真实世界的数据集上进行了各种模拟,以验证所提技术与基准技术相比的有效性。探索结果表明,在基准数据集上,HCFMR 技术的性能优于基准技术,并能提供更好的预测。
{"title":"Hybrid collaborative filtering using matrix factorization and XGBoost for movie recommendation","authors":"Gopal Behera ,&nbsp;Sanjaya Kumar Panda ,&nbsp;Meng-Yen Hsieh ,&nbsp;Kuan-Ching Li","doi":"10.1016/j.csi.2024.103847","DOIUrl":"10.1016/j.csi.2024.103847","url":null,"abstract":"<div><p>Nowadays, e-commerce platforms, such as Amazon, Flipkart, Netflix and YouTube, extensively use recommender systems (RS) techniques. Collaborative filtering (CF) is used widely among all RS techniques. A CF analyzes the user’s preference from past data, like ratings, and then suggests actual items to the intended user. The existing techniques compute the similarity between users/items and predict the ratings. However, most of them indicate the user’s preference for the items using a single technique, which may produce poor results. This paper proposes a hybrid CF technique to enhance the movie recommendation (HCFMR). The HCFMR consists of two modules. The first module finds the prediction score with the help of matrix factorization (MF) and passes the prediction score as input to the prediction algorithm, i.e., extreme gradient boosting (XGBoost). The second module generates handcrafted features, such as similar users and movies, along with the user, item and global average. Finally, these features are supplied to the XGBoost to predict the rating score of the movie and recommend the topmost movie to the user. We conduct various simulations on real-world datasets to verify the effectiveness of the proposed technique against the baseline techniques. The exploratory outcomes signify that the HCFMR technique outperforms the baselines and provides a better prediction on the benchmark datasets.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103847"},"PeriodicalIF":5.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of DDoS attacks in SDN-based VANET using optimized TabNet 使用优化的 TabNet 检测基于 SDN 的 VANET 中的 DDoS 攻击
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-02-18 DOI: 10.1016/j.csi.2024.103845
Mohamed Ali Setitra, Mingyu Fan

Vehicular Ad Hoc Network (VANET) serves as a crucial component in developing the Intelligent Transport System (ITS), which provides a range of services expected to increase road safety and improve the global driving experience. At the same time, Software Defined Network (SDN) is a promising solution for VANET communication security due to the risk related to the dynamic nature of the vehicular network. However, the centralized structure of SDN-based VANET exposes vulnerabilities to Distributed Denial of Service (DDoS) attacks, which can significantly impact the network’s performance. This work presents a deep learning technique for identifying DDoS attacks in SDN-based VANET, commonly called TabNet, a cutting-edge deep learning model for tabular data that generally surpasses traditional machine learning models regarding crucial performance metrics. The model underwent hyperparameter tuning and employed Adam optimization to enhance its performance. Comparative evaluations against other machine learning algorithms demonstrated the proposed model’s robustness, achieving an overall accuracy of 99.42%. Our suggested method presents a potential solution for detecting DDoS attacks in SDN-based VANET, outperforming conventional techniques in terms of accuracy and efficiency.

