摘要:
The development of decision-making systems based on artificial intelligence can lead to achieving optimal solutions water-land-food nexus. In this paper, an extreme learning machine model was developed with the objective function of wheat production maximization. The constraints defined for this problem are divided into three categories: technical parameters of production in agriculture, climatic stress on water resources and land limits. The water, land and food nexus was simulated using 23 experimental farms in Henan province during the 2021–2022 cultivation year. Root-mean-square error was used as an error criterion, and Pearson's coefficient was incorporated into the decision-making system as a correlation index of variables. Harvest index, length of the growth period, cultivation costs and irrigation water were the criteria to evaluate the impact of the sustainable model. The harvest index and the length of the growth period showed the highest and lowest correlation with the production rate, respectively. Furthermore, the optimal management of irrigation water and cost had the most significant impact on increasing crop production. The method proposed in this paper can be a virtual cropping model by changing the area under cultivation of a crop in the different farms of a study area, which increases yield production.
期刊:
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS,2023年27(6):3061-3071 ISSN:2168-2194
通讯作者:
Zhao, Weizhong;Shen, XJ
作者机构:
[Shen, Xianjun; Wang, Haodong; Wang, Yue; Zhao, Weizhong; Zhao, WZ; Shen, XJ; Jiang, Xingpeng; Li, Dandan] Cent China Normal Univ, Sch Comp, Hubei Prov Key Lab Artificial Intelligence & Smart, Wuhan 430079, Peoples R China.;[Sun, Han] Cent China Normal Univ, Sch Math & Stat, Wuhan 430079, Peoples R China.;[Shen, Xianjun; Wang, Haodong; Wang, Yue; Zhao, Weizhong; Zhao, WZ; Shen, XJ; Jiang, Xingpeng; Li, Dandan] Cent China Normal Univ, Natl Language Resources Monitoring & Res Ctr Netwo, Wuhan 430079, Peoples R China.
通讯机构:
[Zhao, WZ; Shen, XJ ] C;Cent China Normal Univ, Sch Comp, Hubei Prov Key Lab Artificial Intelligence & Smart, Wuhan 430079, Peoples R China.;Cent China Normal Univ, Natl Language Resources Monitoring & Res Ctr Netwo, Wuhan 430079, Peoples R China.
关键词:
graph representation learning;heterogeneous information network;multi-head attention mechanism;Phage-host interactions prediction
摘要:
In the treatment of bacterial infectious diseases, overuse of antibiotics may lead to not only bacterial resistance to antibiotics but also dysbiosis of beneficial bacteria which are essential for maintaining normal human life activities. Instead, phage therapy, which invades and lyses specific pathogenic bacteria without affecting beneficial bacteria, becomes more and more popular to treat bacterial infectious diseases. For the effective phage therapy, it requires to accurately predict potential phage-host interactions from heterogeneous information network consisting of bacteria and phages. Although many models have been proposed for predicting phage-host interactions, most methods fail to consider fully the sparsity and unconnectedness of phage-host heterogeneous information network, deriving the undesirable performance on phage-host interactions prediction. To address the challenge, we propose an effective model called GERMAN-PHI for predicting Phage-Host Interactions via Graph Embedding Representation learning with Multi-head Attention mechaNism. In GERMAN-PHI, the multi-head attention mechanism is utilized to learn representations of phages and hosts from multiple perspectives of phage-host associations, addressing the sparsity and unconnectedness in phage-host heterogeneous information network. More specifically, a module of GAT with talking-heads is employed to learn representations of phages and bacteria, on which neural induction matrix completion is conducted to reconstruct the phage-host association matrix. Results of comprehensive experiments demonstrate that GERMAN-PHI performs better than the state-of-the-art methods on phage-host interactions prediction. In addition, results of case study for two high-risk human pathogens show that GERMAN-PHI can predict validated phages with high accuracy, and some potential or new associated phages are provided as well.
期刊:
Pervasive and Mobile Computing,2023年95:101843 ISSN:1574-1192
通讯作者:
Guo, YJ
作者机构:
[Guo, Yajun; Yang, Huan] Cent China Normal Univ, Sch Comp, Luoyu Rd 152, Wuhan 430079, Peoples R China.;[Guo, Yimin] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, South Lake Ave 182, Wuhan 430073, Peoples R China.
