Tracking the flow of external inputs in a program with taint-analysis techniques can help developers better identify potential security vulnerabilities in the software. However, directly using the static taint analysi...
详细信息
This paper tackles the challenge of active perception for robotic grasp detection in cluttered environments. Incomplete 3D geometry information can negatively affect the performance of learning-based grasp detection m...
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ...
详细信息
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system based on Paillier encryption, which is claimed to protect both client C 's location privacy and service provider S's database privacy. However, Yang et al. presented a practical data privacy attack in INFOCOM'18, which allows a polynomial time attacker to obtain S's database. We propose a novel WiFi fingerprint localization system based on CastagnosLaguillaumie(CL) encryption, which has a trustless setup and is efficient due to the excellent properties of CL encryption. To prevent Yang et al.'s attack, the system requires that S selects only the locations from its database that can receive the nonzero signals from all the available access points in C 's nonzero fingerprint in order to determine C's location. Security analysis shows that our scheme is secure under Li et al.'s threat model. Furthermore, to enhance the security level of privacy-preserving WiFi fingerprint localization scheme based on CL encryption, we propose a secure and efficient zero-knowledge proof protocol for the discrete logarithm relations in C's encrypted localization queries.
Geographically replicating objects across multiple data centers improves the performance and reliability of cloud storage *** consistent replicas comes with high synchronization costs,as it faces more expensive WAN tr...
详细信息
Geographically replicating objects across multiple data centers improves the performance and reliability of cloud storage *** consistent replicas comes with high synchronization costs,as it faces more expensive WAN transport prices and increased *** replication is the widely used technique to reduce the synchronization *** replication strategies in existing cloud storage systems are too static to handle traffic changes,which indicates that they are inflexible in the face of unforeseen loads,resulting in additional synchronization *** propose quantitative analysis models to quantify consistency and synchronization cost for periodically replicated systems,and derive the optimal synchronization period to achieve the best tradeoff between consistency and synchronization *** on this,we propose a dynamic periodic synchronization method,Sync-Opt,which allows systems to set the optimal synchronization period according to the variable load in clouds to minimize the synchronization *** results demonstrate the effectiveness of our *** with the policies widely used in modern cloud storage systems,the Sync-Opt strategy significantly reduces the synchronization cost.
Advancements in the vehicular network technology enable real-time interconnection,data sharing,and intelligent cooperative driving among ***,malicious vehicles providing illegal and incorrect information can compromis...
详细信息
Advancements in the vehicular network technology enable real-time interconnection,data sharing,and intelligent cooperative driving among ***,malicious vehicles providing illegal and incorrect information can compromise the interests of vehicle *** mechanisms serve as an effective solution to this *** recent years,many researchers have incorporated blockchain technology to manage and incentivize vehicle nodes,incurring significant overhead and storage requirements due to the frequent ingress and egress of vehicles within the *** this paper,we propose a distributed vehicular network scheme based on trust ***,the designed architecture partitions multiple vehicle regions into ***,cloud supervision systems(CSSs)verify the accuracy of the information transmitted by ***,the trust scores for vehicles are calculated to reward or penalize them based on the trust evaluation *** proposed scheme demonstrates good scalability and effectively addresses the main cause of malicious information distribution among *** theoretical and experimental analysis show that our scheme outperforms the compared schemes.
In this study,the pure erosion behaviour of pure iron and its erosion-corrosion behaviour under different anodic polarization currents were investigated in various cathodic reactions(oxygen reduction,hydrogen ion redu...