车载 Ad Hoc 网络(VANET)是开发智能交通系统(ITS)的重要组成部分,该系统提供的一系列服务有望提高道路安全性并改善全球驾驶体验。与此同时,由于车载网络的动态性所带来的风险,软件定义网络(SDN)成为 VANET 通信安全的一个前景广阔的解决方案。然而,基于 SDN 的 VANET 的集中式结构容易受到分布式拒绝服务(DDoS)攻击,从而严重影响网络性能。本研究提出了一种在基于 SDN 的 VANET 中识别 DDoS 攻击的深度学习技术,通常称为 TabNet,它是一种针对表格数据的前沿深度学习模型,在关键性能指标方面普遍超越了传统的机器学习模型。该模型经过了超参数调整,并采用了亚当优化来提高性能。与其他机器学习算法的对比评估证明了所提出模型的鲁棒性,其总体准确率达到了 99.42%。我们提出的方法为在基于 SDN 的 VANET 中检测 DDoS 攻击提供了一种潜在的解决方案,在准确性和效率方面优于传统技术。
{"title":"Detection of DDoS attacks in SDN-based VANET using optimized TabNet","authors":"Mohamed Ali Setitra,&nbsp;Mingyu Fan","doi":"10.1016/j.csi.2024.103845","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103845","url":null,"abstract":"<div><p>Vehicular Ad Hoc Network (VANET) serves as a crucial component in developing the Intelligent Transport System (ITS), which provides a range of services expected to increase road safety and improve the global driving experience. At the same time, Software Defined Network (SDN) is a promising solution for VANET communication security due to the risk related to the dynamic nature of the vehicular network. However, the centralized structure of SDN-based VANET exposes vulnerabilities to Distributed Denial of Service (DDoS) attacks, which can significantly impact the network’s performance. This work presents a deep learning technique for identifying DDoS attacks in SDN-based VANET, commonly called TabNet, a cutting-edge deep learning model for tabular data that generally surpasses traditional machine learning models regarding crucial performance metrics. The model underwent hyperparameter tuning and employed Adam optimization to enhance its performance. Comparative evaluations against other machine learning algorithms demonstrated the proposed model’s robustness, achieving an overall accuracy of 99.42%. Our suggested method presents a potential solution for detecting DDoS attacks in SDN-based VANET, outperforming conventional techniques in terms of accuracy and efficiency.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103845"},"PeriodicalIF":5.0,"publicationDate":"2024-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139907908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elliptic code-based oblivious polynomial evaluation 基于椭圆码的遗忘多项式评估
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-02-17 DOI: 10.1016/j.csi.2024.103846
Yang Yang, Peidong Guan, Haibo Tian, Fangguo Zhang

Oblivious polynomial evaluation (OPE) constitutes a crucial element in various two-party computation protocols, including private set intersection, data mining, and oblivious keyword search. Consequently, the development of an efficient OPE protocol is of paramount significance. Leveraging the homomorphic properties of encryption algorithms offers an effective avenue for constructing such a protocol. In this paper, we propose an elliptic code-based symmetric homomorphic encryption scheme that incorporates concepts introduced by Armknecht et al. We also provide parameter selection tailored to various security levels. This encryption scheme accommodates arbitrary additions and a finite number of multiplication operations. Expanding on our encryption scheme, we introduce three practical and straightforward OPE protocols that are fully compatible with our encryption framework. We complement these protocols with a comprehensive security analysis. Our protocols not only achieve a high level of security but also exhibit efficiency, requiring only two message transmissions for the entire OPE process. Furthermore, our protocols can concurrently compute function values at multiple evaluation points, whether for distinct functions or the same function.