通讯机构:
[Guo, YJ ] C;Cent China Normal Univ, Sch Comp, Luoyu Rd 152, Wuhan 430079, Peoples R China.
关键词:
Authentication;Security;Fog computing;Physical unclonable functions;Smart home
摘要:
With the rise of Internet of Things (IoT), the smart home is another emerging concept and application of IoT, where security and private data of devices are important. In this paper, fog computing is applied to the smart home environment, where fog can provide many smart features and services to the smart home. Fog computing has many advantages, such as low latency and real-time interaction. However, when fog computing is combined with smart home, it also faces some security threats: first, some fog nodes and smart home devices are deployed in public places, vulnerable to damage or theft by attackers, not considered fully trusted, and vulnerable to device loss/theft attacks, impersonation attacks, and message tampering attacks, etc. These threats can lead to adversaries controlling devices in the smart home or modifying messages to make smart home devices execute wrong commands, causing irreparable damage; Second, the smart home system should have good real-time interaction, and the authentication process using the low latency feature of fog computing should not be involved by the cloud. Considering these, it is necessary to design a secure and effective fog-enabled smart home authentication system that is secure against various known attacks, especially when the fog node is not fully trusted or the smart home device is captured as well. Finally, the authentication scheme should also be lightweight due to the limited resources of many smart home devices. To address these issues, this paper proposes a lightweight authentication scheme for the fog-enabled smart home system. It also employs a physical unclonable function to achieve mutual authentication among three parties: smart home devices, fog nodes and users. Formal security analysis under the Real-Or-Random model shows that this scheme is provably secure. And informal security analysis shows that our scheme is robust against various known attacks. At the same time, the proposed scheme requires less computation cost (8.239 ms) and is approximately 40% to 390% faster than existing related schemes. Although the communication cost is slightly higher (4512 bits), it is reasonable because the proposed scheme implements fog/gateway node compromised attack that has not been achieved by any other existing related schemes.
期刊:
BRIEFINGS IN BIOINFORMATICS,2023年24(2) ISSN:1467-5463
通讯作者:
Weizhong Zhao
作者机构:
[Shen, Xianjun; Zhao, Weizhong; Yuan, Xueling; He, Tingting; Jiang, Xingpeng] Cent China Normal Univ, Sch Comp, Wuhan, Peoples R China.;[Shi, Chuan] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing, Peoples R China.;[Hu, Xiaohua] Drexel Univ, Coll Comp & Informat, Philadelphia, PA 19104 USA.
通讯机构:
[Weizhong Zhao] H;Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning, Central China Normal University , Wuhan, Hubei 430079, P R China<&wdkj&>School of Computer Science, Beijing University of Posts and Telecommunications , Beijing, 100876, P R China<&wdkj&>National Language Resources Monitoring & Research Center for Network Media, Central China Normal University , Wuhan, Hubei 430079, P R China
关键词:
drug–drug interaction;heterogeneous information network;meta-path-based information fusion
摘要:
Drug-drug interactions (DDIs) are compound effects when patients take two or more drugs at the same time, which may weaken the efficacy of drugs or cause unexpected side effects. Thus, accurately predicting DDIs is of great significance for the drug development and the drug safety surveillance. Although many methods have been proposed for the task, the biological knowledge related to DDIs is not fully utilized and the complex semantics among drug-related biological entities are not effectively captured in existing methods, leading to suboptimal performance. Moreover, the lack of interpretability for the predicted results also limits the wide application of existing methods for DDIs prediction. In this study, we propose a novel framework for predicting DDIs with interpretability. Specifically, we construct a heterogeneous information network (HIN) by explicitly utilizing the biological knowledge related to the procedure of inducing DDIs. To capture the complex semantics in HIN, a meta-path-based information fusion mechanism is proposed to learn high-quality representations of drugs. In addition, an attention mechanism is designed to combine semantic information obtained from meta-paths with different lengths to obtain final representations of drugs for DDIs prediction. Comprehensive experiments are conducted on 2410 approved drugs, and the results of predictive performance comparison show that our proposed framework outperforms selected representative baselines on the task of DDIs prediction. The results of ablation study and cold-start scenario indicate that the meta-path-based information fusion mechanism red is beneficial for capturing the complex semantics among drug-related biological entities. Moreover, the results of case study demonstrate that the designed attention mechanism is able to provide partial interpretability for the predicted DDIs. Therefore, the proposed method will be a feasible solution to the task of predicting DDIs.
