当前期刊: ACM Transactions on Internet Technology Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Low-cost Security for Next-generation IoT Networks
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-09-05
    Nikolaos Athanasios Anagnostopoulos; Saad Ahmad; Tolga Arul; Daniel Steinmetzer; Matthias Hollick; Stefan Katzenbeisser

    In recent years, the ubiquitous nature of Internet-of-Things (IoT) applications as well as the pervasive character of next-generation communication protocols, such as the 5G technology, have become widely evident. In this work, we identify the need for low-cost security in current and next-generation IoT networks and address this demand through the implementation, testing, and validation of an intrinsic

    更新日期:2020-09-07
  • Optimal Receiver Placement forK-barrier Coverage in Passive Bistatic Radar Sensor Networks
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-08-26
    Jiaoyan Chen; Laurence T. Yang; Xianjun Deng; Xianggong Hong; Lingzhi Yi

    The improvement of coverage quality in the construction of multiple-barrier coverage is a critical problem in a wireless sensor network. In this article, we investigate the K-barrier coverage construction problem in passive bistatic radar sensor networks. In contrast to traditional bistatic radar networks, the transmitters in a passive bistatic radar network are predeployed and noncooperative. To construct

    更新日期:2020-08-26
  • Fog in the Clouds: UAVs to Provide Edge Computing to IoT Devices
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-08-26
    Giuseppe Faraci; Christian Grasso; Giovanni Schembra

    Internet of Things (IoT) has emerged as a huge paradigm shift by connecting a versatile and massive collection of smart objects to the Internet, coming to play an important role in our daily lives. Data produced by IoT devices can generate a number of computational tasks that cannot be executed locally on the IoT devices. The most common solution is offloading these tasks to external devices with higher

    更新日期:2020-08-26
  • Efficient Latency Control in Fog Deployments via Hardware-Accelerated Popularity Estimation
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-08-12
    Marcel Enguehard; Yoann Desmouceaux; Giovanna Carofiglio

    Introduced as an extension of the Cloud at the network edge for computing and storage purposes, the Fog is increasingly considered a key enabler for Internet-of-Things applications whose latency requirements are not compatible with a Cloud-only approach. Unlike Cloud platforms, which can elastically accommodate large numbers of requests, Fog deployments are usually dimensioned for an average traffic

    更新日期:2020-08-18
  • To Transmit or Not to Transmit: Controlling Communications in the Mobile IoT Domain
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-08-12
    K. Panagidi; C. Anagnostopoulos; A. Chalvatzaras; S. Hadjiefthymiades

    The Mobile IoT domain has been significantly expanded with the proliferation of drones and unmanned robotic devices. In this new landscape, the communication between the resource-constrained device and the fixed infrastructure is similarly expanded to include new messages of varying importance, control, and monitoring. To efficiently and effectively control the exchange of such messages subject to

    更新日期:2020-08-18
  • Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-07-31
    Xia Cheng; Junyang Shi; Mo Sha

    Industrial networks typically connect hundreds or thousands of sensors and actuators in industrial facilities, such as manufacturing plants, steel mills, and oil refineries. Although the typical industrial Internet of Things (IoT) applications operate at low data rates, they pose unique challenges because of their critical demands for reliable and real-time communication in harsh industrial environments

    更新日期:2020-08-18
  • Cloud-based Enabling Mechanisms for Container Deployment and Migration at the Network Edge
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-06-26
    Zakaria Benomar; Francesco Longo; Giovanni Merlino; Antonio Puliafito

    In recent years, a new trend of advanced applications with huge demands in terms of Quality of Service (QoS) is gaining ground. Even though Cloud computing provides mature management facilities with ubiquitous capabilities, novel requirements and workloads, foisted by new services, start to expose its weaknesses. In this context, a new Information and Communication Technologies (ICT) trend aims at

    更新日期:2020-08-18
  • Optimally Self-Healing IoT Choreographies
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-07-24
    Jan Seeger; Arne Bröring; Georg Carle

    In the industrial Internet of Things domain, applications are moving from the Cloud into the Edge, closer to the devices producing and consuming data. This means that applications move from the scalable and homogeneous Cloud environment into a potentially constrained heterogeneous Edge network. Making Edge applications reliable enough to fulfill Industry 4.0 use cases remains an open research challenge

