Computer Standards & Interfaces最新文献

筛选
英文 中文
Privacy-preserving authentication protocol for user personal device security in Brain–Computer Interface 脑机接口中用户个人设备安全的隐私保护认证协议
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-04-10 DOI: 10.1016/j.csi.2025.104009
Sunil Prajapat , Aryan Rana , Pankaj Kumar , Ashok Kumar Das , Willy Susilo
{"title":"Privacy-preserving authentication protocol for user personal device security in Brain–Computer Interface","authors":"Sunil Prajapat ,&nbsp;Aryan Rana ,&nbsp;Pankaj Kumar ,&nbsp;Ashok Kumar Das ,&nbsp;Willy Susilo","doi":"10.1016/j.csi.2025.104009","DOIUrl":"10.1016/j.csi.2025.104009","url":null,"abstract":"<div><div>Brain–Computer Interface (BCI) technology has emerged as a transformative tool, particularly for individuals with severe motor disabilities. Non-invasive BCI systems, leveraging Electroencephalography (EEG), offer a direct interface between users and external devices, bypassing the need for muscular control. However, ensuring the security and privacy of users’ neural data remains a critical challenge. In this paper, we propose a novel privacy-preserving authentication scheme for EEG-based BCI systems, utilizing elliptic curve cryptography (ECC). Our scheme balances robust security with computational efficiency, making it suitable for resource-constrained environments. Since we are addressing security in a resource-constrained environment, such as EEG in BCI, we have constructed a lightweight authentication algorithm to meet the stringent requirements of minimal computational resources and energy consumption. The security analysis and performance evaluation of the authentication protocol show that our scheme is resistant to various attacks, such as replay, offline password guessing, privilege insider, user impersonation, and smart card stolen attacks. It offers mutual authentication and key agreement, requiring only 1632 bits of communication cost and 15.67139 ms of computational cost for the entire login authentication and key agreement phase. Our study lays a solid foundation for future investigation of innovative solutions for BCI security.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104009"},"PeriodicalIF":4.1,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143816344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient rejection-free threshold ring signature from lattices and its application in receipt-free cloud e-voting 一种有效的栅格无拒绝阈值环签名及其在无收据云电子投票中的应用
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-04-05 DOI: 10.1016/j.csi.2025.104008
Chunhui Wu , Youkang Zhou , Fangguo Zhang , Yusong Du , Qiping Lin
{"title":"An efficient rejection-free threshold ring signature from lattices and its application in receipt-free cloud e-voting","authors":"Chunhui Wu ,&nbsp;Youkang Zhou ,&nbsp;Fangguo Zhang ,&nbsp;Yusong Du ,&nbsp;Qiping Lin","doi":"10.1016/j.csi.2025.104008","DOIUrl":"10.1016/j.csi.2025.104008","url":null,"abstract":"<div><div>The threshold ring signature is a generalization of the ring signature. It confirms that <span><math><mi>t</mi></math></span>-out-of-<span><math><mi>N</mi></math></span> members are signing anonymously in a set of <span><math><mi>N</mi></math></span> users, and thus it can be well applied to e-voting. In this paper, we present a more efficient lattice-based threshold ring signature, using Lagrange polynomial interpolation to express the threshold. The scheme eliminates the dependence on Stern-like identification protocols with large soundness error, and achieves much shorter signature sizes. It also uses the technique of Gaussian convolution (<span>G</span>+<span>G</span>) proposed by Devevey et al.<!--> <!-->in Asiacrypt 2023 to remove the rejection sampling in BLISS signature. Compared with previous distributed FSwA (Fiat-Shamir with Aborts) signatures where the number of repetitions increases exponentially with that of signers, our scheme has much higher computation efficiency. We prove the unforgeability and strong anonymity, i.e., fellow-signer anonymity, unclaimability and anonymity against the untrusted leader of our proposed threshold ring signature scheme. Leveraging the security and efficiency advantages of our signature scheme, we propose a post-quantum receipt-free and verifiable e-voting protocol for large-scale elections with untrusted cloud servers.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104008"},"PeriodicalIF":4.1,"publicationDate":"2025-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143806843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new deep learning based electricity theft detection framework for smart grids in cloud computing 基于深度学习的云计算智能电网窃电检测新框架
