期刊文献+
共找到191篇文章
< 1 2 10 >
每页显示 20 50 100
BAFL-SVM:A blockchain-assisted federated learning-driven SVM framework for smart agriculture 被引量:2
1
作者 Ruiyao Shen Hongliang Zhang +4 位作者 Baobao Chai Wenyue Wang Guijuan Wang Biwei Yan Jiguo Yu high-confidence computing 2025年第1期91-100,共10页
The combination of blockchain and Internet of Things technology has made significant progress in smart agriculture,which provides substantial support for data sharing and data privacy protection.Nevertheless,achieving... The combination of blockchain and Internet of Things technology has made significant progress in smart agriculture,which provides substantial support for data sharing and data privacy protection.Nevertheless,achieving efficient interactivity and privacy protection of agricultural data remains a crucial issues.To address the above problems,we propose a blockchain-assisted federated learningdriven support vector machine(BAFL-SVM)framework to realize efficient data sharing and privacy protection.The BAFL-SVM is composed of the FedSVM-RiceCare module and the FedPrivChain module.Specifically,in FedSVM-RiceCare,we utilize federated learning and SVM to train the model,improving the accuracy of the experiment.Then,in FedPrivChain,we adopt homomorphic encryption and a secret-sharing scheme to encrypt the local model parameters and upload them.Finally,we conduct a large number of experiments on a real-world dataset of rice pests and diseases,and the experimental results show that our framework not only guarantees the secure sharing of data but also achieves a higher recognition accuracy compared with other schemes. 展开更多
关键词 Smart agriculture Blockchain Federated learning Privacy protection
在线阅读 下载PDF
On protecting the data privacy of Large Language Models(LLMs)and LLM agents:A literature review 被引量:1
2
作者 Biwei Yan Kun Li +4 位作者 Minghui Xu Yueyan Dong Yue Zhang Zhaochun Ren Xiuzhen Cheng high-confidence computing 2025年第2期131-151,共21页
Large Language Models(LLMs)are complex artificial intelligence systems,which can understand,generate,and translate human languages.By analyzing large amounts of textual data,these models learn language patterns to per... Large Language Models(LLMs)are complex artificial intelligence systems,which can understand,generate,and translate human languages.By analyzing large amounts of textual data,these models learn language patterns to perform tasks such as writing,conversation,and summarization.Agents built on LLMs(LLM agents)further extend these capabilities,allowing them to process user interactions and perform complex operations in diverse task environments.However,during the processing and generation of massive data,LLMs and LLM agents pose a risk of sensitive information leakage,potentially threatening data privacy.This paper aims to demonstrate data privacy issues associated with LLMs and LLM agents to facilitate a comprehensive understanding.Specifically,we conduct an in-depth survey about privacy threats,encompassing passive privacy leakage and active privacy attacks.Subsequently,we introduce the privacy protection mechanisms employed by LLMs and LLM agents and provide a detailed analysis of their effectiveness.Finally,we explore the privacy protection challenges for LLMs and LLM agents as well as outline potential directions for future developments in this domain. 展开更多
关键词 Large Language Models(LLMs) SECURITY Data privacy Privacy protection LLM agents SURVEY
在线阅读 下载PDF
Task migration with deadlines using machine learning-based dwell time prediction in vehicular micro clouds 被引量:1
3
作者 Ziqi Zhou Agon Memedi +3 位作者 Chunghan Lee Seyhan Ucar Onur Altintas Falko Dressler high-confidence computing 2025年第2期100-111,共12页
Edge computing is becoming ever more relevant to offload compute-heavy tasks in vehicular networks.In this context,the concept of vehicular micro clouds(VMCs)has been proposed to use compute and storage resources on n... Edge computing is becoming ever more relevant to offload compute-heavy tasks in vehicular networks.In this context,the concept of vehicular micro clouds(VMCs)has been proposed to use compute and storage resources on nearby vehicles to complete computational tasks.As many tasks in this application domain are time critical,offloading to the cloud is prohibitive.Additionally,task deadlines have to be dealt with.This paper addresses two main challenges.First,we present a task migration algorithm supporting deadlines in vehicular edge computing.The algorithm is following the earliest deadline first model but in presence of dynamic processing resources,i.e,vehicles joining and leaving a VMC.This task offloading is very sensitive to the mobility of vehicles in a VMC,i.e,the so-called dwell time a vehicles spends in the VMC.Thus,secondly,we propose a machine learning-based solution for dwell time prediction.Our dwell time prediction model uses a random forest approach to estimate how long a vehicle will stay in a VMC.Our approach is evaluated using mobility traces of an artificial simple intersection scenario as well as of real urban traffic in cities of Luxembourg and Nagoya.Our proposed approach is able to realize low-delay and low-failure task migration in dynamic vehicular conditions,advancing the state of the art in vehicular edge computing. 展开更多
