Biblio

Found 5882 results

Filters: Keyword is composability  [Clear All Filters]
2023-04-28
Huang, Wenwei, Cao, Chunhong, Hong, Sixia, Gao, Xieping.  2022.  ISTA-based Adaptive Sparse Sampling Network for Compressive Sensing MRI Reconstruction. 2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM). :999–1004.
The compressed sensing (CS) method can reconstruct images with a small amount of under-sampling data, which is an effective method for fast magnetic resonance imaging (MRI). As the traditional optimization-based models for MRI suffered from non-adaptive sampling and shallow” representation ability, they were unable to characterize the rich patterns in MRI data. In this paper, we propose a CS MRI method based on iterative shrinkage threshold algorithm (ISTA) and adaptive sparse sampling, called DSLS-ISTA-Net. Corresponding to the sampling and reconstruction of the CS method, the network framework includes two folders: the sampling sub-network and the improved ISTA reconstruction sub-network which are coordinated with each other through end-to-end training in an unsupervised way. The sampling sub-network and ISTA reconstruction sub-network are responsible for the implementation of adaptive sparse sampling and deep sparse representation respectively. In the testing phase, we investigate different modules and parameters in the network structure, and perform extensive experiments on MR images at different sampling rates to obtain the optimal network. Due to the combination of the advantages of the model-based method and the deep learning-based method in this method, and taking both adaptive sampling and deep sparse representation into account, the proposed networks significantly improve the reconstruction performance compared to the art-of-state CS-MRI approaches.
2023-05-11
Tanaka, Tatsuki, Sugawara, Takeshi.  2022.  Laser-Based Signal-Injection Attack on Piezoresistive MEMS Pressure Sensors. 2022 IEEE Sensors. :1–4.
As more and more information systems rely sen-sors for their critical decisions, there is a growing threat of injecting false signals to sensors in the analog domain. In particular, LightCommands showed that MEMS microphones are susceptible to light, through the photoacoustic and photoelectric effects, enabling an attacker to silently inject voice commands to smart speakers. Understanding such unexpected transduction mechanisms is essential for designing secure and reliable MEMS sensors. Is there any other transduction mechanism enabling laser-induced attacks? We positively answer the question by experimentally evaluating two commercial piezoresistive MEMS pressure sensors. By shining a laser light at the piezoresistors through an air hole on the sensor package, the pressure reading changes by ±1000 hPa with 0.5 mW laser power. This phenomenon can be explained by the photoelectric effect at the piezoresistors, which increases the number of carriers and decreases the resistance. We finally show that an attacker can induce the target signal at the sensor reading by shining an amplitude-modulated laser light.
ISSN: 2168-9229
2023-06-09
Liu, Luchen, Lin, Xixun, Zhang, Peng, Zhang, Lei, Wang, Bin.  2022.  Learning Common Dependency Structure for Unsupervised Cross-Domain Ner. ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). :8347—8351.
Unsupervised cross-domain NER task aims to solve the issues when data in a new domain are fully-unlabeled. It leverages labeled data from source domain to predict entities in unlabeled target domain. Since training models on large domain corpus is time-consuming, in this paper, we consider an alternative way by introducing syntactic dependency structure. Such information is more accessible and can be shared between sentences from different domains. We propose a novel framework with dependency-aware GNN (DGNN) to learn these common structures from source domain and adapt them to target domain, alleviating the data scarcity issue and bridging the domain gap. Experimental results show that our method outperforms state-of-the-art methods.
2023-08-16
Priya, D Divya, Kiran, Ajmeera, Purushotham, P.  2022.  Lightweight Intrusion Detection System(L-IDS) for the Internet of Things. 2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC). :1—4.
Internet of Things devices collect and share data (IoT). Internet connections and emerging technologies like IoT offer privacy and security challenges, and this trend is anticipated to develop quickly. Internet of Things intrusions are everywhere. Businesses are investing more to detect these threats. Institutes choose accurate testing and verification procedures. In recent years, IoT utilisation has increasingly risen in healthcare. Where IoT applications gained popular among technologists. IoT devices' energy limits and scalability raise privacy and security problems. Experts struggle to make IoT devices more safe and private. This paper provides a machine-learning-based IDS for IoT network threats (ML-IDS). This study aims to implement ML-supervised IDS for IoT. We're going with a centralised, lightweight IDS. Here, we compare seven popular categorization techniques on three data sets. The decision tree algorithm shows the best intrusion detection results.
