Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems
Smart grid systems enable bidirectional data communication between users and a smart grid control center (CC), by utilizing various communication infrastructures and embedded devices. To extract valuable information from users’ power ...
MIAT Efficient analysis of adaptive variable-rate tasks▪
Response time analysis of adaptive variable-rate tasks (AVR tasks) is a challenging problem in automotive real-time systems. While in periodic event-triggered systems, the worst-case response time is easy to determine, the analysis of ...
Symbolic identification of shared memory based bank conflicts for GPUs
Graphic processing units (GPUs) are routinely used for general purpose computations to improve performance. To achieve the sought performance gains, care must be invested in fine tuning the way GPU programs interact with the underlying ...
Multiserver configuration for cloud service profit maximization in the presence of soft errors based on grouped grey wolf optimizer
With the growing demand of cloud customers for computing resources, cloud computing has become more and more popular. As a pay-as-you-go model, cloud computing enables customers to use cloud services on demand anytime, anywhere over ...
IRO: Integrity–Reliability enhanced Ring ORAM
Memory security and reliability are two major design concerns in cloud computing systems. State-of-the-art memory security–reliability co-designs (e.g., Synergy) have achieved a good balance in performance, security, and reliability. ...
Heterogeneous online/offline signcryption for secure communication in Internet of Things
Internet of things (IoT) is a promising network that combines various information sensing devices with the Internet to realize the interconnection of pervasive things. Security is a pivotal issue to ensure widespread adoption of the ...
A survey on silicon PUFs
Integrated Circuits (ICs) and electronic devices have become an integral part of daily human life (mobile, home, car, etc.). However, specific security measures should be taken to protect the communicated information to and from these ...
Towards highly-concurrent leaderless state machine replication for distributed systems
State Machine Replication (SMR) is a fault-tolerant service implementation technique used by many modern Internet services. A single leader is used in classic SMR to order all state machine commands. Due to the scalability and ...
A survey of energy-aware scheduling in mixed-criticality systems
Unlike traditional embedded systems only have one criticality level, mixed-criticality (MC) systems integrate different types of applications or functionalities into a common and shared platform. There are many studies focusing on ...
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control
Programmable controllers, critical components in Industrial Control Systems (ICS), are the bridge between cyberspace and physical world. With the development of the Industrial Internet of Things (IIoT), they are no longer physically ...
Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks
Internet of Things (IoT) has become more important for setting up a smart environment, e.g., smart home. It is a network of connected devices, which can provide many benefits such as automating and controlling the tasks on a daily ...
A survey and taxonomy of consensus protocols for blockchains
Blockchain is an emerging decentralized and distributed technology. Along with the beneficial features of decentralization, transparency, and security the consensus algorithms of blockchains form key building blocks for this ...
Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Speaker recognition has become very popular in many application scenarios, such as smart homes and smart assistants, due to ease of use for remote control and economic-friendly features. The rapid development of SRSs is inseparable ...
PQ-PIM: A pruning–quantization joint optimization framework for ReRAM-based processing-in-memory DNN accelerator
Pruning and quantization are two efficient techniques to achieve performance improvement and energy saving for ReRAM-based DNN accelerators. However, most existing ReRAM-based DNN accelerators using pruning and quantization are based ...