遗忘多项式求值(OPE)是私集相交、数据挖掘和遗忘关键字搜索等各种双方计算协议的关键要素。因此,开发高效的 OPE 协议至关重要。利用加密算法的同态特性为构建此类协议提供了有效途径。在本文中,我们提出了一种基于椭圆密码的对称同态加密方案,该方案融合了 Armknecht 等人提出的概念。该加密算法可进行任意加法运算和有限次数的乘法运算。在加密方案的基础上,我们引入了三个实用、简单的 OPE 协议,它们与我们的加密框架完全兼容。我们对这些协议进行了全面的安全性分析。我们的协议不仅实现了高水平的安全性,还表现出了高效性,整个 OPE 过程只需要两次信息传输。此外,我们的协议可以在多个评估点同时计算函数值,无论是不同函数还是同一函数。
{"title":"Elliptic code-based oblivious polynomial evaluation","authors":"Yang Yang,&nbsp;Peidong Guan,&nbsp;Haibo Tian,&nbsp;Fangguo Zhang","doi":"10.1016/j.csi.2024.103846","DOIUrl":"10.1016/j.csi.2024.103846","url":null,"abstract":"<div><p>Oblivious polynomial evaluation (OPE) constitutes a crucial element in various two-party computation protocols, including private set intersection, data mining, and oblivious keyword search. Consequently, the development of an efficient OPE protocol is of paramount significance. Leveraging the homomorphic properties of encryption algorithms offers an effective avenue for constructing such a protocol. In this paper, we propose an elliptic code-based symmetric homomorphic encryption scheme that incorporates concepts introduced by Armknecht et al. We also provide parameter selection tailored to various security levels. This encryption scheme accommodates arbitrary additions and a finite number of multiplication operations. Expanding on our encryption scheme, we introduce three practical and straightforward OPE protocols that are fully compatible with our encryption framework. We complement these protocols with a comprehensive security analysis. Our protocols not only achieve a high level of security but also exhibit efficiency, requiring only two message transmissions for the entire OPE process. Furthermore, our protocols can concurrently compute function values at multiple evaluation points, whether for distinct functions or the same function.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103846"},"PeriodicalIF":5.0,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139928101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning 安全高效的无人机网络防御策略:区块链与深度学习的融合
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-02-13 DOI: 10.1016/j.csi.2024.103844
Zhihao Li , Qi Chen , Jin Li , Jiahui Huang , Weichuan Mo , Duncan S. Wong , Hai Jiang

Unmanned Aerial Vehicles (UAVs) are highly versatile and efficient tools utilized across diverse industries for data collection. However, they are vulnerable to wireless communication and data exchange risks, including unauthorized access, data theft, and network attacks. To address these problems, we introduce a secure and reliable UAV network service architecture that incorporates blockchain and deep learning to provide more secure and efficient network services for UAVs. We propose a UAV cluster identity management module by combining blockchain, encryption algorithms, and digital signatures to enhance the security of UAV communication data transmission. Then, based on machine learning, deep learning, and malicious process detection technology, we propose a real-time secure situational awareness system for UAV cluster terminal devices to enhance the security of the operating environment for UAVs. Finally, we propose a data-trustworthy interconnection platform based on blockchain, smart contracts, and consensus algorithms to realize secure and efficient sharing and transmission of terminal data. The results of the experiments demonstrate the feasibility and effectiveness of our UAV network service architecture.

无人飞行器(UAV)是各行各业用于数据收集的多功能高效工具。然而,它们容易受到无线通信和数据交换风险的影响,包括未经授权的访问、数据盗窃和网络攻击。为解决这些问题,我们引入了一种安全可靠的无人机网络服务架构,该架构结合了区块链和深度学习技术,可为无人机提供更安全、更高效的网络服务。我们结合区块链、加密算法和数字签名,提出了无人机集群身份管理模块,以增强无人机通信数据传输的安全性。然后,基于机器学习、深度学习和恶意进程检测技术,提出无人机集群终端设备实时安全态势感知系统,提升无人机运行环境的安全性。最后,我们提出了基于区块链、智能合约和共识算法的数据可信互联平台,实现终端数据的安全高效共享和传输。实验结果证明了我们的无人机网络服务架构的可行性和有效性。
{"title":"A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning","authors":"Zhihao Li ,&nbsp;Qi Chen ,&nbsp;Jin Li ,&nbsp;Jiahui Huang ,&nbsp;Weichuan Mo ,&nbsp;Duncan S. Wong ,&nbsp;Hai Jiang","doi":"10.1016/j.csi.2024.103844","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103844","url":null,"abstract":"<div><p>Unmanned Aerial Vehicles (UAVs) are highly versatile and efficient tools utilized across diverse industries for data collection. However, they are vulnerable to wireless communication and data exchange risks, including unauthorized access, data theft, and network attacks. To address these problems, we introduce a secure and reliable UAV network service architecture that incorporates blockchain and deep learning to provide more secure and efficient network services for UAVs. We propose a UAV cluster identity management module by combining blockchain, encryption algorithms, and digital signatures to enhance the security of UAV communication data transmission. Then, based on machine learning, deep learning, and malicious process detection technology, we propose a real-time secure situational awareness system for UAV cluster terminal devices to enhance the security of the operating environment for UAVs. Finally, we propose a data-trustworthy interconnection platform based on blockchain, smart contracts, and consensus algorithms to realize secure and efficient sharing and transmission of terminal data. The results of the experiments demonstrate the feasibility and effectiveness of our UAV network service architecture.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103844"},"PeriodicalIF":5.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139743938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE HT2REP:基于 HTLC 和 TRE 的 UC 框架下的公平跨链原子交换协议
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-20 DOI: 10.1016/j.csi.2024.103834
Tao Li , Peiyao Niu , Yilei Wang , Shengke Zeng , Xiaoying Wang , Willy Susilo