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-03-31 DOI: 10.1016/j.csi.2025.104007
Zhen Si , Zhaoqing Liu , Changchun Mu , Meng Wang , Tongxin Gong , Xiaofang Xia , Qing Hu , Yang Xiao
{"title":"A new deep learning based electricity theft detection framework for smart grids in cloud computing","authors":"Zhen Si ,&nbsp;Zhaoqing Liu ,&nbsp;Changchun Mu ,&nbsp;Meng Wang ,&nbsp;Tongxin Gong ,&nbsp;Xiaofang Xia ,&nbsp;Qing Hu ,&nbsp;Yang Xiao","doi":"10.1016/j.csi.2025.104007","DOIUrl":"10.1016/j.csi.2025.104007","url":null,"abstract":"<div><div>Electricity theft is a widespread problem in smart grids with significant economic and security implications. Although users’ electricity consumption patterns usually show obvious periodicity, they also exhibit considerable stochasticity and uncertainty. Existing mainstream electricity theft detection methods are the deep learning-based ones, which struggle to capture reliable long-term dependencies from the complex consumption data, leading to suboptimal identification of abnormal patterns. Moreover, the massive data generated by smart grids demands a scalable and robust computational infrastructure that traditional systems cannot provide. To solve these limitations, we propose a new deep learning-based electricity theft detection framework in cloud computing. At the cloud server, we deploy an electricity theft detector based on the auto-correlation mechanism, called the ETD-SAC detector, which progressively decomposes intricate consumption patterns throughout the detection process and aggregates the dependencies at the subsequence level to effectively discover reliable long-term dependencies from users’ electricity consumption data. Experimental results show that the proposed ETD-SAC detector outperforms state-of-the-art detectors in terms of accuracy, false negative rate, and false positive rate.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104007"},"PeriodicalIF":4.1,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143746803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fields of the future: Digital transformation in smart agriculture with large language models and generative AI 未来领域:基于大型语言模型和生成式人工智能的智能农业数字化转型
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-03-28 DOI: 10.1016/j.csi.2025.104005
Tawseef Ayoub Shaikh , Tabasum Rasool , Waseem Ahmad Mir
{"title":"Fields of the future: Digital transformation in smart agriculture with large language models and generative AI","authors":"Tawseef Ayoub Shaikh ,&nbsp;Tabasum Rasool ,&nbsp;Waseem Ahmad Mir","doi":"10.1016/j.csi.2025.104005","DOIUrl":"10.1016/j.csi.2025.104005","url":null,"abstract":"<div><div>Language models (LLMs) have shown to be very useful in many fields like healthcare and finance, as natural language comprehension and generation have advanced. The capacity of LLM to participate in textual discussion has been the subject of much research, and the findings have proved encouraging across several domains. The inability of conventional image classification networks to comprehend the causes of crop diseases and etiology further impedes precise diagnosis. Agricultural diagnostic models on a grand scale will be based on generative pre-trained transformers (GPT) assisted with agrarian settings. By examining the efficacy of text corpora linked to agriculture for pretraining transformer-based language (TBL) models, this research delves into agricultural natural language processing (ANLP). To make the most of it, we looked at several important aspects, including prompt building, response parsing, and several ChatGPT versions. Despite the proven effectiveness and huge potential, there has been little exploration of LLM and Generative AI to agriculture artificial intelligence (AI). Therefore, this study aims to explore the possibility of LLM and Generative AI in smart agriculture. In particular, we present conceptual tools and technical background to facilitate understanding the problem space and uncover new research directions in this field. The paper presents an overview of the evolution of generative adversarial network (GAN) architectures followed by a first systematic review of various applications in smart agriculture and precision farming systems, involving a diversity of visual recognition tasks for smart farming and livestock, precision agriculture, agricultural language processing (ALP), agricultural robots (AR), plant phenotyping (PP), and postharvest quality assessment. We outline the possibilities, difficulties, constraints, and shortcomings. The study lays forth a road map of accessible areas in agriculture where LLM integration is likely to happen shortly. The research suggests exciting directions for further study in this area, which could lead to better agricultural NLP applications.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104005"},"PeriodicalIF":4.1,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143786282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WeAIR: Wearable Swarm Sensors for Air Quality Monitoring to Foster Citizens’ Awareness of Climate Change WeAIR:用于空气质量监测的可穿戴蜂群传感器,以提高公民对气候变化的认识