关键词 Edge computing Vehicular micro cloud Task migration Task offloading Dwell time prediction
在线阅读 下载PDF
Data distribution inference attack in federated learning via reinforcement learning support 被引量:1
4
作者 Dongxiao Yu Hengming Zhang +1 位作者 Yan Huang Zhenzhen Xie high-confidence computing 2025年第1期47-55,共9页
Federated Learning(FL)is currently a widely used collaborative learning framework,and the distinguished feature of FL is that the clients involved in training do not need to share raw data,but only transfer the model ... Federated Learning(FL)is currently a widely used collaborative learning framework,and the distinguished feature of FL is that the clients involved in training do not need to share raw data,but only transfer the model parameters to share knowledge,and finally get a global model with improved performance.However,recent studies have found that sharing model parameters may still lead to privacy leakage.From the shared model parameters,local training data can be reconstructed and thus lead to a threat to individual privacy and security.We observed that most of the current attacks are aimed at client-specific data reconstruction,while limited attention is paid to the information leakage of the global model.In our work,we propose a novel FL attack based on shared model parameters that can deduce the data distribution of the global model.Different from other FL attacks that aim to infer individual clients’raw data,the data distribution inference attack proposed in this work shows that the attackers can have the capability to deduce the data distribution information behind the global model.We argue that such information is valuable since the training data behind a welltrained global model indicates the common knowledge of a specific task,such as social networks and e-commerce applications.To implement such an attack,our key idea is to adopt a deep reinforcement learning approach to guide the attack process,where the RL agent adjusts the pseudo-data distribution automatically until it is similar to the ground truth data distribution.By a carefully designed Markov decision proces(MDP)process,our implementation ensures our attack can have stable performance and experimental results verify the effectiveness of our proposed inference attack. 展开更多
关键词 Sharing model parameters Data distribution attacks Federated learning Reinforcement learning
在线阅读 下载PDF
Kubernetes application performance benchmarking on heterogeneous CPU architecture:An experimental review
5
作者 Jannatun Noor Badsha Faysal +3 位作者 Sheikh Amin Bushra Tabassum Tamim Raiyan Khan Tanvir Rahman high-confidence computing 2025年第1期132-148,共17页
With the rapid advancement of cloud technologies,cloud services have enormously contributed to the cloud community for application development life-cycle.In this context,Kubernetes has played a pivotal role as a cloud... With the rapid advancement of cloud technologies,cloud services have enormously contributed to the cloud community for application development life-cycle.In this context,Kubernetes has played a pivotal role as a cloud computing tool,enabling developers to adopt efficient and automated deployment strategies.Using Kubernetes as an orchestration tool and a cloud computing system as a manager of the infrastructures,developers can boost the development and deployment process.With cloud providers such as GCP,AWS,Azure,and Oracle offering Kubernetes services,the availability of both x86 and ARM platforms has become evident.However,while x86 currently dominates the market,ARM-based solutions have seen limited adoption,with only a few individuals actively working on ARM deployments.This study explores the efficiency and cost-effectiveness of implementing Kubernetes on different CPU platforms.By comparing the performance of x86 and ARM platforms,this research seeks to ascertain whether transitioning to ARM presents a more advantageous option for Kubernetes deployments.Through a comprehensive evaluation of scalability,cost,and overall performance,this study aims to shed light on the viability of leveraging ARM on different CPUs by providing valuable insights. 展开更多
关键词 Kubernetes K8s K3s Serverless computing Container as a Service(CaaS) Container orchestration Docker CPU architecture X86 ARM
在线阅读 下载PDF
Reinforcement learning for an efficient and effective malware investigation during cyber incident response
6
作者 Dipo Dunsin Mohamed Chahine Ghanem +1 位作者 Karim Ouazzane Vassil Vassilev high-confidence computing 2025年第3期93-111,共19页
