ORCID Profile
0000-0002-4603-0024
Current Organisations
Commonwealth Scientific and Industrial Research Organisation
,
CSIRO
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Communication Technology and Digital Media Studies | Distributed Computing | Communication and Media Studies | Ubiquitous Computing | Software Engineering | Distributed and Grid Systems | Visual Arts and Crafts not elsewhere classified
Expanding Knowledge in Law and Legal Studies | The Creative Arts (incl. Graphics and Craft) | Computer Software and Services not elsewhere classified | Finance Services | Information and Communication Services not elsewhere classified |
Publisher: Springer International Publishing
Date: 2018
Publisher: Springer International Publishing
Date: 2018
Publisher: MDPI AG
Date: 31-01-2023
DOI: 10.3390/APP13031815
Abstract: The implicit prerequisite for using HRRS images is that the images can be trusted. Otherwise, their value would be greatly reduced. As a new data security technology, subject-sensitive hashing overcomes the shortcomings of existing integrity authentication methods and could realize subject-sensitive authentication of HRRS images. However, shortcomings of the existing algorithm, in terms of robustness, limit its application. For ex le, the lack of robustness against JPEG compression makes existing algorithms more passive in some applications. To enhance the robustness, we proposed a Transformer-based subject-sensitive hashing algorithm. In this paper, first, we designed a Transformer-based HRRS image feature extraction network by improving Swin-Unet. Next, subject-sensitive features of HRRS images were extracted by this improved Swin-Unet. Then, the hash sequence was generated through a feature coding method that combined mapping mechanisms with principal component analysis (PCA). Our experimental results showed that the robustness of the proposed algorithm was greatly improved in comparison with existing algorithms, especially the robustness against JPEG compression.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2020
Publisher: Association for Computing Machinery (ACM)
Date: 18-07-2021
DOI: 10.1145/3460287
Abstract: Unprecedented attention towards blockchain technology is serving as a game-changer in fostering the development of blockchain-enabled distinctive frameworks. However, fragmentation unleashed by its underlying concepts hinders different stakeholders from effectively utilizing blockchain-supported services, resulting in the obstruction of its wide-scale adoption. To explore synergies among the isolated frameworks requires comprehensively studying inter-blockchain communication approaches. These approaches broadly come under the umbrella of Blockchain Interoperability (BI) notion, as it can facilitate a novel paradigm of an integrated blockchain ecosystem that connects state-of-the-art disparate blockchains. Currently, there is a lack of studies that comprehensively review BI, which works as a stumbling block in its development. Therefore, this article aims to articulate potential of BI by reviewing it from erse perspectives. Beginning with a glance of blockchain architecture fundamentals, this article discusses its associated platforms, taxonomy, and consensus mechanisms. Subsequently, it argues about BI’s requirement by exemplifying its potential opportunities and application areas. Concerning BI, an architecture seems to be a missing link. Hence, this article introduces a layered architecture for the effective development of protocols and methods for interoperable blockchains. Furthermore, this article proposes an in-depth BI research taxonomy and provides an insight into the state-of-the-art projects. Finally, it determines possible open challenges and future research in the domain.
Publisher: IEEE
Date: 05-2015
Publisher: IEEE
Date: 10-2006
DOI: 10.1109/EDOC.2006.12
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 05-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2020
Publisher: Wiley
Date: 05-04-2021
DOI: 10.1002/SPE.2971
Abstract: The fast pace evolving of Android malware demands for highly efficient strategy. That is, for a range of malware types, a malware detection scheme needs to be resilient and with minimum computation performs efficient and precise. In this paper, we propose Mutual Information and Feature Importance Gradient Boosting (MIFIBoost) tool that uses byte n‐gram frequency. MIFIBoost consists of four steps in the model construction phase and two steps in the prediction phase. For training, first, n‐grams of both the classes.dex and AndroidManifest.xml binary files are obtained. Then, MIFIBoost uses Mutual Information (MI) to determine the top most informative items from the entire n‐gram vocabulary. In the third phase, MIFIBoost utilizes the Gradient Boosting algorithm to re‐rank these top n‐grams. For testing, MIFIBoost uses the learned vocabulary of byte n‐grams term‐frequency ( tf ) to feed into the classifier for prediction. Thus, MIFIBoost does not require reverse engineering. A key insight from this work is that filtering using XGBoost helps us to address the hard problem of detecting obfuscated malware better while having a negligible impact on nonobfuscated malware. We have conducted a wide range of experiments on four different datasets one of which is obfuscated, and MIFIBoost outperforms state‐of‐the‐art tools. MIFIBoost's f1‐score for Drebin, DexShare, and AMD datasets is 99.1%, 98.87%, and 99.62%, respectively, a False Positive Rate of 0.41% using AMD dataset. On average, the False Negative Rate of MIFIBoost is 2.1% for the PRAGuard dataset in which seven different obfuscation techniques are implemented. In addition to fast run‐time performance and resiliency against obfuscated malware, the experiments show that MIFIBoost performs quite efficiently for five zero‐day families with 99.78% AUC.
