首页 > 最新文献

Concurrency and Computation-Practice & Experience最新文献

英文 中文
Enhanced multi-key privacy-preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis 应用于糖尿病视网膜病变诊断的增强型多密钥隐私保护分布式深度学习协议
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-22 DOI: 10.1002/cpe.8263
Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Isaac Amankona Obiri, Eric Kuada, Ebenezer Kwaku Danso, Edward Mensah Acheampong

In this work, privacy-preserving distributed deep learning (PPDDL) is re-visited with a specific application to diagnosing long-term illness like diabetic retinopathy. In order to protect the privacy of participants datasets, a multi-key PPDDL solution is proposed which is robust against collusion attacks and is also post-quantum robust. Additionally, the PPDDL solution provides robust network security in terms of integrity of transmitted ciphertexts and keys, forward secrecy, and prevention of man-in-the-middle attacks and is extensively verified using Verifpal. Proposed solution is evaluated on retina image datasets to detect diabetic retinopathy, with deep learning accuracy results of 96.30%, 96.21% and 96.20% for DDL, DDL + SINGLE and DDL + MULTI scenarios respectively. Results from our simulation indicate that accuracy of the PPDDL is maintained while protecting the privacy of the datasets of participants. Our proposed solution is also efficient in terms of the communication and run-time costs.

摘要 在这项工作中,我们重新探讨了隐私保护分布式深度学习(PPDDL)在诊断糖尿病视网膜病变等长期疾病中的具体应用。为了保护参与者数据集的隐私,本文提出了一种多密钥 PPDDL 解决方案,它不仅能抵御串通攻击,还具有后量子鲁棒性。此外,PPDDL 解决方案在传输密文和密钥的完整性、前向保密性和防止中间人攻击方面提供了强大的网络安全性,并使用 Verifpal 进行了广泛验证。在检测糖尿病视网膜病变的视网膜图像数据集上对所提出的解决方案进行了评估,DDL、DDL + SINGLE 和 DDL + MULTI 场景的深度学习准确率分别为 96.30%、96.21% 和 96.20%。我们的模拟结果表明,在保护参与者数据集隐私的同时,还保持了 PPDDL 的准确性。我们提出的解决方案在通信和运行时间成本方面也很高效。
{"title":"Enhanced multi-key privacy-preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis","authors":"Emmanuel Antwi-Boasiako,&nbsp;Shijie Zhou,&nbsp;Yongjian Liao,&nbsp;Isaac Amankona Obiri,&nbsp;Eric Kuada,&nbsp;Ebenezer Kwaku Danso,&nbsp;Edward Mensah Acheampong","doi":"10.1002/cpe.8263","DOIUrl":"10.1002/cpe.8263","url":null,"abstract":"<div>\u0000 \u0000 <p>In this work, privacy-preserving distributed deep learning (PPDDL) is re-visited with a specific application to diagnosing long-term illness like diabetic retinopathy. In order to protect the privacy of participants datasets, a multi-key PPDDL solution is proposed which is robust against collusion attacks and is also post-quantum robust. Additionally, the PPDDL solution provides robust network security in terms of integrity of transmitted ciphertexts and keys, forward secrecy, and prevention of man-in-the-middle attacks and is extensively verified using Verifpal. Proposed solution is evaluated on retina image datasets to detect diabetic retinopathy, with deep learning accuracy results of 96.30%, 96.21% and 96.20% for DDL, DDL + SINGLE and DDL + MULTI scenarios respectively. Results from our simulation indicate that accuracy of the PPDDL is maintained while protecting the privacy of the datasets of participants. Our proposed solution is also efficient in terms of the communication and run-time costs.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 25","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-task enhanced global–local temporal–spatial network for depression recognition from facial videos 用于从面部视频识别抑郁的全局-局部时空双任务增强网络
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-21 DOI: 10.1002/cpe.8255
Jinjie Shen, Jing Wu, Yan Xing, Min Hu, Xiaohua Wang, Daolun Li, Wenshu Zha

In previous studies on facial video depression recognition, although convolutional neural network (CNN) has become a mainstream method, its performance still has room for improvement due to the insufficient extraction of global and local information and the neglect of the correlation of temporal and spatial information. This paper proposes a novel dual-task enhanced global–local temporal–spatial network (DTE-GLTS) to enhance the extraction capability of global and local features and deepen the analysis of temporal–spatial information correlation. We design a dual-task learning mode that utilizes the data-efficient image transformer (Deit) as the main body to learn the global features of video sequences and guides Deit to learn local features with the pre-trained temporal–spatial fusion network (TSF). In addition, we propose the TSF mechanism to more effectively fuse temporal–spatial information in video sequences, strengthen the correlation between frames and pixels, and embed it in Resnet to form the TSF network. To the best of our knowledge, this is the first application of Deit and dual-task learning mode in the field of facial video depression recognition. The experimental results on AVEC 2013 and AVEC 2014 show that our method achieves competitive performance, with mean absolute error/root mean square error (MAE/RMSE) scores of 6.06/7.73 and 5.91/7.68, respectively, while significantly reducing the number of parameters.

