期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
A systematic literature review of blockchain cyber security 被引量:15
1
作者 Paul J.Taylor Tooska Dargahi +2 位作者 Ali Dehghantanha Reza M.Parizi Kim-Kwang Raymond Choo 《Digital Communications and Networks》 SCIE 2020年第2期147-156,共10页
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008,blockchain has(slowly)become one of the most frequently discussed methods for securing data storage and transfer through decentralized,tru... Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008,blockchain has(slowly)become one of the most frequently discussed methods for securing data storage and transfer through decentralized,trustless,peer-to-peer systems.This research identifies peer-reviewed literature that seeks to utilize blockchain for cyber security purposes and presents a systematic analysis of the most frequently adopted blockchain security applications.Our findings show that the Internet of Things(IoT)lends itself well to novel blockchain applications,as do networks and machine visualization,public-key cryptography,web applications,certification schemes and the secure storage of Personally Identifiable Information(PII).This timely systematic review also sheds light on future directions of research,education and practices in the blockchain and cyber security space,such as security of blockchain in IoT,security of blockchain for AI data,and sidechain security. 展开更多
关键词 Blockchain Smart contracts Cyber security Distributed ledger technology IOT Cryptocurrency Bitcoin
在线阅读 下载PDF
Navigating the Digital Twin Network landscape:A survey on architecture,applications,privacy and security
2
作者 Akshita Maradapu Vera Venkata Sai Chenyu Wang +1 位作者 Zhipeng Cai Yingshu Li 《High-Confidence Computing》 2024年第4期129-149,共21页
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization ... In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization of Digital Twin(DT)technology.The widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical assets.DTNs create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT modeling.The high volume of user data and the ubiquitous communication systems in DTNs come with their own set of challenges.The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches.Also,currently,there is not enough literature that focuses on privacy and security issues in DTN applications.In this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their performance.Next,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective components.We then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the DTNs.We also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the issues.Finally,we provide some open research issues and problems in the field of DTN privacy and security. 展开更多
关键词 Digital Twin Networks Network architecture Privacy and security Federated learning Blockchain Internet of Vehicles 6G Supply chain
在线阅读 下载PDF
Data distribution inference attack in federated learning via reinforcement learning support
3
作者 Dongxiao Yu Hengming Zhang +1 位作者 Yan Huang Zhenzhen Xie 《High-Confidence Computing》 2025年第1期47-55,共9页
Federated Learning(FL)is currently a widely used collaborative learning framework,and the distinguished feature of FL is that the clients involved in training do not need to share raw data,but only transfer the model ... Federated Learning(FL)is currently a widely used collaborative learning framework,and the distinguished feature of FL is that the clients involved in training do not need to share raw data,but only transfer the model parameters to share knowledge,and finally get a global model with improved performance.However,recent studies have found that sharing model parameters may still lead to privacy leakage.From the shared model parameters,local training data can be reconstructed and thus lead to a threat to individual privacy and security.We observed that most of the current attacks are aimed at client-specific data reconstruction,while limited attention is paid to the information leakage of the global model.In our work,we propose a novel FL attack based on shared model parameters that can deduce the data distribution of the global model.Different from other FL attacks that aim to infer individual clients’raw data,the data distribution inference attack proposed in this work shows that the attackers can have the capability to deduce the data distribution information behind the global model.We argue that such information is valuable since the training data behind a welltrained global model indicates the common knowledge of a specific task,such as social networks and e-commerce applications.To implement such an attack,our key idea is to adopt a deep reinforcement learning approach to guide the attack process,where the RL agent adjusts the pseudo-data distribution automatically until it is similar to the ground truth data distribution.By a carefully designed Markov decision proces(MDP)process,our implementation ensures our attack can have stable performance and experimental results verify the effectiveness of our proposed inference attack. 展开更多
关键词 Sharing model parameters Data distribution attacks Federated learning Reinforcement learning
在线阅读 下载PDF
Multiscale Information Fusion Based on Large Model Inspired Bacterial Detection
4
作者 Zongduo Liu Yan Huang +2 位作者 Jian Wang Genji Yuan Junjie Pang 《Big Data Mining and Analytics》 2025年第1期1-17,共17页
Accurate and efficient bacterial detection is essential for public health and medical diagnostics. However, traditional detection methods are constrained by limited dataset size, complex bacterial morphology, and dive... Accurate and efficient bacterial detection is essential for public health and medical diagnostics. However, traditional detection methods are constrained by limited dataset size, complex bacterial morphology, and diverse detection environments, hindering their effectiveness. In this study, we present EagleEyeNet, a novel multi-scale information fusion model designed to address these challenges. EagleEyeNet leverages large models as teacher networks in a knowledge distillation framework, significantly improving detection performance. Additionally, a newly designed feature fusion architecture, integrating Transformer modules, is proposed to enable the efficient fusion of global and multi-scale features, overcoming the bottlenecks posed by Feature Pyramid Networks (FPN) structures, which in turn reduces information transmission loss between feature layers. To improve the model’s adaptability for different scenarios, we create our own QingDao Bacteria Detection (QDBD) dataset as a comprehensive evaluation benchmark for bacterial detection. Experimental results demonstrate that EagleEyeNet achieves remarkable performance improvements, with mAP50 increases of 3.1% on the QDBD dataset and 4.9% on the AGRA dataset, outperforming the State-Of-The-Art (SOTA) methods in detection accuracy. These findings underscore the transformative potential of integrating large models and deep learning for advancing bacterial detection technologies. 展开更多
关键词 bacterial detection large model feature fusion global information
原文传递
Security and Privacy in Metaverse: A Comprehensive Survey 被引量:14
5
作者 Yan Huang Yi(Joy)Li Zhipeng Cai 《Big Data Mining and Analytics》 EI CSCD 2023年第2期234-247,共14页
Metaverse describes a new shape of cyberspace and has become a hot-trending word since 2021.There are many explanations about what Meterverse is and attempts to provide a formal standard or definition of Metaverse.How... Metaverse describes a new shape of cyberspace and has become a hot-trending word since 2021.There are many explanations about what Meterverse is and attempts to provide a formal standard or definition of Metaverse.However,these definitions could hardly reach universal acceptance.Rather than providing a formal definition of the Metaverse,we list four must-have characteristics of the Metaverse:socialization,immersive interaction,real world-building,and expandability.These characteristics not only carve the Metaverse into a novel and fantastic digital world,but also make it suffer from all security/privacy risks,such as personal information leakage,eavesdropping,unauthorized access,phishing,data injection,broken authentication,insecure design,and more.This paper first introduces the four characteristics,then the current progress and typical applications of the Metaverse are surveyed and categorized into four economic sectors.Based on the four characteristics and the findings of the current progress,the security and privacy issues in the Metaverse are investigated.We then identify and discuss more potential critical security and privacy issues that can be caused by combining the four characteristics.Lastly,the paper also raises some other concerns regarding society and humanity. 展开更多
关键词 Metaverse CYBERSECURITY privacy protection cyber infrastructure extended reality
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部