Article
Computer Science, Information Systems
Thomas Favale, Martino Trevisan, Idilio Drago, Marco Mellia
Summary: Packet measurements are essential for various applications, but they pose a threat to user privacy. Anonymization is an answer to this challenge, but it comes with challenges and drawbacks, such as reduced data value, protocol diversity considerations, and the need for high-speed real-time execution.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2021)
Article
Computer Science, Hardware & Architecture
Lan Ding, Ye Tian, Tong Liu, Zhongxiang Wei, Xinming Zhang
Summary: The study shows that commercial 5G networks face challenges in maintaining in-network buffer for TCP traffic, and that MPTCP does not necessarily enhance communication reliability. There are significant regional differences in 5G performances across China, particularly with poorer performances in some populous metropolitan areas.
Article
Computer Science, Information Systems
Nurul I. Sarkar, Ping-Huan Ho, Sonia Gul, Salahuddin Muhammad Salim Zabir
Summary: Mobile Ad hoc Networks (MANETs) are popular for their flexibility in setting up anytime and anywhere, but using Transmission Control Protocol (TCP) in these networks raises serious performance issues. In this paper, a novel algorithm called TCP-LoRaD is proposed to overcome the problems of packet losses and poor performance in noisy channel conditions. Simulation results show that TCP-LoRaD offers higher throughput and lower end-to-end delays compared to TCP-WELCOME under medium to high traffic loads.
Article
Computer Science, Information Systems
Ming Li, Leilei Zeng, Le Zhao, Yuwen Wang, Guoqi Liu
Summary: With the development of multimedia and the Internet, the issue of multimedia copyright infringement has become increasingly serious. The combination of digital watermark and security protocol is crucial for protecting multimedia copyright in the current open network environment. Existing schemes involving trusted third parties and arbitration institutions are often not credible. This paper proposes a new blockchain-based watermarking protocol with multiple parties, including the buyer, seller, cloud platform, and blockchain. The protocol utilizes certificateless secret key negotiation to prevent Man-in-the-middle Attack, and the cloud platform performs homomorphic calculations and watermark embedding. The protocol ensures security and fairness by leveraging the characteristics of the blockchain, such as non-tamperability and traceability.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Physics, Multidisciplinary
Weihua Chen, Yuhang Sun, Xingzhi Feng, Yanjie Liu, Min Zheng, Xingchun Wei, Zongxiao Zhu
Summary: This study systematically investigated the role of TCP phases in the fretting wear process of nickel-based single crystal alloys using molecular dynamics. It found that the friction force increased with the number of friction cycles, and the increase in dislocation density led to hardening and a decrease in material removal rate. The presence of interfaces hindered the transfer of temperature, defects, and atomic displacements in the early stages of friction, and TCP phases experienced stratification. Additionally, increasing relaxation temperature enhanced the workpiece's plastic deformation capacity, increased dislocation density, and caused adhesion between abrasive particles and the grinding ball.
Article
Computer Science, Information Systems
Manish Rai, Sachin Goyal
Summary: Digital Image Watermarking (DIW) has gained attention due to copyright issues. This study proposes a robust and secure watermarking system using Human Visual System (HVS), Fuzzy Inference Systems (FIS), Back Propagation Neural Network (BPNN), and Shark Smell Optimization (SSO). The results show that the proposed hybrid approach outperforms other recent techniques.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Materials Science, Multidisciplinary
Yuan-wei Pu, Li-li Zhou, Yong-chao Liang, Ze-an Tian, Qian Chen, Li Zhang, Jia-jun Ma, Yun-fei Mo, Rang-su Liu, Ting-hong Gao, Quan Xie
Summary: In this study, the effects of adding trace elements on the glass-forming ability (GFA) of metallic glasses were investigated through molecular dynamics simulations. The results showed that the GFA becomes stronger with the increase of Y element, which can promote the formation of topologically close-packed (TCP) clusters and hinder the crystallization process.
