Differential Privacy(DP)stands as a secure and efficient mechanism for privacy preservation,offering enhanced data utility without compromising computational *** adaptability is evidenced by its integration into block...
详细信息
Differential Privacy(DP)stands as a secure and efficient mechanism for privacy preservation,offering enhanced data utility without compromising computational *** adaptability is evidenced by its integration into blockchain-based Internet of Things(IoT)contexts,including smart wearables,smart homes,***,a notable vulnerability surfaces in decentralized environments where existing DP mechanisms falter in withstanding collusion *** vulnerability stems from the absence of an efficient strategy to synchronize the privacy budget consumption and historical query information among all network *** can exploit this weakness,collaborating to inject a substantial volume of queries simultaneously into disparate blockchain nodes to extract more precise *** address this issue,we propose a novel dual response DP mechanism to preserve privacy in blockchain-based IoT *** encompasses both direct and indirect response strategies,enabling an adaptive response to external queries,aiming to provide better data utility while preserving ***,this mechanism can synchronize historical query information and privacy budget consumption within the blockchain network to prevent privacy *** employ Relative Error(RE),Mean Square Error(MSE),and privacy budget consumption as evaluation metrics to measure the performance of the proposed *** outcomes substantiate that the proposed mechanism can adapt to blockchain networks well,affirming its capacity for privacy and great utility.
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use are outdated and suffer from numerous vulnerabilities that stem from the design of the underlying BAS *** this paper,we provide a comprehensive,up-to-date survey on BASs and attacks against seven BAS protocols including BACnet,EnOcean,KNX,LonWorks,Modbus,ZigBee,and *** studies of secure BAS protocols are also presented,covering BACnet Secure Connect,KNX Data Secure,KNX/IP Secure,ModBus/TCP Security,EnOcean High Security and Z-Wave *** and ZigBee do not have security *** point out how these security protocols improve the security of the BAS and what issues remain.A case study is provided which describes a real-world BAS and showcases its vulnerabilities as well as recommendations for improving the security of *** seek to raise awareness to those in academia and industry as well as highlight open problems within BAS security.
Graph-based social recommender systems utilize user-item interaction graphs and user-user social graphs to model user preferences. However, their performance can be limited by redundant and noisy information in these ...
详细信息
As solid-state drives(SSD) have been widely adopted, secure data deletion becomes an essential component for ensuring user privacy, preventing sensitive data leakage. Due to the erase-before-write property,erasure ope...
详细信息
As solid-state drives(SSD) have been widely adopted, secure data deletion becomes an essential component for ensuring user privacy, preventing sensitive data leakage. Due to the erase-before-write property,erasure operation and scrub operation substituting for overwriting technologies are proposed to meet the requirements. However, both methods bring the severe page-copying issue, declining read/write performance, and shortening the lifetime of SSD. In this paper, this issue is alleviated by reserving pages at the page allocation stage to mitigate program disturbance and increasing program step voltage during reprogramming operation to reduce the reprogram latency. The proposed scheme is evaluated by a series of experiments; the results show that the proposed scheme could achieve significant deletion time reduction and alleviate page-copying overhead.
The rapid advancement of technology has given rise to medical cyber-physical systems (MCPS), a subset of cyber-physical systems (CPS) specifically tailored for patient care and healthcare providers. MCPS generate subs...
详细信息
Android applications are becoming increasingly powerful in recent years. While their functionality is still of paramount importance to users, the energy efficiency of these applications is also gaining more and more a...
详细信息
Android applications are becoming increasingly powerful in recent years. While their functionality is still of paramount importance to users, the energy efficiency of these applications is also gaining more and more attention. Researchers have discovered various types of energy defects in Android applications, which could quickly drain the battery power of mobile devices. Such defects not only cause inconvenience to users, but also frustrate Android developers as diagnosing the energy inefficiency of a software product is a non-trivial task. In this work, we perform a literature review to understand the state of the art of energy inefficiency diagnosis for Android applications. We identified 55 research papers published in recent years and classified existing studies from four different perspectives, including power estimation method, hardware component, types of energy defects, and program analysis approach. We also did a cross-perspective analysis to summarize and compare our studied techniques. We hope that our review can help structure and unify the literature and shed light on future research, as well as drawing developers' attention to build energy-efficient Android applications.
This study examines the impact of environmental, social, and governance (ESG) factors on economic investment from a statistical perspective, aiming to develop a tested investment strategy that capitalizes on the conne...
详细信息
In recent years, there has been rapid development in vehicle safety technology, with the emergence of various active safety systems including blind spot information systems, adaptive cruise control, and front collisio...
详细信息
Rolled Mg-Al-Sn series alloys generally possess limited formability due to the formation of strong basal *** weakening is an effective way to enhance formability,but usually accompanied with decreasing *** this work,s...
详细信息
Rolled Mg-Al-Sn series alloys generally possess limited formability due to the formation of strong basal *** weakening is an effective way to enhance formability,but usually accompanied with decreasing *** this work,synergistic enhancement of strength and formability is achieved in a Mg-3Al-1Sn-0.5Ca-0.1Sm(ATXS3110)alloy by 0.2 wt.%Mn addition combined with high temperature rolling,exhibiting a high index Erichsen(I.E.)value of~8.1 mm and near-isotropic mechanical *** one hand,after Mn addition,the grain refinement from~7.6μm to~4.1μm results in suppression of extension twinning,thereby preventing the development of strong basal texture upon stretch *** the other hand,trace Mn addition narrows the grain size distribution and promotes the formation of uniform fine grains,which induces homogeneous deformation during stretch ***,grain refinement and high-density nano-sized precipitates caused by trace Mn addition increase the *** work may provide insights into designing low-cost Mg-Al-Sn series alloys with superior comprehensive mechanical properties for further structural applications.
Smart control techniques have been implemented to address fluctuating power levels within isolated crogrids,mi-mitigating the risk of unstable frequencies and the potential degradation of power supply ***,a challenge ...
详细信息
Smart control techniques have been implemented to address fluctuating power levels within isolated crogrids,mi-mitigating the risk of unstable frequencies and the potential degradation of power supply ***,a challenge lies in the fact that employing these computationally complex methods without stability preservation might not suffice to handle the rapid changes of this highly dynamic environment in real-world scenarios over communication *** study introduces a flexible real-time approach for the frequency control problem using an artificial neural network(ANN)constrained to stabilized *** solution integrates stabilizing PID controllers,computed through small-signal analysis and tuned via an automated search for optimal ANN weights and reinforcement learning(RL)-based selected ***,we design stabilizing PID controllers by applying the stability boundary locus method and the Mikhailov criterion,specifically addressing communication ***,we refine the controller parameters online through an automated process that identifies optimal coefficient combinations,leveraging a constrained ANN to manage frequency deviations within a restricted parameter *** approach is further enhanced by employing the RL technique,which trains the tuning system using an interpolated stability boundary curve to ensure both stability and *** one-of-a-kind combination of ANN,RL,and advanced PID tuning methods is a big step forward in how we handle frequency control problems in isolated AC *** experiments show that our solution outperforms traditional methods due to its reduced parameter search *** particular,the proposed method reduces transient and steady-state frequency deviations more than semi-and unconstrained *** improved metrics and stability analysis show that the method improves system performance and stability under changing conditions.
暂无评论