摘要 在以往的人脸视频凹陷识别研究中,虽然卷积神经网络(CNN)已成为一种主流方法,但由于对全局和局部信息提取不足,且忽视了时空信息的关联性,其性能仍有提升空间。本文提出了一种新颖的双任务增强型全局-局部时空网络(DTE-GLTS),以增强对全局和局部特征的提取能力,深化对时空信息相关性的分析。我们设计了一种双任务学习模式,即以数据高效图像转换器(Deit)为主体学习视频序列的全局特征,并通过预训练的时空融合网络(TSF)引导 Deit 学习局部特征。此外,我们还提出了 TSF 机制,以更有效地融合视频序列中的时空信息,加强帧与像素之间的相关性,并将其嵌入 Resnet 以形成 TSF 网络。据我们所知,这是 Deit 和双任务学习模式在面部视频凹陷识别领域的首次应用。在 AVEC 2013 和 AVEC 2014 上的实验结果表明,我们的方法取得了具有竞争力的性能,平均绝对误差/均方根误差(MAE/RMSE)分别为 6.06/7.73 和 5.91/7.68,同时显著减少了参数数量。
{"title":"Dual-task enhanced global–local temporal–spatial network for depression recognition from facial videos","authors":"Jinjie Shen,&nbsp;Jing Wu,&nbsp;Yan Xing,&nbsp;Min Hu,&nbsp;Xiaohua Wang,&nbsp;Daolun Li,&nbsp;Wenshu Zha","doi":"10.1002/cpe.8255","DOIUrl":"10.1002/cpe.8255","url":null,"abstract":"<div>\u0000 \u0000 <p>In previous studies on facial video depression recognition, although convolutional neural network (CNN) has become a mainstream method, its performance still has room for improvement due to the insufficient extraction of global and local information and the neglect of the correlation of temporal and spatial information. This paper proposes a novel dual-task enhanced global–local temporal–spatial network (DTE-GLTS) to enhance the extraction capability of global and local features and deepen the analysis of temporal–spatial information correlation. We design a dual-task learning mode that utilizes the data-efficient image transformer (Deit) as the main body to learn the global features of video sequences and guides Deit to learn local features with the pre-trained temporal–spatial fusion network (TSF). In addition, we propose the TSF mechanism to more effectively fuse temporal–spatial information in video sequences, strengthen the correlation between frames and pixels, and embed it in Resnet to form the TSF network. To the best of our knowledge, this is the first application of Deit and dual-task learning mode in the field of facial video depression recognition. The experimental results on AVEC 2013 and AVEC 2014 show that our method achieves competitive performance, with mean absolute error/root mean square error (MAE/RMSE) scores of 6.06/7.73 and 5.91/7.68, respectively, while significantly reducing the number of parameters.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 25","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image encryption algorithm based on a novel 2D logistic-sine-coupling chaos map and bit-level dynamic scrambling 基于新型二维逻辑正弦耦合混沌图和位级动态加扰的图像加密算法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-21 DOI: 10.1002/cpe.8261
Jie Fang, Kaihui Zhao, Shixiao Liang, Jiabin Wang

This paper develops a new image encryption algorithm based on a novel two-dimensional chaotic map and bit-level dynamic scrambling. First, multiple one-dimensional chaotic maps are coupled to construct a novel two dimensions Logistic-Sine-coupling chaos map (2D-LSCCM). The performance analysis shows that the 2D-LSCCM has more complex chaotic characteristics and wider chaotic range than many extant 2D chaos maps. Second, original image matrix combines with hash algorithm SHA-256 to generate a hash value. The initial values of 2D-LSCCM are generated based on the hash value. Third, the original image matrix is divided into multiple sub-matrices by wavelet transform, followed by scrambling by an improved Knuth shuffle algorithm. Fourth, the scrambled multiple sub-matrices are stitched into an image matrix of M×N×3$$ Mtimes Ntimes 3 $$ and converted into a binary matrix. The chaotic sequence generated by 2D-LSCCM is introduced as a control sequence to control the bit-level scrambling of pixel points, which realizes the bit-level dynamic scrambling. Finally, the diffusion operation is performed by parameter par and chaotic sequence to obtain the final encrypted image. The algorithm security analysis and simulation examples demonstrate the effectiveness of the proposed encryption scheme.

