Future Generation Computer Systems-The International Journal of Escience最新文献

筛选
英文 中文
ROPGMN: Effective ROP and variants discovery using dynamic feature and graph matching network ROPGMN:利用动态特征和图匹配网络有效发现 ROP 和变体
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-10-22 DOI: 10.1016/j.future.2024.107567
Weina Niu , Kexuan Zhang , Ran Yan , Jie Li , Yan Zhang , Xiaosong Zhang
{"title":"ROPGMN: Effective ROP and variants discovery using dynamic feature and graph matching network","authors":"Weina Niu ,&nbsp;Kexuan Zhang ,&nbsp;Ran Yan ,&nbsp;Jie Li ,&nbsp;Yan Zhang ,&nbsp;Xiaosong Zhang","doi":"10.1016/j.future.2024.107567","DOIUrl":"10.1016/j.future.2024.107567","url":null,"abstract":"<div><div>Return Oriented Programming (ROP) is one of the most challenging threats to operating systems. Traditional detection and defense techniques for ROP such as stack protection, address randomization, compiler optimization, control flow integrity, and basic block thresholds have certain limitations in accuracy or efficiency. At the same time, they cannot effectively detect ROP variant attacks, such as COP, COOP, JOP. In this paper, we propose a novel ROP and its variants detection approach that first filters the normal execution flow according to four strategies provided and then adopts Graph Matching Network (GMN) to determine whether there is ROP or its variant attack. Moreover, we developed a prototype named ROPGMN with shared memory to solve cross-language and cross-process problems. Using real-world vulnerable programs and constructed programs with dangerous function calls, we conduct extensive experiments with 6 ROP detectors to evaluate ROPGMN. The experimental results demonstrate the effectiveness of ROPGMN in discovering ROPs and their variant attacks with low performance overhead.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"164 ","pages":"Article 107567"},"PeriodicalIF":6.2,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142560681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart contract languages: A comparative analysis 智能合约语言:比较分析
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-10-22 DOI: 10.1016/j.future.2024.107563
Massimo Bartoletti , Lorenzo Benetollo , Michele Bugliesi , Silvia Crafa , Giacomo Dal Sasso , Roberto Pettinau , Andrea Pinna , Mattia Piras , Sabina Rossi , Stefano Salis , Alvise Spanò , Viacheslav Tkachenko , Roberto Tonelli , Roberto Zunino
{"title":"Smart contract languages: A comparative analysis","authors":"Massimo Bartoletti ,&nbsp;Lorenzo Benetollo ,&nbsp;Michele Bugliesi ,&nbsp;Silvia Crafa ,&nbsp;Giacomo Dal Sasso ,&nbsp;Roberto Pettinau ,&nbsp;Andrea Pinna ,&nbsp;Mattia Piras ,&nbsp;Sabina Rossi ,&nbsp;Stefano Salis ,&nbsp;Alvise Spanò ,&nbsp;Viacheslav Tkachenko ,&nbsp;Roberto Tonelli ,&nbsp;Roberto Zunino","doi":"10.1016/j.future.2024.107563","DOIUrl":"10.1016/j.future.2024.107563","url":null,"abstract":"<div><div>Smart contracts have played a pivotal role in the evolution of blockchains and Decentralized Applications (DApps). As DApps continue to gain widespread adoption, multiple smart contract languages have been and are being made available to developers, each with its distinctive features, strengths, and weaknesses. In this paper, we examine the smart contract languages used in major blockchain platforms, with the goal of providing a comprehensive assessment of their main properties. Our analysis targets the programming languages rather than the underlying architecture: as a result, while we do consider the interplay between language design and blockchain model, our main focus remains on language-specific features such as usability, programming style, safety and security. To conduct our assessment, we propose an original benchmark which encompasses a wide, yet manageable, spectrum of key use cases that cut across all the smart contract languages under examination.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"164 ","pages":"Article 107563"},"PeriodicalIF":6.2,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142554218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid wind speed optimization forecasting system based on linear and nonlinear deep neural network structure and data preprocessing fusion 基于线性和非线性深度神经网络结构及数据预处理融合的混合风速优化预报系统
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-10-21 DOI: 10.1016/j.future.2024.107565
Jiyang Wang, Jifeng Che, Zhiwu Li, Jialu Gao, Linyue Zhang