    更新日期:2020-08-18
  • Parameter Self-Adaptation for Industrial Wireless Sensor-Actuator Networks
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-06-26
    Junyang Shi; Mo Sha

    Wireless sensor-actuator network (WSAN) technology is gaining rapid adoption by industrial Internet of Things applications in recent years. A WSAN typically connects sensors, actuators, and controllers in industrial facilities, such as steel mills, oil refineries, chemical plants, and infrastructures implementing complex monitoring and control processes. IEEE 802.15.4–based WSANs operate at low power

    更新日期:2020-08-18
  • IoT Architecture for Urban Data-Centric Services and Applications
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-07-24
    Marcin Luckner; Maciej Grzenda; Robert Kunicki; Jaroslaw Legierski

    In this work, we describe an urban Internet of Things (IoT) architecture, grounded in big data patterns and focused on the needs of cities and their key stakeholders. First, the architecture of the dedicated platform USE4IoT (Urban Service Environment for the Internet of Things), which gathers and processes urban big data and extends the Lambda architecture, is proposed. We describe how the platform

    更新日期:2020-08-18
  • An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-05-12
    Xingbin Jiang; Michele Lora; Sudipta Chattopadhyay

    The revolutionary development of the Internet of Things has triggered a huge demand for Internet of Things devices. They are extensively applied to various fields of social activities, and concerning manufacturing, they are a key enabling concept for the Industry 4.0 ecosystem. Industrial Internet of Things (IIoT) devices share common vulnerabilities with standard IoT devices, which are increasingly

    更新日期:2020-05-12
  • Adaptive Multi-Task Dual-Structured Learning with Its Application on Alzheimer's Disease Study
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-05-07
    Shijie Hao; Tao Chen; Yang Wang; Yanrong Guo; Meng Wang

    Multi-task learning has been widely applied to Alzheimer's Disease study due to its capability to simultaneously rating the disease severity (classification) and predicting corresponding clinical scores (regression). In this paper, we propose a novel technique of Adaptive Multi-task Dual-Structured Learning, named AMDSL, by mutually exploring the dual manifold structure for label and regression score

    更新日期:2020-05-07
  • Large scale least squares twin SVMs
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-05-05
    M. TANVEER; Shilpa Sharma; Khan Muhammad

    In the last decade, twin support vector machines (TWSVMs) classifiers have been achieved considerable emphasis on pattern classification tasks. However, the TWSVM formulation still suffers from the following two shortcomings: (i) TWSVM deals with the inverse matrix calculation in the Wolfe-dual problems which is intractable for large scale datasets with numerous features and samples. (ii) TWSVM minimizes

    更新日期:2020-05-05
  • Phishing Scams Detection in Ethereum Transaction Network
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-05-04
    Liang Chen; Jiaying Peng; Yang Liu; Jintang Li; Fenfang Xie; Zibin Zheng

    Blockchain has attracted an increasing amount of research, with lots of refreshing implementations in different fields. Cryptocurrency, as its most famous implementation, suffers economic loss due to phishing scams. In our work, accounts and transactions are treated as nodes and edges, thus detection of phishing accounts can be modelled as a node classification problem. To tackle the problem, we proprose

    更新日期:2020-05-04
  • Exploiting Proxy Sensing for Efficient Monitoring of Large-Scale Sensor Networks
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-30
    Amitangshu Pal; Krishna Kant

    Large networks of IoT devices, each consisting of one or more sensors, are being increasingly deployed for comprehensive real-time monitoring of cyber-physical systems. Such networks form an essential component of the emerging edge computing paradigm and are expected to increase in complexity and size. The physical phenomenon sensed by different sensors (within the same or different IoT devices in

    更新日期:2020-04-30
  • Cloud Deployment Tradeoffs for the Analysis of Spatially Distributed Internet of Things Systems
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-30
    Christos Tsigkanos; Martin Garriga; Luciano Baresi; Carlo Ghezzi

    Internet-enabled devices operating in the physical world are increasingly integrated in modern distributed systems. We focus on systems where the dynamics of spatial distribution is crucial; in such cases, devices may need to carry out complex computations (e.g., analyses) to check satisfaction of spatial requirements. The requirements are partly global—as the overall system should achieve certain

    更新日期:2020-04-30
  • A Novel Multiobjective GDWCN-PSO Algorithm and its Application to Medical Data Security
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-29
    VANDANA BHARTI; Bhaskar Biswas; Kaushal Kumar Shukla