摘要 本文基于新颖的二维混沌图和位级动态加扰,开发了一种新的图像加密算法。首先,将多个一维混沌图耦合在一起,构建了一个新颖的二维逻辑正弦耦合混沌图(2D-LSCCM)。性能分析表明,与许多现有的二维混沌图相比,二维正弦耦合混沌图具有更复杂的混沌特性和更宽的混沌范围。其次,原始图像矩阵与哈希算法 SHA-256 结合生成哈希值。根据哈希值生成 2D-LSCCM 的初始值。第三,通过小波变换将原始图像矩阵划分为多个子矩阵,然后使用改进的 Knuth 洗牌算法进行加扰处理。第四,将扰乱后的多个子矩阵拼接成一个图像矩阵,并转换成二进制矩阵。引入 2D-LSCCM 生成的混沌序列作为控制序列,控制像素点的位级加扰,实现位级动态加扰。最后,通过参数par和混沌序列进行扩散运算,得到最终的加密图像。算法安全性分析和仿真实例证明了所提加密方案的有效性。
{"title":"Image encryption algorithm based on a novel 2D logistic-sine-coupling chaos map and bit-level dynamic scrambling","authors":"Jie Fang,&nbsp;Kaihui Zhao,&nbsp;Shixiao Liang,&nbsp;Jiabin Wang","doi":"10.1002/cpe.8261","DOIUrl":"10.1002/cpe.8261","url":null,"abstract":"<div>\u0000 \u0000 <p>This paper develops a new image encryption algorithm based on a novel two-dimensional chaotic map and bit-level dynamic scrambling. First, multiple one-dimensional chaotic maps are coupled to construct a novel two dimensions Logistic-Sine-coupling chaos map (2D-LSCCM). The performance analysis shows that the 2D-LSCCM has more complex chaotic characteristics and wider chaotic range than many extant 2D chaos maps. Second, original image matrix combines with hash algorithm SHA-256 to generate a hash value. The initial values of 2D-LSCCM are generated based on the hash value. Third, the original image matrix is divided into multiple sub-matrices by wavelet transform, followed by scrambling by an improved Knuth shuffle algorithm. Fourth, the scrambled multiple sub-matrices are stitched into an image matrix of <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>M</mi>\u0000 <mo>×</mo>\u0000 <mi>N</mi>\u0000 <mo>×</mo>\u0000 <mn>3</mn>\u0000 </mrow>\u0000 <annotation>$$ Mtimes Ntimes 3 $$</annotation>\u0000 </semantics></math> and converted into a binary matrix. The chaotic sequence generated by 2D-LSCCM is introduced as a control sequence to control the bit-level scrambling of pixel points, which realizes the bit-level dynamic scrambling. Finally, the diffusion operation is performed by parameter <i>par</i> and chaotic sequence to obtain the final encrypted image. The algorithm security analysis and simulation examples demonstrate the effectiveness of the proposed encryption scheme.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 25","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142225200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on insulator image segmentation and defect recognition technology based on U-Net and YOLOv7 基于 U-Net 和 YOLOv7 的绝缘体图像分割和缺陷识别技术研究
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-21 DOI: 10.1002/cpe.8266
Jiawen Chen, Chao Cai, Fangbin Yan, Bowen Zhou

This study focuses on aerial images in power line inspection, using a small sample size and concentrating on accurately segmenting insulators in images and identifying potential “self-explode” defects through deep learning methods. The research process consists of four key steps: image segmentation of insulators, identification of small connected regions, data augmentation of original samples, and detection of insulator defects using the YOLO v7 model. In this paper, due to the small sample size, sample expansion is considered first. A sliding window approach is adopted to crop images, increasing the number of training samples. Subsequently, the U-Net neural network model for semantic segmentation is used to train insulator images, thereby generating preliminary mask images of insulators. Then, through connected region area filtering techniques, smaller connected regions are removed to eliminate small speckles in the predicted mask images, obtaining more accurate insulator mask images. The evaluation metric for image recognition, the dice coefficient, is 93.67%. To target the identification of insulator defects, 35 images with insulator defects from the original samples are augmented. These images are input into the YOLO v7 network for further training, ultimately achieving effective detection of insulator “self-explode” defects.

本研究以电力线路检测中的航空图像为重点,使用小样本量,专注于准确分割图像中的绝缘子,并通过深度学习方法识别潜在的 "自爆 "缺陷。研究过程包括四个关键步骤:绝缘子的图像分割、小连接区域的识别、原始样本的数据增强以及使用 YOLO v7 模型检测绝缘子缺陷。在本文中,由于样本量较小,首先考虑样本扩展。采用滑动窗口方法裁剪图像,增加训练样本的数量。随后,使用用于语义分割的 U-Net 神经网络模型对绝缘体图像进行训练,从而生成绝缘体的初步掩膜图像。然后,通过连通区域过滤技术,去除较小的连通区域,消除预测掩膜图像中的小斑点,从而获得更精确的绝缘体掩膜图像。图像识别的评价指标--骰子系数为 93.67%。针对绝缘体缺陷的识别,从原始样本中添加了 35 幅带有绝缘体缺陷的图像。这些图像被输入 YOLO v7 网络进行进一步训练,最终实现了对绝缘体 "自爆 "缺陷的有效检测。
{"title":"Research on insulator image segmentation and defect recognition technology based on U-Net and YOLOv7","authors":"Jiawen Chen,&nbsp;Chao Cai,&nbsp;Fangbin Yan,&nbsp;Bowen Zhou","doi":"10.1002/cpe.8266","DOIUrl":"10.1002/cpe.8266","url":null,"abstract":"<p>This study focuses on aerial images in power line inspection, using a small sample size and concentrating on accurately segmenting insulators in images and identifying potential “self-explode” defects through deep learning methods. The research process consists of four key steps: image segmentation of insulators, identification of small connected regions, data augmentation of original samples, and detection of insulator defects using the YOLO v7 model. In this paper, due to the small sample size, sample expansion is considered first. A sliding window approach is adopted to crop images, increasing the number of training samples. Subsequently, the U-Net neural network model for semantic segmentation is used to train insulator images, thereby generating preliminary mask images of insulators. Then, through connected region area filtering techniques, smaller connected regions are removed to eliminate small speckles in the predicted mask images, obtaining more accurate insulator mask images. The evaluation metric for image recognition, the dice coefficient, is 93.67%. To target the identification of insulator defects, 35 images with insulator defects from the original samples are augmented. These images are input into the YOLO v7 network for further training, ultimately achieving effective detection of insulator “self-explode” defects.</p>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 25","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An archive-based method for efficiently handling small file problems in HDFS 基于归档的方法,有效处理 HDFS 中的小文件问题
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-20 DOI: 10.1002/cpe.8260
Junnan Liu, Shengyi Jin, Dong Wang, Han Li