The ever-escalating prevalence of malware is a serious cybersecurity threat,often requiring advanced post-incident forensic investigation techniques.This paper proposes a framework to enhance malware forensics by leve... The ever-escalating prevalence of malware is a serious cybersecurity threat,often requiring advanced post-incident forensic investigation techniques.This paper proposes a framework to enhance malware forensics by leveraging reinforcement learning(RL).The approach combines heuristic and signaturebased methods,supported by RL through a unified MDP model,which breaks down malware analysis into distinct states and actions.This optimisation enhances the identification and classification of malware variants.The framework employs Q-learning and other techniques to boost the speed and accuracy of detecting new and unknown malware,outperforming traditional methods.We tested the experimental framework across multiple virtual environments infected with various malware types.The RL agent collected forensic evidence and improved its performance through Q-tables and temporal difference learning.The epsilon-greedy exploration strategy,in conjunction with Q-learning updates,effectively facilitated transitions.The learning rate depended on the complexity of the MDP environment:higher in simpler ones for quicker convergence and lower in more complex ones for stability.This RL-enhanced model significantly reduced the time required for post-incident malware investigations,achieving a high accuracy rate of 94%in identifying malware.These results indicate RL’s potential to revolutionise post-incident forensics investigations in cybersecurity.Future work will incorporate more advanced RL algorithms and large language models(LLMs)to further enhance the effectiveness of malware forensic analysis. 展开更多
关键词 Cyber incident Digital forensics Artificial intelligence Reinforcement learning Markov Chain MDP DFIR MALWARE Incident response
在线阅读 下载PDF
A lightweight practical consensus mechanism for supply chain blockchain
7
作者 Mohammad Saidur Rahman Ibrahim Khalil +1 位作者 Mohammed Atiquzzaman Abdelaziz Bouras high-confidence computing 2025年第1期101-113,共13页
We present a consensus mechanism in this paper that is designed specifically for supply chain blockchains,with a core focus on establishing trust among participating stakeholders through a novel reputation-based appro... We present a consensus mechanism in this paper that is designed specifically for supply chain blockchains,with a core focus on establishing trust among participating stakeholders through a novel reputation-based approach.The prevailing consensus mechanisms,initially crafted for cryptocurrency applications,prove unsuitable for the unique dynamics of supply chain systems.Unlike the broad inclusivity of cryptocurrency networks,our proposed mechanism insists on stakeholder participation rooted in process-specific quality criteria.The delineation of roles for supply chain participants within the consensus process becomes paramount.While reputation serves as a well-established quality parameter in various domains,its nuanced impact on non-cryptocurrency consensus mechanisms remains uncharted territory.Moreover,recognizing the primary role of efficient block verification in blockchain-enabled supply chains,our work introduces a comprehensive reputation model.This model strategically selects a leader node to orchestrate the entire block mining process within the consensus.Additionally,we innovate with a Schnorr Multisignature-based block verification mechanism seamlessly integrated into our proposed consensus model.Rigorous experiments are conducted to evaluate the performance and feasibility of our pioneering consensus mechanism,contributing valuable insights to the evolving landscape of blockchain technology in supply chain applications. 展开更多
关键词 Supply chain Blockchain CONSENSUS REPUTATION Reputation-based consensus MULTISIGNATURE RAFT Schnorr multisignature
在线阅读 下载PDF
Performance evaluation of file operations using Mutagen
8
作者 Mahid Atif Hosain Sriram Chellappan Jannatun Noor high-confidence computing 2025年第3期153-158,共6页
Docker is a vital tool in modern development,enabling the creation,deployment,and execution of applications using containers,thereby ensuring consistency across various environments.However,developers often face chall... Docker is a vital tool in modern development,enabling the creation,deployment,and execution of applications using containers,thereby ensuring consistency across various environments.However,developers often face challenges,particularly with filesystem complexities and performance bottlenecks when working directly within Docker containers.This is where Mutagen comes into play,significantly enhancing the Docker experience by offering efficient network file synchronization,reducing latency in file operations,and improving overall data transfer rates in containerized environments.By exploring Docker’s architecture,examining Mutagen’s role,and evaluating their combined performance impacts,particularly in terms of file operation speeds and development workflow efficiencies,this research provides a deep understanding of these technologies and their potential to streamline development processes in networked and distributed environments. 展开更多