    Nature-inspired optimization is one of the most prevalent research domains with a confounding history that fascinates the research communities. Particle Swarm Optimization (PSO) is one of the well-known optimizer that belongs to the family of nature inspired algorithms. It often suffers from premature convergence leading to a local optimum. To address this, several methods were presented using different

    更新日期:2020-04-29
  • EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-29
    Cong Peng; He Debiao; chen jianhua; Neeraj Kumar; Muhammad Khurram Khan

    As one of the essential applications of Health Information Technology (HIT), the eHealth system plays a significant role in enabling various internet medicine service scenes, most of which primarily rely on service recommendation or evaluation mechanism. To avoid privacy leakage, some privacy-preserving mechanisms must be adopted to protect raters' privacy and make evaluation trust reliable. To tackle

    更新日期:2020-04-29
  • Improving Collaborative Filtering with Social Influence over Heterogeneous Information Networks
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-28
    Yang Zhou; Ling Liu; Kisung Lee; Balaji Palanisamy; Qi Zhang

    This paper presents a social influence based collaborative filtering (CF) framework over heterogeneous information networks with three unique features. First, we integrate different types of entities, links, attributes, and activities from rating, social, and activity networks into a unified CF model through intra-network and inter-network social influence. Second, we propose three social influence

    更新日期:2020-04-28
  • Blockchain-based Data Sharing System for Sensing-as-A-Service in Smart Cities
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-26
    Chao Lin; He Debiao; Sherali Zeadally; Xinyi Huang; Zhe Liu

    We propose a BBDS system model with its security requirements before we propose a concrete construction by combining $\Sigma$-protocol, Paillier and AES encryption schemes, and the ECDSA signature scheme. To demonstrate the utility of our proposed BBDS system, we present a security analysis and compare our system with other solutions. We implement the prototype in Remix to analyze the gas cost and

    更新日期:2020-04-26
  • Unsupervised Derivation of Keyword Summary for Short Texts
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-24
    Bin Cao; Jiawei Wu; Sichao Wang; Jing Fan; Honghao Gao; Shuiguang Deng; Jianwei Yin; Xuan Liu

    Automatically summarizing a group of short texts that mainly share one topic is a fundamental task in many applications, e.g., summarizing the main symptoms for a disease based on a group of medical texts that are usually short. Conventional unsupervised short text summarization techniques tend to find the most representative short text document. However they may cause privacy issues, e.g., personal

    更新日期:2020-04-24
  • Hybrid Feature Selection Algorithm Based on Discrete Artificial Bee Colony for Parkinson Diagnosis
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-23
    Haolun Li; Chi-Man Pun; Feng Xu; Longsheng Pan; Rui Zong; Hao Gao; Huimin Lu

    Parkinson's disease (PD) is a neurodegenerative disease that affects millions of people around the world and cannot be cured fundamentally. Automatic identification of early Parkinson's disease on feature data sets is one of the most challenging medical tasks today. Many features in these datasets are useless or suffering from problems like noise, which affect the learning process and increase the

    更新日期:2020-04-23
  • Incentive-driven Computation Offloading in Blockchain-enabled E-Commerce
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-23
    Shuiguang Deng; Guanjie Chen; Hailiang Zhao; Honghao Gao; Jianwei Yin

    Blockchain is regarded as one of the most promising technologies to upgrade e-commerce. This paper analyzes the challenges that current e-commerce is facing and introduces a new scenario of e-commerce enabled by blockchain. A framework for mining tasks in this scenario offloaded onto edge servers based on mobile edge computing is proposed. Then the offloading issue is modelled as a multi-constrained

    更新日期:2020-04-23
  • An Emotional Analysis of False Information in Social Media and News Articles
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-19
    Bilal Ghanem; Paolo Rosso; Francisco Rangel

    Fake news is risky, since it has been created to manipulate readers’ opinions and beliefs. In this work, we compared the language of false news to the real one of real news from an emotional perspective, considering a set of false information types (propaganda, hoax, clickbait, and satire) from social media and online news article sources. Our experiments showed that false information has different

    更新日期:2020-04-19
  • Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-15
    Xiaolong Xu; Dawei Zhu; Xiaoxian Yang; Shuo Wang; Lianyong Qi; Wanchun Dou

