Computer Science, Software Engineering

Article Computer Science, Software Engineering

Quantum-behaved RS-PSO-LSSVM method for quality prediction in parts production processes

Su Yingying, Han Lianjuan, Wang Jianan, Wang Huimin

Summary: Quality control is crucial for ensuring product quality, and quality prediction is a key aspect of quality management. This study proposes a product quality prediction model using Rough Set, Particle Swarm Optimization, and Least Square Support Vector Machine. The effectiveness of the model and the proposed algorithm is demonstrated through a case study, showing higher prediction accuracy compared to existing methods.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2022)

Article Computer Science, Information Systems

Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations

Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab

Summary: Robots play important roles in various fields, but security vulnerabilities and malicious attacks pose significant challenges to human society. The development of security solutions for robotic systems is crucial to mitigate risks and enhance overall safety.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2022)

Review Computer Science, Hardware & Architecture

Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review

Ali Shakarami, Hamid Shakarami, Mostafa Ghobaei-Arani, Elaheh Nikougoftar, Mohammad Faraji-Mehmandar

Summary: This paper reviews and classifies resource provisioning approaches in computation paradigms, identifying five main mechanisms and discussing future research challenges related to resource performance, location, uncertainties, elasticity, and migration.

JOURNAL OF SYSTEMS ARCHITECTURE (2022)

Article Computer Science, Interdisciplinary Applications

A chaotic strategy-based quadratic Opposition-Based Learning adaptive variable-speed whale optimization algorithm

Maodong Li, Guanghui Xu, Qiang Lai, Jie Chen

Summary: The paper introduces a chaotic strategy-based quadratic opposition-based learning adaptive variable-speed whale optimization algorithm to address the inadequate convergence accuracy and speed of the whale optimization algorithm. The improved algorithm shows faster convergence speed, higher accuracy, and better ability to escape local optima in extensive tests on benchmark functions and complex engineering optimization problems.

MATHEMATICS AND COMPUTERS IN SIMULATION (2022)

Article Computer Science, Information Systems

Value Entropy: A Systematic Evaluation Mode of Service Ecosystem Evolution

Xiao Xue, Zhaojie Chen, Shufang Wang, Zhiyong Feng, Yucong Duan, Zhangbing Zhou

Summary: With the development of cloud computing, service computing, IoT and mobile Internet, the emergence and evaluation of service ecosystems have become increasingly important. This article proposes a value entropy model that links the operating state of the system with the efficiency of value creation, providing a comprehensive assessment of the performance of the service ecosystem.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Software Engineering

Perceptual Quality Assessment of Colored 3D Point Clouds

Qi Liu, Honglei Su, Zhengfang Duanmu, Wentao Liu, Zhou Wang

Summary: 3D point clouds have various applications but there has been little research on perceptual quality assessment. This study introduces the Waterloo Point Cloud (WPC) database, which includes high-quality source point clouds and diverse distorted point clouds. The subjective quality assessment experiment conducted over the database shows limited success of existing objective point cloud quality assessment models. A novel objective PCQA model based on attention mechanism and a variant of information content-weighted structural similarity is proposed, outperforming existing models. The database is publicly available at https://github.com/qdushl/Waterloo-Point-Cloud-Database.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2023)

Article Computer Science, Information Systems

Age-Invariant Face Recognition by Multi-Feature Fusion and Decomposition with Self-attention

Chenggang Yan, Lixuan Meng, Liang Li, Jiehua Zhang, Zhan Wang, Jian Yin, Jiyong Zhang, Yaoqi Sun, Bolun Zheng

Summary: This article introduces a new method for age-invariant face recognition called Multi-feature Fusion and Decomposition (MFD) framework. The method samples multiple face images of different ages with the same identity and uses multi-head attention to capture contextual information from facial feature series. It combines feature decomposition and fusion techniques to ensure that the final features effectively represent the identity information of the face and have stronger robustness against the aging process.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2022)

Article Computer Science, Interdisciplinary Applications

Virtual reality consumer experience escapes: preparing for the metaverse

Dai-In Danny Han, Yoy Bergs, Natasha Moorhouse

Summary: This paper critically reviews literature on virtual reality consumer experience escapes and discusses the issues in its design and application, as well as the impacts on consumer health and well-being. It presents future considerations and a sequential research agenda.

VIRTUAL REALITY (2022)

Article Computer Science, Information Systems

LSH-aware multitype health data prediction with privacy preservation in edge environment

Lingzhen Kong, Lina Wang, Wenwen Gong, Chao Yan, Yucong Duan, Lianyong Qi

Summary: With the increasing development of electronic technology, traditional paper-driven medical systems are converting to efficient electronic records, but missing data problems are common. Health data is crucial for evaluating health status and adjusting fitness. This paper proposes a novel multitype health data privacy-aware prediction approach and verifies its effectiveness through experiments.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2022)

Article Computer Science, Information Systems

A Generic Deep Learning Based Cough Analysis System From Clinically Validated Samples for Point-of-Need Covid-19 Test and Severity Levels

Javier Andreu-Perez, Humberto Perez-Espinosa, Eva Timonet, Mehrin Kiani, Manuel Giron-Perez, Alma B. Benitez-Trinidad, Delaram Jarchi, Alejandro Rosales-Perez, Nick Gkatzoulis, Orion F. Reyes-Galaviz, Alejandro Torres-Garcia, Carlos A. Reyes-Garcia, Zulfiqar Ali, Francisco Rivas

Summary: In an attempt to reduce the infection rate of Covid-19, an economical and accessible diagnostic tool based on cough sound called "DeepCough" has been developed and deployed as a web-app named "CoughDetect". The experimental results show that this tool has high accuracy and sensitivity, making it potentially significant in combating the Covid-19 pandemic worldwide.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults

