Cluster Computing-The Journal of Networks Software Tools and Applications最新文献

筛选
英文 中文
Secure and efficient decentralized machine learning through group-based model aggregation 通过基于组的模型聚合实现安全高效的分散机器学习
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-11-14 DOI: 10.1007/s10586-023-04174-9
Brandon A. Mosqueda González, Omar Hasan, Wisnu Uriawan, Youakim Badr, Lionel Brunie
{"title":"Secure and efficient decentralized machine learning through group-based model aggregation","authors":"Brandon A. Mosqueda González, Omar Hasan, Wisnu Uriawan, Youakim Badr, Lionel Brunie","doi":"10.1007/s10586-023-04174-9","DOIUrl":"https://doi.org/10.1007/s10586-023-04174-9","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"59 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134901376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-stage intrusion detection system aided by grey wolf optimization algorithm 基于灰狼优化算法的多阶段入侵检测系统
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-11-10 DOI: 10.1007/s10586-023-04179-4
Somnath Chatterjee, Vaibhav Shaw, Ranit Das
{"title":"Multi-stage intrusion detection system aided by grey wolf optimization algorithm","authors":"Somnath Chatterjee, Vaibhav Shaw, Ranit Das","doi":"10.1007/s10586-023-04179-4","DOIUrl":"https://doi.org/10.1007/s10586-023-04179-4","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"105 34","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel lightweight and fine-grained fast access control using RNS properties in fog computing 在雾计算中使用RNS特性的新型轻量级和细粒度快速访问控制
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-11-10 DOI: 10.1007/s10586-023-04169-6
Mohammad Ali Alizadeh, Somayyeh Jafarali Jassbi, Ahmad Khademzadeh, Majid Haghparast
{"title":"Novel lightweight and fine-grained fast access control using RNS properties in fog computing","authors":"Mohammad Ali Alizadeh, Somayyeh Jafarali Jassbi, Ahmad Khademzadeh, Majid Haghparast","doi":"10.1007/s10586-023-04169-6","DOIUrl":"https://doi.org/10.1007/s10586-023-04169-6","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"111 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based biometric identity management 基于区块链的生物识别身份管理
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-11-07 DOI: 10.1007/s10586-023-04180-x
Sherif Hamdy Gomaa Salem, Ashraf Yehia Hassan, Marwa S. Moustafa, Mohamed Nabil Hassan
{"title":"Blockchain-based biometric identity management","authors":"Sherif Hamdy Gomaa Salem, Ashraf Yehia Hassan, Marwa S. Moustafa, Mohamed Nabil Hassan","doi":"10.1007/s10586-023-04180-x","DOIUrl":"https://doi.org/10.1007/s10586-023-04180-x","url":null,"abstract":"Abstract In recent years, face biometrics recognition systems are a wide space of a computer usage which is mostly employed for security purpose. The main purpose of the face biometrics recognition system is to authenticate a user from a given database. Due to the widespread expansion of the surveillance cameras and facial recognition technology, a robust face recognition system required. The recognition system needs to store a large number of training samples in any storage unit, that time hackers can access and control that data. So, Protecting and managing sensitive data is essential object. This requires a technique that preserve the privacy of individuals, maintain data integrity, and prevent information leakage. The storage of biometric templates on centralized servers has been associated with potential privacy risks. To address this issue, we have developed and implemented a proof-of-concept facial biometric identification system that uses a private Blockchain platform and smart contract technology. So, the proposed approach is presented a secure and tamper-proof from data breaches as well as hacks with data availability, by using the Blockchain platform to store face images. This paper aims to utilize Blockchain technology to identify individuals based on their biometric traits, specifically facial recognition system makes it tamper-proof (immutable) ensuring security. The system consists of enrolment and authentication phases. Blockchain technology uses peer-to-peer communication, cryptography, consensus processes, and smart contracts to ensure the security. The proposed approach was tested on two popular datasets: CelebFaces Attributes (CelebA) and large-scale face UTKFace datasets. The experimental results indicate that the system yields highly performance outcomes, as evidenced by the Equal Error Rate (EER) values of 0.05% and 0.07% obtained for the CelebA and UTKFace datasets, respectively. The system was compared to three baseline methods and scored the lowest Equal Error Rate.","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"60 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135475375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection based on ensemble learning for big data classification 基于集成学习的大数据分类入侵检测
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-11-07 DOI: 10.1007/s10586-023-04168-7
Farah Jemili, Rahma Meddeb, Ouajdi Korbaa
{"title":"Intrusion detection based on ensemble learning for big data classification","authors":"Farah Jemili, Rahma Meddeb, Ouajdi Korbaa","doi":"10.1007/s10586-023-04168-7","DOIUrl":"https://doi.org/10.1007/s10586-023-04168-7","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135432308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis 基于系统调用序列分析的云入侵检测系统混合框架
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-11-07 DOI: 10.1007/s10586-023-04162-z
Ashish Chaudhari, Bhavesh Gohil, Udai Pratap Rao
{"title":"A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis","authors":"Ashish Chaudhari, Bhavesh Gohil, Udai Pratap Rao","doi":"10.1007/s10586-023-04162-z","DOIUrl":"https://doi.org/10.1007/s10586-023-04162-z","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"327 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135475439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel hybrid success history intelligent optimizer with Gaussian transformation: application in CNN hyperparameter tuning 新型高斯变换混合成功史智能优化器在CNN超参数整定中的应用
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-11-06 DOI: 10.1007/s10586-023-04161-0
Hussam N. Fakhouri, Sadi Alawadi, Feras M. Awaysheh, Faten Hamad
{"title":"Novel hybrid success history intelligent optimizer with Gaussian transformation: application in CNN hyperparameter tuning","authors":"Hussam N. Fakhouri, Sadi Alawadi, Feras M. Awaysheh, Faten Hamad","doi":"10.1007/s10586-023-04161-0","DOIUrl":"https://doi.org/10.1007/s10586-023-04161-0","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"12 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135590105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method of system selection for shuttle-based storage and retrieval system considering cost and performance 考虑成本和性能的航天飞机储运系统选择方法
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-11-05 DOI: 10.1007/s10586-023-04175-8
Dong Yang, Ruyan Ren
{"title":"A method of system selection for shuttle-based storage and retrieval system considering cost and performance","authors":"Dong Yang, Ruyan Ren","doi":"10.1007/s10586-023-04175-8","DOIUrl":"https://doi.org/10.1007/s10586-023-04175-8","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135725096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach 基于机器学习的云存储系统大数据重复数据删除增强认证
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-11-03 DOI: 10.1007/s10586-023-04171-y
Mohd Akbar, Irshad Ahmad, Mohsina Mirza, Manavver Ali, Praveen Barmavatu
{"title":"Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach","authors":"Mohd Akbar, Irshad Ahmad, Mohsina Mirza, Manavver Ali, Praveen Barmavatu","doi":"10.1007/s10586-023-04171-y","DOIUrl":"https://doi.org/10.1007/s10586-023-04171-y","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"44 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135819720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things 基于云的工业物联网超自动化过程网络攻击检测新架构
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-11-02 DOI: 10.1007/s10586-023-04163-y
Alireza Souri, Monire Norouzi, Yousef Alsenani
{"title":"A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things","authors":"Alireza Souri, Monire Norouzi, Yousef Alsenani","doi":"10.1007/s10586-023-04163-y","DOIUrl":"https://doi.org/10.1007/s10586-023-04163-y","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"34 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135973409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信