Article
Computer Science, Hardware & Architecture
Leixiao Cheng, Jing Qin, Fei Meng
Summary: This paper analyzes the vulnerability of existing CLPASE schemes to frequency analysis, which compromises user's search privacy. A concrete CLPASE scheme against frequency analysis is proposed, which provides higher guarantee for user's search privacy with comparable efficiency compared to previous schemes.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Maoyuan Qin, Jiacheng Zhu, Baolei Mao, Wei Hu
Summary: This paper presents a hardware/software security co-verification method based on information flow analysis, which effectively detects and locates security vulnerabilities in a system. The information flow security model and properties are described using standard hardware design and verification languages.
INTEGRATION-THE VLSI JOURNAL
(2024)
Article
Computer Science, Hardware & Architecture
Rezaul Haque, Siraj Fulum Mossa
Summary: This paper discusses the challenges and methods of constructing an on-chip low-power energy harvesting block for 3D Non-volatile memory. The focus is on developing a smaller area, higher-efficiency on-chip charge pump design to keep up with transistor scaling every two years. The study presents design criteria and principles, and recommends optimizing circuit placement and following industry-wide design guidelines.
INTEGRATION-THE VLSI JOURNAL
(2024)
Article
Computer Science, Hardware & Architecture
Vasiliki Gogolou, Savvas Karipidis, Thomas Noulis, Stylianos Siskos
Summary: A novel frequency boosting design technique is proposed for charge pump architectures to achieve high-speed performance without additional circuitry or design complexity. Simulation results and hardware measurements confirm the effectiveness and advantages of the proposed technique.
INTEGRATION-THE VLSI JOURNAL
(2024)
Article
Computer Science, Hardware & Architecture
A. Noorian
Summary: This paper proposes a novel personalized sequential recommendation model, BERTSeqHybrid, which utilizes Bidirectional Encoder Representations from Transformers (BERT) to improve user-user similarity model. The model also employs asymmetric schemas and topic modeling to enhance contextual data from Points of Interest (POIs). Furthermore, a novel method for evaluating user preferences utilizing explicit demographic data is proposed to solve the cold start problem. Experimental evaluation demonstrates the superiority of the developed methodology in terms of RMSE, F-Score, MAP, and NDCG indexes on two different datasets (Yelp and Flickr).
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Amjad Rehman, Ibrahim Abunadi, Khalid Haseeb, Tanzila Saba, Jaime Lloret
Summary: Artificial intelligence (AI) is experiencing significant growth in the areas of smart cities, agriculture, food management, and weather forecasting, primarily due to the limitations of computing power on sensing devices. The integration of AI with IoT and ubiquitous sensors has led to improvements in the agricultural sector and reduced management costs. However, optimizing resource management and data load for forwarding nodes near edge boundaries remains a challenging issue due to limited wireless technology resources.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Ruben Grande, Aurora Vizcaino, Felix O. Garcia
Summary: The adoption of DevOps in global and distributed settings can bring several advantages to software companies, but it also presents challenges that need to be overcome.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Haibo Tian, Yanchuan Wen, Fangguo Zhang, Yunfeng Shao, Bingshuai Li
Summary: In this paper, a lattice-based distributed threshold additive homomorphic encryption (DTAHE) scheme is proposed and its applications in federated learning are demonstrated. The DTAHE scheme saves communication bandwidth compared to other lattice-based DTAHE schemes. Two secure aggregation protocols are obtained when embedding the scheme into federated learning, one against semi-honest adversary and the other against active adversary using a smart contract in a ledger.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Lifei Wei, Jihai Liu, Lei Zhang, Qin Wang, Wuji Zhang, Xiansong Qian
Summary: Private set intersection (PSI) is widely studied for preserving privacy in collaborative data analytics. However, existing multi-party PSI (MP-PSI) protocols often face performance and scalability issues when the number of participants increases. To address this, we propose two efficient MP-PSI protocols for scenarios with a large number of participants and small set size.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Lalit Bandil, Bal Chand Nagar
Summary: This paper investigates the benefits of approximate computing in energy-efficient error-resilient applications. It proposes a modified restoring array square root (MRAS) architecture for approximate computing and presents a trade-off between accuracy and hardware. The results show significant reductions in power consumption and faster computation compared to exact designs.