Hadoop distributed file system (HDFS) performs well when storing and managing large files. However, its performance significantly decreases when dealing with massive small files. In response to this problem, a novel archive-based solution is proposed. The archive refers to merging multiple small files into larger data files, which can effectively reduce the memory usage of the NameNode. The current archive-based solutions have the disadvantages of long access time, long archive construction time, and no support for storage, updating and deleting small files in the archive system. Our method utilizes a dynamic hash function to distribute the metadata of small files across multiple metadata files. We construct a primary index that combines dynamic and static indexes for these metadata files. Regarding data files, include some read-only files and one readable–writable file. A small file's contents are written into a readable and writable file. Upon reaching a predetermined threshold, the readable–writable file transitions into read-only status, with a fresh readable–writable file replacing it. Experimental results show that the scheme improves the efficiency of archive access and archive creation and is more efficient than the original HDFS storage and update efficiency.

摘要Hadoop 分布式文件系统(HDFS)在存储和管理大文件时表现出色。然而,在处理海量小文件时,其性能会明显下降。针对这一问题,我们提出了一种基于归档的新型解决方案。归档指的是将多个小文件合并成较大的数据文件,这样可以有效减少 NameNode 的内存使用量。目前基于归档的解决方案存在访问时间长、归档构建时间长、不支持在归档系统中存储、更新和删除小文件等缺点。我们的方法利用动态哈希函数将小文件的元数据分布到多个元数据文件中。我们为这些元数据文件构建了一个结合动态和静态索引的主索引。关于数据文件,包括一些只读文件和一个可读可写文件。小文件的内容被写入一个可读可写文件。当达到预定阈值时,可读可写文件就会转为只读状态,由一个新的可读可写文件取代。实验结果表明,该方案提高了存档访问和存档创建的效率,比原来的 HDFS 存储和更新效率更高。
{"title":"An archive-based method for efficiently handling small file problems in HDFS","authors":"Junnan Liu,&nbsp;Shengyi Jin,&nbsp;Dong Wang,&nbsp;Han Li","doi":"10.1002/cpe.8260","DOIUrl":"10.1002/cpe.8260","url":null,"abstract":"<div>\u0000 \u0000 <p>Hadoop distributed file system (HDFS) performs well when storing and managing large files. However, its performance significantly decreases when dealing with massive small files. In response to this problem, a novel archive-based solution is proposed. The archive refers to merging multiple small files into larger data files, which can effectively reduce the memory usage of the NameNode. The current archive-based solutions have the disadvantages of long access time, long archive construction time, and no support for storage, updating and deleting small files in the archive system. Our method utilizes a dynamic hash function to distribute the metadata of small files across multiple metadata files. We construct a primary index that combines dynamic and static indexes for these metadata files. Regarding data files, include some read-only files and one readable–writable file. A small file's contents are written into a readable and writable file. Upon reaching a predetermined threshold, the readable–writable file transitions into read-only status, with a fresh readable–writable file replacing it. Experimental results show that the scheme improves the efficiency of archive access and archive creation and is more efficient than the original HDFS storage and update efficiency.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 24","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recommending cloud services based on social trust: An overview 基于社会信任的云服务推荐:综述
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-20 DOI: 10.1002/cpe.8262
Fatma Zohra Lebib, Saida Kichou

The continued expansion and development of the business requires great computing power and massive data storage systems. Cloud services deliver these resources in a simple, flexible and secure way. There is now a wide range of similar cloud services with different capabilities, which requires a recommendation system. Recommendation based on Quality of Service (QoS) is the first generation of service recommendation systems that only takes into account the rating information of all users without distinction. However, these systems suffer from many shortcomings, such as cold start and data sparsity issues, as well as poor accuracy and reliability of recommendation results. To address these issues and improve the quality of recommendations, a new generation of recommender systems has emerged, such as context-aware, domain-specific, and trust-aware recommender systems. These systems now focus more on how to leverage social data generated from user interactions with each other in social networks to recommend more suitable and reliable services in response to user needs. Due to the importance of considering trust in cloud environments, this study aims to provide an overview of the research on trust-based cloud service recommendation approaches proposed so far and highlights the current trend towards use new technologies such as deep learning to deal with certain challenges.