2023-04-28
Wang, Yiwen, Liang, Jifan, Ma, Xiao.  2022.  Local Constraint-Based Ordered Statistics Decoding for Short Block Codes. 2022 IEEE Information Theory Workshop (ITW). :107–112.
In this paper, we propose a new ordered statistics decoding (OSD) for linear block codes, which is referred to as local constraint-based OSD (LC-OSD). Distinguished from the conventional OSD, which chooses the most reliable basis (MRB) for re-encoding, the LC-OSD chooses an extended MRB on which local constraints are naturally imposed. A list of candidate codewords is then generated by performing a serial list Viterbi algorithm (SLVA) over the trellis specified with the local constraints. To terminate early the SLVA for complexity reduction, we present a simple criterion which monitors the ratio of the bound on the likelihood of the unexplored candidate codewords to the sum of the hard-decision vector’s likelihood and the up-to-date optimal candidate’s likelihood. Simulation results show that the LC-OSD can have a much less number of test patterns than that of the conventional OSD but cause negligible performance loss. Comparisons with other complexity-reduced OSDs are also conducted, showing the advantages of the LC-OSD in terms of complexity.
2023-07-31
Tao, Kai, Long, Zhijun, Qian, Weifeng, Wei, Zitao, Chen, Xinda, Wang, Weiming, Xia, Yan.  2022.  Low-complexity Forward Error Correction For 800G Unamplified Campus Link. 2022 20th International Conference on Optical Communications and Networks (ICOCN). :1—3.
The discussion about forward error correction (FEC) used for 800G unamplified link (800LR) is ongoing. Aiming at two potential options for FEC bit error ratio (BER) threshold, we propose two FEC schemes, respectively based on channel-polarized (CP) multilevel coding (MLC) and bit interleaved coded modulation (BICM), with the same inner FEC code. The field-programmable gate array (FPGA) verification results indicate that with the same FEC overhead (OH), proposed CP-MLC outperforms BICM scheme with less resource and power consumption.
2023-08-03
Chen, Wenlong, Wang, Xiaolin, Wang, Xiaoliang, Xu, Ke, Guo, Sushu.  2022.  LRVP: Lightweight Real-Time Verification of Intradomain Forwarding Paths. IEEE Systems Journal. 16:6309–6320.
The correctness of user traffic forwarding paths is an important goal of trusted transmission. Many network security issues are related to it, i.e., denial-of-service attacks, route hijacking, etc. The current path-aware network architecture can effectively overcome this issue through path verification. At present, the main problems of path verification are high communication and high computation overhead. To this aim, this article proposes a lightweight real-time verification mechanism of intradomain forwarding paths in autonomous systems to achieve a path verification architecture with no communication overhead and low computing overhead. The problem situation is that a packet finally reaches the destination, but its forwarding path is inconsistent with the expected path. The expected path refers to the packet forwarding path determined by the interior gateway protocols. If the actual forwarding path is different from the expected one, it is regarded as an incorrect forwarding path. This article focuses on the most typical intradomain routing environment. A few routers are set as the verification routers to block the traffic with incorrect forwarding paths and raise alerts. Experiments prove that this article effectively solves the problem of path verification and the problem of high communication and computing overhead.
Conference Name: IEEE Systems Journal
2023-09-20
Shen, Qiyuan.  2022.  A machine learning approach to predict the result of League of Legends. 2022 International Conference on Machine Learning and Knowledge Engineering (MLKE). :38—45.
Nowadays, the MOBA game is the game type with the most audiences and players around the world. Recently, the League of Legends has become an official sport as an e-sport among 37 events in the 2022 Asia Games held in Hangzhou. As the development in the e-sport, analytical skills are also involved in this field. The topic of this research is to use the machine learning approach to analyze the data of the League of Legends and make a prediction about the result of the game. In this research, the method of machine learning is applied to the dataset which records the first 10 minutes in diamond-ranked games. Several popular machine learning (AdaBoost, GradientBoost, RandomForest, ExtraTree, SVM, Naïve Bayes, KNN, LogisticRegression, and DecisionTree) are applied to test the performance by cross-validation. Then several algorithms that outperform others are selected to make a voting classifier to predict the game result. The accuracy of the voting classifier is 72.68%.
Kumar Sahoo, Goutam, Kanike, Keerthana, Das, Santos Kumar, Singh, Poonam.  2022.  Machine Learning-Based Heart Disease Prediction: A Study for Home Personalized Care. 2022 IEEE 32nd International Workshop on Machine Learning for Signal Processing (MLSP). :01—06.
