Search
Search Results
-
Threshold ring signature: generic construction and logarithmic size instantiation
A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...
-
Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)
The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...
-
Real-time scheduling of power grid digital twin tasks in cloud via deep reinforcement learning
As energy demand continues to grow, it is crucial to integrate advanced technologies into power grids for better reliability and efficiency. Digital...
-
Detecting mistakes in a domain model: a comparison of three approaches
Domain models are a fundamental part of software engineering, thus it is important for every software engineer to know the principles of domain...
-
ASOD: an adaptive stream outlier detection method using online strategy
In the current era of information technology, blockchain is widely used in various fields, and the monitoring of the security and status of the...
-
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption
Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate...
-
Qualitative reasoning and cyber-physical systems: abstraction, modeling, and optimized simulation
Complex systems modeling and simulation are critical in many industrial and research fields, specifically to predict, prove, verify, and understand...
-
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud
With the popularity of the media cloud computing industry, individuals and organizations outsource image computation and storage to the media cloud...
-
Improved homomorphic evaluation for hash function based on TFHE
Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...
-
An empirical study of reflection attacks using NetFlow data
Reflection attacks are one of the most intimidating threats organizations face. A reflection attack is a special type of distributed...
-
Computational intelligence-based classification system for the diagnosis of memory impairment in psychoactive substance users
Computational intelligence techniques have emerged as a promising approach for diagnosing various medical conditions, including memory impairment....
-
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications
Coverage-guided fuzzing is one of the most popular approaches to detect bugs in programs. Existing work has shown that coverage metrics are a crucial...
-
Distributed Petri nets ROS
Verifying industrial robotic systems is a complex task because those systems are distributed and solely defined by their implementation instead of...
-
Non-orthogonal multiple access-based MEC for energy-efficient task offloading in e-commerce systems
Mobile edge computing (MEC) reduces the latency for end users to access applications deployed at the edge by offloading tasks to the edge. With the...
-
A novel parallel mammogram sharpening framework using modified Laplacian filter for lumps identification on GPU
In medical diagnosis, mammographic imaging is mainly concerned with the breast parenchymal patterns (counterbalance of glandular tissue and fatty...
-
Phishing behavior detection on different blockchains via adversarial domain adaptation
Despite the growing attention on blockchain, phishing activities have surged, particularly on newly established chains. Acknowledging the challenge...
-
Handling class overlap and imbalance using overlap driven under-sampling with balanced random forest in software defect prediction
Various techniques in machine learning have been used for building software defect prediction (SDP) models to identify the defective software...
-
Agile model-driven re-engineering
In this paper we describe an Agile model-driven engineering (MDE) approach, AMDRE, for the re-engineering of legacy systems. The objective is to...
-
Transitioning towards SysML v2 as a variability modeling language
Systems engineers seek ways to reuse system models to accelerate the initial design development process on new complex projects. Despite its promise,...
-
Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis
The Internet of Things (IoT) integrates more than billions of intelligent devices over the globe with the capability of communicating with other...