Publisher: Springer International Publishing
Date: 2020
Publisher: Springer International Publishing
Date: 2018
Publisher: IEEE
Date: 08-2017
DOI: 10.1109/CBD.2016.037
Publisher: JMIR Publications Inc.
Date: 27-05-2016
Publisher: Elsevier BV
Date: 02-2017
Publisher: Springer International Publishing
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2021
Publisher: IEEE
Date: 07-2010
Publisher: Springer Science and Business Media LLC
Date: 10-04-2018
Publisher: IEEE
Date: 11-2012
DOI: 10.1109/CGC.2012.22
Publisher: IGI Global
Date: 04-2011
Abstract: The Web enters a new era where contents are to take the back seat and services will take the driver seat to form a service-oriented Web. This paper presents a service-oriented user interface design for the next generation Web. The design leverages the advances of semantic Web and service composition technologies to provide an intelligent and generic user interface to query, compose and execute Web services for a variety of user tasks. First, a simple cost model is developed for estimating the development and learning overheads of Web service interfaces for service-oriented applications as the motivation of this work. Then, the authors present the design of the service-oriented browser and discuss the enabling technologies. A prototype system is developed using existing technologies and standards as a proof of concept.
Publisher: IGI Global
Date: 2012
Abstract: In recent years, a range of innovations in the ‘service’ related technologies have been witnessed, namely SaaS, PaaS, and IaaS. Meanwhile, Service Oriented Architecture (SOA) enables composing different services seamlessly to form new service network. The combination of the two trends allow in idual organizations to overcome their limitation of computing resources and obtain the maximum value of the functionality themselves can provide. One major issue with such massive composition is to verify the compliance of participating entities. Composed services usually span several administrative domains, where each has its own priorities. Given the fact that an admission to a violation may cause penalties, it is conceivable that an entity may intend to deceive. To tackle this issue, ‘accountability’ has emerged as a promising concept to achieve system trustworthiness. Recently, accountability has received considerable attention in research communities, and many approaches have been proposed. In this survey, the authors discuss the concept and desirable properties of accountability, clarify the requirements and differences that distinguish accountability to other related approaches, and systematically summarize and evaluate various approaches of accountability.
Publisher: Elsevier BV
Date: 11-2021
Publisher: Elsevier BV
Date: 06-2018
Publisher: Oxford University Press (OUP)
Date: 17-11-2019
Abstract: Malware detection based on static features and without code disassembling is a challenging path of research. Obfuscation makes the static analysis of malware even more challenging. This paper extends static malware detection beyond byte level $n$-grams and detecting important strings. We propose a model (Byte2vec) with the capabilities of both binary file feature representation and feature selection for malware detection. Byte2vec embeds the semantic similarity of byte level codes into a feature vector (byte vector) and also into a context vector. The learned feature vectors of Byte2vec, using skip-gram with negative-s ling topology, are combined with byte-level term-frequency (tf) for malware detection. We also show that the distance between a feature vector and its corresponding context vector provides a useful measure to rank features. The top ranked features are successfully used for malware detection. We show that this feature selection algorithm is an unsupervised version of mutual information (MI). We test the proposed scheme on four freely available Android malware datasets including one obfuscated malware dataset. The model is trained only on clean APKs. The results show that the model outperforms MI in a low-dimensional feature space and is competitive with MI and other state-of-the-art models in higher dimensions. In particular, our tests show very promising results on a wide range of obfuscated malware with a false negative rate of only 0.3% and a false positive rate of 2.0%. The detection results on obfuscated malware show the advantage of the unsupervised feature selection algorithm compared with the MI-based method.
Publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
Date: 2020
Publisher: IEEE
Date: 06-2015
DOI: 10.1109/SCC.2015.39
Publisher: IEEE
Date: 04-2016
Publisher: IEEE
Date: 04-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-08-2022
Publisher: IEEE
Date: 07-2015
Publisher: Elsevier BV
Date: 11-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2016
Publisher: ACM
Date: 04-12-2017
Publisher: CSIRO
Date: 2021
DOI: 10.25919/86EV-KG77
Publisher: IEEE
Date: 06-2017
Publisher: Springer Berlin Heidelberg
Date: 04-09-2013
Publisher: Springer International Publishing
Date: 2019
Publisher: IGI Global
Date: 10-2017
Abstract: Micro learning becomes popular in online open learning and it is effective and helpful for learning in mobile environment. However, the delivery of open education resources (OERs) is scarcely supported by the current online systems. In this research, the authors introduce an approach to bridge the gap by providing adaptive micro open education resources for in idual learners to carry out learning activities in a short time span. They propose a framework for micro learning resource customization and a personalized learner model, which are supported by education data mining (EDM) and learning analysis (LA). A service-oriented architecture for Micro Learning as a Service (MLaaS) is designed to integrate all necessary procedures together as a complete Service for delivering micro OERs, providing a platform for resource sharing and exchanging in peer-to-peer learning environment. Working principle of a key step, namely the computational decision-making of micro OER adaptation, is also introduced.
