Computer Science, Hardware & Architecture

Article Computer Science, Hardware & Architecture

Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network

B. Meenakshi, D. Karunkuzhali

Summary: Wireless Sensor Network (WSN) is a crucial component of the cyber physical system, consisting of fixed or moving sensors that collectively sense, gather, analyze, and transfer data of detected objects. Intrusion detection schemes in WSNs often suffer from poor identification rate, high computation overhead, and higher false alarm rate. This study proposes an innovative approach that combines advanced techniques such as self-attention, provisional learning, and generative adversarial networks to improve security and adaptability in WSNs.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Sahand 1.0: A new model for extracting information from source code in object-oriented projects

Gholamali Nejad Hajali Irani, Habib Izadkhah

Summary: Providing models for intelligent decision-making is crucial in software projects. This paper proposes a new model called Sahand, which utilizes a Relational Database Repository (RDP) to store source code and extract necessary information. This model extends open-source tools and provides an infrastructure for developers to extract information using SQL language or its extensions.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Efficient dynamic multi-client searchable encryption supporting fuzzy search

Shuqin Liu, Xialin Liu, Wanxuan Huang, Kai Du

Summary: This article introduces a searchable symmetric encryption (SSE) scheme using fuzzy keyword search. A dynamic multi-client scheme is proposed in a single-client setting, achieving forward privacy with multiple trapdoors communication using Intel SGX. Additionally, an enhanced multi-client scheme is presented that achieves forward privacy even with a corrupted user. Security and efficiency evaluations show that these schemes meet the desired security level and are well-suited for real-world applications.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

New tag-based signatures and their applications on linearly homomorphic signatures

Chengjun Lin, Rui Xue, Xinyi Huang, Shaojun Yang

Summary: This paper discusses the conversion of tag-based signature schemes into digital signature schemes and addresses the issue of allowing k > 1 fold tag-collisions in the lattice environment. It proposes a stateful tag-based signature (STS) scheme based on homomorphic hash functions and hash functions of tags, which allows for k > 1 fold tag-collisions. Two STS schemes based on the CDH and RSA assumptions, respectively, are also introduced using the same technique. The paper further explores the application of the STS schemes and demonstrates the conversion of schemes with field or quasi-field as message space into linearly homomorphic signature (LHS) schemes.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Performance modeling and analysis for randomly walking mobile users with Markov chains

Keqin Li

Summary: In this paper, we propose a computation offloading strategy to satisfy all UEs served by an MEC and develop an efficient method to find such a strategy. By using Markov chains to characterize UE mobility and calculating the joint probability distribution of UE locations, we can obtain the average response time of UEs and predict the overall average response time of tasks. Additionally, we solve the power constrained MEC speed setting problem.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

Orienting undirected phylogenetic networks

Katharina T. Huber, Leo van Iersel, Remie Janssen, Mark Jones, Vincent Moulton, Yukihiro Murakami, Charles Semple

Summary: This paper investigates the relationship between undirected and directed phylogenetic networks, and provides corresponding algorithms. The study reveals that the directed phylogenetic network is unique under specific conditions. Additionally, an algorithm for directing undirected binary networks is described, applicable to certain classes of directed phylogenetic networks.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

Fast and succinct population protocols for Presburger arithmetic

Philipp Czerner, Roland Guttenberg, Martin Helfrich, Javier Esparza

Summary: This paper presents a construction method that produces population protocols with a small number of states, while achieving near-optimal expected number of interactions, for deciding Presburger predicates.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

Post-quantum secure group signature with verifier local revocation and backward unlinkability

Shuaining Gao, Xinjian Chen, Hongbo Li, Willy Susilo, Qiong Huang

Summary: This paper proposes a new lattice-based group signature scheme that combines the timestamp with Verifier Local Revocation (VLR) using the complete tree technique. The scheme achieves post-quantum security, almost full anonymity, and traceability, as well as backward unlinkability and effectively reduces the size of the revocation list.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system

Kui Ma, Guoji Song, Yanwei Zhou, Ran Xu, Bo Yang

Summary: This paper discusses the use of electronic medical systems for remote diagnosis and treatment services, addressing concerns about privacy and proposing an efficient and novel identity authentication protocol with revocation and tracking. The protocol is based on a linear secret sharing scheme and provides security properties such as data integrity, confidentiality, non-repudiation, and data freshness.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Web service discovery: Rationale, challenges, and solution directions

Ahmet Vedat Tokmak, Akhan Akbulut, Cagatay Catal

Summary: Service Oriented Architecture (SOA) is a methodology for promoting cooperation between services with diverse functions. Web service technology has paved the way for microservice architecture, but the increasing number of services has made it challenging to find the most suitable one. Various approaches have been proposed to improve the effectiveness and quality of service discovery, but there is a lack of comprehensive overview of web service discovery techniques. Therefore, a systematic literature review was conducted to analyze and classify existing methodologies and tools for discovering web services.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Self-tallying e-voting with public traceability based on blockchain