作者机构:
[Hu, Zhanxuan; Ning, Hailong] Xian Univ Posts & Telecommun, Sch Comp Sci & Technol, Shaanxi Key Lab Network Data Anal & Intelligent Pr, Xian, Peoples R China.;[Hu, Zhanxuan; Ning, Hailong; An, Mengyuan] Xian Key Lab Big Data & Intelligent Comp, Xian, Peoples R China.;[Lei, Tao] Shaanxi Univ Sci & Technol, Sch Elect Informat & Artificial Intelligence, Xian, Peoples R China.;[Sun, Hao] Cent China Normal Univ, Sch Comp, Wuhan, Peoples R China.;[Nandi, Asoke K.] Brunel Univ London, Dept Elect & Elect Engn, London, England.
通讯机构:
[Tao Lei; Tao Lei Tao Lei Tao Lei] S;School of Electronic Information and Artificial Intelligence, Shaanxi University of Science and Technology, Xi'an, China
关键词:
deep learning;image analysis;image classification;information fusion
摘要:
Aerial scene recognition (ASR) has attracted great attention due to its increasingly essential applications. Most of the ASR methods adopt the multi-scale architecture because both global and local features play great roles in ASR. However, the existing multi-scale methods neglect the effective interactions among different scales and various spatial locations when fusing global and local features, leading to a limited ability to deal with challenges of large-scale variation and complex background in aerial scene images. In addition, existing methods may suffer from poor generalisations due to millions of to-be-learnt parameters and inconsistent predictions between global and local features. To tackle these problems, this study proposes a scale-wise interaction fusion and knowledge distillation (SIF-KD) network for learning robust and discriminative features with scale-invariance and background-independent information. The main highlights of this study include two aspects. On the one hand, a global-local features collaborative learning scheme is devised for extracting scale-invariance features so as to tackle the large-scale variation problem in aerial scene images. Specifically, a plug-and-play multi-scale context attention fusion module is proposed for collaboratively fusing the context information between global and local features. On the other hand, a scale-wise knowledge distillation scheme is proposed to produce more consistent predictions by distilling the predictive distribution between different scales during training. Comprehensive experimental results show the proposed SIF-KD network achieves the best overall accuracy with 99.68%, 98.74% and 95.47% on the UCM, AID and NWPU-RESISC45 datasets, respectively, compared with state of the arts.
作者机构:
[Peng, Pai; Li, Le; Chen, Qiyuan] Cent China Normal Univ, Sch Math & Stat, Wuhan 430079, Peoples R China.;[Yang, Haitong] Cent China Normal Univ, Sch Comp Sci, Wuhan 430079, Peoples R China.;[Li, Le] Hubei Key Lab Math Sci, Wuhan 430072, Peoples R China.
通讯机构:
[Li, L.] C;Central China Normal University, China
作者:
Zengyang Li;Wenshuo Wang;Sicheng Wang;Peng Liang;Ran Mo
期刊:
2023 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM),2023年:1-11
作者机构:
[Peng Liang] School of Computer Science, Wuhan University, Wuhan, China;[Zengyang Li; Wenshuo Wang; Sicheng Wang; Ran Mo] Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning, School of Computer Science, Central China Normal University, Wuhan, China
摘要:
Background: In modern software systems, more and more systems are written in multiple programming languages (PLs). There is no comprehensive investigation on the phenomenon of multi-programming-language (MPL) bugs, which resolution involves source files written in multiple PLs. Aim: This work investigated the characteristics of bug resolution in MPL software systems and explored the reasons why bug resolution involves multiple PLs. Method: We conducted an empirical study on 54 MPL projects selected from 655 Apache OSS projects, of which 66,932 bugs were analyzed. Results: (1) the percentage of MPL bugs (MPLBs) in the selected projects ranges from 0.17% to 42.26%, and the percentage of MPLBs for all projects as a whole is 10.01%; (2) 95.0% and 4.5% of all the MPLBs involve source files written in 2 and 3 PLs, respectively; (3) the change complexity resolution characteristics of MPLBs tend to be higher than those of single-programming-language bugs (SPLBs); (4) the open time for MPLBs is 19.52% to 529.57% significantly longer than SPLBs regarding 9 PL combinations; (5) the reopen rate of bugs involving the PL combination of JavaScript and Python reaches 20.66%; (6) we found 6 causes why the bug resolution involves multiple PLs and identified 5 cross-language calling mechanisms. Conclusion: MPLBs are related to increased development difficulty.
