Computer Science, Hardware & Architecture

Article Computer Science, Hardware & Architecture

Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises

Leixiao Cheng, Jing Qin, Fei Meng

Summary: This paper analyzes the vulnerability of existing CLPASE schemes to frequency analysis, which compromises user's search privacy. A concrete CLPASE scheme against frequency analysis is proposed, which provides higher guarantee for user's search privacy with comparable efficiency compared to previous schemes.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Hardware/software security co-verification and vulnerability detection: An information flow perspective

Maoyuan Qin, Jiacheng Zhu, Baolei Mao, Wei Hu

Summary: This paper presents a hardware/software security co-verification method based on information flow analysis, which effectively detects and locates security vulnerabilities in a system. The information flow security model and properties are described using standard hardware design and verification languages.

INTEGRATION-THE VLSI JOURNAL (2024)

Article Computer Science, Hardware & Architecture

On-chip charge pump design for 3D non-volatile flash memory: from industry perspective

Rezaul Haque, Siraj Fulum Mossa

Summary: This paper discusses the challenges and methods of constructing an on-chip low-power energy harvesting block for 3D Non-volatile memory. The focus is on developing a smaller area, higher-efficiency on-chip charge pump design to keep up with transistor scaling every two years. The study presents design criteria and principles, and recommends optimizing circuit placement and following industry-wide design guidelines.

INTEGRATION-THE VLSI JOURNAL (2024)

Article Computer Science, Hardware & Architecture

A frequency boosting technique for cold-start charge pump units

Vasiliki Gogolou, Savvas Karipidis, Thomas Noulis, Stylianos Siskos

Summary: A novel frequency boosting design technique is proposed for charge pump architectures to achieve high-speed performance without additional circuitry or design complexity. Simulation results and hardware measurements confirm the effectiveness and advantages of the proposed technique.

INTEGRATION-THE VLSI JOURNAL (2024)

Article Computer Science, Hardware & Architecture

A BERT-Based Sequential POI Recommender system in Social Media

A. Noorian

Summary: This paper proposes a novel personalized sequential recommendation model, BERTSeqHybrid, which utilizes Bidirectional Encoder Representations from Transformers (BERT) to improve user-user similarity model. The model also employs asymmetric schemas and topic modeling to enhance contextual data from Points of Interest (POIs). Furthermore, a novel method for evaluating user preferences utilizing explicit demographic data is proposed to solve the cold start problem. Experimental evaluation demonstrates the superiority of the developed methodology in terms of RMSE, F-Score, MAP, and NDCG indexes on two different datasets (Yelp and Flickr).

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Intelligent and trusted metaheuristic optimization model for reliable agricultural network

Amjad Rehman, Ibrahim Abunadi, Khalid Haseeb, Tanzila Saba, Jaime Lloret

Summary: Artificial intelligence (AI) is experiencing significant growth in the areas of smart cities, agriculture, food management, and weather forecasting, primarily due to the limitations of computing power on sensing devices. The integration of AI with IoT and ubiquitous sensors has led to improvements in the agricultural sector and reduced management costs. However, optimizing resource management and data load for forwarding nodes near edge boundaries remains a challenging issue due to limited wireless technology resources.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Is it worth adopting DevOps practices in Global Software Engineering? Possible challenges and benefits

Ruben Grande, Aurora Vizcaino, Felix O. Garcia

Summary: The adoption of DevOps in global and distributed settings can bring several advantages to software companies, but it also presents challenges that need to be overcome.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Lattice based distributed threshold additive homomorphic encryption with application in federated learning

Haibo Tian, Yanchuan Wen, Fangguo Zhang, Yunfeng Shao, Bingshuai Li

Summary: In this paper, a lattice-based distributed threshold additive homomorphic encryption (DTAHE) scheme is proposed and its applications in federated learning are demonstrated. The DTAHE scheme saves communication bandwidth compared to other lattice-based DTAHE schemes. Two secure aggregation protocols are obtained when embedding the scheme into federated learning, one against semi-honest adversary and the other against active adversary using a smart contract in a ledger.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Efficient multi-party private set intersection protocols for large participants and small sets

Lifei Wei, Jihai Liu, Lei Zhang, Qin Wang, Wuji Zhang, Xiansong Qian

Summary: Private set intersection (PSI) is widely studied for preserving privacy in collaborative data analytics. However, existing multi-party PSI (MP-PSI) protocols often face performance and scalability issues when the number of participants increases. To address this, we propose two efficient MP-PSI protocols for scenarios with a large number of participants and small set size.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Modified restoring array-based power efficient approximate square root circuit and its application

Lalit Bandil, Bal Chand Nagar

Summary: This paper investigates the benefits of approximate computing in energy-efficient error-resilient applications. It proposes a modified restoring array square root (MRAS) architecture for approximate computing and presents a trade-off between accuracy and hardware. The results show significant reductions in power consumption and faster computation compared to exact designs.