This study develops a framework for personalized care to tackle heart disease risk using an at-home system. The machine learning models used to predict heart disease are Logistic Regression, K - Nearest Neighbor, Support Vector Machine, Naive Bayes, Decision Tree, Random Forest and XG Boost. Timely and efficient detection of heart disease plays an important role in health care. It is essential to detect cardiovascular disease (CVD) at the earliest, consult a specialist doctor before the severity of the disease and start medication. The performance of the proposed model was assessed using the Cleveland Heart Disease dataset from the UCI Machine Learning Repository. Compared to all machine learning algorithms, the Random Forest algorithm shows a better performance accuracy score of 90.16%. The best model may evaluate patient fitness rather than routine hospital visits. The proposed work will reduce the burden on hospitals and help hospitals reach only critical patients.
2023-06-22
Cheng, Xin, Wang, Mei-Qi, Shi, Yu-Bo, Lin, Jun, Wang, Zhong-Feng.  2022.  Magical-Decomposition: Winning Both Adversarial Robustness and Efficiency on Hardware. 2022 International Conference on Machine Learning and Cybernetics (ICMLC). :61–66.
Model compression is one of the most preferred techniques for efficiently deploying deep neural networks (DNNs) on resource- constrained Internet of Things (IoT) platforms. However, the simply compressed model is often vulnerable to adversarial attacks, leading to a conflict between robustness and efficiency, especially for IoT devices exposed to complex real-world scenarios. We, for the first time, address this problem by developing a novel framework dubbed Magical-Decomposition to simultaneously enhance both robustness and efficiency for hardware. By leveraging a hardware-friendly model compression method called singular value decomposition, the defending algorithm can be supported by most of the existing DNN hardware accelerators. To step further, by using a recently developed DNN interpretation tool, the underlying scheme of how the adversarial accuracy can be increased in the compressed model is highlighted clearly. Ablation studies and extensive experiments under various attacks/models/datasets consistently validate the effectiveness and scalability of the proposed framework.
ISSN: 2160-1348
2023-03-17
Webb, Susan J., Knight, Jasper, Grab, Stefan, Enslin, Stephanie, Hunt, Hugh, Maré, Leonie.  2022.  Magnetic evidence for lightning strikes on mountains in Lesotho as an important denudation agent. 2022 36th International Conference on Lightning Protection (ICLP). :500–503.
Contrary to previous opinion, ‘frost shattering’ is not the only major contributor to rock weathering at mid latitudes and high elevations, more specifically along edges of bedrock escarpments. Lightning is also a significant contributor to land surface denudation. We can show this as lightning strikes on outcrops can dramatically alter the magnetic signature of rocks and is one of the main sources of noise in paleomagnetic studies. Igneous rocks in the highlands of Lesotho, southern Africa (\textgreater 3000 m elevation) provide an ideal study location, as flow lavas remain as prominent ridges that are relatively resistant to weathering. It is well known that lightning strikes can cause large remanent magnetization in rocks with little resultant variation in susceptibility. At two adjoining peaks in the Lesotho highlands, mapped freshly fractured rock correlates with areas of high magnetic intensity (remanent component), but little variation in susceptibility (related to the induced field), and is therefore a clear indicator of lightning damage. The majority of these mapped strike sites occur at the edges of topographic highs. Variations in magnetic intensity are correlated with the much lower resolution national lightning strikes dataset. These data confirm that high elevation edges of peak scarps are the focus of previous lightning strikes. This method of magnetic surveying compared with lightning strike data is a new method of confirming the locations of lightning strikes, and reduces the need for intensive paleomagnetic studies of the area to confirm remanence.
Fuhui, Li, Decheng, Kong, Xiaowei, Meng, Yikun, Fang, Ketai, He.  2022.  Magnetic properties and optimization of AlNiCo fabricated by additive manufacturing. 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA). :354–358.
In this paper, we use selective laser melting (SLM) technology to fabricate AlNiCo magnetic materials, and the effects of laser processing parameters on the density and mechanical properties of AlNiCo magnetic materials were studied. We tested the magnetic properties of the heat-treated magnets. The results show that both laser power and scanning speed affect the forming. In this paper, the influence of laser power on the density of samples far exceeds the scanning speed. Through the experiment, we obtained the optimal range of process parameters: laser power (150 170W) and laser scanning speed (800 1000mm/s). Although the samples formed within this range have higher density, there are still many cracks, further research work should be done.
