首页 > 最新文献

Cluster Computing-The Journal of Networks Software Tools and Applications最新文献

英文 中文
Secure and efficient decentralized machine learning through group-based model aggregation 通过基于组的模型聚合实现安全高效的分散机器学习
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-14 DOI: 10.1007/s10586-023-04174-9
Brandon A. Mosqueda González, Omar Hasan, Wisnu Uriawan, Youakim Badr, Lionel Brunie
{"title":"Secure and efficient decentralized machine learning through group-based model aggregation","authors":"Brandon A. Mosqueda González, Omar Hasan, Wisnu Uriawan, Youakim Badr, Lionel Brunie","doi":"10.1007/s10586-023-04174-9","DOIUrl":"https://doi.org/10.1007/s10586-023-04174-9","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134901376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-stage intrusion detection system aided by grey wolf optimization algorithm 基于灰狼优化算法的多阶段入侵检测系统
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-10 DOI: 10.1007/s10586-023-04179-4
Somnath Chatterjee, Vaibhav Shaw, Ranit Das
{"title":"Multi-stage intrusion detection system aided by grey wolf optimization algorithm","authors":"Somnath Chatterjee, Vaibhav Shaw, Ranit Das","doi":"10.1007/s10586-023-04179-4","DOIUrl":"https://doi.org/10.1007/s10586-023-04179-4","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel lightweight and fine-grained fast access control using RNS properties in fog computing 在雾计算中使用RNS特性的新型轻量级和细粒度快速访问控制
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-10 DOI: 10.1007/s10586-023-04169-6
Mohammad Ali Alizadeh, Somayyeh Jafarali Jassbi, Ahmad Khademzadeh, Majid Haghparast
{"title":"Novel lightweight and fine-grained fast access control using RNS properties in fog computing","authors":"Mohammad Ali Alizadeh, Somayyeh Jafarali Jassbi, Ahmad Khademzadeh, Majid Haghparast","doi":"10.1007/s10586-023-04169-6","DOIUrl":"https://doi.org/10.1007/s10586-023-04169-6","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based biometric identity management 基于区块链的生物识别身份管理
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-07 DOI: 10.1007/s10586-023-04180-x
Sherif Hamdy Gomaa Salem, Ashraf Yehia Hassan, Marwa S. Moustafa, Mohamed Nabil Hassan
Abstract In recent years, face biometrics recognition systems are a wide space of a computer usage which is mostly employed for security purpose. The main purpose of the face biometrics recognition system is to authenticate a user from a given database. Due to the widespread expansion of the surveillance cameras and facial recognition technology, a robust face recognition system required. The recognition system needs to store a large number of training samples in any storage unit, that time hackers can access and control that data. So, Protecting and managing sensitive data is essential object. This requires a technique that preserve the privacy of individuals, maintain data integrity, and prevent information leakage. The storage of biometric templates on centralized servers has been associated with potential privacy risks. To address this issue, we have developed and implemented a proof-of-concept facial biometric identification system that uses a private Blockchain platform and smart contract technology. So, the proposed approach is presented a secure and tamper-proof from data breaches as well as hacks with data availability, by using the Blockchain platform to store face images. This paper aims to utilize Blockchain technology to identify individuals based on their biometric traits, specifically facial recognition system makes it tamper-proof (immutable) ensuring security. The system consists of enrolment and authentication phases. Blockchain technology uses peer-to-peer communication, cryptography, consensus processes, and smart contracts to ensure the security. The proposed approach was tested on two popular datasets: CelebFaces Attributes (CelebA) and large-scale face UTKFace datasets. The experimental results indicate that the system yields highly performance outcomes, as evidenced by the Equal Error Rate (EER) values of 0.05% and 0.07% obtained for the CelebA and UTKFace datasets, respectively. The system was compared to three baseline methods and scored the lowest Equal Error Rate.