INTEGRATION-THE VLSI JOURNAL (2024)

Article Computer Science, Hardware & Architecture

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm

Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, Jawad Ahmad

Summary: In the field of Industrial Internet of Things (IIoT), networks are increasingly vulnerable to cyberattacks. This research introduces an optimized Intrusion Detection System based on Deep Transfer Learning (DTL) for heterogeneous IIoT networks, combining Convolutional Neural Networks (CNNs), Genetic Algorithms (GA), and ensemble techniques. Through rigorous evaluation, the framework achieves exceptional performance and accurate detection of various cyberattacks.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Designing the color of electric motorcycle products emotionally based on the dynamic field theory and deep learning

Man Ding, Haocheng Qin, Xinxin Zhang, Liwen Ma

Summary: This paper proposes a novel method for Product Color Emotional Design (PCED) by integrating dynamic field theory with deep learning. The method establishes a system capable of generating color design schemes that align with users' emotional needs based solely on user feature labels.

DISPLAYS (2024)

Article Computer Science, Hardware & Architecture

Maximizing the profit of omnichannel closed-loop supply chains with mean-variance criteria

Jianteng Xu, Qingguo Bai, Zhiwen Li, Lili Zhao

Summary: This study constructs two optimization models for the omnichannel closed-loop supply chain by leveraging the combined power of leader-follower game and mean-variance theories. The focus is on analyzing the performance of manufacturers who distribute products through physical stores. The results show that the risk-averse attitude of the physical store has a positive impact on the overall system profitability, but if the introduced physical store belongs to another firm, total profit experiences a decline.

COMPUTERS & ELECTRICAL ENGINEERING (2024)

Article Computer Science, Hardware & Architecture

TEA-RFFI: Temperature adjusted radio frequency fingerprint-based smartphone identification

Xiaolin Gu, Wenjia Wu, Yusen Zhou, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo

Summary: This study proposes a radio frequency fingerprint identification solution based on crystal oscillator temperature adjustment, which enhances the differences between Wi-Fi device fingerprints and mitigates collision. Experimental results demonstrate the effectiveness of the system in identifying smartphones under different scenarios.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

A high current efficiency multipath nested feedforward compensation technique for two-stage amplifier

Weiwei Yu, Xiao Zhao, Liyuan Dong, Lanya Yu

Summary: This paper proposes a high current efficiency two-stage amplifier using the MNFC method, which improves the phase margin and extends the gain bandwidth by adding a nested small-gain stage between the two stages and eliminating the non-dominant pole using MNFC technique. The experimental results show that the amplifier has good performance.

INTEGRATION-THE VLSI JOURNAL (2024)

Article Computer Science, Hardware & Architecture

Efficient and low-cost approximate multipliers for image processing applications

Bahram Rashidi

Summary: This paper proposes two approximate multipliers based on an approximate 4:2 compressor and 4-bit full adders, and compares their performance. The results show that these approximate multipliers perform well in image processing applications.

INTEGRATION-THE VLSI JOURNAL (2024)

Article Computer Science, Hardware & Architecture

Inner product encryption from Middle-Product Learning With Errors

Niao Yang, Shaojun Yang, Yong Zhao, Wei Wu, Xuewei Wang

Summary: Inner product encryption (IPE) is a vital area of research in functional cryptosystems that enhances user access control and fine-grained query. It has extensive applications in emerging fields like cloud computing. Lattice-based IPE is advantageous due to resistance against quantum algorithm attacks and relatively simple encryption algorithms, making it highly promising.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Consent notices are obstructing my view: Viewing sticky elements on responsive websites under the magnifying glass

Frode Eika Sandnes

Summary: This study explores the implications of consent notices on websites for low vision users who rely on browser magnification. The study finds that a significant number of websites have blocking consent notices and permanent elements that obstruct screen real estate when magnified. The study also provides recommendations for improving accessibility for users relying on magnification in narrow viewports.

DISPLAYS (2024)

Article Computer Science, Hardware & Architecture

STOP: Joint send buffer and transmission control for user-perceived deadline guarantee via curriculum guided-deep reinforcement learning

Rongji Liao, Yuan Zhang, Jinyao Yan, Yang Cai, Narisu Tao

Summary: This paper proposes a joint control approach called STOP to guarantee user-perceived deadline using curriculum-guided deep reinforcement learning. Experimental results show that the STOP scheme achieves a significantly higher average arrival ratio in NS-3.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

W-IQ: Wither-logic based issue queue for RISC-V superscalar out-of-order processor

Zhi-Guo Yu, Xiao-Yu Zhong, Xiao-Jie Ma, Xiao-Feng Gu

Summary: This paper proposes a Withering-logic Based Issue Queue (W-IQ) to improve the performance of RISC-V processors by increasing IPC and reducing delay. Experimental results show that W-IQ outperforms traditional methods in terms of running time and delay.

INTEGRATION-THE VLSI JOURNAL (2024)