关键词 MUTAGEN DOCKER OverlayFS Union mount filesystem Synchronization Fio RSYNC
在线阅读 下载PDF
FedViTBloc:Secure and privacy-enhanced medical image analysis with federated vision transformer and blockchain
9
作者 Gabriel Chukwunonso Amaizu Akshita Maradapu Vera Venkata Sai +3 位作者 Sanjay Bhardwaj Dong-Seong Kim Madhuri Siddula Yingshu Li high-confidence computing 2025年第3期123-134,共12页
The increasing prevalence of cancer necessitates advanced methodologies for early detection and diagnosis.Early intervention is crucial for improving patient outcomes and reducing the overall burden on healthcare syst... The increasing prevalence of cancer necessitates advanced methodologies for early detection and diagnosis.Early intervention is crucial for improving patient outcomes and reducing the overall burden on healthcare systems.Traditional centralized methods of medical image analysis pose significant risks to patient privacy and data security,as they require the aggregation of sensitive information in a single location.Furthermore,these methods often suffer from limitations related to data diversity and scalability,hindering the development of universally robust diagnostic models.Recent advancements in machine learning,particularly deep learning,have shown promise in enhancing medical image analysis.However,the need to access large and diverse datasets for training these models introduces challenges in maintaining patient confidentiality and adhering to strict data protection regulations.This paper introduces FedViTBloc,a secure and privacy-enhanced framework for medical image analysis utilizing Federated Learning(FL)combined with Vision Transformers(ViT)and blockchain technology.The proposed system ensures patient data privacy and security through fully homomorphic encryption and differential privacy techniques.By employing a decentralized FL approach,multiple medical institutions can collaboratively train a robust deep-learning model without sharing raw data.Blockchain integration further enhances the security and trustworthiness of the FL process by managing client registration and ensuring secure onboarding of participants.Experimental results demonstrate the effectiveness of FedViTBloc in medical image analysis while maintaining stringent privacy standards,achieving 67%accuracy and reducing loss below 2 across 10 clients,ensuring scalability and robustness. 展开更多
关键词 AI Blockchain DECENTRALIZED Federated Learning Medical images Machine Learning VIT
在线阅读 下载PDF
Joint feature selection and classification of low-resolution satellite images using the SAT-6 dataset
10
作者 Rajalaxmi Padhy Sanjit Kumar Dash Jibitesh Mishra high-confidence computing 2025年第3期8-17,共10页
The modern industries of today demand the classification of satellite images,and to use the information obtained from it for their advantage and growth.The extracted information also plays a crucial role in national s... The modern industries of today demand the classification of satellite images,and to use the information obtained from it for their advantage and growth.The extracted information also plays a crucial role in national security and the mapping of geographical locations.The conventional methods often fail to handle the complexities of this process.So,an effective method is required with high accuracy and stability.In this paper,a new methodology named RankEnsembleFS is proposed that addresses the crucial issues of stability and feature aggregation in the context of the SAT-6 dataset.RankEnsembleFS makes use of a two-step process that consists of ranking the features and then selecting the optimal feature subset from the top-ranked features.RankEnsembleFS achieved comparable accuracy results to state-of-the-art models for the SAT-6 dataset while significantly reducing the feature space.This reduction in feature space is important because it reduces computational complexity and enhances the interpretability of the model.Moreover,the proposed method demonstrated good stability in handling changes in data characteristics,which is critical for reliable performance over time and surpasses existing ML ensemble methods in terms of stability,threshold setting,and feature aggregation.In summary,this paper provides compelling evidence that this RankEnsembleFS methodology presents excellent performance and overcomes key issues in feature selection and image classification for the SAT-6 dataset. 展开更多
关键词 Satellite images Feature selection Ensemble feature selection Feature ranking Feature reduction Image classification
在线阅读 下载PDF
Text-augmented long-term relation dependency learning for knowledge graph representation
11
作者 Quntao Zhu Mengfan Li +3 位作者 Yuanjun Gao Yao Wan Xuanhua Shi Hai Jin high-confidence computing 2025年第4期43-56,共14页