Publisher: Elsevier BV
Date: 12-2014
Publisher: IEEE
Date: 2006
DOI: 10.1109/ICWS.2006.59
Publisher: Frontiers Media SA
Date: 12-10-2022
Publisher: Springer Singapore
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer International Publishing
Date: 2019
Publisher: ACM
Date: 04-04-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2023
Publisher: Elsevier BV
Date: 10-2020
Publisher: IEEE
Date: 09-2021
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: IEEE
Date: 07-2019
Publisher: IEEE
Date: 06-2017
DOI: 10.1109/ICWS.2017.54
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2015
Publisher: Springer Science and Business Media LLC
Date: 14-07-2014
DOI: 10.1038/SREP05685
Publisher: IEEE
Date: 07-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-02-2021
Publisher: Springer Science and Business Media LLC
Date: 08-10-2020
Publisher: IEEE
Date: 06-2017
DOI: 10.1109/SCC.2017.32
Publisher: Springer Berlin Heidelberg
Date: 04-09-2013
Publisher: Springer International Publishing
Date: 2020
Publisher: Springer Science and Business Media LLC
Date: 20-09-2016
Publisher: ACM
Date: 27-05-2018
Publisher: IEEE
Date: 09-2008
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2023
Publisher: IEEE
Date: 11-2015
DOI: 10.1109/CBD.2014.25
Publisher: MDPI AG
Date: 22-06-2023
Abstract: In recent years, edge-based intelligent UAV delivery systems have attracted significant interest from both the academic and industrial sectors. One key obstacle faced by these smart UAV delivery systems is data privacy, as they rely on vast amounts of data from users and UAVs for training machine learning models for person re-identification (ReID) purposes. To tackle this issue, federated learning (FL) has been extensively adopted as a promising solution since it only involves sharing and updating model parameters with a central server, without transferring raw data. However, traditional FL still suffers from the problem of having a single point of failure. In this study, we present a performance optimization method for federated person re-identification using benchmark analysis in blockchain-powered edge-based smart UAV delivery systems. Our method integrates a decentralized FL mechanism enabled by blockchain, which eliminates the necessity for a central server and stores private data on a decentralized permissioned blockchain, thus preventing a single point of failure. We employ the person ReID application in intelligent UAV delivery systems as a representative ex le to drive our research and examine privacy concerns. Additionally, we introduce the Federated Re-identification Consensus (FRC) protocol to address the scalability issue of the blockchain in supporting UAV delivery systems. The efficiency of our proposed method is illustrated through experiments on energy efficiency, confirmation time, and throughput. We also explore the effects of the incentive mechanism and analyze the system’s resilience under various security attacks. This study offers valuable insights and potential solutions for addressing data privacy and security challenges in the fast-growing domain of smart UAV delivery systems.
Publisher: ACM
Date: 10-07-2023
Publisher: IEEE
Date: 07-2010
DOI: 10.1109/SCC.2010.83
Publisher: Elsevier BV
Date: 2016
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: IEEE
Date: 06-2017
DOI: 10.1109/ICWS.2017.43
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2021
Publisher: Springer International Publishing
Date: 2018
Publisher: IEEE
Date: 07-2019
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: IGI Global
Date: 2018
DOI: 10.4018/978-1-5225-7598-6.CH114
Abstract: Performance testing is one of the vital activities spanning the whole life cycle of software engineering. As a result, there are a considerable number of performance testing products and open source tools available. It has been observed that most of the existing performance testing products and tools are either too expensive and complicated for small projects or too specific and simple for erse performance tests. In this chapter, the authors present an overview of existing performance test products/tools, provide a summary of some of the contemporary system performance testing frameworks, and capture the key requirements for a general-purpose performance testing framework. Based on previous works, the authors propose a system performance testing framework that is suitable for both simple and small as well as complicated and large-scale performance testing projects. The core of the framework contains an abstraction to facilitate performance testing by separating the application logic from the common performance testing functionality and a general-purpose data model.
Publisher: Wiley
Date: 08-07-2013
DOI: 10.1002/CPE.2891
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: IEEE
Date: 06-2016
DOI: 10.1109/SCC.2016.59
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2010
DOI: 10.1109/TC.2010.80
Publisher: Springer International Publishing
Date: 2020
Publisher: Public Library of Science (PLoS)
Date: 04-05-2017
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: MDPI AG
Date: 23-12-2021
DOI: 10.3390/MA15010085
Abstract: Additive manufacturing (AM) is rapidly evolving from “rapid prototyping” to “industrial production”. AM enables the fabrication of bespoke components with complicated geometries in the high-performance areas of aerospace, defence and biomedicine. Providing AM parts with a tagging feature that allows them to be identified like a fingerprint can be crucial for logistics, certification and anti-counterfeiting purposes. Whereas the implementation of an overarching strategy for the complete traceability of AM components downstream from designer to end user is, by nature, a cross-disciplinary task that involves legal, digital and technological issues, materials engineers are on the front line of research to understand what kind of tag is preferred for each kind of object and how existing materials and 3D printing hardware should be synergistically modified to create such tag. This review provides a critical analysis of the main requirements and properties of tagging features for authentication and identification of AM parts, of the strategies that have been put in place so far, and of the future challenges that are emerging to make these systems efficient and suitable for digitalisation. It is envisaged that this literature survey will help scientists and developers answer the challenging question: “How can we embed a tagging feature in an AM part?”.