ISSN: 2158-2297
2023-04-14
Gong, Dehao, Liu, Yunqing.  2022.  A Mechine Learning Approach for Botnet Detection Using LightGBM. 2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA). :829–833.
The botnet-based network assault are one of the most serious security threats overlay the Internet this day. Although significant progress has been made in this region of research in recent years, it is still an ongoing and challenging topic to virtually direction the threat of botnets due to their continuous evolution, increasing complexity and stealth, and the difficulties in detection and defense caused by the limitations of network and system architectures. In this paper, we propose a novel and efficient botnet detection method, and the results of the detection method are validated with the CTU-13 dataset.
2023-02-03
Vosoughitabar, Shaghayegh, Nooraiepour, Alireza, Bajwa, Waheed U., Mandayam, Narayan, Wu, Chung- Tse Michael.  2022.  Metamaterial-Enabled 2D Directional Modulation Array Transmitter for Physical Layer Security in Wireless Communication Links. 2022 IEEE/MTT-S International Microwave Symposium - IMS 2022. :595–598.
A new type of time modulated metamaterial (MTM) antenna array transmitter capable of realizing 2D directional modulation (DM) for physical layer (PHY) security is presented in this work. The proposed 2D DM MTM antenna array is formed by a time modulated corporate feed network loaded with composite right/left-handed (CRLH) leaky wave antennas (LWAs). By properly designing the on-off states of the switch for each antenna feeding branch as well as harnessing the frequency scanning characteristics of CRLH L WAs, 2D DM can be realized to form a PHY secured transmission link in the 2D space. Experimental results demonstrate the bit-error-rate (BER) is low only at a specific 2D angle for the orthogonal frequency-division multiplexing (OFDM) wireless data links.
ISSN: 2576-7216
2023-01-20
Latha., N, Divya, B V, Surendra, Usha, Archana, N V.  2022.  Micro grid Communication Technologies: An Overview. 2022 IEEE Industrial Electronics and Applications Conference (IEACon). :49–54.
Micro grid is a small-scale power supply network designed to provide electricity to small community with integrated renewable energy sources. A micro grid can be integrated to the utility grid. Due to lack of computerized analysis, mechanical switches causing slow response time, poor visibility and situational awareness blackouts are caused due to cascading of faults. This paper presents a brief survey on communication technologies used in smart grid and its extension to micro grid. By integration of communication network, device control, information collection and remote management an intelligent power management system can be achieved
2023-02-17
Maddamsetty, Saketh, Tharwani, Ayush, Mishra, Debadatta.  2022.  MicroBlind: Flexible and Secure File System Middleware for Application Sandboxes. 2022 IEEE International Conference on Cloud Engineering (IC2E). :221–232.
Virtual machine (VM) based application sandboxes leverage strong isolation guarantees of virtualization techniques to address several security issues through effective containment of malware. Specifically, in end-user physical hosts, potentially vulnerable applications can be isolated from each other (and the host) using VM based sandboxes. However, sharing data across applications executing within different sandboxes is a non-trivial requirement for end-user systems because at the end of the day, all applications are used by the end-user owning the device. Existing file sharing techniques compromise the security or efficiency, especially considering lack of technical expertise of many end-users in the contemporary times. In this paper, we propose MicroBlind, a security hardened file sharing framework for virtualized sandboxes to support efficient data sharing across different application sandboxes. MicroBlind enables a simple file sharing management API for end users where the end user can orchestrate file sharing across different VM sandboxes in a secure manner. To demonstrate the efficacy of MicroBlind, we perform comprehensive empirical analysis against existing data sharing techniques (augmented for the sandboxing setup) and show that MicroBlind provides improved security and efficiency.
2022-12-09
Nisansala, Sewwandi, Chandrasiri, Gayal Laksara, Prasadika, Sonali, Jayasinghe, Upul.  2022.  Microservice Based Edge Computing Architecture for Internet of Things. 2022 2nd International Conference on Advanced Research in Computing (ICARC). :332—337.