摘要:
Temporal knowledge graph embedding (TKGE) aims to learn the embedding of entities and relations in a temporal knowledge graph (TKG). Although the previous graph neural networks (GNN) based models have achieved promising results, they cannot directly capture the interactions of multi-facts at different timestamps. To address the above limitation, we propose a time-aware relational graph attention model (TARGAT), which takes the multi-facts at different timestamps as a unified graph. First, we develop a relational generator to dynamically generate a series of time-aware relational message transformation matrices, which jointly models the relations and the timestamp information into a unified way. Then, we apply the generated message transformation matrices to project the neighborhood features into different time-aware spaces and aggregate these neighborhood features to explicitly capture the interactions of multi-facts. Finally, a temporal transformer classifier is applied to learn the representation of the query quadruples and predict the missing entities. The experimental results show that our TARGAT model beats the GNN-based models by a large margin and achieves new state-of-the-art results on four popular benchmark datasets.
期刊:
IEEE TRANSACTIONS ON SERVICES COMPUTING,2023年16(6):4102-4114 ISSN:1939-1374
通讯作者:
Guo, YM
作者机构:
[Guo, Yimin; Guo, YM] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Hubei, Peoples R China.;[Guo, Yajun] Cent China Normal Univ, Sch Comp, Wuhan 430079, Hubei, Peoples R China.
通讯机构:
[Guo, YM ] Z;Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Hubei, Peoples R China.
关键词:
Internet of Things (IoT);authentication;robust synchronization;anonymity;perfect forward secrecy
摘要:
Anonymity, robust synchronization, and perfect forward secrecy are the most important security properties of authenticated key agreement (AKA) protocols. Designing AKA protocols that simultaneously achieve these security properties and availability in the IoT environment is a challenging task. AKA protocols built using public key cryptographic primitives have advantages in achieving these critical security properties, but performing expensive public-key cryptographic operations is inefficient for resource-constrained IoT devices. The authentication protocols based on symmetric cryptographic primitives are often subject to various attacks. This paper proposes a secure lightweight AKA protocol with critical security properties (called CS-LAKA) for IoT environments without using public-key cryptographic primitives. LAKA cleverly achieves the security goals of anonymity, robust synchronization, and perfect forward secrecy by embedding dynamic identities in authenticators, and a few additional exchange messages are added. This enables LAKA to have both robust security and high efficiency. Subsequently, we perform a formal security analysis to prove that LAKA is secure, and compared with existing related schemes, LAKA has obvious advantages in terms of security, functionality and running performance.
期刊:
Information Processing & Management,2023年60(5):103469 ISSN:0306-4573
通讯作者:
Po Hu
作者机构:
Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning, Central China Normal University, Wuhan, 430079, China;School of Computer Science, Central China Normal University, Wuhan, 430079, Hubei, China;National Language Resources Monitoring and Research Center for Network Media, Central China Normal University, Wuhan, 430079, Hubei, China;[Hao Fei] School of Computing, National University of Singapore, 117583, Singapore;[Ling Zhuang; Po Hu] Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning, Central China Normal University, Wuhan, 430079, China<&wdkj&>School of Computer Science, Central China Normal University, Wuhan, 430079, Hubei, China<&wdkj&>National Language Resources Monitoring and Research Center for Network Media, Central China Normal University, Wuhan, 430079, Hubei, China
通讯机构:
[Po Hu] H;Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning, Central China Normal University, Wuhan, 430079, China<&wdkj&>School of Computer Science, Central China Normal University, Wuhan, 430079, Hubei, China<&wdkj&>National Language Resources Monitoring and Research Center for Network Media, Central China Normal University, Wuhan, 430079, Hubei, China
摘要:
A direction-aware augmented spatial keyword top- $k$ query (DAT $k\text{Q}$ ) returns the top- $k$ objects based on a ranking function that considers spatial distance, textual similarity, query numeric attributes, and query direction. When a user initiates a DAT $k\text{Q}$ , some user-desired objects (missing objects) may not appear in the query result set, and then the user wonders why they do not appear, which is called the why-not question. This paper focuses on answering why-not questions on DAT $k$ Qs. We first discuss how to obtain the refined query direction by analyzing the position relationship between missing objects and original query direction in Polar coordinates. Then a DAPC index structure is designed, which can cut down irrelevant search space based on not only conventional distance pruning, keyword pruning, and attribute pruning but also query direction pruning. Particularly, by comparing the position relationship between the query direction and the sector (sector ring) region segmented by the DAPC-based method, the search space that does not meet the query direction is pruned. In addition, we discuss the applicability of our scheme for handling why-not questions on regional spatial keyword queries (SKQ), ordinary direction-aware top- $k$ SKQ queries and complex scoring SKQ queries. Finally, a series of experiments are conducted on two real datasets to show the efficiency of our DAPC-based method.