JOURNAL OF MATERIALS RESEARCH AND TECHNOLOGY-JMR&T
(2022)
Review
Materials Science, Ceramics
Maria Antonia Sainz, Sara Serena, Angel Caballero
Summary: Beta-tricalcium phosphate (Ca3(PO4)2 or TCP) is a biomaterial with advantages in chemical composition, biocompatibility, and osseointegration. However, its limited mechanical properties restrict its applications in high-performance areas. Spark Plasma Sintering (SPS) was used to obtain high-density doped-TCP bioceramic materials with advantages in heating rate, sintering temperatures, and residence times. The study focused on designing, obtaining, and characterizing undoped beta-TCP, 1ZnO-doped beta-TCP, and 1ZnO-1MgO co-doped beta-TCP bioceramics.
CERAMICS INTERNATIONAL
(2023)
Article
Computer Science, Information Systems
Peiqian Liu, Shangchen Xie, Zihao Shen, Hui Wang
Summary: This paper proposes a scheme based on a peer-to-peer network for protecting location privacy. By utilizing location attribute-based security authentication and private sharing data group, trust among mobile terminals is established to prevent unauthorized access to query requests and protect location privacy.
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
(2022)
Article
Materials Science, Ceramics
Gabrielle A. Sblendorio, Bastien Le Gars Santoni, Duncan T. L. Alexander, Paul Bowen, Marc Bohner, Nicola Dobalin
Summary: The variation in biological responses to beta-TCP implants reported in literature may be attributed to subtle differences in the beta-TCP crystal structure. In this study, 12 pairs of unit cells with different Ca(4) site occupancies were combined in different checkerboard patterns to better understand the ordering of this site. Atomistic simulations revealed the lowest energy configurations, showing that the previously published low energy configuration is not the most stable one in larger supercells. The findings can guide future simulation studies in explaining the Ca(4) site occupancy in the beta-TCP crystal structure.
JOURNAL OF THE EUROPEAN CERAMIC SOCIETY
(2023)
Article
Computer Science, Information Systems
Reuven Cohen, Matty Kadosh, Alan Lo, Qasem Sayah
Summary: This paper proposes an LB scheme that guarantees high throughput and supports frequent server pool updates while effectively fighting against high-rate SYN attacks.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
C. Venkata Narasimhulu
Summary: In this paper, a novel digital watermarking model based on 3D wavelet transformation is proposed for multimedia copyright protection. Embedding watermarks in keyframes using spread spectrum technique, and applying a new hybrid optimization algorithm SU-ROA, outperforms state-of-the-art models in terms of both embedding and extracting effectiveness.
Article
Engineering, Electrical & Electronic
Baowei Wang, Yufeng Wu, Guiling Wang
Summary: This article explores the issue of watermark embedding strength in watermarking and proposes an adaptive watermarking method based on deep learning. Compared to traditional methods, this approach can adaptively adjust the embedding strength of watermark images, improving the robustness and imperceptibility of the watermark.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
(2023)
Article
Computer Science, Artificial Intelligence
Qingliang Liu, Shuguo Yang, Jing Liu, Li Zhao, Pengcheng Xiong, Jun Shen
Summary: This paper proposes a blockchain-based approach for video watermarking, which selects wavelet coefficient blocks in key frames and leverages blockchain to connect them. It solves the issues of storing a large number of coordinates and vulnerability to video frame attacks in existing solutions. Experimental results demonstrate that this approach achieves high storage efficiency and significantly improves overall robustness, making novel and significant contributions to the field of video watermarking.