Cheng Zhang, Yang Xu, Yupeng Hu, Jiajing Wu, Ju Ren, Yaoxue Zhang

Summary: This article introduces a blockchain-based multi-cloud storage data auditing scheme to ensure data integrity and resolve service disputes. The scheme utilizes blockchain to record interactions between users, service providers, and organizers as evidence, and employs smart contracts to identify malicious service providers. Theoretical analysis and experiments demonstrate the effectiveness and acceptable cost of the scheme in multi-cloud environments.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems

Yuan Zhang, Chunxiang Xu, Nan Cheng, Xuemin Shen

Summary: In this article, we propose SPADE, an encrypted data deduplication scheme that resists compromised key servers and frees users from the key management problem. The scheme includes a mechanism for periodic substitution of key servers, a password-hardening protocol, and password-based mechanisms for secure data access and deduplication.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Image-to-Image Translation: Methods and Applications

Yingxue Pang, Jianxin Lin, Tao Qin, Zhibo Chen

Summary: This paper provides an overview of recent developments in image-to-image translation (I2I), analyzing the key techniques and progress made in the field. It discusses the impact of I2I on research and industry, as well as the remaining challenges in related fields.

IEEE TRANSACTIONS ON MULTIMEDIA (2022)

Article Computer Science, Hardware & Architecture

DRHEFT: Deadline-Constrained Reliability-Aware HEFT Algorithm for Real-Time Heterogeneous MPSoC Systems

Junlong Zhou, Mingyue Zhang, Jin Sun, Tian Wang, Xiumin Zhou, Shiyan Hu

Summary: This article proposes a novel algorithm that uses fuzzy dominance to evaluate the relative fitness values of candidate solutions, and maximizes both soft-error reliability (SER) and lifetime reliability (LTR) simultaneously for dependent tasks executing on heterogeneous MPSoC systems under real-time constraint. The experiments show that the algorithm achieves better SER-LTR tradeoff solutions with higher hypervolume and less computation cost compared to state-of-the-art approaches.

IEEE TRANSACTIONS ON RELIABILITY (2022)

Article Computer Science, Information Systems

Profit Maximization Incentive Mechanism for Resource Providers in Mobile Edge Computing

Quyuan Wang, Songtao Guo, Jiadi Liu, Chengsheng Pan, Li Yang

Summary: Mobile Edge Computing (MEC) is a promising technique that offloads tasks to nearby edge clouds to accommodate resource-constrained mobile devices. This paper proposes an incentive mechanism to stimulate service provisioning by charging mobile devices and rewarding edge clouds. The mechanism ensures the profit of resource providers and guarantees the Quality of Experience (QoE) of mobile devices.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Decision Boundary-Aware Data Augmentation for Adversarial Training

Chen Chen, Jingfeng Zhang, Xilie Xu, Lingjuan Lyu, Chaochao Chen, Tianlei Hu, Gang Chen

Summary: Adversarial training (AT) is a method to improve the robustness of deep neural networks by training on adversarial variants generated from natural examples. However, as training progresses, the training data becomes less attackable, undermining the enhancement of model robustness. To address this issue, this paper proposes a Decision boundary-aware data Augmentation framework (CODA) that utilizes meta information from previous epochs to guide the augmentation process and generate attackable data close to the decision boundary. CODA outperforms vanilla mixup by providing a higher ratio of attackable data, enhancing model robustness while mitigating the linear behavior between classes that is unfavorable for adversarial training. Experimental results demonstrate that CODA improves adversarial robustness across various training methods and datasets.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Hardware & Architecture

Quantum-Safe Round-Optimal Password Authentication for Mobile Devices

Zengpeng Li, Ding Wang, Eduardo Morais

Summary: Password authentication is a dominant form of access control for the Web and mobile devices, and the use of Password Authenticated Key Exchange (PAKE) systems is recommended for secure data communication. The industry standard suggests using asymmetric-PAKE protocols to prevent password exposure.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Data Dissemination for Industry 4.0 Applications in Internet of Vehicles Based on Short-term Traffic Prediction

Chen Chen, Lei Liu, Shaohua Wan, Xiaozhe Hui, Qingqi Pei

Summary: As a key use case of Industry 4.0 and the Smart City, the Internet of Vehicles (IoV) provides an efficient way for city managers to regulate traffic flow and improve commuting performance. In this article, a novel data dissemination scheme is proposed by exploring short-term traffic prediction for Industry 4.0 applications enabled in IoV. Through a three-tier network architecture and the use of a deep learning network, the scheme aims to simplify network management, reduce communication overheads, and enable the controller to make routing decisions in advance based on traffic prediction and optimal path finding.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2022)

Article Computer Science, Hardware & Architecture

Survey on computation offloading in UAV-Enabled mobile edge computing

S. M. Asiful Huda, Sangman Moh

Summary: With the increasing growth of IoT devices, effective computation performance has become critical. Mobile edge computing (MEC) and unmanned aerial vehicles (UAVs) can address this issue. However, communication overhead and delays are major challenges. This study reviews UAV-enabled MEC solutions focusing on offloading and compares algorithms for their features and performance. Additionally, open issues and research challenges in design and implementation are discussed.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2022)

Article Computer Science, Software Engineering

StyleGAN-NADA: CLIP-Guided Domain Adaptation of Image Generators

Rinon Gal, Or Patashnik, Haggai Maron, Amit H. Bermano, Gal Chechik, Daniel Cohen-Or

Summary: This study introduces a text-driven method that allows training a generative model to produce images from different domains guided by text prompts and without seeing any image. The method demonstrates its effectiveness in adapting the generator to various domains with diverse styles and shapes, which would be difficult to achieve with existing methods.

ACM TRANSACTIONS ON GRAPHICS (2022)