Publisher: IEEE
Date: 06-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2020
Publisher: No publisher found
Date: 2021
DOI: 10.25919%2F86EV-KG77
Publisher: IEEE
Date: 12-2013
DOI: 10.1109/CSE.2013.125
Publisher: IEEE
Date: 07-2011
DOI: 10.1109/ICWS.2011.44
Publisher: Springer Berlin Heidelberg
Date: 2014
Publisher: IEEE
Date: 09-2011
Publisher: ACM
Date: 24-05-2021
Publisher: Inderscience Publishers
Date: 2009
Publisher: Ovid Technologies (Wolters Kluwer Health)
Date: 03-2017
Publisher: Springer Singapore
Date: 2021
Publisher: IGI Global
Date: 02-2017
DOI: 10.4018/IJSSOE.20210701.OA1
Abstract: Despite the enormous number of online docking services available, consumers sometimes struggle to discover the services they require from time to time. On the other hand, when finding matching or recommendation platforms from an academic or industry perspective, most of the related work they can find is centralized systems. Unfortunately, the centralized systems often have shortages, such as adv-driven, lack of trust, non-transparency, and unfairness. The authors propose a peer-to-peer (P2P) service network for service discovery and recommendation. ServiceNet is a blockchain-based service ecosystem that promises to provide an open, transparent, self-growing, and self-managing service environment. The article will provide the basic concept, the proto-architecture type's design, and the proto-initial type's implementation and performance assessment.
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: ACM
Date: 27-05-2018
Publisher: Springer Science and Business Media LLC
Date: 23-10-2020
Publisher: MDPI AG
Date: 16-12-2021
DOI: 10.3390/RS13245109
Abstract: The prerequisite for the use of remote sensing images is that their security must be guaranteed. As a special subset of perceptual hashing, subject-sensitive hashing overcomes the shortcomings of the existing perceptual hashing that cannot distinguish between “subject-related t ering” and “subject-unrelated t ering” of remote sensing images. However, the existing subject-sensitive hashing still has a large deficiency in robustness. In this paper, we propose a novel attention-based asymmetric U-Net (AAU-Net) for the subject-sensitive hashing of remote sensing (RS) images. Our AAU-Net demonstrates obvious asymmetric structure characteristics, which is important to improve the robustness of features by combining the attention mechanism and the characteristics of subject-sensitive hashing. On the basis of AAU-Net, a subject-sensitive hashing algorithm is developed to integrate the features of various bands of RS images. Our experimental results show that our AAU-Net-based subject-sensitive hashing algorithm is more robust than the existing deep learning models such as Attention U-Net and MUM-Net, and its t ering sensitivity remains at the same level as that of Attention U-Net and MUM-Net.
Publisher: IGI Global
Date: 2011
DOI: 10.4018/IJSSOE
Publisher: IEEE
Date: 07-2020
Publisher: Wiley
Date: 05-09-2019
DOI: 10.1002/SPE.2744
Publisher: Elsevier BV
Date: 06-2014
Publisher: American Physical Society (APS)
Date: 06-10-2014
Publisher: Springer International Publishing
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: Springer Science and Business Media LLC
Date: 05-01-2008
Publisher: IEEE
Date: 07-2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: IEEE
Date: 07-2010
Publisher: IEEE
Date: 12-2018
Publisher: Springer Berlin Heidelberg
Date: 2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2017
Publisher: IEEE
Date: 27-02-2021
Publisher: Informa UK Limited
Date: 14-10-2014
Publisher: IEEE
Date: 05-2015
Publisher: Springer International Publishing
Date: 2021
Publisher: Informa UK Limited
Date: 22-01-2014
Publisher: Springer Nature Switzerland
Date: 2022
Publisher: Association for Computing Machinery (ACM)
Date: 13-07-2023
DOI: 10.1145/3582882
Abstract: The next-generation blockchain ecosystem is expected to integrate both homogeneous and heterogeneous distributed ledgers. These systems require operations across multiple blockchains to enrich advanced functionalities for future applications. However, the development of blockchain interoperability involves much more complexity regarding the variety of underlying architectures. Guaranteeing the properties of ACID (Atomicity, Consistency, Isolation, Durability) across erse blockchain systems remains challenging. To clear the fog, this article accordingly provides a comprehensive review of the current progress of blockchain interoperability. We explore the general principles and procedures for interoperable blockchain systems to highlight their design commons. Then, we survey practical instances and compare state-of-the-art systems to present their unique features between distinct solutions. Finally, we discuss critical challenges and point out potential research directions. We believe our work can provide an intuitive guideline for newcomers and also promote rapid development in terms of blockchain interoperability.