企业的持续扩张和发展需要强大的计算能力和海量数据存储系统。云服务以简单、灵活和安全的方式提供这些资源。目前,类似的云服务种类繁多,功能各异,这就需要一个推荐系统。基于服务质量(QoS)的推荐是第一代服务推荐系统,它只考虑所有用户的评级信息,不加区分。然而,这些系统存在许多缺陷,如冷启动和数据稀疏问题,以及推荐结果的准确性和可靠性较差。为了解决这些问题并提高推荐质量,新一代推荐系统应运而生,如情境感知推荐系统、特定领域推荐系统和信任感知推荐系统。目前,这些系统更加关注如何利用用户在社交网络中相互交流产生的社交数据,针对用户需求推荐更合适、更可靠的服务。考虑到信任在云环境中的重要性,本研究旨在概述迄今为止提出的基于信任的云服务推荐方法的研究情况,并强调当前使用深度学习等新技术应对某些挑战的趋势。
{"title":"Recommending cloud services based on social trust: An overview","authors":"Fatma Zohra Lebib,&nbsp;Saida Kichou","doi":"10.1002/cpe.8262","DOIUrl":"10.1002/cpe.8262","url":null,"abstract":"<p>The continued expansion and development of the business requires great computing power and massive data storage systems. Cloud services deliver these resources in a simple, flexible and secure way. There is now a wide range of similar cloud services with different capabilities, which requires a recommendation system. Recommendation based on Quality of Service (QoS) is the first generation of service recommendation systems that only takes into account the rating information of all users without distinction. However, these systems suffer from many shortcomings, such as cold start and data sparsity issues, as well as poor accuracy and reliability of recommendation results. To address these issues and improve the quality of recommendations, a new generation of recommender systems has emerged, such as context-aware, domain-specific, and trust-aware recommender systems. These systems now focus more on how to leverage social data generated from user interactions with each other in social networks to recommend more suitable and reliable services in response to user needs. Due to the importance of considering trust in cloud environments, this study aims to provide an overview of the research on trust-based cloud service recommendation approaches proposed so far and highlights the current trend towards use new technologies such as deep learning to deal with certain challenges.</p>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 25","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VoWiFi cell capacity improvement using A-MPDU frame aggregation technique for VBR traffic 利用 A-MPDU 帧聚合技术提高 VBR 流量的 VoWiFi 小区容量
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-20 DOI: 10.1002/cpe.8247
Ayes Chinmay, Hemanta Kumar Pati

The expanding popularity of Voice over WiFi (VoWiFi) necessitates a concerted effort to identify novel ways to increase VoWiFi cell capacity. The primary objective of this study is to increase the capacity of VoWiFi cells by means of frame aggregation of aggregate MAC protocol data unit (A-MPDU) for variable bit rate (VBR) traffic. Taking into account Arbitration Inter-frame Spacing (AIFS), Compressed RTP (cRTP) and A-MPDU frames, we devised a formula to calculate an approximate number of concurrent VoWiFi users that can coexist with no detriment to the quality-of-service (QoS) of existing VoWiFi calls over the Wireless Fidelity (WiFi) standards. Here, we used AIFS to determine the channel's health before sending Voice over WiFi data and Short Inter-frame Spacing (SIFS) to transfer frames such as Request To Send (RTS)/Clear To Send (CTS) and Acknowledgement (ACK). We have used our suggested model to analyse the capacity of VoWiFi cells in IEEE 802.11b/g/n/ac/ax/be Wireless Local Area Network (WLAN)s with VBR traffic utilising DCF Inter-frame Spacing (DIFS) and AIFS. For IEEE 802.11b/g/n/ac/ax/be, we also determined the most number of MAC protocol data unit (MPDU)s that may be combined into a single A-MPDU. We have also studied the impact of voice packet retransmission on the cell capacity of a WLAN standard that offers VoWiFi service while taking A-MPDU method into account. We have compared the results gained using IEEE 802.11be with earlier WLAN standards like IEEE 802.11b/g/n/ac/ax considering the constant bit rate (CBR) and VBR traffics.

摘要随着 WiFi 语音(VoWiFi)的日益普及,有必要共同努力找出提高 VoWiFi 小区容量的新方法。本研究的主要目的是通过帧聚合聚合 MAC 协议数据单元(A-MPDU)来增加 VoWiFi 小区的容量,以实现可变比特率(VBR)流量。考虑到仲裁帧间距 (AIFS)、压缩 RTP (cRTP) 和 A-MPDU 帧,我们设计了一个公式来计算在不影响无线保真 (WiFi) 标准上现有 VoWiFi 通话的服务质量 (QoS) 的情况下,可并存的 VoWiFi 用户的大致数量。在此,我们使用 AIFS 在发送 WiFi 语音数据前确定信道的健康状况,并使用短帧间距 (SIFS) 传输帧,如请求发送 (RTS) / 清除发送 (CTS) 和确认 (ACK)。我们利用建议的模型分析了 IEEE 802.11b/g/n/ac/ax/be 无线局域网(WLAN)中使用 DCF 帧间距(DIFS)和 AIFS 的 VBR 流量的 VoWiFi 小区的容量。对于 IEEE 802.11b/g/n/ac/ax/be,我们还确定了可组合成单个 A-MPDU 的最多 MAC 协议数据单元 (MPDU)。我们还研究了语音数据包重传对提供 VoWiFi 服务的 WLAN 标准小区容量的影响,同时考虑了 A-MPDU 方法。考虑到恒定比特率(CBR)和 VBR 流量,我们比较了使用 IEEE 802.11be 和 IEEE 802.11b/g/n/ac/ax 等早期 WLAN 标准获得的结果。
{"title":"VoWiFi cell capacity improvement using A-MPDU frame aggregation technique for VBR traffic","authors":"Ayes Chinmay,&nbsp;Hemanta Kumar Pati","doi":"10.1002/cpe.8247","DOIUrl":"10.1002/cpe.8247","url":null,"abstract":"<div>\u0000 \u0000 <p>The expanding popularity of Voice over WiFi (VoWiFi) necessitates a concerted effort to identify novel ways to increase VoWiFi cell capacity. The primary objective of this study is to increase the capacity of VoWiFi cells by means of frame aggregation of aggregate MAC protocol data unit (A-MPDU) for variable bit rate (VBR) traffic. Taking into account Arbitration Inter-frame Spacing (AIFS), Compressed RTP (cRTP) and A-MPDU frames, we devised a formula to calculate an approximate number of concurrent VoWiFi users that can coexist with no detriment to the quality-of-service (QoS) of existing VoWiFi calls over the Wireless Fidelity (WiFi) standards. Here, we used AIFS to determine the channel's health before sending Voice over WiFi data and Short Inter-frame Spacing (SIFS) to transfer frames such as Request To Send (RTS)/Clear To Send (CTS) and Acknowledgement (ACK). We have used our suggested model to analyse the capacity of VoWiFi cells in IEEE 802.11b/g/n/ac/ax/be Wireless Local Area Network (WLAN)s with VBR traffic utilising DCF Inter-frame Spacing (DIFS) and AIFS. For IEEE 802.11b/g/n/ac/ax/be, we also determined the most number of MAC protocol data unit (MPDU)s that may be combined into a single A-MPDU. We have also studied the impact of voice packet retransmission on the cell capacity of a WLAN standard that offers VoWiFi service while taking A-MPDU method into account. We have compared the results gained using IEEE 802.11be with earlier WLAN standards like IEEE 802.11b/g/n/ac/ax considering the constant bit rate (CBR) and VBR traffics.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 24","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in IoMT IoMT 联合学习模型中基于区块链的隐私保护可搜索属性加密方案
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-20 DOI: 10.1002/cpe.8257
Ziyu Zhou, Na Wang, Jianwei Liu, Junsong Fu, Lunzhi Deng