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-03-28 DOI: 10.1016/j.csi.2025.104004
Giovanna Maria Dimitri , Lorenzo Parri , Eleonora Vitanza , Alessandro Pozzebon , Ada Fort , Chiara Mocenni
{"title":"WeAIR: Wearable Swarm Sensors for Air Quality Monitoring to Foster Citizens’ Awareness of Climate Change","authors":"Giovanna Maria Dimitri ,&nbsp;Lorenzo Parri ,&nbsp;Eleonora Vitanza ,&nbsp;Alessandro Pozzebon ,&nbsp;Ada Fort ,&nbsp;Chiara Mocenni","doi":"10.1016/j.csi.2025.104004","DOIUrl":"10.1016/j.csi.2025.104004","url":null,"abstract":"<div><div>The present study proposes the implementation of an air quality measurement tool through the use of wearable devices, named WeAIR, consisting of wearable sensors for measuring NO<span><math><msub><mrow></mrow><mrow><mi>x</mi></mrow></msub></math></span>, CO<span><math><msub><mrow></mrow><mrow><mn>2</mn></mrow></msub></math></span>, CO, temperature, humidity, barometric pressure and PM10. In particular through the use of our novel sensor prototype, we performed a measurement collection campaign, acquiring an extensive set of geo-localized air quality data in the city of Siena (Italy). We further implemented and applied an AI neural network based model, capable of predicting the localization of an observation, having as input the air monitoring parameters and using the new spatio-temporal collected datasets. The promising performances obtained with the AI prediction approach enhanced the importance and possibilities of using such spatio-temporal air quality monitoring datasets, suggesting their crucial role both for raising citizen awareness on climate change and supporting policymakers’ decisions, as for instance the ones related to the positioning of new fixed monitoring stations.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104004"},"PeriodicalIF":4.1,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143746802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of reversible data hiding: Statistics, current trends, and future outlook 可逆数据隐藏的调查:统计、当前趋势和未来展望
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-03-25 DOI: 10.1016/j.csi.2025.104003
Sonal Gandhi, Rajeev Kumar
{"title":"Survey of reversible data hiding: Statistics, current trends, and future outlook","authors":"Sonal Gandhi,&nbsp;Rajeev Kumar","doi":"10.1016/j.csi.2025.104003","DOIUrl":"10.1016/j.csi.2025.104003","url":null,"abstract":"<div><div>In the era of increasing digital media storage and transmission over networks, reversible data hiding (RDH) has evolved as a prominent area of research mitigating information security risk. To study the evolution of research, highlight its achievements over the years, and provide future prospects, this paper presents an extensive review of RDH utilizing the dataset extracted from one of the most popular and exhaustive databases, Web of Science. The study aims to first perform quantitative analysis that includes trend analysis, citation analysis, prominent authors and organizations, and geographical coverage, along with qualitative analysis focusing on key research areas and future prospects within RDH. The study further provides a structured view of sub-technologies within RDH, along with the key contributors and their proposed techniques that have led to the evolution of RDH over the years. Next, we provide a comprehensive review of some of the prominent works in each of the sub-technologies of RDH. Finally, several key research directions, identified based on current research trends and early-stage problems and motivations, are discussed. Overall, the proposed study provides valuable insights into the evolution, key milestones, current state, and future prospects of RDH, serving as a guide for the research community.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104003"},"PeriodicalIF":4.1,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143725098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PP-MAD: Privacy-preserving multi-task data aggregation in mobile crowdsensing via blockchain PP-MAD:基于区块链的移动众测中保护隐私的多任务数据聚合
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-03-25 DOI: 10.1016/j.csi.2025.104002