{"title":"Hybrid wind speed optimization forecasting system based on linear and nonlinear deep neural network structure and data preprocessing fusion","authors":"Jiyang Wang,&nbsp;Jifeng Che,&nbsp;Zhiwu Li,&nbsp;Jialu Gao,&nbsp;Linyue Zhang","doi":"10.1016/j.future.2024.107565","DOIUrl":"10.1016/j.future.2024.107565","url":null,"abstract":"<div><div>Wind speed time series forecasting has been widely used in wind power generation. However, the nonlinear and non-stationary characteristics of wind speed make accurate wind speed forecasting a difficult task. In recent years, the rapid development of artificial intelligence and machine learning technology provides a new solution to the problem of wind speed forecasting. Combining the advance of artificial intelligence and data analysis strategy, this paper proposes a wind speed forecasting system based on multi-model fusion and integrated learning. Considering the differences in data observation and training principles of various algorithms and exploiting the advantages of each model, a wind speed forecasting system with multiple machine learning algorithms embedded in integrated learning is constructed, which includes three modules: data preprocessing, optimization and forecasting. The data preprocessing module can conduct quantitative analysis through input data decomposition and feature extraction, and the combination of multi-objective intelligent optimization algorithm and combined forecasting method can effectively forecast the wind speed time series. The validity of the algorithm is verified using the data of Shandong wind farm in China. The forecasting results show that compared with the traditional single model forecasting, the proposed integrated wind speed forecasting system based on the fusion of multiple models has higher forecasting accuracy.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"164 ","pages":"Article 107565"},"PeriodicalIF":6.2,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142560682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Serverless Computing for Next-generation Application Development 面向下一代应用程序开发的无服务器计算
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-10-21 DOI: 10.1016/j.future.2024.107573
Adel N. Toosi , Bahman Javadi , Alexandru Iosup , Evgenia Smirni , Schahram Dustdar
{"title":"Serverless Computing for Next-generation Application Development","authors":"Adel N. Toosi ,&nbsp;Bahman Javadi ,&nbsp;Alexandru Iosup ,&nbsp;Evgenia Smirni ,&nbsp;Schahram Dustdar","doi":"10.1016/j.future.2024.107573","DOIUrl":"10.1016/j.future.2024.107573","url":null,"abstract":"<div><div>Serverless computing is a cloud computing model that abstracts server management, allowing developers to focus solely on writing code without concerns about the underlying infrastructure. This paradigm shift is transforming application development by reducing time to market, lowering costs, and enhancing scalability. In serverless computing, functions are event-driven and automatically scale in response to events such as data changes or user requests. Despite its advantages, serverless computing presents several research challenges, including managing state for ephemeral functions, mitigating cold start delays, optimizing function composition, debugging, efficient auto-scaling, resource management, and ensuring security and compliance. This special issue focused on addressing these challenges by promoting research on innovative solutions and exploring the potential of serverless computing in new application domains.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"164 ","pages":"Article 107573"},"PeriodicalIF":6.2,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142651754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the vetaverse: Web 3.0 for decentralized Digital Twin-enhanced vehicle–road safety 确保车辆安全:用于分散式数字孪生增强型车辆道路安全的 Web 3.0
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-10-21 DOI: 10.1016/j.future.2024.107555
Sadia Jabeen Siddiqi , Sana Saleh , Mian Ahmad Jan , Muhammad Tariq
{"title":"Securing the vetaverse: Web 3.0 for decentralized Digital Twin-enhanced vehicle–road safety","authors":"Sadia Jabeen Siddiqi ,&nbsp;Sana Saleh ,&nbsp;Mian Ahmad Jan ,&nbsp;Muhammad Tariq","doi":"10.1016/j.future.2024.107555","DOIUrl":"10.1016/j.future.2024.107555","url":null,"abstract":"<div><div>The rapid evolution of vehicular communication technologies in recent times necessitates robust security measures and enhanced road safety protocols. Integrity of data shared between vehicles, their Digital Twins (DT) and road side units is at stake. Intrusion in these data can potentially lead to misinformation in Advanced Driving Assistance Systems (ADAS) causing serious consequences upon road safety. These include improper detection of drunk driving behaviors. In this domain, Web 3.0 emerges as the overarching approach that can transform security of vehicles and ensure road safety. This paper explores the potential of Web 3.0 and its key enabling technologies to establish a VEhicular meTAVERSE (Vetaverse) utilizing edge-based DTs of the vehicles to process their dynamics shared in real-time, and based on its deep learning models, predict whether the driving behavior is drunk or sober. This Deep Neural Network (DNN) performs these predictions with 96% accuracy. It secures all Vehicle-to-Digital Twin (V2DT) communications via Multichain - a horizontally scaled parallel blockchains platform that tamper proofs each bit of sensor data, and optimizes transaction validation time to leverage vetaverse security. Results reveal that this framework is accurate and computationally lightweight in comparison to existing state-of-the-art, and brings Web 3.0 to the crucial road safety use-case.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"164 ","pages":"Article 107555"},"PeriodicalIF":6.2,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142526099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient and provably secured puncturable attribute-based signature for Web 3.0 用于 Web 3.0 的高效且可证明安全的可标点属性签名
