This paper presents a comprehensive survey on the development of Intel SGX(software guard extensions)processors and its *** the advent of SGX in 2013 and its subsequent development,the corresponding research works are...
详细信息
This paper presents a comprehensive survey on the development of Intel SGX(software guard extensions)processors and its *** the advent of SGX in 2013 and its subsequent development,the corresponding research works are also increasing *** order to get a more comprehensive literature review related to SGX,we have made a systematic analysis of the related papers in this *** first search through five large-scale paper retrieval libraries by keywords(i.e.,ACM Digital Library,IEEE/IET Electronic Library,SpringerLink,Web of science,and Elsevier science Direct).We read and analyze a total of 128 SGX-related *** first round of extensive study is conducted to classify *** second round of intensive study is carried out to complete a comprehensive analysis of the paper from various *** start with the working environment of SGX and make a conclusive summary of trusted execution environment(TEE).We then focus on the applications of *** also review and study multifarious attack methods to SGX framework and some recent security improvements made on ***,we summarize the advantages and disadvantages of SGX with some future research *** hope this review could help the existing and future research works on SGX and its application for both developers and users.
As China’s information technology development shifts from a single high-speed growth stage to a multidimensional high-quality development stage, the Internet of Things (IoT) enters all aspects of life and becomes mor...
详细信息
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
详细信息
To address the problem of autonomous vehicles in terms of sensing distance, reaction time and recognition accuracy, this paper proposes a collective control method for autonomous vehicles. We design a model of autonom...
To address the problem of autonomous vehicles in terms of sensing distance, reaction time and recognition accuracy, this paper proposes a collective control method for autonomous vehicles. We design a model of autonomous vehicle traffic system featuring sensing and communication integration. This system achieves collective vehicle movement and collaborative obstacle avoidance through the perception and judgment of the surrounding environmental conditions by the fleet of autonomous vehicles. We propose a new clustering algorithm called Low Energy Adaptive Clustering Hierarchy - Fleet (LEACH-F), based on classical LEACH algorithm. This algorithm is adapted for autonomous vehicles to realize node clustering and routing in sensing and communication network. In this paper, we also optimize the Re-architecting congestion control (PCC) algorithm to adapt the fleet of autonomous vehicles, which enhances the forwarding efficiency in the communication links.
Variational Autoencoder based Bayesian Optimization (VAE-BO) has demonstrated its excellent performance in addressing high-dimensional structured optimization problems. However, current mainstream methods overlook the...
详细信息
With the widespread use of language models (LMs) in NLP tasks, researchers have discovered the potential of Chain-of-thought (CoT) to assist LMs in accomplishing complex reasoning tasks by generating intermediate step...
详细信息
This paper proposes a Machine Learning-based approach for detecting Denial-of-Service (DoS) attacks using different datasets for training and testing. The study evaluates the performance of the proposed approach on a ...
This paper proposes a Machine Learning-based approach for detecting Denial-of-Service (DoS) attacks using different datasets for training and testing. The study evaluates the performance of the proposed approach on a unique dataset; thereafter, compares it to existing approaches in a bid to demonstrate its superiority in terms of accuracy, false-positive rate, and computational efficiency. Furthermore, the impacts of different Machine Learning algorithms and hypertuning configurations on the performance of the proposed approach are investigated. Also, via Feature Importance Analysis, this study examines the influence of each feature (present in the dataset) on our proposed model. The contributions of our work herein demonstrate the potentials of the proposed approach in detecting DoS attacks; and our research highlights the importance of employing Machine Learning in this domain. Future research directions have been suggested based on insights acquired from the investigations of different algorithms and hyperparameters.
Fine-tuning large pretrained language models on a limited training corpus usually suffers from poor generalization. Prior works show that the recently-proposed sharpness-aware minimization (SAM) optimization method ca...
详细信息
Recent trends in Network Function Virtualization (NFV) combined with Internet of Things (IoT) and 5G applications have reshaped the network service offering. In particular, Service Function Chains (SFCs) can associate...
Recent trends in Network Function Virtualization (NFV) combined with Internet of Things (IoT) and 5G applications have reshaped the network service offering. In particular, Service Function Chains (SFCs) can associate network functions with physical and virtual resources towards providing a complete network service. Concurrently, the management of a continuously expanding network and the fulfillment of the applications’ requirements pave the way for autonomic network solutions. Intent Based Networking (IBN) is a novel paradigm that aims to achieve the automatic orchestration of network services and the assurance of their performance. Accordingly, in this paper, we propose a novel automated network assurance model, based on Model Predictive Control, to guarantee the Quality of Service (QoS) and security requirements of multi-tenant and IBN-enabled SFCs. In this context, corrective decisions are proactively taken, in the form of incoming intent relocations among the SFCs. The results reveal that our model can assure with high probability the application requirements and minimize QoS violations.
The proliferation of Internet of Things (IoT) devices has led to the generation of massive amounts of data that require efficient aggregation for analysis and decision-making. However, multi-tier IoT systems, which in...
The proliferation of Internet of Things (IoT) devices has led to the generation of massive amounts of data that require efficient aggregation for analysis and decision-making. However, multi-tier IoT systems, which involve multiple layers of devices and gateways, face more complex security challenges in data aggregation compared to ordinary IoT systems. In this paper, we propose an efficient privacy-preserving multi-functional data aggregation scheme for multi-tier IoT architecture. The scheme supports privacy-preserving calculation of mean, variance, and anomaly proportion. The scheme uses the Paillier cryptosystem and the BLS algorithm for encryption and signature, and uses blinding techniques to keep the size of the IoT system secret. In order to make the Paillier algorithm more suitable for the IoT scenario, we also improve its efficiency of encryption and decryption. The performance evaluation shows that the scheme improves encryption efficiency by 43.7% and decryption efficiency by 45% compared to the existing scheme.
暂无评论