KNOWLEDGE-BASED SYSTEMS
(2023)
Article
Computer Science, Information Systems
Pengju Zhang, Jingbing Li, Uzair Aslam Bhatti, Jing Liu, Yen-wei Chen, Dekai Li, Lei Cao
Summary: The increasing amount of 3D data in the Internet of Medical Things (IoMT) has raised the importance of protecting these medical data. However, there is a lack of research on 3D data watermarking, especially considering the special characteristics of medical data. In this study, a robust watermarking algorithm based on Polar Cosine Transform and 3D-Discrete Cosine Transform (PCT and 3D-DCT) was proposed for medical volume data, achieving higher performance than the comparison algorithm.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)
Article
Computer Science, Information Systems
Cheng Qian, Wei Yu, Chao Lu, David Griffith, Nada Golmie
Summary: This article investigates the impact of insufficient data on machine learning model training and proposes a framework using GAN and continuous learning to address the issue. The experimental results demonstrate that new data greatly improves model accuracy, and the proposed defensive mechanism safeguards the model learning process.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Pu Tian, Weixian Liao, Wei Yu, Erik Blasch
Summary: In this article, a weight-similarity-based client clustering approach is proposed to address the issue of non-IID data in IoT systems. The approach uses an affinity-propagation-based method with the cosine distance of the client's weight parameters to dynamically cluster clients, resulting in improved accuracy compared to existing federated learning schemes.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Medical Laboratory Technology
Zhen Ling, Shichang Zhang, Huanyu Ju, Jiexin Zhang
Summary: This case report presents a 34-year-old female patient with constant low serum phosphorus concentrations during treatment for amniotic fluid embolism. The patient received extracorporeal membrane oxygenation, continuous renal replacement therapy, and blood component transfusion. The study highlights the release of inorganic phosphorus from platelets and plasma, which stimulates parathyroid hormone secretion and suggests the consideration of vitamin D supplementation and PTH antagonism in ICU patients to benefit recovery.
CLINICA CHIMICA ACTA
(2023)
Article
Nutrition & Dietetics
Zhen Ling, Chengcheng Zhang, Jun He, Feiyun Ouyang, Dan Qiu, Ling Li, Yilu Li, Xuping Li, Yanying Duan, Dan Luo, Shuiyuan Xiao, Minxue Shen
Summary: This study suggests that a combined healthy lifestyle pattern may considerably decrease the risk of NAFLD in Chinese government employees.
Article
Environmental Sciences
Han Meng, Yuanyuan Lin, Wenjun Zhong, Zheng Zhao, Liang Shen, Zhen Ling, Kaisong Zhao, Shan Xu
Summary: This study used eDNA metabarcoding to monitor fish diversity in the Dianchi Lake basin and constructed the Fish Index of Biological Integrity (F-IBI) for ecological assessment. The results showed distinct diversity patterns among Dianchi Lake and the three inflowing rivers, and water temperature, chemical oxygen demand, total nitrogen, and total phosphorus significantly influenced the distribution of fish communities. According to the F-IBI assessment system, 25% of the sampling sites were defined as 'fine' or above, and 75% were 'impaired' or below.
Correction
Plant Sciences
Zhen Ling, Zhengtao Shi, Shixiang Gu, Tao Wang, Weiwei Zhu, Guojian Feng
FRONTIERS IN PLANT SCIENCE
(2023)
Article
Computer Science, Information Systems
Jinghui Zhang, Zhengjia Xu, Junhe Li, Qiangsheng Dai, Zhen Ling, Ming Yang
Summary: Physical layer fingerprinting is a promising solution for improving Wi-Fi device security and enhancing Wi-Fi-based applications in IoT scenarios. Existing methods using signal analyzers for feature extraction are not practical and need improvement for devices with complex physical layer modulation. We propose a device fingerprinting technique that extracts various multi-domain features from the physical layer preamble, different from previous works. The proposed scheme achieves high accuracy in identifying fingerprints for different types of IoT Wi-Fi devices and network cards.
COMPUTER COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Xiaoheng Deng, Jincai Zhu, Xinjun Pei, Lan Zhang, Zhen Ling, Kaiping Xue
Summary: This paper proposes a Flow Topology based Graph Convolutional Network (FT-GCN) approach for label-limited IoT network intrusion detection. By leveraging flow traffic patterns and flow topological structure, FT-GCN is deployed at edge servers in IoT networks to detect intrusions. It constructs an interval-constrained traffic graph (ICTG) considering the time correlation of traffic flows, and enhances key statistical features of traffic flows using a Node-Level Spatial (NLS) attention mechanism. Intrusion identification in IoT networks is achieved by learning the combined representation of statistical flow features and flow topological structure with the cost-effective Topology Adaptive Graph Convolutional Networks (TAGCN).