INTEGRATION-THE VLSI JOURNAL
(2024)
Article
Computer Science, Hardware & Architecture
Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, Jawad Ahmad
Summary: In the field of Industrial Internet of Things (IIoT), networks are increasingly vulnerable to cyberattacks. This research introduces an optimized Intrusion Detection System based on Deep Transfer Learning (DTL) for heterogeneous IIoT networks, combining Convolutional Neural Networks (CNNs), Genetic Algorithms (GA), and ensemble techniques. Through rigorous evaluation, the framework achieves exceptional performance and accurate detection of various cyberattacks.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Man Ding, Haocheng Qin, Xinxin Zhang, Liwen Ma
Summary: This paper proposes a novel method for Product Color Emotional Design (PCED) by integrating dynamic field theory with deep learning. The method establishes a system capable of generating color design schemes that align with users' emotional needs based solely on user feature labels.
Article
Computer Science, Hardware & Architecture
Jianteng Xu, Qingguo Bai, Zhiwen Li, Lili Zhao
Summary: This study constructs two optimization models for the omnichannel closed-loop supply chain by leveraging the combined power of leader-follower game and mean-variance theories. The focus is on analyzing the performance of manufacturers who distribute products through physical stores. The results show that the risk-averse attitude of the physical store has a positive impact on the overall system profitability, but if the introduced physical store belongs to another firm, total profit experiences a decline.
COMPUTERS & ELECTRICAL ENGINEERING
(2024)
Article
Computer Science, Hardware & Architecture
Xiaolin Gu, Wenjia Wu, Yusen Zhou, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo
Summary: This study proposes a radio frequency fingerprint identification solution based on crystal oscillator temperature adjustment, which enhances the differences between Wi-Fi device fingerprints and mitigates collision. Experimental results demonstrate the effectiveness of the system in identifying smartphones under different scenarios.
Article
Computer Science, Hardware & Architecture
Weiwei Yu, Xiao Zhao, Liyuan Dong, Lanya Yu
Summary: This paper proposes a high current efficiency two-stage amplifier using the MNFC method, which improves the phase margin and extends the gain bandwidth by adding a nested small-gain stage between the two stages and eliminating the non-dominant pole using MNFC technique. The experimental results show that the amplifier has good performance.
INTEGRATION-THE VLSI JOURNAL
(2024)
Article
Computer Science, Hardware & Architecture
Bahram Rashidi
Summary: This paper proposes two approximate multipliers based on an approximate 4:2 compressor and 4-bit full adders, and compares their performance. The results show that these approximate multipliers perform well in image processing applications.
INTEGRATION-THE VLSI JOURNAL
(2024)
Article
Computer Science, Hardware & Architecture
Niao Yang, Shaojun Yang, Yong Zhao, Wei Wu, Xuewei Wang
Summary: Inner product encryption (IPE) is a vital area of research in functional cryptosystems that enhances user access control and fine-grained query. It has extensive applications in emerging fields like cloud computing. Lattice-based IPE is advantageous due to resistance against quantum algorithm attacks and relatively simple encryption algorithms, making it highly promising.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Frode Eika Sandnes
Summary: This study explores the implications of consent notices on websites for low vision users who rely on browser magnification. The study finds that a significant number of websites have blocking consent notices and permanent elements that obstruct screen real estate when magnified. The study also provides recommendations for improving accessibility for users relying on magnification in narrow viewports.
Article
Computer Science, Hardware & Architecture
Rongji Liao, Yuan Zhang, Jinyao Yan, Yang Cai, Narisu Tao
Summary: This paper proposes a joint control approach called STOP to guarantee user-perceived deadline using curriculum-guided deep reinforcement learning. Experimental results show that the STOP scheme achieves a significantly higher average arrival ratio in NS-3.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Zhi-Guo Yu, Xiao-Yu Zhong, Xiao-Jie Ma, Xiao-Feng Gu
Summary: This paper proposes a Withering-logic Based Issue Queue (W-IQ) to improve the performance of RISC-V processors by increasing IPC and reducing delay. Experimental results show that W-IQ outperforms traditional methods in terms of running time and delay.
INTEGRATION-THE VLSI JOURNAL
(2024)