Cross-chain transactions between heterogeneous blockchain systems pose various challenges, encompassing atomicity, security, and fairness of the transactions. While Traditional Hash Time Lock Contracts (HTLCs) can achieve atomic cross-chain transactions, they exhibit fairness deficiencies in two aspects: firstly, the transaction initiator benefits from an American Option (AO) advantage, and secondly, the transaction responder may be incentivized to launch a Draining Attack (DA), both of which impact the fairness of cross-chain transactions. Because of significant fluctuations in the exchange rate of tokens held by both parties, cross-chain transactions often face timeout rollbacks, resulting in a diminished probability of successful transactions. To tackle these issues, we propose a novel atomic cross-chain exchange protocol—HT2REP. This protocol integrates Time Released Encryption (TRE), ShangMi 3 Hash function (SM3), and scalable smart contract technologies to enhance fairness within the traditional HTLCs protocol. Additionally, HT2REP ensures atomicity, security, and a heightened probability of success for cross-chain exchanges. Finally, we demonstrate that HT2REP is Universally Composable (UC) secure.

异构区块链系统之间的跨链交易面临着各种挑战,包括交易的原子性、安全性和公平性。传统的哈希时间锁定合约(HTLC)虽然可以实现原子跨链交易,但在公平性方面却存在两方面的缺陷:首先,交易发起方会从美式期权(AO)优势中获益;其次,交易响应方可能会被激励发起耗尽攻击(DA),这两方面都会影响跨链交易的公平性。由于交易双方持有的代币汇率波动较大,跨链交易经常面临超时回滚,导致交易成功的概率降低。为了解决这些问题,我们提出了一种新型原子跨链交换协议--HT2REP。该协议集成了时间释放加密(TRE)、ShangMi 3 哈希函数(SM3)和可扩展智能合约技术,以提高传统 HTLCs 协议的公平性。此外,HT2REP 还确保了跨链交换的原子性、安全性和更高的成功概率。最后,我们证明了 HT2REP 的通用可组合(UC)安全性。
{"title":"HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE","authors":"Tao Li ,&nbsp;Peiyao Niu ,&nbsp;Yilei Wang ,&nbsp;Shengke Zeng ,&nbsp;Xiaoying Wang ,&nbsp;Willy Susilo","doi":"10.1016/j.csi.2024.103834","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103834","url":null,"abstract":"<div><p><span>Cross-chain transactions between heterogeneous blockchain<span> systems pose various challenges, encompassing atomicity, security, and fairness of the transactions. While Traditional Hash Time Lock Contracts (HTLCs) can achieve atomic cross-chain transactions, they exhibit fairness deficiencies in two aspects: firstly, the transaction initiator benefits from an American Option (AO) advantage, and secondly, the transaction responder may be incentivized to launch a Draining Attack (DA), both of which impact the fairness of cross-chain transactions. Because of significant fluctuations in the exchange rate of tokens held by both parties, cross-chain transactions often face timeout rollbacks, resulting in a diminished probability of successful transactions. To tackle these issues, we propose a novel atomic cross-chain exchange protocol—</span></span><span><math><mrow><mi>H</mi><msup><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msup><mi>R</mi><mi>E</mi><mi>P</mi></mrow></math></span><span><span>. This protocol integrates Time Released Encryption (TRE), ShangMi 3 Hash function (SM3), and scalable </span>smart contract technologies to enhance fairness within the traditional HTLCs protocol. Additionally, </span><span><math><mrow><mi>H</mi><msup><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msup><mi>R</mi><mi>E</mi><mi>P</mi></mrow></math></span> ensures atomicity, security, and a heightened probability of success for cross-chain exchanges. Finally, we demonstrate that <span><math><mrow><mi>H</mi><msup><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msup><mi>R</mi><mi>E</mi><mi>P</mi></mrow></math></span> is Universally Composable (UC) secure.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"89 ","pages":"Article 103834"},"PeriodicalIF":5.0,"publicationDate":"2024-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139549994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patient-centric medical service matching with fine-grained access control and dynamic user management 以患者为中心的医疗服务匹配与细粒度访问控制和动态用户管理
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-19 DOI: 10.1016/j.csi.2024.103833
Shu Wu , Aiqing Zhang , Ya Gao , Xiaojuan Xie

