Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin...
详细信息
Generative information retrieval methods retrieve documents by directly generating their identifiers. Much effort has been devoted to developing effective generative information retrieval (IR) models. Less attention h...
详细信息
Client-side deduplication system is widely used in cloud storage systems to reduce storage and communication overhead by eliminating the storing and uploading of duplicate data. However, it is vulnerable to side chann...
详细信息
ISBN:
(数字)9781728190549
ISBN:
(纸本)9781728190556
Client-side deduplication system is widely used in cloud storage systems to reduce storage and communication overhead by eliminating the storing and uploading of duplicate data. However, it is vulnerable to side channel attacks, where an adversary can infer the existence status of uploaded data based on deterministic relations in duplication check responses. To address this issue, Random Response (RARE) was proposed, which sends duplication check requests for two chunks simultaneously. Nevertheless, RARE has limitations in terms of communication efficiency and security. In this paper, we propose Random Zero-one Coding Response (RZCR) to overcome these limitations. RZCR achieves lightweight coding of multiple chunks using a novel linear mapping algorithm, allowing for a balance between security and performance through the adjustment of system parameters. Furthermore, we, for the first time, formally define a security game to model these side channel attacks in client-side deduplication systems and introduce a stronger threat model compared to RARE. Security analysis demonstrates that RZCR effectively mitigates the risk of side channel attacks. We also implement a prototype of RZCR and evaluate its performance using large-scale real-world datasets (i.e., Enron Email and Fslhomes) as well as synthetic datasets. The results show that RZCR significantly reduces communication overhead compared to representative schemes.
Unmanned Aerial Vehicle(UAV)tracking has been possible because of the growth of intelligent information technology in smart cities,making it simple to gather data at any time by dynamically monitoring events,people,th...
详细信息
Unmanned Aerial Vehicle(UAV)tracking has been possible because of the growth of intelligent information technology in smart cities,making it simple to gather data at any time by dynamically monitoring events,people,the environment,and other aspects in the *** traditional filter creates a model to address the boundary effect and time filter degradation issues in UAV tracking *** these methods ignore the loss of data integrity terms since they are overly dependent on numerous explicit previous regularization *** light of the aforementioned issues,this work suggests a dual-domain Jensen-Shannon divergence correlation filter(DJSCF)model address the probability-based distance measuring issue in the event of filter *** two-domain weighting matrix and JS divergence constraint are combined to lessen the impact of sample imbalance and *** new tracking models that are based on the perspectives of the actual probability filter distribution and observation probability filter distribution are proposed to translate the statistical distance in the online tracking model into response *** model is roughly transformed into a linear equality constraint issue in the iterative solution,which is then solved by the alternate direction multiplier method(ADMM).The usefulness and superiority of the suggested strategy have been shown by a vast number of experimental findings.
Symmetric searchable encryption(SSE) allows the users to store and query their private data in the encrypted database. Many SSE schemes for different scenarios have been proposed in the past few years, however, most o...
详细信息
Symmetric searchable encryption(SSE) allows the users to store and query their private data in the encrypted database. Many SSE schemes for different scenarios have been proposed in the past few years, however, most of these schemes still face more or fewer security issues. Using these security leakages,many attacks against the SSE scheme have been proposed, and especially the non-adaptive file injection attack is the most serious. Non-adaptive file injection attack(NAFA) can effectively recover some extremely important private information such as keyword plaintext. As of now, there is no scheme that can effectively defend against such attacks. We first propose the new security attribute called toward privacy to resist nonadaptive file injection attacks. We then present an efficient SSE construction called Cetus to achieve toward privacy. By setting up a buffer and designing the efficient oblivious reading algorithm based on software guard extensions(SGX), we propose the efficient one-time oblivious writing mechanism. Oblivious writing protects the update pattern and allows search operations to be performed directly on the data. The experiment results show that Cetus achieves O(aw) search time and O(1) update communication. The practical search time, communication, and computation overheads incurred by Cetus are lower than those of state-of-the-art.
In this paper, we aim to enhance the robustness of Universal Information Extraction (UIE) by introducing a new benchmark dataset, a comprehensive evaluation, and a feasible solution. Existing robust benchmark datasets...
详细信息
Active disturbance-rejection methods are effective in estimating and rejecting disturbances in both transient and steady-state *** paper presents a deep observation on and a comparison between two of those methods:the...
详细信息
Active disturbance-rejection methods are effective in estimating and rejecting disturbances in both transient and steady-state *** paper presents a deep observation on and a comparison between two of those methods:the generalized extended-state observer(GESO)and the equivalent input disturbance(EID)from assumptions,system configurations,stability conditions,system design,disturbance-rejection performance,and extensibility.A time-domain index is introduced to assess the disturbance-rejection performance.A detailed observation of disturbance-suppression mechanisms reveals the superiority of the EID approach over the GESO method.A comparison between these two methods shows that assumptions on disturbances are more practical and the adjustment of disturbance-rejection performance is easier for the EID approach than for the GESO method.
For protecting millimeter wave (mmWave) communications from clone attacks, this paper employs the deep learning to propose a physical layer authentication (PLA) approach for detecting attackers and classifying multipl...
详细信息
Toxic gases inhalation is the most common cause of death in fire scenes, which can make people unconscious and unable to save themselves. Hence, discovering the unconscious victims is crucial to improve their survival...
详细信息
暂无评论