Federated learning enables training healthcare diagnostic models across multiple decentralized devices containing local private health data samples, without transferring data to a central server, providing privacy-preserving services for healthcare professionals. However, for a model of a specific field, some medical data from non-target participants may be included in model training, compromising model accuracy. Moreover, diagnostic queries for healthcare models stored in cloud servers may result in the leakage of the privacy of healthcare participants and the parameters of models. Furthermore, the records of model searching and usage could be tracked causing privacy disclosure risk. To address these issues, we propose a blockchain-based privacy-preserving searchable attribute-based encryption scheme for the diagnostic model federated learning in the Internet of Medical Things (BSAEM-FL). We first adopt fine-grained model trainer participation policies for federated learning, using the attribute-based encryption (ABE) mechanism, to realize model accuracy and local data privacy. Then, We employ searchable encryption technology for model training and usage to protect the security of models stored in the cloud server. Blockchain is utilized to implement distributed healthcare models' keyword-based search and model users' attribute-based authentication. Lastly, we transfer most of the computational overhead of user terminals in model searching and decryption to edge nodes, achieving lightweight computation of IoMT terminals. The security analysis proves the security of the proposed healthcare scheme. The performance evaluation indicates our scheme is of better feasibility, efficiency, and decentralization.

联盟学习可在多个包含本地私人健康数据样本的分散设备上训练医疗诊断模型,而无需将数据传输到中央服务器,从而为医疗专业人员提供保护隐私的服务。不过,对于特定领域的模型而言,一些来自非目标参与者的医疗数据可能会被纳入模型训练,从而影响模型的准确性。此外,对存储在云服务器中的医疗模型进行诊断查询可能会导致医疗参与者的隐私和模型参数泄露。此外,模型搜索和使用记录可能会被追踪,从而造成隐私泄露风险。为了解决这些问题,我们为医疗物联网中的诊断模型联合学习(BSAEM-FL)提出了一种基于区块链的隐私保护可搜索属性加密方案。我们首先利用基于属性的加密(ABE)机制,为联合学习采用细粒度的模型训练员参与策略,以实现模型的准确性和本地数据的隐私性。然后,我们采用可搜索加密技术进行模型训练和使用,以保护存储在云服务器中的模型的安全。利用区块链实现分布式医疗模型的关键字搜索和模型用户的基于属性的身份验证。最后,我们将用户终端在模型搜索和解密中的大部分计算开销转移到边缘节点,实现了 IoMT 终端的轻量级计算。安全分析证明了所提出的医疗保健方案的安全性。性能评估表明,我们的方案具有更好的可行性、效率和分散性。
{"title":"The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in IoMT","authors":"Ziyu Zhou,&nbsp;Na Wang,&nbsp;Jianwei Liu,&nbsp;Junsong Fu,&nbsp;Lunzhi Deng","doi":"10.1002/cpe.8257","DOIUrl":"10.1002/cpe.8257","url":null,"abstract":"<p>Federated learning enables training healthcare diagnostic models across multiple decentralized devices containing local private health data samples, without transferring data to a central server, providing privacy-preserving services for healthcare professionals. However, for a model of a specific field, some medical data from non-target participants may be included in model training, compromising model accuracy. Moreover, diagnostic queries for healthcare models stored in cloud servers may result in the leakage of the privacy of healthcare participants and the parameters of models. Furthermore, the records of model searching and usage could be tracked causing privacy disclosure risk. To address these issues, we propose a blockchain-based privacy-preserving searchable attribute-based encryption scheme for the diagnostic model federated learning in the Internet of Medical Things (BSAEM-FL). We first adopt fine-grained model trainer participation policies for federated learning, using the attribute-based encryption (ABE) mechanism, to realize model accuracy and local data privacy. Then, We employ searchable encryption technology for model training and usage to protect the security of models stored in the cloud server. Blockchain is utilized to implement distributed healthcare models' keyword-based search and model users' attribute-based authentication. Lastly, we transfer most of the computational overhead of user terminals in model searching and decryption to edge nodes, achieving lightweight computation of IoMT terminals. The security analysis proves the security of the proposed healthcare scheme. The performance evaluation indicates our scheme is of better feasibility, efficiency, and decentralization.</p>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 24","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid energy-Efficient distributed aided frog leaping dynamic A* with reinforcement learning for enhanced trajectory planning in UAV swarms large-scale networks 混合节能分布式辅助蛙跳动态 A* 与强化学习用于增强无人机群大规模网络的轨迹规划
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-20 DOI: 10.1002/cpe.8237
R. Christal Jebi, S. Baulkani, L. Femila