Knowledge graph(KG)representation learning aims to map entities and relations into a low-dimensional representation space,showing significant potential in many tasks.Existing approaches follow two categories:(1)Graph-... Knowledge graph(KG)representation learning aims to map entities and relations into a low-dimensional representation space,showing significant potential in many tasks.Existing approaches follow two categories:(1)Graph-based approaches encode KG elements into vectors using structural score functions.(2)Text-based approaches embed text descriptions of entities and relations via pre-trained language models(PLMs),further fine-tuned with triples.We argue that graph-based approaches struggle with sparse data,while text-based approaches face challenges with complex relations.To address these limitations,we propose a unified Text-Augmented Attention-based Recurrent Network,bridging the gap between graph and natural language.Specifically,we employ a graph attention network based on local influence weights to model local structural information and utilize a PLM based prompt learning to learn textual information,enhanced by a mask-reconstruction strategy based on global influence weights and textual contrastive learning for improved robustness and generalizability.Besides,to effectively model multi-hop relations,we propose a novel semantic-depth guided path extraction algorithm and integrate cross-attention layers into recurrent neural networks to facilitate learning the long-term relation dependency and offer an adaptive attention mechanism for varied-length information.Extensive experiments demonstrate that our model exhibits superiority over existing models across KG completion and question-answering tasks. 展开更多
关键词 Knowledge graph representation Graph attention network Pretrained language model Attention-based recurrent network Masked autoencoder Contrastive learning
在线阅读 下载PDF
Assessing the effectiveness of crawlers and large language models in detecting adversarial hidden link threats in meta computing
12
作者 Junjie Xiong Mingkui Wei +1 位作者 Zhuo Lu Yao Liu high-confidence computing 2025年第3期31-45,共15页
In the emerging field of Meta Computing,where data collection and integration are essential components,the threat of adversary hidden link attacks poses a significant challenge to web crawlers.In this paper,we investi... In the emerging field of Meta Computing,where data collection and integration are essential components,the threat of adversary hidden link attacks poses a significant challenge to web crawlers.In this paper,we investigate the influence of these attacks on data collection by web crawlers,which famously elude conventional detection techniques using large language models(LLMs).Empirically,we find some vulnerabilities in the current crawler mechanisms and large language model detection,especially in code inspection,and propose enhancements that will help mitigate these weaknesses.Our assessment of real-world web pages reveals the prevalence and impact of adversary hidden link attacks,emphasizing the necessity for robust countermeasures.Furthermore,we introduce a mitigation framework that integrates element visual inspection techniques.Our evaluation demonstrates the framework’s efficacy in detecting and addressing these advanced cyber threats within the evolving landscape of Meta Computing. 展开更多
关键词 Meta computing Data integration Adversary hidden link Web crawling Content deception detection Large language model
在线阅读 下载PDF
Trusted access control mechanism for data with blockchain-assisted attribute encryption
13
作者 Chang Liu Dong Wang +3 位作者 Da Li Shaoyong Guo Wenjing Li Xuesong Qiu high-confidence computing 2025年第2期19-30,共12页
In the growing demand for data sharing,how to realize fine-grained trusted access control of shared data and protect data security has become a difficult problem.Ciphertext policy attribute-based encryption(CP-ABE)mod... In the growing demand for data sharing,how to realize fine-grained trusted access control of shared data and protect data security has become a difficult problem.Ciphertext policy attribute-based encryption(CP-ABE)model is widely used in cloud data sharing scenarios,but there are problems such as privacy leakage of access policy,irrevocability of user or attribute,key escrow,and trust bottleneck.Therefore,we propose a blockchain-assisted CP-ABE(B-CP-ABE)mechanism for trusted data access control.Firstly,we construct a data trusted access control architecture based on the B-CP-ABE,which realizes the automated execution of access policies through smart contracts and guarantees the trusted access process through blockchain.Then,we define the B-CP-ABE scheme,which has the functions of policy partial hidden,attribute revocation,and anti-key escrow.The B-CP-ABE scheme utilizes Bloom filter to hide the mapping relationship of sensitive attributes in the access structure,realizes flexible revocation and recovery of users and attributes by re-encryption algorithm,and solves the key escrow problem by joint authorization of data owners and attribute authority.Finally,we demonstrate the usability of the B-CP-ABE scheme by performing security analysis and performance analysis. 展开更多