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-10-20 DOI: 10.1016/j.future.2024.107568
YueTong Wu , Hu Xiong , Fazlullah Khan , Salman Ijaz , Ryan Alturki , Abeer Aljohani
{"title":"Efficient and provably secured puncturable attribute-based signature for Web 3.0","authors":"YueTong Wu ,&nbsp;Hu Xiong ,&nbsp;Fazlullah Khan ,&nbsp;Salman Ijaz ,&nbsp;Ryan Alturki ,&nbsp;Abeer Aljohani","doi":"10.1016/j.future.2024.107568","DOIUrl":"10.1016/j.future.2024.107568","url":null,"abstract":"<div><div>Web 3.0 is a grand design with intricate data interchange, implying the requirement of versatile network protocol to ensure its security. Attribute-based signature (ABS) allows a user, who is featured with a set of attributes, to sign messages under a predicate. The validity of the ABS signature demonstrates that this signature is generated by the user whose attributes satisfy the corresponding predicate, and thus flexibly achieves anonymous authentication. Similar to other digital signatures, the security of ABS is broken in case the private key of the user is leaked out. To address the threat brought by the key leakage, this paper proposes a puncturable attribute-based signature scheme that allows the private key generator to revoke the signing right associated with specific tags. This paper firstly elaborates the construction of the proposed ABS scheme with puncturable property, and then proves its security theoretically by reducing the involved security to the computational Diffie–Hellman assumption. This paper then experimentally shows that the suggested puncturable ABS scheme owns a more efficient storage cost and superior performance.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"164 ","pages":"Article 107568"},"PeriodicalIF":6.2,"publicationDate":"2024-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142526100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving and verifiable convolution neural network inference and training in cloud computing 云计算中的隐私保护和可验证卷积神经网络推理与训练
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-10-19 DOI: 10.1016/j.future.2024.107560
Wei Cao , Wenting Shen , Jing Qin , Hao Lin
{"title":"Privacy-preserving and verifiable convolution neural network inference and training in cloud computing","authors":"Wei Cao ,&nbsp;Wenting Shen ,&nbsp;Jing Qin ,&nbsp;Hao Lin","doi":"10.1016/j.future.2024.107560","DOIUrl":"10.1016/j.future.2024.107560","url":null,"abstract":"<div><div>With the rapid development of cloud computing, outsourcing massive data and complex deep learning model to cloud servers (CSs) has become a popular trend, which also brings some security problems. One is that the model stored in the CSs may be corrupted, leading to incorrect inference and training results. The other is that the privacy of outsourced data and model may be compromised. However, existing privacy-preserving and verifiable inference schemes suffer from low detection probability, high communication overhead and substantial computational time. To solve the above problems, we propose a privacy-preserving and verifiable scheme for convolutional neural network inference and training in cloud computing. In our scheme, the model owner generates the authenticators for model parameters before uploading the model to CSs. In the phase of model integrity verification, model owner and user can utilize these authenticators to check model integrity with high detection probability. Furthermore, we design a set of privacy-preserving protocols based on replicated secret sharing for both the inference and training phases, significantly reducing communication overhead and computational time. Through security analysis, we demonstrate that our scheme is secure. Experimental evaluations show that the proposed scheme outperforms existing schemes in privacy-preserving inference and model integrity verification.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"164 ","pages":"Article 107560"},"PeriodicalIF":6.2,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142554220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SeCTIS: A framework to Secure CTI Sharing SeCTIS:安全 CTI 共享框架
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-10-19 DOI: 10.1016/j.future.2024.107562
Dincy R. Arikkat , Mert Cihangiroglu , Mauro Conti , Rafidha Rehiman K.A. , Serena Nicolazzo , Antonino Nocera , Vinod P.