Publisher: IEEE
Date: 2011
Publisher: Springer International Publishing
Date: 2018
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2018
Publisher: Springer Singapore
Date: 2021
Publisher: Springer International Publishing
Date: 2017
Publisher: SCITEPRESS - Science and and Technology Publications
Date: 2016
Publisher: IGI Global
Date: 07-2012
Abstract: Recently, identity management has gained increasing attention from both enterprises and government organisations, in terms of security, privacy, and trust. A considerable number of theories and techniques have been developed to deal with identity management issues within and between organisations. In this paper, the authors reviewed, assessed, and consolidated the research and development activities of identity management in 14 privately and publicly funded organisations. Furthermore, the authors developed a taxonomy to characterise and classify these identity management frameworks into two categories: processes and technologies. The authors then studied these frameworks by systematically reviewing the whole lifecycle of an identity management framework, including actors, roles, security, privacy, trust, interoperability, and federation. This paper aims to provide the reader with the state of art of existing identity management frameworks and a good understanding of the research issues and progress in this area.
Publisher: IGI Global
Date: 2018
DOI: 10.4018/978-1-5225-2255-3.CH658
Abstract: Performance testing is one of the vital activities spanning the whole life cycle of software engineering. As a result, there are a considerable number of performance testing products and open source tools available. It has been observed that most of the existing performance testing products and tools are either too expensive and complicated for small projects, or too specific and simple for erse performance tests. In this chapter, we will present an overview of existing performance test products/tools, provide a summary of some of the contemporary system performance testing frameworks, and capture the key requirements for a general-purpose performance testing framework. Based on our previous works, we propose a system performance testing framework which is suitable for both simple and small, as well as complicated and large-scale performance testing projects. The core of our framework contains an abstraction to facilitate performance testing by separating the application logic from the common performance testing functionality, and a set of general-purpose data model.
Publisher: IEEE
Date: 07-2009
DOI: 10.1109/ICWS.2009.53
Publisher: IEEE
Date: 06-2012
Publisher: Informa UK Limited
Date: 08-1983
Publisher: Springer International Publishing
Date: 2017
Publisher: IEEE
Date: 11-2020
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: IEEE
Date: 2007
DOI: 10.1109/SCC.2007.26
Publisher: Wiley
Date: 11-10-2023
DOI: 10.1002/SMR.2627
Publisher: Association for Computing Machinery (ACM)
Date: 03-03-2023
DOI: 10.1145/3576899
Abstract: Limitations on high latency and low scalability of classical blockchain systems retard their adoptions and applications. Reconstructed blockchain systems have been proposed to avoid the consumption of competitive transactions caused by linear sequenced blocks. These systems, instead, structure transactions/blocks in the form of Directed Acyclic Graph (DAG) and consequently rebuild upper layer components. The promise of DAG-based blockchain systems is to enable fast confirmation (complete transactions within million seconds) and high scalability (attach transactions in parallel) without significantly compromising security. However, this field still lacks systematic work that summarises DAG techniques. To bridge the gap, this Systematization of Knowledge (SoK) provides a comprehensive analysis of ever-existing and ongoing DAG-based blockchain systems. We abstract a general model to capture the main features and identify six types of design patterns. Then, we evaluate these systems from the perspectives of structure, consensus, property, security, and performance. We further discuss the trade-off between different factors, open challenges, and the potentiality of DAG-based solutions, indicating their promising directions for future research.
Publisher: IEEE
Date: 07-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2022
Publisher: Elsevier BV
Date: 06-2017
Publisher: CSIRO
Date: 2011
Publisher: IEEE
Date: 09-2008
DOI: 10.1109/ICWS.2008.74
Publisher: Springer International Publishing
Date: 2020
Publisher: IGI Global
Date: 2017
DOI: 10.4018/978-1-5225-0759-8.CH018
Abstract: With the recent advancement in computing technologies, business and research applications are not only executed in the traditional systems such as enterprise systems and supercomputers (HPC systems) but also in the cloud. The traditional HPC systems are expensive and sometimes require huge start-up investment, technical and administrative support and job queuing. With the benefits of cloud computing, cloud services such as Infrastructure as a Service (IaaS) and Hardware as a Service (HaaS), enables business, scientists and researchers to run their business and HPC applications in the cloud without upfront investment associated with the traditional infrastructures. Therefore, in this paper we analyze the computational performance and dollar cost of running HPC applications in the cloud when IaaS or HaaS is leased. We find that HaaS significantly reduces the cost of running HPC application in the cloud by 20% compare to IaaS without significant impact to application's performance. We also found that there is a substantial improvement in computational performance in HaaS compare to IaaS.
Publisher: Association for Computing Machinery (ACM)
Date: 2012
Abstract: Service-centric solutions usually require rich context to fully deliver and better reflect on the underlying applications. We present a novel use of context in the form of customized user interface services with the concept of User Interface as a Service (UIaaS). UIaaS takes user profiles as input to generate context-aware interface services. Such interface services can be used as context to augment semantic services with contextual information leading to UIaaS as a Context (UIaaSaaC). The added serendipitous benefit of the proposed concept is that the composition of a customized user interface with the requested service is performed by the service composition engine, as is the case with any other services. We use a special-purpose language (called User Interface Description Language (UIDL)) to model and realize user interfaces as services. We use a real-life e-government application, human services delivery for the citizens, as a proof-of-concept. We also present a comprehensive evaluation of the proposed approach using a functional evaluation and a nonfunctional evaluation consisting of an end user usability test and expert usability reviews.