    Currently, the integration of the supply chain and blockchain is promising, as blockchain successfully eliminates the bullwhip effect in the supply chain. Generally, concurrent PBFT (Practical Byzantine Fault Tolerance) consensus method, named C-PBFT, is powerful to deal with the consensus inefficiencies, caused by the fast node expansion in the supply chain. However, due to the tremendous complicated

    更新日期:2020-04-15
  • Emo2Vec
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-13
    Shuo Wang; Aishan Maoliniyazi; Xinle Wu; Xiaofeng Meng

    Sentiment analysis or opinion mining for subject information extraction from the text has become more and more dependent on natural language processing, especially for business and healthcare, since the online products and service reviews affect the consuming behaviors. Word embeddings that can map the words to low-dimensional vector representations have been widely used in natural language processing

    更新日期:2020-04-13
  • A Cost-Efficient Container Orchestration Strategy in Kubernetes-Based Cloud Computing Infrastructures with Heterogeneous Resources
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-13
    Zhiheng Zhong; Rajkumar Buyya

    Containers, as a lightweight application virtualization technology, have recently gained immense popularity in mainstream cluster management systems like Google Borg and Kubernetes. Prevalently adopted by these systems for task deployments of diverse workloads such as big data, web services, and IoT, they support agile application deployment, environmental consistency, OS distribution portability,

    更新日期:2020-04-13
  • Understanding Ethereum via Graph Analysis
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-13
    Ting Chen; Zihao Li; Yuxiao Zhu; Jiachi Chen; Xiapu Luo; John Chi-Shing Lui; Xiaodong Lin; Xiaosong Zhang

    Ethereum, a blockchain, supports its own cryptocurrency named Ether and smart contracts. Although more than 8M smart contracts have been deployed on Ethereum, little is known about the characteristics of its users, smart contracts, and the relationships among them. We conduct the first systematic study on Ethereum by leveraging graph analysis to characterize three major activities on Ethereum, namely

    更新日期:2020-04-13
  • Design and Implementation of BCI-Based Intelligent Upper Limb Rehabilitation Robot System
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-01
    Tae-Yeun Kim; Sung-Hwan Kim; Hoon Ko

    The performance evaluation results showed that the optimal EEG electrode locations were F7, F8, FC5, and FC6, whereas the accuracy of learning and test data of user-intention recognition was found to be 94.2% and 92.3%, respectively, which suggests that the proposed system can be used to recognize user intention for specific behavior. The system proposed in the present study can allow continued rehabilitation

    更新日期:2020-04-01
  • Enabling Reference Verifiability for the World Wide Web with Webchain
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-01
    Elias Rohrer; Steffen Heidel; Florian Tschorsch

    As online sources are becoming more prevalent in journalism and scientific literature, the ephemeral nature of the World Wide Web is becoming an increasingly serious issue for their verifiability, replicability, and reproducibility. The architecture of Webchain, a new system enabling source and reference verifiability on the Web, is combining distributed ledger technologies with secure timestamping

    更新日期:2020-04-01
  • Design and Implementation of a Compressed Certificate Status Protocol
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-04-01
    Michalis Pachilakis; Antonios A. Chariton; Panagiotis Papadopoulos; Panagiotis Ilia; Eirini Degkleri; Evangelos P Markatos

    Trust in SSL-based communications is provided by Certificate Authorities in the form of signed certificates. Despite the existence of several revocation checking mechanisms, sophisticated cyber-attackers can still trick web browsers to trust a revoked certificate, believing that it is still valid. In this paper, we present CCSP: a system to provide timely information regarding certificates status.

    更新日期:2020-04-01
  • Serendipity-based Points-of-Interest Navigation
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-25
    Xiaoyu Ge; Panos K. Chrysanthis; Konstantinos Pelechrinis; Demetrios Zeinalipour-Yazti; Mohamed Sharaf

    In this paper we present MPG (Mobile Personal Guide), which provides: i) a set of diverse yet surprisingly interesting venue recommendations that are aligned with user preferences; and ii) a set of route recommendations that are constructed from the recommended venues. We also introduce EPUI (an Experimental Platform for Urban Informatics), a testbed we developed to evaluate venue and route recommendation

    更新日期:2020-03-25
  • Big Data Analysis of Internet of Things System
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-19
    zhihan lv; Amit Kumar Singh