摘要:
Cervical cancer seriously endangers the health of the female reproductive system and even risks women's life in severe cases. Optical coherence tomography (OCT) is a non-invasive, real-time, high-resolution imaging technology for cervical tissues. However, since the interpretation of cervical OCT images is a knowledge-intensive, time-consuming task, it is tough to acquire a large number of high-quality labeled images quickly, which is a big challenge for supervised learning. In this study, we introduce the vision Transformer (ViT) architecture, which has recently achieved impressive results in natural image analysis, into the classification task of cervical OCT images. Our work aims to develop a computer-aided diagnosis (CADx) approach based on a self-supervised ViT-based model to classify cervical OCT images effectively. We leverage masked autoencoders (MAE) to perform self-supervised pre-training on cervical OCT images, so the proposed classification model has a better transfer learning ability. In the fine-tuning process, the ViT-based classification model extracts multi-scale features from OCT images of different resolutions and fuses them with the cross-attention module. The ten-fold cross-validation results on an OCT image dataset from a multi-center clinical study of 733 patients in China indicate that our model achieved an AUC value of 0.9963 ± 0.0069 with a 95.89 ± 3.30% sensitivity and 98.23 ± 1.36 % specificity, outperforming some state-of-the-art classification models based on Transformers and convolutional neural networks (CNNs) in the binary classification task of detecting high-risk cervical diseases, including high-grade squamous intraepithelial lesion (HSIL) and cervical cancer. Furthermore, our model with the cross-shaped voting strategy achieved a sensitivity of 92.06% and specificity of 95.56% on an external validation dataset containing 288 three-dimensional (3D) OCT volumes from 118 Chinese patients in a different new hospital. This result met or exceeded the average of four medical experts who have used OCT for over one year. In addition to promising classification performance, our model has a remarkable ability to detect and visualize local lesions using the attention map of the standard ViT model, providing good interpretability for gynecologists to locate and diagnose possible cervical diseases. Cervical cancer seriously endangers the health of the female reproductive system and even risks women's life in severe cases. Optical coherence tomography (OCT) is a non-invasive, real-time, high-resolution imaging technology for cervical tissues. However, since the interpretation of cervical OCT images is a knowledge-intensive, time-consuming task, it is tough to acquire a large number of high-quality labeled images quickly, which is a big challenge for supervised learning. In this study, we introduce the vision Transformer (ViT) architecture, which has recently achieved impressive results in natural image analysis, into the classification task of cervical OCT images. Our work aims to develop a computer-aided diagnosis (CADx) approach based on a self-supervised ViT-based model to classify cervical OCT images effectively. We leverage masked autoencoders (MAE) to perform self-supervised pre-training on cervical OCT images, so the proposed classification model has a better transfer learning ability. In the fine-tuning process, the ViT-based classification model extracts multi-scale features from OCT images of different resolutions and fuses them with the cross-attention module. The ten-fold cross-validation results on an OCT image dataset from a multi-center clinical study of 733 patients in China indicate that our model achieved an AUC value of 0.9963 ± 0.0069 with a 95.89 ± 3.30% sensitivity and 98.23 ± 1.36 % specificity, outperforming some state-of-the-art classification models based on Transformers and convolutional neural networks (CNNs) in the binary classification task of detecting high-risk cervical diseases, including high-grade squamous intraepithelial lesion (HSIL) and cervical cancer. Furthermore, our model with the cross-shaped voting strategy achieved a sensitivity of 92.06% and specificity of 95.56% on an external validation dataset containing 288 three-dimensional (3D) OCT volumes from 118 Chinese patients in a different new hospital. This result met or exceeded the average of four medical experts who have used OCT for over one year. In addition to promising classification performance, our model has a remarkable ability to detect and visualize local lesions using the attention map of the standard ViT model, providing good interpretability for gynecologists to locate and diagnose possible cervical diseases.