关键词 Access control Blockchain CP-ABE Policy hidden Attribute revocation Key escrow
在线阅读 下载PDF
Optimal filter assignment policy against link flooding attack
14
作者 Rajorshi Biswas Jie Wu +1 位作者 Wei Chang Pouya Ostovari high-confidence computing 2025年第1期15-24,共10页
A Link Flooding Attack(LFA)is a special type of Denial-of-Service(DoS)attack in which the attacker sends out a huge number of requests to exhaust the capacity of a link on the path the traffic comes to a server.As a r... A Link Flooding Attack(LFA)is a special type of Denial-of-Service(DoS)attack in which the attacker sends out a huge number of requests to exhaust the capacity of a link on the path the traffic comes to a server.As a result,user traffic cannot reach the server.As a result,DoS and degradation of Qualityof-Service(QoS)occur.Because the attack traffic does not go to the victim,protecting the legitimate traffic alone is hard for the victim.The victim can protect its legitimate traffic by using a special type of router called filter router(FR).An FR can receive server filters and apply them to block a link incident to it.An FR probabilistically appends its own IP address to packets it forwards,and the victim uses that information to discover the traffic topology.By analyzing traffic rates and paths,the victim identifies some links that may be congested.The victim needs to select some of these possible congested links(PCLs)and send a filter to the corresponding FR so that legitimate traffic avoids congested paths.In this paper,we formulate two optimization problems for blocking the least number of PCLs so that the legitimate traffic goes through a non-congested path.We consider the scenario where every user has at least one non-congested shortest path in the first problem.We extend the first problem to a scenario where there are some users whose shortest paths are all congested.We transform the original problem to the vertex separation problem to find the links to block.We use a custom-built Java multi-threaded simulator and conduct extensive simulations to support our solutions. 展开更多
关键词 BOTNET DDoS defense QUALITY-OF-SERVICE Filter router Link flooding attack Network security
在线阅读 下载PDF
Analysis of deep learning under adversarial attacks in hierarchical federated learning
15
作者 Duaa S.Alqattan Vaclav Snasel +1 位作者 Rajiv Ranjan Varun Ojha high-confidence computing 2025年第4期119-141,共23页
Hierarchical Federated Learning(HFL)extends traditional Federated Learning(FL)by introducing multi-level aggregation in which model updates pass through clients,edge servers,and a global server.While this hierarchical... Hierarchical Federated Learning(HFL)extends traditional Federated Learning(FL)by introducing multi-level aggregation in which model updates pass through clients,edge servers,and a global server.While this hierarchical structure enhances scalability,it also increases vulnerability to adversarial attacks—such as data poisoning and model poisoning—that disrupt learning by introducing discrepancies at the edge server level.These discrepancies propagate through aggregation,affecting model consistency and overall integrity.Existing studies on adversarial behaviour in FL primarily rely on single-metric approaches—such as cosine similarity or Euclidean distance—to assess model discrepancies and filter out anomalous updates.However,these methods fail to capture the diverse ways adversarial attacks influence model updates,particularly in highly heterogeneous data environments and hierarchical structures.Attackers can exploit the limitations of single-metric defences by crafting updates that seem benign under one metric while remaining anomalous under another.Moreover,prior studies have not systematically analysed how model discrepancies evolve over time,vary across regions,or affect clustering structures in HFL architectures.To address these limitations,we propose the Model Discrepancy Score(MDS),a multi-metric framework that integrates Dissimilarity,Distance,Uncorrelation,and Divergence to provide a comprehensive analysis of how adversarial activity affects model discrepancies.Through temporal,spatial,and clustering analyses,we examine how attacks affect model discrepancies at the edge server level in 3LHFL and 4LHFL architectures and evaluate MDS’s ability to distinguish between benign and malicious servers.Our results show that while 4LHFL effectively mitigates discrepancies in regional attack scenarios,it struggles with distributed attacks due to additional aggregation layers that obscure distinguishable discrepancy patterns over time,across regions,and within clustering structures.Factors influencing detection include data heterogeneity,attack sophistication,and hierarchical aggregation depth.These findings highlight the limitations of single-metric approaches and emphasize the need for multi-metric strategies such as MDS to enhance HFL security. 展开更多