Personal health records (PHR) offer significant benefit for patients, such as reducing medical cost and improving the quality of medical care. Majority of the current schemes lack provisions for tracking and revoking malicious doctors. The explicit access policies are prone to leaking patient private information. What is more, owning to the uneven distribution of medical supplies, shocking computational overhead during decryption is a burden that cannot be ignored for busy medical workers. This paper proposed a patient-centric medical service matching scheme that supports policy hiding, attribute matching, fine-grained access control, and user dynamic management. The scheme uses ciphertext policy-based attribute encryption (CP-ABE) to achieve fine-grained access control and supports policy hiding. It utilizes white-box tracking technology and binary tree structure to achieve malicious doctor tracking. Revocation information is ciphertext to achieve dynamic management of doctors. From the experimental results, it can be concluded that our protocol achieves both patient-centric security and performance advantages.

个人健康记录(PHR)为患者带来了巨大的好处,如降低医疗成本和提高医疗质量。目前的大多数方案都缺乏跟踪和撤销恶意医生的规定。明确的访问政策容易泄露病人的私人信息。更重要的是,由于医疗用品分布不均,解密过程中的计算开销对繁忙的医务工作者来说是一个不可忽视的负担。本文提出了一种以患者为中心的医疗服务匹配方案,支持策略隐藏、属性匹配、细粒度访问控制和用户动态管理。该方案使用基于密文策略的属性加密(CP-ABE)来实现细粒度访问控制,并支持策略隐藏。它利用白盒跟踪技术和二叉树结构实现恶意医生跟踪。撤销信息为密码文本,实现对医生的动态管理。从实验结果可以得出结论,我们的协议实现了以患者为中心的安全性和性能优势。
{"title":"Patient-centric medical service matching with fine-grained access control and dynamic user management","authors":"Shu Wu ,&nbsp;Aiqing Zhang ,&nbsp;Ya Gao ,&nbsp;Xiaojuan Xie","doi":"10.1016/j.csi.2024.103833","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103833","url":null,"abstract":"<div><p>Personal health records (PHR) offer significant benefit for patients, such as reducing medical cost and improving the quality of medical care. Majority of the current schemes lack provisions for tracking and revoking malicious doctors. The explicit access policies are prone to leaking patient private information. What is more, owning to the uneven distribution of medical supplies, shocking computational overhead during decryption is a burden that cannot be ignored for busy medical workers. This paper proposed a patient-centric medical service matching scheme that supports policy hiding, attribute matching, fine-grained access control, and user dynamic management. The scheme uses ciphertext policy-based attribute encryption (CP-ABE) to achieve fine-grained access control and supports policy hiding. It utilizes white-box tracking technology and binary tree structure to achieve malicious doctor tracking. Revocation information is ciphertext to achieve dynamic management of doctors. From the experimental results, it can be concluded that our protocol achieves both patient-centric security and performance advantages.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"89 ","pages":"Article 103833"},"PeriodicalIF":5.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139550003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Standards & Interfaces
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1