作者机构:
[Wang, Chao; Zhang, Jiaxu; Tu, Zhigang] Wuhan Univ, State Key Lab Informat Engn Surveying, Wuhan 430072, Hubei, Peoples R China.;[Xie, Wei] Cent China Normal Univ, Sch Comp, Wuhan 430079, Hubei, Peoples R China.;[Tu, Ruide] Cent China Normal Univ, Sch Informat Management, Wuhan 430079, Hubei, Peoples R China.
通讯机构:
[Chao Wang; Ruide Tu] S;State Key Laboratory of Information Engineering in Surveying, Wuhan University, Wuhan, China<&wdkj&>School Of Information Management, Central China Normal University, Wuhan, China
关键词:
Skeleton action recognition;Visual transformer;Graph-aware transformer;Velocity information of human body joints;Graph neural network
摘要:
Recently, graph convolutional networks (GCNs) play a critical role in skeleton-based human action recognition. However, most GCN-based methods still have two main limitations: (1) The semantic-level adjacency matrix of the skeleton graph is difficult to be manually defined, which restricts the perception field of GCN and limits its ability to extract the spatial–temporal features. (2) The velocity information of human body joints cannot be efficiently used and fully exploited by GCN, because GCN does not represent the correlation between the velocity vectors explicitly. To address these issues, we propose a graph-aware transformer (GAT), which can make full use of the velocity information and learn discriminative spatial–temporal motion features from the sequence of the skeleton graphs in a data-driven way. Besides, similar to the GCN-based model, our GAT also considers the prior structures of the human body including the link-aware structure and the part-aware structure. Extensive experiments on three large-scale datasets, i.e., NTU-RGB+D 60, NTU-RGB+D 120, and Kinetics-Skeleton, demonstrated that the proposed GAT obtains significant improvement compared to the GCN-based baseline for skeleton action recognition.
摘要:
Identifying temporal and subevent relationships between different events (i.e., event relation extraction) is an important step towards event-centric natural language processing, which can help understand how events evolve and potentially facilitate many downstream tasks, such as timeline generation and event knowledge graph construction. Existing work has extensively leveraged external knowledge to improve the performance of relation extraction. Despite the progress made, the current knowledge-enhanced approach still has some shortcomings, e.g., knowledge missing, knowledge noise, and suboptimal knowledge injection. In this paper, we propose OntoEnhance, a novel event relation extraction framework that fuses semantic information from event ontologies to enhance event representation. Specifically, we first inject the latent knowledge in the event ontology into the prompt text to address the issue of knowledge missing. Then a dual-stack attention fusion mechanism is further introduced to enhance the injection of key knowledge to alleviate knowledge noise. In order to prevent the knowledge in the event ontology from being wrongly dominated, we use the event direction induction mechanism to obtain the event context-based relational sequence representation. Finally, a gate mechanism is used to fuse ontology-based knowledge and context-based event features dynamically. Extensive experiments demonstrate that OntoEnhance outperforms all comparison baselines by a large margin on all four datasets under both standard and few-shot settings.
期刊:
Journal of Information Security and Applications,2023年77:103576 ISSN:2214-2126
通讯作者:
Hsu, CF
作者机构:
[Harn, Lein] Univ Missouri Kansas City, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA.;[Hsu, Chingfang] Cent China Normal Univ, Hubei Prov Key Lab Artificial Intelligence & Smart, Wuhan 430079, Hubei, Peoples R China.;[Zeng, Shuchang; Xu, Hang; Pang, Fengling; Hsu, Chingfang] Cent China Normal Univ, Sch Comp, Wuhan 430079, Hubei, Peoples R China.;[Xia, Zhe] Wuhan Univ Technol, Dept Comp Sci, Wuhan 430071, Peoples R China.
