Medical data is highly sensitive, often leading to 'data silos' in sharing processes. To address this issue, this paper combines blockchain and federated metric learning technologies, and innovatively integrat...
详细信息
This research focuses on the limitations of the original association rule and presents a method for addressing these limitations by dividing the dataset into event sequences. The original association rule has a limite...
详细信息
Globalization and technology have greatly enhanced the quality of life for deaf students by addressing communication barriers, safety concerns, limited accessibility to sign language learning tools, and mobility diffi...
详细信息
Accompanied by the development of big data and cloud computing and other technologies, the traditional centralized authentication technology faces increasing security risks due to the existence of its trusted center. ...
详细信息
The globalization of the IC supply chain has increased the possibility for adversaries to insert hardware Trojans (HTs), which are always inserted into nodes with high concealment. Although several methods have been i...
详细信息
ISBN:
(纸本)9798331540340;9798331540333
The globalization of the IC supply chain has increased the possibility for adversaries to insert hardware Trojans (HTs), which are always inserted into nodes with high concealment. Although several methods have been introduced to detect HTs, they do not specifically focus on node concealment and are not accurate enough. In this paper, 11 new features are proposed reflecting the node concealment, i.e, the controllable difficulty and observable difficulty of nodes, for machine-learning-based HT detection. The proposed features comprehensively consider the circuit structure information and signal propagation characteristics, and quantify the possibility of attacks. After combining the proposed features with existing ones for classification, the true positive rate (TPR) is 35 points higher than that without using the proposed features. Compared with the state-of-the-art works, our TPR and true negative rate (TNR) have increased by 15.6% and 2.1%, respectively, especially in large-scale circuits. It shows that our method has a great advantage in detection accuracy.
Hazardous forest fires over Borneo in 2019 should be a concern that natural climate-related disasters have been increasing;they can be more frequent and extreme. Research about forest fire prediction and its impact ha...
详细信息
With long privacy policies, users face the challenge of understanding them easily in order to ensure that their privacy rights are upheld. This paper presents an approach for democratizing GDPR compliance through AI-d...
详细信息
Cloud computing has revolutionized access to computing resources by offering internet-based utility services, eliminating the need for significant upfront investments in hardware and software infrastructure. However, ...
详细信息
ISBN:
(纸本)9798350395914
Cloud computing has revolutionized access to computing resources by offering internet-based utility services, eliminating the need for significant upfront investments in hardware and software infrastructure. However, ensuring data integrity (DI) within this paradigm presents multifaceted challenges. These challenges encompass issues of complexity, security, privacy, control limitations, human error, and financial constraints. Existing DI solutions often fall short of effectively verifying data, mitigating replay attacks, and managing computational overhead. This deficiency leads to an increasing need for third-party verifiers with access to cloud infrastructure, raising concerns about data security and privacy. This paper proposes the Cryptographic Accumulator Provable Data Possession with Merkle Hash Tree (CAPDP-MHT) scheme as a robust solution to address the limitations of current DI approaches. Through extensive simulations and rigorous evaluations utilizing MATLAB, CAPDP-MHT demonstrates significantly enhanced performance compared to both Provable Data Possession (PDP) and Rivest-Shamir-Adleman (RSA) algorithms across various scenarios. Specifically, CAPDP-MHT achieves an average data verification success rate of 25%, a substantial improvement over PDP and RSA's rates of 10% and 5%, respectively. Additionally, it outperforms existing algorithms in detecting replay attacks, accomplishing this within 30 seconds compared to PDP's 45 seconds and RSA's 70 seconds. Furthermore, CAPDP-MHT demonstrates superior computational efficiency, incurring an overhead of approximately 27 seconds, significantly lower than PDP's 45 seconds and RSA's 60 seconds. These results establish CAPDP-MHT as a highly reliable and efficient solution for data integrity verification in cloud environments. It surpasses traditional PDP and RSA-based schemes in both reliability and computational efficiency, offering a promising avenue for addressing the challenges of data integrity in the cloud com
Recently, mobile edge computing (MEC) has been considered as a promising solution to address the challenges arising from the growing computationally intensive applications and limited computation capability of mobile ...
详细信息
With the rapid development of unmanned aerial vehicles (UAVs), they can not only carry communication equipment for intercepting and interfering with signals to protect communication security, but also carry energy tra...
详细信息
暂无评论