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2023)
Article
Agronomy
Zhen Ling, Zhengtao Shi, Tiyuan Xia, Shixiang Gu, Jiaping Liang, Chong-Yu Xu
Summary: A short-term crop evapotranspiration (ETc) forecasting method was proposed for rubber plantations using the rubber crop coefficient K-c and public weather forecasts. The results showed that the method had good performance and acceptable accuracy, especially in the dry season, providing an important basis for improving water management in high water consumption rubber plantations at a regional scale.
Article
Computer Science, Information Systems
Jinghui Zhang, Boxi Liang, Hancheng Zhang, Wei Zhang, Zhen Ling, Ming Yang
Summary: In almost every situation of our life, various applications are deployed on mobile smart devices. However, in some situations, sensitive applications are strictly prohibited. Real-time recognition of applications running on mobile smart devices is important in these cases. Most existing technologies require system permissions to obtain the running application list, which is banned by mainstream mobile operating systems. To overcome this limitation, a magnetic field side channel analysis method is introduced to recognize running applications. This method uses autoencoder to extract robust depth features and implements online application recognition through the introduction of a finite-state machine. The proposed method is evaluated by recognizing 1000 different applications in a real environment, showing its feasibility and effectiveness in real-time application identification.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2023)
Proceedings Paper
Computer Science, Hardware & Architecture
Pu Tian, Turhan Kimbrough, Weixian Liao, Erik Blasch, Wei Yu
Summary: The paper investigates the impact of transformations on adversarial facial images and proposes a simple yet effective framework called TaD for removing possible adversarial perturbations from user images generated by popular FR privacy protection frameworks. Experimental results show that simple transformations can impact protection performance, and choosing DNN-based facial feature extractors can enhance the robustness of facial images with adversarial perturbations.
2022 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS)
(2022)
Proceedings Paper
Computer Science, Hardware & Architecture
Kai Dong, Yakun Zhang, Yuchen Zhao, Daoming Li, Zhen Ling, Wenjia Wu, Xiaorui Zhu
Summary: This paper proposes a novel trigger notification mechanism called RTX-IFTTT to achieve real-time execution of Applets. The mechanism does not require any changes to the current IFTTT framework or H-IoT devices, but only needs an edge node to identify device events and notify IFTTT to perform the corresponding actions. Experimental results show that the averaged Applet execution delay for RTXIFTTT is only about 2 seconds.
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022)
(2022)
Proceedings Paper
Computer Science, Hardware & Architecture
Xiaolin Gu, Wenjia Wu, Naixuan Guo, Wei He, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo
Summary: In this study, the instability of the carrier frequency offset (CFO) fingerprint in commonly used smartphones due to temperature fluctuations is addressed. A more reliable and applicable temperature-aware radio frequency fingerprinting (TeRFF) approach is proposed, which involves constructing a dataset by extracting the temperature and corresponding CFO value from multiple smartphones. Multiple Naive Bayes models are trained based on registered temperature values, and a CFO estimation method is designed for unregistered temperatures. Experimental results demonstrate that TeRFF is an effective solution for smartphone identification, outperforming other existing RF fingerprinting schemes.
2022 19TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON)
(2022)
Proceedings Paper
Computer Science, Hardware & Architecture
Shan Wang, Zhen Ling, Yue Zhang, Ruizhao Liu, Joshua Kraunelis, Kang Jia, Bryan Pearson, Xinwen Fu
Summary: We have discovered that seemingly harmless animations widely used in Android can pose significant threats to the security and privacy of users. Both entrance and exit animations can be exploited to launch various attacks, such as the draw-and-destroy overlay attack and the draw-and-destroy toast attack. These attacks can be used to intercept user inputs stealthily and exploit the slow-in and fade-out animations to suppress alerts and hide malicious activities.
2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022)
(2022)
Proceedings Paper
Computer Science, Information Systems
Xinhui Shao, Lan Luo, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu
Summary: This paper proposes a function-based ASLR scheme for resource-constrained IoT devices, utilizing ARM TrustZone-M technique and memory protection unit. By randomizing the entry addresses of functions, the scheme enhances runtime security. Compared to related work, the fASLR achieves high randomization entropy with less than 10% runtime overhead.
COMPUTER SECURITY - ESORICS 2022, PT II
(2022)