Publisher: IEEE
Date: 04-2007
Publisher: IEEE
Date: 11-2020
Publisher: Elsevier BV
Date: 11-2019
Publisher: IEEE
Date: 2007
Publisher: IEEE
Date: 05-2018
Publisher: Elsevier BV
Date: 04-2018
Publisher: IEEE
Date: 11-2020
Publisher: IEEE
Date: 11-2020
Publisher: IEEE
Date: 07-2018
Publisher: IEEE
Date: 06-2011
Publisher: Association for Computing Machinery (ACM)
Date: 05-2008
Abstract: Massive Internet media distribution demands prolonged continuous consumption of networking and disk bandwidths in large capacity. Many proxy-based Internet media distribution algorithms and systems have been proposed, implemented, and evaluated to address the scalability and performance issue. However, few of them have been used in practice, since two important issues are not satisfactorily addressed. First, existing proxy-based media distribution architectures lack an efficient media distribution control mechanism. Without copyright protection, content providers are hesitant to use proxy-based fast distribution techniques. Second, little has been done to protect client privacy during content accesses on the Internet. Straightforward solutions to address these two issues independently lead to conflicts. For ex le, to enforce distribution control, only legitimate users should be granted access rights. However, this normally discloses more information (such as which object the client is accessing) other than the client identity, which conflicts with the client's desire for privacy protection. In this article, we propose a unified proxy-based media distribution protocol to effectively address these two problems simultaneously. We further design a set of new algorithms in a cooperative proxy environment where our proposed scheme works efficiently and practically. Simulation-based experiments are conducted to extensively evaluate the proposed system. Preliminary results demonstrate the effectiveness of our proposed strategy.
Publisher: IGI Global
Date: 2017
Publisher: IEEE
Date: 06-2013
Publisher: IEEE
Date: 06-2014
Publisher: IGI Global
Date: 10-2011
DOI: 10.4018/IJSSOE.2011100104
Abstract: New applications have recently emerged within the domains of e-Health, e-Science, e-Research and e-Government that require the formation of dynamic collaborations between independent, autonomous business organizations for the duration of a project designed with a specific purpose. To successfully create and manage such collaborations, there is a need of a standard way to specify: (a) what resources are required, (b) who will contribute resources, (c) the type of access required to these resources, (d) agreement and obligations of the partners within the business collaboration, with the terms and conditions specified in the agreement, and (e) how to instantiate, maintain and terminate such business collaborations easily and in a well understood manner. The authors address these issues through the creation, negotiation and execution of an agreed electronic contract. First, this paper provides a framework for an electronic contract (e-Contract) by introducing a Web Service Collaborative Context Definition Language (WS-CCDL), which was developed in the context of dynamic business collaboration. Then, the authors illustrate its use with a universal (anywhere) connectivity service for a tele-Collaboration application in the context of e-Research domain. Both architectural design and implementation considerations are provided to highlight the feasibility and complicity of the technologies.
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: Springer International Publishing
Date: 2017
Publisher: American Physical Society (APS)
Date: 20-04-2009
Publisher: IEEE
Date: 06-2012
DOI: 10.1109/SCC.2012.73
Publisher: Springer International Publishing
Date: 2017
Publisher: Royal Society of Chemistry (RSC)
Date: 2010
DOI: 10.1039/C004332J
Abstract: We present a combined experimental and theoretical investigation of the valence electronic structure of porphyrin-derived molecules. The valence photoemission spectra of the free-base tetraphenylporphyrin and of the octaethylporphyrin molecule were measured using synchrotron radiation and compared with theoretical spectra calculated using the GW method and the density-functional method within the generalized gradient approximation. Only the GW results could reproduce the experimental data. We found that the contribution to the orbital energies due to electronic correlations has the same linear behavior in both molecules, with larger deviations in the vicinity of the HOMO level. This shows the importance of adequate treatment of electronic correlations in these organic systems.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2010
DOI: 10.1109/TSC.2010.34
Publisher: Elsevier BV
Date: 02-2023
Publisher: IEEE
Date: 07-2023
Publisher: IEEE
Date: 05-2012
Publisher: IEEE
Date: 2010
Publisher: IEEE
Date: 07-2017
Publisher: Copernicus GmbH
Date: 30-04-2018
DOI: 10.5194/ISPRS-ARCHIVES-XLII-3-665-2018
Abstract: Abstract. This paper briefly describes the post-processing influence assessment experiment, the experiment includes three steps: the physical simulation, image processing, and image quality assessment. The physical simulation models s led imaging system in laboratory, the imaging system parameters are tested, the digital image serving as image processing input are produced by this imaging system with the same imaging system parameters. The gathered optical s led images with the tested imaging parameters are processed by 3 digital image processes, including calibration pre-processing, lossy compression with different compression ratio and image post-processing with different core. Image quality assessment method used is just noticeable difference (JND) subject assessment based on ISO20462, through subject assessment of the gathered and processing images, the influence of different imaging parameters and post-processing to image quality can be found. The six JND subject assessment experimental data can be validated each other. Main conclusions include: image post-processing can improve image quality image post-processing can improve image quality even with lossy compression, image quality with higher compression ratio improves less than lower ratio with our image post-processing method, image quality is better, when camera MTF being within a small range.