{"title":"SeCTIS: A framework to Secure CTI Sharing","authors":"Dincy R. Arikkat ,&nbsp;Mert Cihangiroglu ,&nbsp;Mauro Conti ,&nbsp;Rafidha Rehiman K.A. ,&nbsp;Serena Nicolazzo ,&nbsp;Antonino Nocera ,&nbsp;Vinod P.","doi":"10.1016/j.future.2024.107562","DOIUrl":"10.1016/j.future.2024.107562","url":null,"abstract":"<div><div>The rise of IT-dependent operations in modern organizations has heightened their vulnerability to cyberattacks. Organizations are inadvertently enlarging their vulnerability to cyber threats by integrating more interconnected devices into their operations, which makes these threats both more sophisticated and more common. Consequently, organizations have been compelled to seek innovative approaches to mitigate the menaces inherent in their infrastructure. In response, considerable research efforts have been directed towards creating effective solutions for sharing Cyber Threat Intelligence (CTI). Current information-sharing methods lack privacy safeguards, leaving organizations vulnerable to proprietary and confidential data leaks. To tackle this problem, we designed a novel framework called SeCTIS (Secure Cyber Threat Intelligence Sharing), integrating Swarm Learning and Blockchain technologies to enable businesses to collaborate, preserving the privacy of their CTI data. Moreover, our approach provides a way to assess the data and model quality and the trustworthiness of all the participants leveraging some <em>validators</em> through Zero Knowledge Proofs. Extensive experimentation has confirmed the accuracy and performance of our framework. Furthermore, our detailed attack model analyzes its resistance to attacks that could impact data and model quality.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"164 ","pages":"Article 107562"},"PeriodicalIF":6.2,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ServlessSimPro: A comprehensive serverless simulation platform ServlessSimPro:全面的无服务器仿真平台
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-10-19 DOI: 10.1016/j.future.2024.107558
Han Cao , Jinquan Zhang , Long Chen , Siyuan Li , Guang Shi
{"title":"ServlessSimPro: A comprehensive serverless simulation platform","authors":"Han Cao ,&nbsp;Jinquan Zhang ,&nbsp;Long Chen ,&nbsp;Siyuan Li ,&nbsp;Guang Shi","doi":"10.1016/j.future.2024.107558","DOIUrl":"10.1016/j.future.2024.107558","url":null,"abstract":"<div><div>Serverless computing represents an emerging paradigm within cloud computing, characterized by the fundamental concept of enabling developers to run applications without the need for concerns related to the management of underlying servers. Although there are several mature serverless computing platforms currently exist, there is limited availability of open-source simulation platforms that can accurately simulate the characteristics of serverless environments and provide a free and convenient tool for researchers to conduct investigations. Furthermore, existing simulation platforms do not provide comprehensive interfaces for scheduling strategies and do not provide the diverse monitoring metrics required by researchers. In response to this gap, we have developed the ServlessSimPro simulation platform. This platform offers the most comprehensive set of scheduling algorithms, diverse evaluation metrics, and extensive interfaces and parameters among all existing serverless simulators. The experimental results demonstrate that the scheduling algorithm of the simulator can effectively reduce latency, enhance resource utilization, and decrease energy consumption.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"163 ","pages":"Article 107558"},"PeriodicalIF":6.2,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward data efficient anomaly detection in heterogeneous edge–cloud environments using clustered federated learning 利用聚类联合学习实现异构边缘云环境中的数据高效异常检测
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-10-19 DOI: 10.1016/j.future.2024.107559
Zongpu Wei, Jinsong Wang, Zening Zhao, Kai Shi
{"title":"Toward data efficient anomaly detection in heterogeneous edge–cloud environments using clustered federated learning","authors":"Zongpu Wei,&nbsp;Jinsong Wang,&nbsp;Zening Zhao,&nbsp;Kai Shi","doi":"10.1016/j.future.2024.107559","DOIUrl":"10.1016/j.future.2024.107559","url":null,"abstract":"<div><div>Anomaly detection in edge–cloud scenarios stands as a critical means to ensure the security of network environment. Federated learning (FL)-based anomaly detection combines multiple data sources and ensures data privacy, making it a promising distributed detection method. However, FL-based anomaly detection system is usually affected by data heterogeneity and data bias, resulting in the inefficiency of data used for FL and the decline of detection performance. We propose an iterative federated clustering ensemble algorithm named IFCEA, in which we (1) establish a committee on the devices, and select the optimal participation for each device based on the evaluations of committee; (2) filter the clusters based on committee results, and exclude the biased clusters; (3) design an aggregation weight that reflects the degree of local distribution balance; (4) present a novel cluster initialization method, OneBiPartition, which adapts to the number of clusters and commences clustering federated task efficiently. IFCEA enhances the data quality used in FL-based anomaly detection system from two perspectives: device selection and participation weights, effectively addressing the issues of data heterogeneity and data bias faced during the FL training phase. Extensive experimental results on five network traffic datasets (the UNSW-NB15, CIC-IDS2017, CIC-IDS2018, CIC-DDoS2019 and BCCC-DDoS2024 datasets) demonstrate that our proposed framework outperforms in terms of detection metrics and convergence performance.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"164 ","pages":"Article 107559"},"PeriodicalIF":6.2,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142560683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信