摘要:人脸生物识别系统是近年来计算机应用的一个广泛领域,主要用于安全目的。人脸生物识别系统的主要目的是从给定的数据库中对用户进行身份验证。随着监控摄像机和人脸识别技术的广泛应用,需要一个强大的人脸识别系统。识别系统需要在任何存储单元中存储大量的训练样本,这样黑客就可以访问和控制这些数据。因此,保护和管理敏感数据是必不可少的目标。这需要一种保护个人隐私、维护数据完整性和防止信息泄露的技术。在集中式服务器上存储生物识别模板会带来潜在的隐私风险。为了解决这个问题,我们开发并实施了一个概念验证面部生物识别系统,该系统使用私有区块链平台和智能合约技术。因此,通过使用区块链平台存储人脸图像,提出了一种安全和防篡改的方法,可以防止数据泄露以及数据可用性的黑客攻击。本文旨在利用区块链技术根据个人的生物特征识别个人,特别是面部识别系统使其防篡改(不可变),确保安全。该系统包括注册和认证两个阶段。区块链技术使用点对点通信、密码学、共识过程和智能合约来确保安全性。该方法在两个流行的数据集上进行了测试:CelebA和大规模人脸UTKFace数据集。实验结果表明,该系统产生了高性能的结果,CelebA和UTKFace数据集的等错误率(EER)分别为0.05%和0.07%。将该系统与三种基线方法进行比较,获得了最低的相等错误率。
{"title":"Blockchain-based biometric identity management","authors":"Sherif Hamdy Gomaa Salem, Ashraf Yehia Hassan, Marwa S. Moustafa, Mohamed Nabil Hassan","doi":"10.1007/s10586-023-04180-x","DOIUrl":"https://doi.org/10.1007/s10586-023-04180-x","url":null,"abstract":"Abstract In recent years, face biometrics recognition systems are a wide space of a computer usage which is mostly employed for security purpose. The main purpose of the face biometrics recognition system is to authenticate a user from a given database. Due to the widespread expansion of the surveillance cameras and facial recognition technology, a robust face recognition system required. The recognition system needs to store a large number of training samples in any storage unit, that time hackers can access and control that data. So, Protecting and managing sensitive data is essential object. This requires a technique that preserve the privacy of individuals, maintain data integrity, and prevent information leakage. The storage of biometric templates on centralized servers has been associated with potential privacy risks. To address this issue, we have developed and implemented a proof-of-concept facial biometric identification system that uses a private Blockchain platform and smart contract technology. So, the proposed approach is presented a secure and tamper-proof from data breaches as well as hacks with data availability, by using the Blockchain platform to store face images. This paper aims to utilize Blockchain technology to identify individuals based on their biometric traits, specifically facial recognition system makes it tamper-proof (immutable) ensuring security. The system consists of enrolment and authentication phases. Blockchain technology uses peer-to-peer communication, cryptography, consensus processes, and smart contracts to ensure the security. The proposed approach was tested on two popular datasets: CelebFaces Attributes (CelebA) and large-scale face UTKFace datasets. The experimental results indicate that the system yields highly performance outcomes, as evidenced by the Equal Error Rate (EER) values of 0.05% and 0.07% obtained for the CelebA and UTKFace datasets, respectively. The system was compared to three baseline methods and scored the lowest Equal Error Rate.","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135475375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection based on ensemble learning for big data classification 基于集成学习的大数据分类入侵检测
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-07 DOI: 10.1007/s10586-023-04168-7
Farah Jemili, Rahma Meddeb, Ouajdi Korbaa
{"title":"Intrusion detection based on ensemble learning for big data classification","authors":"Farah Jemili, Rahma Meddeb, Ouajdi Korbaa","doi":"10.1007/s10586-023-04168-7","DOIUrl":"https://doi.org/10.1007/s10586-023-04168-7","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135432308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis 基于系统调用序列分析的云入侵检测系统混合框架
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-07 DOI: 10.1007/s10586-023-04162-z
Ashish Chaudhari, Bhavesh Gohil, Udai Pratap Rao
{"title":"A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis","authors":"Ashish Chaudhari, Bhavesh Gohil, Udai Pratap Rao","doi":"10.1007/s10586-023-04162-z","DOIUrl":"https://doi.org/10.1007/s10586-023-04162-z","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135475439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel hybrid success history intelligent optimizer with Gaussian transformation: application in CNN hyperparameter tuning 新型高斯变换混合成功史智能优化器在CNN超参数整定中的应用
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-06 DOI: 10.1007/s10586-023-04161-0
Hussam N. Fakhouri, Sadi Alawadi, Feras M. Awaysheh, Faten Hamad
{"title":"Novel hybrid success history intelligent optimizer with Gaussian transformation: application in CNN hyperparameter tuning","authors":"Hussam N. Fakhouri, Sadi Alawadi, Feras M. Awaysheh, Faten Hamad","doi":"10.1007/s10586-023-04161-0","DOIUrl":"https://doi.org/10.1007/s10586-023-04161-0","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135590105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method of system selection for shuttle-based storage and retrieval system considering cost and performance 考虑成本和性能的航天飞机储运系统选择方法
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-05 DOI: 10.1007/s10586-023-04175-8
Dong Yang, Ruyan Ren
{"title":"A method of system selection for shuttle-based storage and retrieval system considering cost and performance","authors":"Dong Yang, Ruyan Ren","doi":"10.1007/s10586-023-04175-8","DOIUrl":"https://doi.org/10.1007/s10586-023-04175-8","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135725096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach 基于机器学习的云存储系统大数据重复数据删除增强认证
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-03 DOI: 10.1007/s10586-023-04171-y
Mohd Akbar, Irshad Ahmad, Mohsina Mirza, Manavver Ali, Praveen Barmavatu
{"title":"Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach","authors":"Mohd Akbar, Irshad Ahmad, Mohsina Mirza, Manavver Ali, Praveen Barmavatu","doi":"10.1007/s10586-023-04171-y","DOIUrl":"https://doi.org/10.1007/s10586-023-04171-y","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135819720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things 基于云的工业物联网超自动化过程网络攻击检测新架构
3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-02 DOI: 10.1007/s10586-023-04163-y
Alireza Souri, Monire Norouzi, Yousef Alsenani
{"title":"A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things","authors":"Alireza Souri, Monire Norouzi, Yousef Alsenani","doi":"10.1007/s10586-023-04163-y","DOIUrl":"https://doi.org/10.1007/s10586-023-04163-y","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135973409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cluster Computing-The Journal of Networks Software Tools and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1