    The study aims at exploring the Internet of things (IoT) system from the perspective of data, and further improving the performance of the IoT system. The IoT data energy collection and information transmission system model is constructed by combining IoT and wireless relay cooperative transmission technology. Moreover, the energy efficiency, outage probability, and accuracy of the model are evaluated

    更新日期:2020-03-19
  • A Blockchain-based Iterative Double Auction Protocol using Multiparty State Channels
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-19
    Truc Nguyen; My T. Thai

    Current implementations of iterative double auction rely on a trusted third-party to handle the auction process. This imposes the risk of single point of failures and monopoly. We tackle this problem by proposing a novel decentralized and trustless blockchain-based framework for iterative double auction. Our design extends the state channel technologies to enable a double auction process among trading

    更新日期:2020-03-19
  • Sub-Population Specific Models of Couples’ Conflict
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-14
    Krit Gupta; Aditya Gujral; Theodora Chaspari; Adela C. Timmons; Sohyun Han; Yehsong Kim; Sarah Barrett; Stassja Sichko; Gayla Margolin

    Interpersonal conflict between couples is a significant source of stress with long-lasting effects on partners’ physical and psychological health. Motivated by findings in psychological science, we study how couples with distinct relationship functioning characteristics experience conflict in real life. We propose sub-population specific machine learning models using hierarchical and adaptive learning

    更新日期:2020-03-14
  • A Multilingual Evaluation for Online Hate Speech Detection
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-14
    Michele Corazza; Stefano Menini; Elena Cabrio; Sara Tonelli; Serena Villata

    The increasing popularity of social media platforms such as Twitter and Facebook has led to a rise in the presence of hate and aggressive speech on these platforms. Despite the number of approaches recently proposed in the Natural Language Processing research area for detecting these forms of abusive language, the issue of identifying hate speech at scale is still an unsolved problem. In this article

    更新日期:2020-03-14
  • Detecting Misogyny and Xenophobia in Spanish Tweets Using Language Technologies
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-14
    Flor-Miriam Plaza-Del-Arco; M. Dolores Molina-González; L. Alfonso Ureña-López; M. Teresa Martín-Valdivia

    Today, misogyny and xenophobia are some of the most important social problems. With the increase in the use of social media, this feeling of hatred toward women and immigrants can be more easily expressed, and therefore it can have harmful effects on social media users. For this reason, it is important to develop systems capable of detecting hateful comments automatically. In this article, we analyze

    更新日期:2020-03-14
  • Improving Vaccine Safety Using Blockchain
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-12
    Laizhong Cui; Zhe Xiao; Fei Chen; Jiahao Wang; Yi Pan; Hua Dai; Jing Qin

    In recent years, vaccine incidents occurred around the world. This paper presents a blockchain based solution to protect the whole process of vaccine circulation. We first propose a model to supervise the vaccine circulation process by incorporating existing regulatory practices. Then, we propose a blockchain based tracing system to implement this model. The proposed system takes the blockchain as

    更新日期:2020-03-12
  • An Efficient Service Function Chaining Placement Algorithm in Mobile Edge Computing
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-11
    Meng Wang; Bo Cheng; Jun-liang Chen

    Mobile Edge Computing (MEC) is a promising architecture that pushes mobile computing to the network edge. Recent studies deploy MEC applications in Network Function Virtualization (NFV) environment. The mobile network service in NFV is deployed as a Service Function Chaining (SFC). In this paper, we solve the SFC placement problem in the MEC-NFV environment. We formulate the placement problem as a

    更新日期:2020-03-11
  • FinPrivacy: A Privacy-Preserving Mechanismfor Fingerprint Identification
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-10
    Tao Wang; Zhigao Zheng; Ali Kashif Bashir; Alireza Jolfaei; Yanyan Xu

    This study proposes FinPrivacy, a privacy-preserving mechanism for fingerprint identification. This mechanism utilizes the low-rank matrix approximation to reduce the dimensionality of fingerprint and the exponential mechanism to carefully determine the value of the optimal rank. Thereafter, FinPrivacy injects Laplace noise to the singular values of the approximated singular matrix, thereby trading

    更新日期:2020-03-10
  • An efficient angle based universum least squares twin support vector machine for classification
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-06
    Bharat Richhariya; M. TANVEER

    Universum based support vector machine (USVM) incorporates prior information about the distribution of data in training of the classifier using universum data points. This leads to better generalization performance, but with increased computation cost. Various twin hyperplane based classifiers are proposed to reduce the computation cost of universum based algorithms. In this work, we present an efficient