Xingfu Yan , Jiaju Ding , Fucai Luo , Zheng Gong , Wing W.Y. Ng , Yiyuan Luo
{"title":"PP-MAD: Privacy-preserving multi-task data aggregation in mobile crowdsensing via blockchain","authors":"Xingfu Yan ,&nbsp;Jiaju Ding ,&nbsp;Fucai Luo ,&nbsp;Zheng Gong ,&nbsp;Wing W.Y. Ng ,&nbsp;Yiyuan Luo","doi":"10.1016/j.csi.2025.104002","DOIUrl":"10.1016/j.csi.2025.104002","url":null,"abstract":"<div><div>In smart city, multi-task data aggregation has become a key method for extracting useful information from massive sensing data generated by concurrent mobile crowdsensing tasks from multiple task requesters. In such multi-requester and multi-task scenario, each task requester wants to protect the privacy of their own aggregation results. Thus, protecting privacies of both workers and task requesters pose a significant challenge for multi-task data aggregation. Most existing privacy-preserving data aggregation methods focus on single-requester scenarios. When applied to multi-task and multi-requester aggregation, existing methods are inefficient due to completing repeatedly each task and fail to safeguard the privacy of each task requester. Additionally, existing multi-task data aggregation schemes do not support multiple types of aggregation. To tackle these challenges, we propose PP-MAD, a multi-type and privacy-preserving multi-task data aggregation scheme based on blockchain for mobile crowdsensing. PP-MAD is able to aggregate multiple concurrent tasks from multiple task requesters, and it supports many types of data aggregation, including sum, mean, variance, weighted sum, weighted mean. Moreover, PP-MAD ensures privacies of workers’ data and aggregation results of each task requester, even under collusion attacks. A detailed security analysis verifies that PP-MAD is both secure and privacy-preserving. Furthermore, experimental results and theoretical analyses of both computation and communication costs demonstrate our scheme is efficient.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104002"},"PeriodicalIF":4.1,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143704075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PQHealthcare: An efficient cloud data sharing system via Functional Encryption from lattices PQHealthcare:通过格子功能加密的高效云数据共享系统
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-03-19 DOI: 10.1016/j.csi.2025.103993
Qiqi Lai , Chongshen Chen , Momeng Liu , Yang Yang , Yong Yu
{"title":"PQHealthcare: An efficient cloud data sharing system via Functional Encryption from lattices","authors":"Qiqi Lai ,&nbsp;Chongshen Chen ,&nbsp;Momeng Liu ,&nbsp;Yang Yang ,&nbsp;Yong Yu","doi":"10.1016/j.csi.2025.103993","DOIUrl":"10.1016/j.csi.2025.103993","url":null,"abstract":"<div><div>With the rapid development of the large language models (<span><math><mi>LLM</mi></math></span>) service on the cloud, especially in the healthcare sector, the usage of large models is becoming increasingly popular. However, training these models always involves sensitive information containing lots of personal medical data. And thus, such training processes might result in the exposure of privacy information. In order to help the users eliminate their concerns and share their data in a secure way, we need to find a privacy-preserving method for data sharing in the public cloud service environment.</div><div>While traditional public-key encryption (<span><math><mi>PKE</mi></math></span>) schemes can effectively encrypt healthcare data, they typically offer protection in an “all-or-nothing” manner, lacking flexibility and imposing a significant computational burden on public cloud servers. In contrast, Functional Encryption (<span><math><mi>FE</mi></math></span>) offers a more flexible way of encryption with access control, making it ideal for the cloud data sharing environment. Furthermore, we observe that the majority of computations involved in training large models can be represented by inner product functions. To establish a secure public cloud data sharing system, we propose an efficient <span><math><mi>FE</mi></math></span> scheme for inner product function class, making it well-suited for various real-world applications. We will demonstrate that our scheme achieves post-quantum security based on lattice assumptions.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 103993"},"PeriodicalIF":4.1,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143684751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Standardization in artificial general intelligence model for education 通用人工智能教育模型的标准化
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-03-19 DOI: 10.1016/j.csi.2025.104006