Publisher: Elsevier BV
Date: 2009
Publisher: CSIRO
Date: 2011
Publisher: Springer International Publishing
Date: 2018
Publisher: IGI Global
Date: 2018
DOI: 10.4018/978-1-5225-7113-1.CH048
Abstract: The digital profile of a person has become one of the tradable digital commodities over the Internet. Identity management has gained increasing attention from both enterprises and government organisations, in terms of security, privacy, and trust. A considerable number of theories and techniques have been developed to deal with identity management issues using biometric multimodal approaches. In this chapter, the authors review, assess, and consolidate the research and development activities of contemporary biometric and non-biometric identity management in 21 privately and publicly funded organisations. Furthermore, they develop a taxonomy to characterise and classify these identity management frameworks into two categories: processes and technologies. The authors then study these frameworks by systematically reviewing the whole lifecycle of an identity management framework, including actors, roles, security, privacy, trust, interoperability, and federation. The goal is to provide readers with a comprehensive picture of the state of the art of the existing identity management frameworks that utilise biometric and non-biometric technologies with the aim to highlight the contemporary issues and progress in this area of identity management.
Publisher: IEEE
Date: 06-2014
DOI: 10.1109/SCC.2014.122
Publisher: Springer Berlin Heidelberg
Date: 2014
Publisher: CSIRO
Date: 2017
Publisher: ACM
Date: 09-12-2019
Publisher: IGI Global
Date: 07-2011
Abstract: This paper proposes the use of a mobile-cloud by combining mobile devices and the cloud together in a biodefense and emerging infectious diseases (BEI) research application scenario. A mobile-cloud framework is developed to facilitate the use of mobile devices to collect data for, and manipulate and interact with the scientific workflows running in the Cloud. In this framework, an independent trusted accountability service is used to provide data provenance and enforce compliance among the participants of a biodefense research workflow. The authors have implemented a prototype which allows the researchers to use mobile devices to design and participate in biodefense workflows. The authors evaluated the effectiveness of the mobile-cloud with a prototype and conducted performance testing with ex le biodefense workflows.
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: IEEE
Date: 10-2020
Publisher: IEEE
Date: 05-2019
Publisher: ACM
Date: 27-11-2006
Publisher: IGI Global
Date: 2014
DOI: 10.4018/978-1-4666-6256-8.CH001
Abstract: The digital profile of a person has become one of the tradable digital commodities over the Internet. Identity management has gained increasing attention from both enterprises and government organisations, in terms of security, privacy, and trust. A considerable number of theories and techniques have been developed to deal with identity management issues using biometric multimodal approaches. In this chapter, the authors review, assess, and consolidate the research and development activities of contemporary biometric and non-biometric identity management in 21 privately and publicly funded organisations. Furthermore, they develop a taxonomy to characterise and classify these identity management frameworks into two categories: processes and technologies. The authors then study these frameworks by systematically reviewing the whole lifecycle of an identity management framework, including actors, roles, security, privacy, trust, interoperability, and federation. The goal is to provide readers with a comprehensive picture of the state of the art of the existing identity management frameworks that utilise biometric and non-biometric technologies with the aim to highlight the contemporary issues and progress in this area of identity management.
Publisher: IEEE
Date: 07-2007
Publisher: Springer International Publishing
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2016
DOI: 10.1109/MS.2015.26
Publisher: IEEE
Date: 08-2015
DOI: 10.1109/ARES.2015.73
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2020
Publisher: MDPI AG
Date: 26-05-2017
DOI: 10.3390/SU9060898
Publisher: IEEE
Date: 03-2008
Publisher: Institution of Engineering and Technology (IET)
Date: 24-09-2021
DOI: 10.1049/BLC2.12009
Publisher: IEEE
Date: 12-2011
DOI: 10.1109/UCC.2011.55
Publisher: ACM
Date: 08-04-2019
Publisher: Association for Computing Machinery (ACM)
Date: 07-12-2016
DOI: 10.1145/3007190
Abstract: The communication systems in existing smart grids mainly take the request/reply interaction model, in which data access is under the direct control of data producers. This tightly controlled interaction model is not scalable to support complex interactions among smart grid services. On the contrary, the publish/subscribe system features a loose coupling communication infrastructure and allows indirect, anonymous and multicast interactions among smart grid services. The publish/subscribe system can thus support scalable and flexible collaboration among smart grid services. However, the access is not under the direct control of data producers, it might not be easy to implement an access control scheme for a publish/subscribe system. In this article, we propose a Data-Centric Access Control Framework (DCACF) to support secure access control in a publish/subscribe model. This framework helps to build scalable smart grid services, while keeping features of service interactions and data confidentiality at the same time. The data published in our DCACF is encrypted with a fully homomorphic encryption scheme, which allows in-grid homomorphic aggregation of the encrypted data. The encrypted data is accompanied by bloom-filter encoded control policies and access credentials to enable indirect access control. We have analyzed the correctness and security of our DCACF and evaluated its performance in a distributed environment.