    更新日期:2020-03-06
  • MANDOLA
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-04
    Demetris Paschalides; Dimosthenis Stephanidis; Andreas Andreou; Kalia Orphanou; George Pallis; Marios D. Dikaiakos; Evangelos Markatos

    In recent years, the increasing propagation of hate speech in online social networks and the need for effective counter-measures have drawn significant investment from social network companies and researchers. This has resulted in the development of many web platforms and mobile applications for reporting and monitoring online hate speech incidents. In this article, we present MANDOLA, a big-data processing

    更新日期:2020-03-04
  • Trustworthy and Transparent Third Party Authority
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-03-01
    Runhua Xu; James Joshi

    A crucial component of emerging cryptographic schemes is a third-party authority (TPA) that must be trusted. However, several types of attacks and certificate mis-issuance problems in the CA infrastructure indicate that the successful deployment of newer emerging cryptographic schemes will also significantly depend on the trustworthiness of the TPAs. To address this issue, we propose an authority transparency

    更新日期:2020-03-01
  • Privacy-preserving time series medical images analysis using a hybrid deep learning framework
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-02-15
    Zijie Yue; Shuai Ding; Lei Zhao; Youtao Zhang; Zehong Cao; M. TANVEER; Alireza Jolfaei; Xi Zheng

    Time series medical images are an important type of medical data that contain rich spatio-temporal information. Recently, computer-aided diagnosis algorithms are often used on honest-but-curious servers to analyze medical images, which introduces severe privacy concerns. This paper proposes a convolutional-LSTM network (HE-CLSTM) for analyzing encrypted medical image sequences. Specifically, several

    更新日期:2020-02-15
  • Secure Motif Finding Based on Candidate Pruning
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-02-10
    Kaijian Xia; Xiang Wu; Yaqing Mao; Huanhuan Wang

    DNA motif finding is an important study to understand the regulation of gene expression, however, the existing methods generally ignore the potential sensitive information that may be exposed in the process. In this work, we utilize the differential privacy model to provide provable privacy guarantees which is independent of attackers? background knowledge. Our method makes use of sample databases

    更新日期:2020-02-10
  • Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-02-08
    Mohammed Al-Khafajiy; Safa Otoum; Thar Baker; Muhammad Asim; Zakaria Maamar; Moayad Aloqaily; Mark Taylor; Martin Randles

    There have been significant advances in the field of Internet of Things (IoT) recently. In most IoT based systems or applications, especially those within smart-homes and smart-cities, there is a bridging point (fog computing) between a sensor network and the Internet which often just performs basic functions such as translating between the protocols used in the Internet and sensor networks, as well

    更新日期:2020-02-08
  • The Security of Medical Data on Internet Based on Differential Privacy Technology
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-02-08
    zhihan lv; Francesco Piccialli

    In the analysis of information loss, it is found that with the number of identifiers increasing in the Magic and EIA datasets, the algorithm in this paper is significantly lower than that in k-anonymity and l-diversity models, and achieves the expected effect. In the availability scoring analysis, for both Magic data set and EIA data set, the usability improvement value of k-anonymity-differential

    更新日期:2020-02-08
  • Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator
    ACM Trans. Internet Technol. (IF 1.598) Pub Date : 2020-01-21
    Jian Qi; Jin Wang; Ren Yongjun; Yepeng Liu; Gwang-jun Kim

    This paper proposed a new and effective integrity auditing mechanism of sensor data based on a bilinear map accumulator. Using the proposed approach will examine all the data blocks in the dataset, not just some of the data blocks, thus eliminating the possibility of any cloud manipulation. Compared with other schemes, our proposed solution has been proved to be highly secure for all necessary security

    更新日期:2020-01-21
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
《自然》编辑与您分享如何成为优质审稿人-信息流
物理学研究前沿热点精选期刊推荐
科研绘图
欢迎报名注册2020量子在线大会
化学领域亟待解决的问题
材料学研究精选新
GIANT
自然职场线上招聘会
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
阿拉丁试剂right
张晓晨
田蕾蕾
李闯创
刘天飞
隐藏1h前已浏览文章
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
天合科研
x-mol收录
X-MOL
清华大学
廖矿标
陈永胜
试剂库存
down
wechat
bug