Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 156, Issue CNov 2024Current Issue
Reflects downloads up to 25 Jan 2025Bibliometrics
Skip Table Of Content Section
Research Paper
research-article
Certificateless integrity auditing scheme for sensitive information protection in cloud storage
Abstract

Data integrity auditing provides a method for checking the integrity of outsourced data in cloud storage. However, outsourced data often contain sensitive information (such as names), posing risks of exposure during data sharing. To address this ...

research-article
Secure pairing-free certificateless aggregate signcryption scheme for IoT
Abstract

The widespread application of wireless sensor technology in the Internet of Things (IoT) industry significantly enhances productivity. However, the large scale deployment of IoT and the inherent vulnerabilities of wireless communication methods ...

research-article
Datacenter optimization methods for Softwarized Network Services
Abstract

This paper tackles the problem of optimum Virtual Machine placement, focusing on an industrial use-case dealing with capacity planning for Virtualized Network Functions. The work is framed within an industrial collaboration with the Vodafone ...

research-article
Energy-aware reliability guarantee scheduling with semi-clairvoyant in mixed-criticality systems
Abstract

The management of energy in mixed-criticality systems (MCS) has been widely accomplished through Dynamic Voltage and Frequency Scaling (DVFS) techniques. Nevertheless, recent studies indicated that the DVFS has a negative impact on the ...

research-article
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet
Abstract

Avionics Full-Duplex Switched Ethernet (AFDX) is a fault-tolerant real-time communication bus for safety–critical applications in aircraft. AFDX configures communication channels, denoted as virtual links (VLs), ensuring bounded message delays ...

research-article
DUDS: Diversity-aware unbiased device selection for federated learning on Non-IID and unbalanced data
Abstract

Federated Learning (FL) is a distributed machine learning approach that preserves privacy by allowing numerous devices to collaboratively train a global model without sharing raw data. However, the frequent exchange of model updates between ...

research-article
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption
Abstract

As a novel distributed learning framework for protecting personal data privacy, federated learning, (FL) has attained widespread attention through sharing gradients among users without collecting their data. However, an untrusted cloud server may ...

research-article
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection
Abstract

Recent advancements in cloud computing have underscored the critical need for robust security mechanisms to counter evolving cyber-threats. Traditional security solutions such as Intrusion Detection Systems (IDSs) often fall short due to their ...

research-article
SAR: Sharpness-Aware minimization for enhancing DNNs’ Robustness against bit-flip errors
Abstract

As Deep Neural Networks (DNNs) are increasingly deployed in safety-critical scenarios, there is a growing need to address bit-flip errors occurring in hardware, such as memory. These errors can lead to changes in DNN weights, potentially ...

Highlights

  • The first work to uncover the DNNs’ intrinsic robustness against bit-flip errors.
  • The first work to adopt Sharpness-Aware Minimization to resist bit-flip errors.
  • A valuable and lightweight framework for security-critical scenarios.

research-article
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA
Abstract

Automotive networks are crucial for ensuring safety as the number of Electronic Control Units (ECUs) grows to support vehicle intelligence. The Controller Area Network (CAN) is commonly used for efficient in-vehicle communication among ECUs. ...

research-article
On the degree of parallelism for parallel real-time tasks
Abstract

The degree of parallelism, which measures how a task can execute concurrently, is an important characterization in scheduling. This paper studies the degree of parallelism in the domain of real-time scheduling of parallel tasks, including the DAG ...

Highlights

  • The first work to study the degree of parallelism (DOP) for a conditional DAG task.
  • The definition and the algorithm are provided for the DOP of a conditional DAG task.
  • Based on DOP, a real-time scheduling approach for conditional ...

research-article
Verifiable privacy-preserving semantic retrieval scheme in the edge computing
Abstract

Edge computing, with its characteristics of low latency and low transmission costs, addresses the storage and computation challenges arising from the surge in network edge traffic. It enables users to leverage nearby edge servers for data ...

Reviews
review-article
A survey on unmanned aerial systems cybersecurity
Abstract

Unmanned aerial systems (UASs) have recently seen widespread use in both military and civilian applications due to their flexibility and versatility. As embedded systems integrating communications, computing and control, UASs are vulnerable due ...

Special issue on Reliable Software Technologies (AEiC2024)
research-article
Toward Linux-based safety-critical systems—Execution time variability analysis of Linux system calls
Abstract

Modern transportation and industrial domain safety-critical applications, such as autonomous vehicles and collaborative robots, exhibit a combination of escalating software complexity and the need to integrate diverse software stacks and machine ...

research-article
HyFAR: A hypervisor-based fault tolerance approach for heterogeneous automotive real-time systems
Abstract

Fault tolerance is a key aspect for fully autonomous vehicles, as there is no human driver available to take control of the vehicle as a backup. Such autonomous vehicles incorporate signal-oriented and service-oriented hardware and software ...

research-article
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems
Abstract

Security threats are becoming an increasingly relevant concern in cyber–physical systems. Cyber attacks on these systems are not only common today but also increasingly sophisticated and constantly evolving. One way to secure the system against ...

Special Issue on Design and Architectures for Signal and Image Processing (DASIP)
research-article
TaPaFuzz: Hardware-accelerated RISC-V bare-metal firmware fuzzing using rapid job launches
Abstract

Fuzz testing serves as a key technique in software security aimed at identifying unexpected program behaviors by repeatedly executing the target program with auto-generated random inputs. Testing is integral to IoT device security but is hampered ...

Special Issue on Dependable Software Engineering: Theories, Tools and Applications
research-article
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering
Abstract

The software industry increasingly turns to Model-Driven Engineering (MDE) to mitigate complexity by automating model creation and transformation. Many organisations are pursuing Integrated Development Platforms (IDPs) to enhance automation in ...

Comments