Publisher: Association for Computing Machinery (ACM)
Date: 14-03-2023
DOI: 10.1145/3568315
Abstract: Garg et al. (TCC 2018) defined the notion of registration-based encryption (RBE) where the private key generator (PKG) is decoupled from key management and replaced by a key curator (KC). KC does not possess any cryptographic secrets and only plays the role of aggregating the public keys of all the registered users and updating the public parameters whenever a new user joins the system, which solves the key escrow issue. Notwithstanding, RBE still places a significant amount of trust in KC, whose actions are not accountable, e.g., it could secretly register multiple keys for already registered users. In this article, we propose a blockchain-based RBE framework, which provides total transparency and decentralization of KC by leveraging smart contracts. Our framework transfers the right of key management from KC to in idual participants and keeps publicly upgradable parameters on-chain. We provide a basic construction that calculates the public parameter on-chain and an extended construction with better efficiency, which merely calculates the roots of trees on-chain. Our basic version is theoretically feasible, while the extended version is practically feasible. In particular, the enhanced scheme reduces computing complexity to a constant level. Our prototype implementation and evaluation results demonstrate that our extended construction is satisfactorily efficient.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-1988
DOI: 10.1109/20.11488
Publisher: IEEE
Date: 12-2010
Publisher: Association for Computing Machinery (ACM)
Date: 14-03-2023
DOI: 10.1145/3568314
Abstract: NEO is one of the top public chains worldwide. It adopts a new consensus algorithm called delegated Byzantine Fault Tolerance (dBFT). In this article, we formalize dBFT via the state machine replication model and point out its potential issues. Our theoretical analysis indicates that dBFT could guarantee neither liveness nor safety , even if the number of Byzantine nodes is no more than the threshold, which has contradicted the established security claim. Then, we identify two attacks and successfully simulate them. Finally, we provide recommendations. Notably, NEO official team has accepted our suggested fixes.
Publisher: IEEE Comput. Soc
Date: 2002
Publisher: IEEE
Date: 12-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2015
Publisher: IEEE
Date: 09-2008
Publisher: IEEE
Date: 2007
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2016
Publisher: Springer International Publishing
Date: 2022
Publisher: Association for Computing Machinery (ACM)
Date: 27-08-2019
DOI: 10.1145/3338851
Abstract: This article studies synchronous online distributed software update, also known as rolling upgrade in DevOps, which in clouds upgrades software versions in virtual machine instances even when various failures may occur. The goal is to minimise completion time, availability degradation, and monetary cost for entire rolling upgrade by selecting proper parameters. For this goal, we propose a stochastic model and a novel optimisation method. We validate our approach to minimise the objectives through both experiments in Amazon Web Service (AWS) and simulations.
Publisher: IEEE
Date: 06-2015
Publisher: Springer Science and Business Media LLC
Date: 12-02-2013
Publisher: IEEE
Date: 07-2008
DOI: 10.1109/SCC.2008.66
Publisher: IEEE
Date: 03-2019
Publisher: Springer International Publishing
Date: 2014
Publisher: Association for Computing Machinery (ACM)
Date: 09-09-2022
DOI: 10.1145/3538226
Abstract: Federated Learning (FL) presents a privacy-compliant approach by sharing model parameters instead of raw data. However, how to motivate data owners to participate in and stay within an FL ecosystem by continuously contributing their data to the FL model remains a challenge. In this article, we propose a hybrid incentive mechanism based on blockchain to address the above challenge. The proposed mechanism comprises two primary smart contract-based modules, namely the reputation module and the reverse auction module. The former is used to dynamically calculate the reputation score of each FL participant. It employs a trust-jointed reputation scheme to balance the weights between trust values of parameters and bid prices. The latter is responsible for initiating FL auction tasks, calculating price rankings, and assigning corresponding token rewards. Experiments are conducted to evaluate the feasibility and performance of the proposed mechanism against the three typical threats. Experimental results indicate that our mechanism can successfully reduce incentive costs while preventing participants from colluding and over-bidding in the data sharing auction.
Publisher: IEEE
Date: 12-2020
Publisher: IGI Global
Date: 07-2021
Abstract: In 5G systems and beyond, traditional generic service models are no longer appropriate for highly customized and intelligent services. The process of reinventing service models involves allocating available resources, where the performance of service processes is determined by the activity node with the lowest service rate. This paper proposes a new bottleneck-aware resource allocation approach by formulating the resource allocation as a max-min problem. The approach can allocate resources proportional to the workload of each activity, which can guarantee that the service rates of activities within a process are equal or close-to-equal. Based on the business process simulator (i.e., BIMP) simulation results show that the approach is able to reduce the average cycle time and improve resource utilization, as compared to existing alternatives. The results also show that the approach can effectively mitigate the impact of bottleneck activity on the performance of service processes.
Publisher: IEEE
Date: 05-2012
Publisher: IEEE
Date: 05-2018
Publisher: Elsevier BV
Date: 03-2021
Publisher: Elsevier BV
Date: 2005
Publisher: IEEE Comput. Soc
Date: 2002
Location: Australia
Start Date: 05-2022
End Date: 04-2025
Amount: $450,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 07-2023
End Date: 07-2026
Amount: $570,943.00
Funder: Australian Research Council
View Funded Activity