Qiuxuan Xu , Yonghe Wu , Hao Zheng , Huan Yan , Huina Wu , Yu Qian , You Wu , Bowen Liu
{"title":"Standardization in artificial general intelligence model for education","authors":"Qiuxuan Xu ,&nbsp;Yonghe Wu ,&nbsp;Hao Zheng ,&nbsp;Huan Yan ,&nbsp;Huina Wu ,&nbsp;Yu Qian ,&nbsp;You Wu ,&nbsp;Bowen Liu","doi":"10.1016/j.csi.2025.104006","DOIUrl":"10.1016/j.csi.2025.104006","url":null,"abstract":"<div><div>The application of Artificial General Intelligence Models (AGIMs) in education has been identified as a promising emerging field. However, extensive research has revealed limitations in using AGIM in education, particularly in terms of controllability, trustworthiness, explainability, evaluation and feedback, security, and privacy. Therefore, standardization in AGIMs for Education (AGIME) is urgently required to provide normative guidance for developing artificial intelligence systems in education. This study first explores an AGIME standardization process with the methodology of use case collection and iterative research. We then propose the definition and attributes of AGIME and establish a standard system framework for the AGIME life cycle. This framework includes published specifications such as information model, data specification, evaluation specification, and application requirements on teaching and learning. We introduce standard application cases to validate the effectiveness of AGIME standard system framework. Finally, we present several specifications currently under development within this standard system, including interface, regulatory, operation and maintenance, and security, ethics, and privacy specifications. This study provides references for AGIME development and deployment, ensuring the technical stability, data credibility, evaluation accuracy, and pedagogical applicability of AGIME.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104006"},"PeriodicalIF":4.1,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143725179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A privacy-preserving standardized model for large-scale source code fingerprint extraction and clone detection 大规模源代码指纹提取和克隆检测的隐私保护标准化模型
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-03-19 DOI: 10.1016/j.csi.2025.103998
Ming Yang , Yu-an Tan , Ning Shi , Yajie Wang , Ziqi Wang , Qi Liang
{"title":"A privacy-preserving standardized model for large-scale source code fingerprint extraction and clone detection","authors":"Ming Yang ,&nbsp;Yu-an Tan ,&nbsp;Ning Shi ,&nbsp;Yajie Wang ,&nbsp;Ziqi Wang ,&nbsp;Qi Liang","doi":"10.1016/j.csi.2025.103998","DOIUrl":"10.1016/j.csi.2025.103998","url":null,"abstract":"<div><div>With the rapid advancement of software technology, developers often replicate or modify existing code to achieve code cloning, thereby improving development efficiency. However, the widespread use of open-source code may lead to intellectual property disputes and infringement risks. Additionally, the repeated use of cloned code can exacerbate vulnerabilities, increasing system fragility and maintenance costs, especially when synchronized modifications are required for cloned fragments during software evolution. To address these challenges, this paper proposes a privacy-preserving large-scale code fingerprint extraction model—Ringer. The model decouples feature extraction from clone detection, enabling efficient clone detection without direct access to the source code. Ringer employs syntax trees for lexical and syntactic analysis to comprehensively extract code features, and generates irreversible code fingerprints through token replacement and the Metro-128 hash algorithm, ensuring the privacy of the source code while effectively detecting clones. Experimental results show that Ringer performs excellently on datasets from multiple programming languages (e.g., Java, C++, Python, etc.), maintaining consistently high accuracy based on the characteristics of each language. On the Python dataset, Ringer achieves detection accuracies of 94%, 94%, and 97% for Type-1, Type-2, and Type-3 clones, respectively, further validating its efficiency and reliability in practical applications. Compared to mainstream detection tools (e.g., Moss and NiCad), Ringer outperforms in cross-language detection, demonstrating its robust adaptability and superior accuracy. This strongly supports the broad applicability of Ringer for privacy-preserving clone detection in large-scale, multi-language codebases.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 103998"},"PeriodicalIF":4.1,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143704124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信