关键词 Hierarchical federated learning Model discrepancy Targeted label flipping Untargeted label flipping Client-side sign flipping Server-side sign flipping
在线阅读 下载PDF
Hierarchical federated transfer learning in digital twin-based vehicular networks
16
作者 Qasim Zia Saide Zhu +2 位作者 Haoxin Wang Zafar Iqbal Yingshu Li high-confidence computing 2025年第4期8-18,共11页
In recent research on the Digital Twin-based Vehicular Ad hoc Network(DT-VANET),Federated Learning(FL)has shown its ability to provide data privacy.However,Federated learning struggles to adequately train a global mod... In recent research on the Digital Twin-based Vehicular Ad hoc Network(DT-VANET),Federated Learning(FL)has shown its ability to provide data privacy.However,Federated learning struggles to adequately train a global model when confronted with data heterogeneity and data sparsity among vehicles,which ensure suboptimal accuracy in making precise predictions for different vehicle types.To address these challenges,this paper combines Federated Transfer Learning(FTL)to conduct vehicle clustering related to types of vehicles and proposes a novel Hierarchical Federated Transfer Learning(HFTL).We construct a framework for DT-VANET,along with two algorithms designed for cloud server model updates and intra-cluster federated transfer learning,to improve the accuracy of the global model.In addition,we developed a data quality score-based mechanism to prevent the global model from being affected by malicious vehicles.Lastly,detailed experiments on real-world datasets are conducted,considering different performance metrics that verify the effectiveness and efficiency of our algorithm. 展开更多
关键词 Vehicular ad-hoc network Hierarchical federated transfer learning Vehicular digital twin Autonomous vehicle Digital twin-based vehicular networks
在线阅读 下载PDF
An improved secure designated server certificateless authenticated searchable encryption scheme for IIoT
17
作者 Le Zhang Feng Zhou +2 位作者 Qijia Zhang Wei Xiong Youliang Tian high-confidence computing 2025年第3期112-122,共11页
The Industrial Internet of Things(IIoT)achieves the automation,monitoring,and optimization of industrial processes by interconnecting various sensors,smart devices,and the Internet,which dramatically increases product... The Industrial Internet of Things(IIoT)achieves the automation,monitoring,and optimization of industrial processes by interconnecting various sensors,smart devices,and the Internet,which dramatically increases productivity and product quality.Nevertheless,the IIoT comprises a substantial amount of sensitive data,which requires encryption to ensure data privacy and security.Recently,Sun et al.proposed a certificateless searchable encryption scheme for IIoT to enable the retrieval of ciphertext data while protecting data privacy.However,we found that their scheme not only fails to satisfy trapdoor indistinguishability but also lacks defense against keyword guessing attacks.In addition,some schemes use deterministic algorithms in the encryption process,resulting in the same ciphertexts after encryption for the same keyword,thereby leaking the potential frequency distribution of the keyword in the ciphertext space,thereby leaking the potential frequency distribution of the keyword in the ciphertext space,allowing attackers to infer the plaintext information corresponding to the ciphertext through statistical analysis.To better protect data privacy,we propose an improved certificateless searchable encryption scheme with a designated server.With security analysis,we prove that our scheme provides multi-ciphertext indistinguishability and multi-trapdoor indistinguishability security under the random oracle.Experimental results show that the proposed scheme has good overall performance in terms of computational overhead,communication overhead,and security features. 展开更多
关键词 Industrial Internet of Things Searchable encryption INDISTINGUISHABILITY Keyword guessing attacks Random oracle
在线阅读 下载PDF
Dynamic assessment approach for intelligent power distribution systems based on runtime verification with requirements updates
18
作者 Yunshuo Li Xiangjun Duan +1 位作者 Yuanyuan Xu Cheng Zhao high-confidence computing 2025年第2期1-10,共10页
The study aims to address the challenge of dynamic assessment in power systems by proposing a design scheme for an intelligent adaptive power distribution system based on runtime verification.The system architecture i... The study aims to address the challenge of dynamic assessment in power systems by proposing a design scheme for an intelligent adaptive power distribution system based on runtime verification.The system architecture is built upon cloud-edge-end collaboration,enabling comprehensive monitoring and precise management of the power grid through coordinated efforts across different levels.Specif-ically,the study employs the adaptive observer approach,allowing dynamic adjustments to observers to reflect updates in requirements and ensure system reliability.This method covers both structural and parametric adjustments to specifications,including updating time protection conditions,updating events,and adding or removing responses.The results demonstrate that with the implementation of adaptive observers,the system becomes more flexible in responding to changes,significantly enhancing its level of efficiency.By employing dynamically changing verification specifications,the system achieves real-time and flexible verification.This research provides technical support for the safe,efficient,and reliable operation of electrical power distribution systems. 展开更多