UAVs are emerging as a critical asset in the field of data collection from extensive wireless sensor networks (WSNs) on a large scale. UAVs can be used to deploy energy-efficient nodes or recharge nodes, but it should not compromise the network's coverage and connectivity. This paper proposes a comprehensive approach to optimize UAV trajectories within large-scale WSNs, utilizing Multi-Objective Reinforcement Learning (MORL) to balance critical objectives such as coverage, connectivity, and energy efficiency. This research investigates the configuration of a Wireless Sensor Network (WSN) assisted by a pen_spark UAV. In this network, Cluster Heads (CHs) act as central points for collecting data from their assigned sensor nodes. A predefined path is established for the UAV to efficiently gather data from these CHs. The Hybrid Threshold-sensitive Energy Efficient Network (Hy-TEEN) encompasses sophisticated algorithms for CH selection, dynamic A* for 3D trajectory planning and leverages reinforcement learning for multi-objective optimization. The experimental results and analysis demonstrate the effectiveness and efficiency of the proposed approach in improving UAV performance and energy efficiency. The results demonstrate that the proposed methodology's trajectories are capable of achieving a time savings of 3.52% in mission completion when contrasted with conventional baseline methods.

摘要无人机正在成为大规模无线传感器网络(WSN)数据收集领域的重要资产。无人机可用于部署高能效节点或为节点充电,但不应影响网络的覆盖范围和连接性。本文提出了一种在大规模 WSN 中优化无人机轨迹的综合方法,利用多目标强化学习(MORL)来平衡覆盖范围、连通性和能效等关键目标。本研究调查了由 pen_spark 无人机辅助的无线传感器网络(WSN)的配置。在该网络中,簇头(CHs)作为中心点,负责从指定的传感器节点收集数据。为无人机建立了一条预定义路径,以便从这些 CHs 有效地收集数据。混合阈值敏感节能网络(Hy-TEEN)包含用于 CH 选择的复杂算法、用于三维轨迹规划的动态 A* 算法以及用于多目标优化的强化学习算法。实验结果和分析证明了所提方法在提高无人飞行器性能和能效方面的有效性和效率。结果表明,与传统的基线方法相比,拟议方法的轨迹能够在完成任务方面节省 3.52% 的时间。
{"title":"Hybrid energy-Efficient distributed aided frog leaping dynamic A* with reinforcement learning for enhanced trajectory planning in UAV swarms large-scale networks","authors":"R. Christal Jebi,&nbsp;S. Baulkani,&nbsp;L. Femila","doi":"10.1002/cpe.8237","DOIUrl":"10.1002/cpe.8237","url":null,"abstract":"<div>\u0000 \u0000 <p>UAVs are emerging as a critical asset in the field of data collection from extensive wireless sensor networks (WSNs) on a large scale. UAVs can be used to deploy energy-efficient nodes or recharge nodes, but it should not compromise the network's coverage and connectivity. This paper proposes a comprehensive approach to optimize UAV trajectories within large-scale WSNs, utilizing Multi-Objective Reinforcement Learning (MORL) to balance critical objectives such as coverage, connectivity, and energy efficiency. This research investigates the configuration of a Wireless Sensor Network (WSN) assisted by a pen_spark UAV. In this network, Cluster Heads (CHs) act as central points for collecting data from their assigned sensor nodes. A predefined path is established for the UAV to efficiently gather data from these CHs. The Hybrid Threshold-sensitive Energy Efficient Network (Hy-TEEN) encompasses sophisticated algorithms for CH selection, dynamic A* for 3D trajectory planning and leverages reinforcement learning for multi-objective optimization. The experimental results and analysis demonstrate the effectiveness and efficiency of the proposed approach in improving UAV performance and energy efficiency. The results demonstrate that the proposed methodology's trajectories are capable of achieving a time savings of 3.52% in mission completion when contrasted with conventional baseline methods.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 24","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HybGBS: A hybrid neural network and grey wolf optimizer for intrusion detection in a cloud computing environment HybGBS:用于云计算环境中入侵检测的混合神经网络和灰狼优化器
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-19 DOI: 10.1002/cpe.8264
S Sumathi, R Rajesh