Distributed computation and AI processing at the edge has been identified as an efficient solution to deliver real-time IoT services and applications compared to cloud-based paradigms. These solutions are expected to support the delay-sensitive IoT applications, autonomic decision making, and smart service creation at the edge in comparison to traditional IoT solutions. However, existing solutions have limitations concerning distributed and simultaneous resource management for AI computation and data processing at the edge; concurrent and real-time application execution; and platform-independent deployment. Hence, first, we propose a novel three-layer architecture that facilitates the above service requirements. Then we have developed a novel platform and relevant modules with integrated AI processing and edge computer paradigms considering issues related to scalability, heterogeneity, security, and interoperability of IoT services. Further, each component is designed to handle the control signals, data flows, microservice orchestration, and resource composition to match with the IoT application requirements. Finally, the effectiveness of the proposed platform is tested and have been verified.
2023-02-03
Venkatesh, Suresh, Saeidi, Hooman, Sengupta, Kaushik, Lu, Xuyang.  2022.  Millimeter-Wave Physical Layer Security through Space-Time Modulated Transmitter Arrays. 2022 IEEE 22nd Annual Wireless and Microwave Technology Conference (WAMICON). :1–4.
Wireless security and privacy is gaining a significant interest due to the burgeoning growth of communication devices across the electromagnetic spectrum. In this article, we introduce the concept of the space-time modulated millimeter-wave wireless links enabling physical layer security in highspeed communication links. Such an approach does not require cryptographic key exchanges and enables security in a seamless fashion with no overhead on latency. We show both the design and implementation of such a secure system using custom integrated chips at 71-76 GHz with off-chip packaged antenna array. We also demonstrate the security metric of such a system and analyze the efficacy through distributed eavesdropper attack.
2023-07-13
Alqarni, Mansour, Azim, Akramul.  2022.  Mining Large Data to Create a Balanced Vulnerability Detection Dataset for Embedded Linux System. 2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT). :83–91.
The security of embedded systems is particularly crucial given the prevalence of embedded devices in daily life, business, and national defense. Firmware for embedded systems poses a serious threat to the safety of society, business, and the nation because of its robust concealment, difficulty in detection, and extended maintenance cycle. This technology is now an essential part of the contemporary experience, be it in the smart office, smart restaurant, smart home, or even the smart traffic system. Despite the fact that these systems are often fairly effective, the rapid expansion of embedded systems in smart cities have led to inconsistencies and misalignments between secured and unsecured systems, necessitating the development of secure, hacker-proof embedded systems. To solve this issue, we created a sizable, original, and objective dataset that is based on the latest Linux vulnerabilities for identifying the embedded system vulnerabilities and we modified a cutting-edge machine learning model for the Linux Kernel. The paper provides an updated EVDD and analysis of an extensive dataset for embedded system based vulnerability detection and also an updated state of the art deep learning model for embedded system vulnerability detection. We kept our dataset available for all researchers for future experiments and implementation.
2023-03-17
Silva, M. D., Eriksson, S..  2022.  On the Mitigation of Leakage Flux in Spoke Type Permanent Magnet Synchronous Machines. 2022 International Conference on Electrical Machines (ICEM). :302–308.
The use of rare-earth elements in permanent magnets rises economic, environmental and supply-chain related concerns. Instead, ferrite magnets have been researched as an alternative. The magnetic flux concentration capacity of the Spoke Type Permanent Magnet Synchronous Motor (PMSM) and the low magnetic remanence of the ferrite magnet make them complementary strategies towards the desirable performance. However, if restricted to conventional manufacturing processes and materials, the mechanical design is a challenging step of the development of these machines. This paper explores how mechanical constraints impact electromagnetic performance. To access the interdependency of the performance and the mechanical constraints, finite element analyses are done both in the mechanical and electromagnetic domain. The results show that the mechanical constraints have an impact on the performance, although it is possible to reduce it by adapting the design to the electromagnetic and mechanical properties of the electrical steel.
ISSN: 2381-4802
Savoie, Marc, Shan, Jinjun.  2022.  Monte Carlo Study of Jiles-Atherton Parameters on Hysteresis Area and Remnant Displacement. 2022 IEEE 31st International Symposium on Industrial Electronics (ISIE). :1017–1022.
In this study, the parameters of the Jiles-Atherton (JA) model are investigated to determine suitable solution candidates for hysteresis models of a piezoelectric actuator (PEA). The methodology of this study is to perform Monte Carlo experiments on the JA model by randomly selecting parameters that generate hysteresis curves. The solution space is then restrained such that their normalized area and remnant displacements are comparable to those of the PEA. The data resulting from these Monte Carlo simulations show trends in the parameter space that can be used to further restrain parameter selection windows to find suitable JA parameters to model PEAs. In particular, the results show that selection of the reversibility coefficient and the pinning factor strongly affect both of the hysteresis characteristics studied. A large density of solutions is found in certain parameter distributions for both the area and the remnant displacement, but the remnant displacement generates the densest distributions. These results can be used to more effectively find suitable hysteresis models for modeling purposes.