通讯机构:
[Hsu, CF ] C;Cent China Normal Univ, Hubei Prov Key Lab Artificial Intelligence & Smart, Wuhan 430079, Hubei, Peoples R China.
关键词:
General construction;Anonymously releasing data;Secure multiparty computation;Dealer-free;Non-interaction;TCSS
摘要:
Shamir's (t, n) threshold secret sharing (SS) is one of the most important cryptographic primitives in various security applications designed to protect highly sensitive information, such as intellectual property and network security. A dealer in a (t, n) threshold SS divides the secret into n shares such that with t or more than t of these shares, the secret can be retrieved; but with less than t of these shares, no information of the secret can be revealed. In order to adapt the dynamic environment in various applications, the threshold changeable SS (TCSS) allows the threshold of the original secret to be dynamically adjusted. Note that Shamir's original SS is unable to achieve this property. In the literature, most existing TCSS schemes are suffering from limitations that either it requires a trusted dealer to generate and distribute new shares, or requires interactions among shareholders to generate new shares. In this paper, we propose a novel idea to construct a dealer-free and non-interactive TCSS based on pairwise keys between users. Research papers related to pairwise key distribution schemes have been published over last 40 years and it has become one of fundamental tools used in design of cryptographic solutions. First, we show that our idea can be used to construct a scheme for anonymously releasing data and a secure multiparty computation scheme. Both schemes are very simple and security analysis can be understood easily. Second, we demonstrate that a TCSS can also be designed based on same approach. Our design of TCSS is novel and it can be applied to convert any existing SS into a TCSS.
作者机构:
[Hsu, Chingfang] Computer School, Central China Normal University , Wuhan 430079 , China;[Li, Zixuan] Wuhan Britain-China School , Wuhan 430022 , China;[Xia, Zhe] Department of Computer Science, Wuhan University of Technology , Wuhan 430071 , China;[Harn, Lein] Department of Computer Science Electrical Engineering, University of Missouri-Kansas City , Kansas City, MO 64110 , USA
通讯机构:
[Chingfang Hsu] C;Computer School, Central China Normal University , Wuhan 430079 , China
摘要:
In this paper, we propose a new cryptographic primitive, called multiple blind signature (MBS), which is designed based on the integration of both normal blind signature scheme and dual signature. The major difference between a normal blind signature and an MBS is that using a normal blind signature, only one message, |$m$|, can be verified, but using an MBS, any subset, |${M}^{\prime }$|, of multiple messages in a set, |$M$|, where |${M}^{\prime}{\subseteq} M$|, can be verified. With this additional property, we will show that MBS is especially suitable for e-voting and e-cash applications. In other words, we classify these processes in two applications into two phases, on-line and off-line phases. One unique property of this design is that most time-consuming computation and interaction can be performed in advance in off-line phase. There is no cost of computation and interaction in the online phase.
期刊:
Artificial Intelligence in Medicine,2023年145:102677 ISSN:0933-3657
通讯作者:
Jiang, XP
作者机构:
[Fu, Chengcheng] Cent China Normal Univ, Natl Engn Res Ctr E Learning, Wuhan, Peoples R China.;[Jiang, Xingpeng; Fu, Chengcheng; He, Tingting] Cent China Normal Univ, Sch Comp Sci, Wuhan, Peoples R China.;[Fu, Chengcheng; van Harmelen, Frank; Huang, Zhisheng] Vrije Univ Amsterdam, Dept Comp Sci, Amsterdam, Netherlands.;[Fu, Chengcheng; He, Tingting; Jiang, Xingpeng] Cent China Normal Univ, Natl Language Resources Monitor Res Ctr Network Me, Wuhan, Peoples R China.;[Huang, Zhisheng] Tongji Univ, Sch Med, Clin Res Ctr Mental Disorders, Shanghai Pudong New Area Mental Hlth Ctr, Shanghai, Peoples R China.
通讯机构:
[Jiang, XP ] C;Cent China Normal Univ, Sch Comp Sci, Wuhan, Peoples R China.
关键词:
Food;Gut microbiota;Knowledge graph;Mental health