关键词 Smart grid Cloud-edge collaboration Power distribution internet of things Self-adaptive systems Runtime verification
在线阅读 下载PDF
Cloud data security with deep maxout assisted data sanitization and restoration process
19
作者 Shrikant D.Dhamdhere M.Sivakkumar V.Subramanian high-confidence computing 2025年第1期68-81,共14页
The potential of cloud computing,an emerging concept to minimize the costs associated with computing has recently drawn the interest of a number of researchers.The fast advancements in cloud computing techniques led t... The potential of cloud computing,an emerging concept to minimize the costs associated with computing has recently drawn the interest of a number of researchers.The fast advancements in cloud computing techniques led to the amazing arrival of cloud services.But data security is a challenging issue for modern civilization.The main issues with cloud computing are cloud security as well as effective cloud distribution over the network.Increasing the privacy of data with encryption methods is the greatest approach,which has highly progressed in recent times.In this aspect,sanitization is also the process of confidentiality of data.The goal of this work is to present a deep learning-assisted data sanitization procedure for data security.The proposed data sanitization process involves the following steps:data preprocessing,optimal key generation,deep learning-assisted key fine-tuning,and Kronecker product.Here,the data preprocessing considers original data as well as the extracted statistical feature.Key generation is the subsequent process,for which,a self-adaptive Namib beetle optimization(SANBO)algorithm is developed in this research.Among the generated keys,appropriate keys are fine-tuned by the improved Deep Maxout classifier.Then,the Kronecker product is done in the sanitization process.Reversing the sanitization procedure will yield the original data during the data restoration phase.The study part notes that the suggested data sanitization technique guarantees cloud data security against malign attacks.Also,the analysis of proposed work in terms of restoration effectiveness and key sensitivity analysis is also done. 展开更多
关键词 Adopted data sanitization Cloud data security RESTORATION Improved deep maxout Optimal key generation
在线阅读 下载PDF
Secure and trusted sharing mechanism of private data for Internet of Things
20
作者 Mengyuan Li Shaoyong Guo +6 位作者 Wenjing Li Ao Xiong Xiaoming Zhou Jun Qi Feng Qi Dong Wang Da Li high-confidence computing 2025年第2期55-63,共9页
In recent years,the rapid development of Internet of Things(IoT)technology has led to a significant increase in the amount of data stored in the cloud.However,traditional IoT systems rely primarily on cloud data cente... In recent years,the rapid development of Internet of Things(IoT)technology has led to a significant increase in the amount of data stored in the cloud.However,traditional IoT systems rely primarily on cloud data centers for information storage and user access control services.This practice creates the risk of privacy breaches on IoT data sharing platforms,including issues such as data tampering and data breaches.To address these concerns,blockchain technology,with its inherent properties such as tamper-proof and decentralization,has emerged as a promising solution that enables trusted sharing of IoT data.Still,there are challenges to implementing encrypted data search in this context.This paper proposes a novel searchable attribute cryptographic access control mechanism that facilitates trusted cloud data sharing.Users can use keywords To efficiently search for specific data and decrypt content keys when their properties are consistent with access policies.In this way,cloud service providers will not be able to access any data privacy-related information,ensuring the security and trustworthiness of data sharing,as well as the protection of user data privacy.Our simulation results show that our approach outperforms existing studies in terms of time overhead.Compared to traditional access control schemes,our approach reduces data encryption time by 33%,decryption time by 5%,and search time by 75%. 展开更多
关键词 Searchable encryption Attribute access control Privacy protection Data sharing Keyword search
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部