ISSN: 2163-5145
2023-09-01
Seito, Takenobu, Shikata, Junji, Watanabe, Yohei.  2022.  Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security. 2022 56th Annual Conference on Information Sciences and Systems (CISS). :84—89.
A multi-designated receiver authentication code (MDRA-code) with information-theoretic security is proposed as an extension of the traditional multi-receiver authentication code. The purpose of the MDRA-code is to securely transmit a message via a broadcast channel from a single sender to an arbitrary subset of multiple receivers that have been designated by the sender, and only the receivers in the subset (i.e., not all receivers) should accept the message if an adversary is absent. This paper proposes a model and security formalization of MDRA-codes, and provides constructions of MDRA-codes.
2023-02-03
Kotkar, Aditya, Khadapkar, Shreyas, Gupta, Aniket, Jangale, Smita.  2022.  Multiple layered Security using combination of Cryptography with Rotational, Flipping Steganography and Message Authentication. 2022 IEEE International Conference on Data Science and Information System (ICDSIS). :1–5.
Data or information are being transferred at an enormous pace and hence protecting and securing this transmission of data are very important and have been very challenging. Cryptography and Steganography are the most broadly used techniques for safeguarding data by encryption of data and hiding the existence of data. A multi-layered secure transmission can be achieved by combining Cryptography with Steganography and by adding message authentication ensuring the confidentiality of the message. Different approach towards Steganography implementation is proposed using rotations and flips to prevent detection of encoded messages. Compression of multimedia files is set up for increasing the speed of encoding and consuming less storage space. The HMAC (Hash-based Authentication Code) algorithm is chosen for message authentication and integrity. The performance of the proposed Steganography methods is concluded using Histogram comparative analysis. Simulations have been performed to back the reliability of the proposed method.
2023-08-24
Briggs, Shannon, Chabot, Sam, Sanders, Abraham, Peveler, Matthew, Strzalkowski, Tomek, Braasch, Jonas.  2022.  Multiuser, multimodal sensemaking cognitive immersive environment with a task-oriented dialog system. 2022 IEEE International Symposium on Technologies for Homeland Security (HST). :1–3.
This paper is a conceptual paper that explores how the sensemaking process by intelligence analysts completed within a cognitive immersive environment might be impacted by the inclusion of a progressive dialog system. The tools enabled in the sensemaking room (a specific instance within the cognitive immersive environment) were informed by tools from the intelligence analysis domain. We explore how a progressive dialog system would impact the use of tools such as the collaborative brainstorming exercise [1]. These structured analytic techniques are well established in intelligence analysis training literature, and act as ways to access the intended users' cognitive schema as they use the cognitive immersive room and move through the sensemaking process. A prior user study determined that the sensemaking room encouraged users to be more concise and representative with information while using the digital brainstorming tool. We anticipate that addition of the progressive dialog function will enable a more cohesive link between information foraging and sensemaking behaviors for analysts.
2023-04-28
Naik, Badavath Shravan, Tripathy, Somanath, Mohanty, Susil Kumar.  2022.  MuSigRDT: MultiSig Contract based Reliable Data Transmission in Social Internet of Vehicle. GLOBECOM 2022 - 2022 IEEE Global Communications Conference. :1763–1768.
Social Internet of Vehicle (SIoV) has emerged as one of the most promising applications for vehicle communication, which provides safe and comfortable driving experience. It reduces traffic jams and accidents, thereby saving public resources. However, the wrongly communicated messages would cause serious issues, including life threats. So it is essential to ensure the reliability of the message before acting on considering that. Existing works use cryptographic primitives like threshold authentication and ring signatures, which incurs huge computation and communication overheads, and the ring signature size grew linearly with the threshold value. Our objective is to keep the signature size constant regardless of the threshold value. This work proposes MuSigRDT, a multisignature contract based data transmission protocol using Schnorr digital signature. MuSigRDT provides incentives, to encourage the vehicles to share correct information in real-time and participate honestly in SIoV. MuSigRDT is shown to be secure under Universal Composability (UC) framework. The MuSigRDT contract is deployed on Ethereum's Rinkeby testnet.