Yichao Lu, Huilin Li, Le Gao, Jiaxin Yu, Yong Yu, Hexing Su

Summary: In the post-epidemic era, the importance of e-voting in facilitating distributed decision-making is highlighted. This paper proposes a blockchain-based self-tallying e-voting system to address the limitations of existing systems and improve fairness and accountability.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

An extension of iStar for Machine Learning requirements by following the PRISE methodology

Jose M. Barrera, Alejandro Reina-Reina, Ana Lavalle, Alejandro Mate, Juan Trujillo

Summary: The rise of AI and Deep Learning has made ML a common practice, but successful ML projects require domain knowledge and expertise in algorithms and data processing. This paper presents an approach to capture ML requirements and applies it to real-world projects, showing improved algorithm selection and data preprocessing, and adaptability to different domains.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Over-threshold multi-party private set operation protocols for lightweight clients

Liju Ma, Hao Wang, Ziyu Niu, Zhi Li, Lei Wu, Xiaochao Wei, Ye Su

Summary: The problem of private set operation (PSO) has attracted wide attention from researchers in academia and industry as it enables data set analysis while preserving privacy. Over-threshold multi-party private set operation (OT-MP-PSO), a special class of PSO, finds applications in various scenarios such as voting systems and network operations centers. However, existing protocols have exponential computational costs with respect to the threshold t, limiting the range of t for efficient protocols. In this paper, we propose an efficient OT-MP-PSO protocol in the dual cloud setting without any limitation on the range of t. We also design a series of private set fine-grained computation protocols incorporating threshold conditions. Formal security proofs are provided for these protocols, and experimental results demonstrate their efficiency. Our protocol shows significant improvement over the state-of-the-art approach when applied to small data sets ranging from 101 to 103. A typical voting application scenario is also introduced to showcase the practicality of our protocols.

COMPUTER STANDARDS & INTERFACES (2024)

Correction Computer Science, Hardware & Architecture

Prediction, learning, uniform convergence, and scale-sensitive dimensions (vol 56, pg 174, 1998)

Peter L. Bartlett, Philip M. Long

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

Assessment of the quality of the text of safety standards with industrial semantic technologies

Jose Luis de la Vara, Hector Bahamonde, Clara Ayora

Summary: Most safety-critical systems undergo rigorous assurance processes to ensure dependability, often in compliance with standards like DO-178C for aerospace software. However, following these standards can be challenging due to issues in their text, such as imprecision and ambiguity. This study introduces an approach using RQA - Quality Studio for evaluating the text quality of safety standards, identifying common issues like passive voice and imprecise modal verbs in DO-178C.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Solving problems on generalized convex graphs via mim-width

Flavia Bonomo-Braberman, Nick Brettell, Andrea Munaro, Daniel Paulusma

Summary: This article discusses the convexity and mim-width of bipartite graphs, and it proves that for certain families of graphs 7-t, the 7-t-convex graphs can be solved in polynomial time for NP-complete problems. It also explores the bounded and unbounded mim-width of 7-t-convex graphs for different sets 7-t.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems

Zihang Zhen, Xiaoding Wang, Hui Lin, Sahil Garg, Prabhat Kumar, M. Shamim Hossain

Summary: In this paper, a blockchain architecture based on dynamic state sharding (DSSBD) is proposed to solve the problems caused by cross-shard transactions and reconfiguration. By utilizing deep reinforcement learning, the number of shards, block spacing, and block size can be dynamically adjusted to improve the performance of the blockchain. The experimental results show that the crowdsourcing system with DSSBD has better performance in terms of throughput, latency, balancing, cross-shard transaction proportion, and node reconfiguration proportion, while ensuring security.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

On the complexity of the storyplan problem

Carla Binucci, Emilio Di Giacomo, William J. Lenhart, Giuseppe Liotta, Fabrizio Montecchiani, Martin Nollenburg, Antonios Symvonis

Summary: In this study, we investigate the problem of representing a graph as a storyplan, which is a model for dynamic graph visualization. We prove the NP-completeness of this problem and propose two parameterized algorithms as solutions. We also demonstrate that partial 3-trees always admit a storyplan and can be computed in linear time. Additionally, we show that even if the vertex appearance order is given, the problem of choosing how to draw the frames remains NP-complete.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

Perpetual maintenance of machines with different urgency requirements

Leszek Gasieniec, Tomasz Jurdzinski, Ralf Klasing, Christos Levcopoulos, Andrzej Lingas, Jie Min, Tomasz Radzik

Summary: This passage describes the Bamboo Garden Trimming Problem and presents approximation algorithms for both Discrete BGT and Continuous BGT.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

Wireless IoT sensors data collection reward maximization by leveraging multiple energy- and storage-constrained UAVs

Francesco Betti Sorbelli, Alfredo Navarra, Lorenzo Palazzetti, Cristina M. Pinotti, Giuseppe Prencipe

Summary: This study discusses the deployment of IoT sensors in an area that needs to be monitored. Drones are used to collect data from the sensors, but they have energy and storage constraints. To maximize the overall reward from the collected data and ensure compliance with energy and storage limits, an optimization problem called Multiple-drone Data-collection Maximization Problem (MDMP) is proposed and solved using an Integer Linear Programming algorithm.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)