详细信息
In this study,the pure erosion behaviour of pure iron and its erosion-corrosion behaviour under different anodic polarization currents were investigated in various cathodic reactions(oxygen reduction,hydrogen ion reduction,and water reduction)using a cylindrical stirring *** corrosion-enhanced erosion(C-E)rates were determined for each *** results revealed that pure iron displayed similar pure erosion behaviour across all three cathodic *** the cathodic reactions involve hydrogen ion reduction or water reduction,the erosion-corrosion of pure iron manifested as uniform damage,with the reduction in hardness being the main cause of the C-E in this ***,in the case of oxy-gen reduction reaction as the cathodic reaction,the erosion-corrosion presented as pitting damage,with the reduction in hardness resulting from localized concentration of anodic current and the formation of easily worn protruding flaky iron structures at the edges of the pits as the main mechanism of the ***,linear and exponential relationships were found between the C-E rate and the anodic current density for uniform damage and pitting damage,***,the concept of surface equivalent hardness was proposed,along with the establishment of a mathematical model for surface equivalent hardness based on the relationships between the C-E rate and the anodic current *** the surface equivalent hardness enables the evaluation of the erosion rate on material surfaces considering the coupled effect.
1 Introduction Lattice-based cryptography is one of the most promising routine of post-quantum cryptography(PQC).The fundamental and time-consuming operation in lattice-based schemes is the polynomial multiplication i...
详细信息
1 Introduction Lattice-based cryptography is one of the most promising routine of post-quantum cryptography(PQC).The fundamental and time-consuming operation in lattice-based schemes is the polynomial multiplication in cyclotomic ring.
With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage...
详细信息
With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage in complex interactive *** the effectiveness of manual testing is highly dependent on the user operation process(UOP)of experienced *** on the UOP,we propose an iterative Android automated testing(IAAT)method that automatically records,extracts,and integrates UOPs to guide the test logic of the tool across the complex Activity *** feedback test results can train the UOPs to achieve higher coverage in each *** extracted 50 UOPs and conducted experiments on 10 popular mobile APPs to demonstrate IAAT’s effectiveness compared with Monkey and the initial automated *** experimental results show a noticeable improvement in the IAAT compared with the test logic without human *** the 60 minutes test time,the average code coverage is improved by 13.98%to 37.83%,higher than the 27.48%of Monkey under the same conditions.
Accurate classification of encrypted traffic plays an important role in network ***,current methods confronts several problems:inability to characterize traffic that exhibits great dispersion,inability to classify tra...
详细信息
Accurate classification of encrypted traffic plays an important role in network ***,current methods confronts several problems:inability to characterize traffic that exhibits great dispersion,inability to classify traffic with multi-level features,and degradation due to limited training traffic *** address these problems,this paper proposes a traffic granularity-based cryptographic traffic classification method,called Granular Classifier(GC).In this paper,a novel Cardinality-based Constrained Fuzzy C-Means(CCFCM)clustering algorithm is proposed to address the problem caused by limited training traffic,considering the ratio of cardinality that must be linked between flows to achieve good traffic ***,an original representation format of traffic is presented based on granular computing,named Traffic Granules(TG),to accurately describe traffic structure by catching the dispersion of different traffic *** granule is a compact set of similar data with a refined boundary by excluding *** on TG,GC is constructed to perform traffic classification based on multi-level *** performance of the GC is evaluated based on real-world encrypted network traffic *** results show that the GC achieves outstanding performance for encrypted traffic classification with limited size of training traffic and keeps accurate classification in dynamic network conditions.
This paper investigates the cooperative adaptive optimal output regulation problem of continuous-time linear multi-agent *** the multi-agent system dynamics are uncertain,solving regulator equations and the correspond...
详细信息
This paper investigates the cooperative adaptive optimal output regulation problem of continuous-time linear multi-agent *** the multi-agent system dynamics are uncertain,solving regulator equations and the corresponding algebraic Riccati equations is challenging,especially for high-order *** this paper,a novel method is proposed to approximate the solution of regulator equations,i.e.,gradient descent *** is worth noting that this method obtains gradients through online data rather than model information.A data-driven distributed adaptive suboptimal controller is developed by adaptive dynamic programming,so that each follower can achieve asymptotic tracking and disturbance ***,the effectiveness of the proposed control method is validated by simulations.
暂无评论