High-Confidence Computing 第4卷第4期正式上线,本期共发表11篇研究论文,2篇综述,所有文章均为开放获取,欢迎广大专家学者阅读、引用与分享!
本期目录
Research Articles
01
An investigation of the private-attribute leakage in WiFi sensing【作者】
Yiding Shi, Xueying Zhang, Lei Fu, Huanle Zhang*
【DOI】
https://doi.org/10.1016/j.hcc.2024.100209
【关键词】
WiFi sensing;Private attribute;Deep learning;Privacy protection
【全文链接】
02
Bioinvasion risk analysis based on automatic identification system and marine ecoregion data【作者】
Hongwei Shi, Chenyu Wang, Hang Zhao, Shengling Wang, Yixian Chen*
【DOI】
https://doi.org/10.1016/j.hcc.2024.100210
【关键词】
Biological invasion;Species invasion network;Global shipping network
【全文链接】
03
Data cube-based storage optimization for resource-constrained edge computing【作者】
Liyuan Gao, Wenjing Li, Hongyue Ma*, Yumin Liu, Chunyang Li
【DOI】
https://doi.org/10.1016/j.hcc.2024.100212
【关键词】
Edge computing;Data storage;Reliability;Compression efficiency
【全文链接】
04
Deviceauthentication for 5G terminals via Radio Frequency fingerprints【作者】
Ping Dong, Namin Hou, Yuting Tang, Yushi Cheng*, Xiaoyu Ji
【DOI】
https://doi.org/10.1016/j.hcc.2024.100222
【关键词】
Radio Frequency fingerprint;5G terminal authentication;Wireless security;Mobile communication networks
【全文链接】
05
Aquilo: Temperature-aware scheduler for millimeter-wave devices and networks【作者】
Moh Sabbir Saadat*, Sanjib Sur, Srihari Nelakuditi
【DOI】
https://doi.org/10.1016/j.hcc.2024.100223
【关键词】
5G;Millimeter-wave;Temperature-aware design;Multi-antenna scheduler
【全文链接】
06
Graph isomorphism—Characterization and efficient algorithms【作者】
Jian Ren*, Tongtong Li
【DOI】
https://doi.org/10.1016/j.hcc.2024.100224
【关键词】
Undirected graph;Characterization;Isomorphism;Algorithm;Polynomial time complexity
【全文链接】
07
Intelligent edge CDN with smart contract-aided local IoT sharing【作者】
Jiamin Fan, Daming Liu, Guoming Tang, Kui Wu*, Xun Shao
【DOI】
https://doi.org/10.1016/j.hcc.2024.100225
【关键词】
CDN over edge IoT;Game theory;EM algorithm;Smart contracts
【全文链接】
08
EPri-MDAS: An efficient privacy-preserving multiple data aggregation scheme without trusted authority for fog-based smart grid【作者】
Jinjiao Zhang, Wenying Zhang*, Xiaochao Wei, Huimin Liu
【DOI】
https://doi.org/10.1016/j.hcc.2024.100226
【关键词】
Privacy-preserving;Multiple data aggregation;Smart grid;Fog computing
【全文链接】
09
AIDCT: An AI service development and composition tool for constructing trustworthy intelligent systems
【作者】
Wei Jiang, Luo Xu, Zichao Zhang, Xiang Lei*
【DOI】
https://doi.org/10.1016/j.hcc.2024.100227
【关键词】
AI service;Trustworthy intelligent system;Practical applications
【全文链接】
10
Unsupervised machine learning approach for tailoring educational content to individual student weaknesses【作者】
Shabab Intishar Rahman, Shadman Ahmed, Tasnim Akter Fariha, Ammar Mohammad, Muhammad Nayeem,Mubasshirul Haque, Sriram Chellappan, Jannatun Noor*
【DOI】
https://doi.org/10.1016/j.hcc.2024.100228
【关键词】
Recommendation system;Clustering;F-P growth;Apriori;Associative pattern;E-learning sphere;Online learning;Energy blockchain; Data security; Storage; Management; Utilization
【全文链接】
11
Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain【作者】
Jing Tian, Yanqi Zhao*, Xiaoyi Yang, Xuan Zhao, Ruonan Chen,Yong Yu
【DOI】
https://doi.org/10.1016/j.hcc.2024.100271
【关键词】
Identity-based signature;Threshold (multi) signature;Accountability;Blockchain
【全文链接】
Review Articles
12
A survey of acoustic eavesdropping attacks: Principle, methods, and progress【作者】
Yiwei Chen, Wenhao Li, Xiuzhen Cheng*, Pengfei Hu*
【DOI】
https://doi.org/10.1016/j.hcc.2024.100241
【关键词】
Acoustic eavesdropping;Attack scenarios and threat models;Acoustic side-channel attacks
【全文链接】
13
Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security
【作者】
Akshita Maradapu Vera Venkata Sai, Chenyu Wang, Zhipeng Cai, Yingshu Li*
【DOI】
https://doi.org/10.1016/j.hcc.2024.100269
【关键词】
Digital Twin Networks;Network architecture;Privacy and security;Federated learning;Blockchain;Internet of Vehicles;6G;Supply chain
【全文链接】