The cloud computing environment is subject to unprecedented cyber-attacks as its infrastructure and protocols may contain vulnerabilities and bugs. Among these, Distributed Denial of Service (DDoS) is chosen by most cyber extortionists, creating unusual traffic that drains cloud resources, making them inaccessible to customers and end users. Hence, security solutions to combat this attack are in high demand. The existing DDoS detection techniques in literature have many drawbacks, such as overfitting, delay in detection, low detection accuracy for attacks that target multiple victims, and high False Positive Rate (FPR). In this proposed study, an Artificial Neural Network (ANN) based hybrid GBS (Grey Wolf Optimizer (GWO) + Back Propagation Network (BPN) + Self Organizing Map (SOM)) Intrusion Detection System (IDS) is proposed for intrusion detection in the cloud computing environment. The base classifier, BPN, was chosen for our research after evaluating the performance of a comprehensive set of neural network algorithms on the standard benchmark UNSW-NS 15 dataset. BPN intrusion detection performance is further enhanced by combining it with SOM and GWO. Hybrid Feature Selection (FS) is made using a correlation-based approach and Stratified 10-fold cross-validation (STCV) ranking based on Weight matrix value (W). These selected features are further fine-tuned using metaheuristic GWO hyperparameter tuning based on a fitness function. The proposed IDS technique is validated using the standard benchmark UNSW-NS 15 dataset, which consists of 1,75,341 and 82,332 attack cases in the training and testing datasets. This study's findings demonstrate that the proposed ANN-based hybrid GBS IDS model outperforms other existing IDS models with a higher intrusion detection accuracy of 99.40%, fewer false alarms (0.00389), less error rate (0.001), and faster prediction time (0.29 ns).

云计算环境受到前所未有的网络攻击,因为其基础设施和协议可能存在漏洞和错误。其中,分布式拒绝服务(DDoS)是大多数网络勒索者的选择,它会产生异常流量,耗尽云资源,使客户和最终用户无法访问。因此,应对这种攻击的安全解决方案需求量很大。现有文献中的 DDoS 检测技术有很多缺点,如过拟合、检测延迟、针对多个受害者的攻击检测准确率低、假阳性率(FPR)高。本研究提出了一种基于人工神经网络(ANN)的混合 GBS(灰狼优化器(GWO)+ 反向传播网络(BPN)+ 自组织图(SOM))入侵检测系统(IDS)。为云计算环境中的入侵检测提出了基于混合 GBS(灰狼优化器 (GWO) + 反向传播网络 (BPN) + 自组织图 (SOM) 的入侵检测系统 (IDS)。在标准基准 UNSW-NS 15 数据集上评估了一整套神经网络算法的性能后,我们选择了基础分类器 BPN 作为研究对象。通过将 BPN 与 SOM 和 GWO 相结合,进一步提高了 BPN 的入侵检测性能。混合特征选择(FS)采用基于相关性的方法和基于权重矩阵值(W)的分层 10 倍交叉验证(STCV)排序。利用基于适度函数的元启发式 GWO 超参数调整对所选特征进行进一步微调。拟议的 IDS 技术使用标准基准 UNSW-NS 15 数据集进行了验证,该数据集的训练和测试数据集中分别包含 1,75,341 和 82,332 个攻击案例。研究结果表明,所提出的基于 ANN 的混合 GBS IDS 模型优于其他现有 IDS 模型,入侵检测准确率高达 99.40%,误报率更低(0.00389),错误率更小(0.001),预测时间更短(0.29 ns)。
{"title":"HybGBS: A hybrid neural network and grey wolf optimizer for intrusion detection in a cloud computing environment","authors":"S Sumathi,&nbsp;R Rajesh","doi":"10.1002/cpe.8264","DOIUrl":"https://doi.org/10.1002/cpe.8264","url":null,"abstract":"<div>\u0000 \u0000 <p>The cloud computing environment is subject to unprecedented cyber-attacks as its infrastructure and protocols may contain vulnerabilities and bugs. Among these, Distributed Denial of Service (DDoS) is chosen by most cyber extortionists, creating unusual traffic that drains cloud resources, making them inaccessible to customers and end users. Hence, security solutions to combat this attack are in high demand. The existing DDoS detection techniques in literature have many drawbacks, such as overfitting, delay in detection, low detection accuracy for attacks that target multiple victims, and high False Positive Rate (FPR). In this proposed study, an Artificial Neural Network (ANN) based hybrid GBS (Grey Wolf Optimizer (GWO) + Back Propagation Network (BPN) + Self Organizing Map (SOM)) Intrusion Detection System (IDS) is proposed for intrusion detection in the cloud computing environment. The base classifier, BPN, was chosen for our research after evaluating the performance of a comprehensive set of neural network algorithms on the standard benchmark UNSW-NS 15 dataset. BPN intrusion detection performance is further enhanced by combining it with SOM and GWO. Hybrid Feature Selection (FS) is made using a correlation-based approach and Stratified 10-fold cross-validation (STCV) ranking based on Weight matrix value (W). These selected features are further fine-tuned using metaheuristic GWO hyperparameter tuning based on a fitness function. The proposed IDS technique is validated using the standard benchmark UNSW-NS 15 dataset, which consists of 1,75,341 and 82,332 attack cases in the training and testing datasets. This study's findings demonstrate that the proposed ANN-based hybrid GBS IDS model outperforms other existing IDS models with a higher intrusion detection accuracy of 99.40%, fewer false alarms (0.00389), less error rate (0.001), and faster prediction time (0.29 ns).</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 24","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142404823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Concurrency and Computation-Practice & Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1