FD2Foremer: Thinking Face Forgery Detection in Midfrequency Geometry DetailsRead the full article
Security and Communication Networks provides a prestigious forum for the R&D community in academia and industry working at the interdisciplinary nexus of next generation communications technologies for security implementations in all network layers.
Chief Editor Dr Di Pietro is a full professor of cybersecurity at the HBKU College of Science and Engineering, Qatar. His research interests include distributed systems security, cloud security, and wireless security.
Latest ArticlesMore articles
Research on Optimal Route Planning for Self-Driving Tour Based on Road Network Structure
Today’s social and economic development continues to improve people’s quality of life, and private cars are widely popularized, and self-driving tours have developed. The rapid development of self-driving travel has played an important role in the development of the national economy, and self-driving travel has become popular. Because the development of self-driving tours has caused some problems, the road network structure has become more and more complex, and the roads have become very congested. Especially during the holidays, there are more private cars in tourist attractions and the roads are more congested. How to use the information of roads and attractions and then choose the optimal travel route becomes particularly important. In response to this problem, we first analyze the topology of the road network, then analyze the accessibility of scenic spots and related factors that affect self-driving travel, and use the A∗ algorithm, Dijkstra algorithm, and other calculation methods to calculate the optimal path. The experiment found that there are many influencing factors of self-driving travel, and the road network structure has the greatest influence on it. The A∗ algorithm has obvious advantages over the Dijkstra algorithm.
Based on Fuzzy Comprehensive Evaluation, the Online and Offline Hybrid Teaching Mode of Physical Education Courses is Constructed
With the continuous development of the times, the educational concept in the information age continues to advance, in order to meet the needs of the society, each school in China has reformed and piloted according to its own situation to improve the quality of teaching. The research of conventional mixed physical education teaching, from the perspective of research methods, can be divided into two orientations: qualitative and quantitative. On the other hand, from the perspective of sample size, traditional research is a small sample study, and these objective behavioral data have opened up a new perspective for the research of blended physical education teaching from the research methods and research content. In this context, this paper combines the fuzzy comprehensive evaluation method to propose fuzzy comprehensive evaluation methods for mixed physical education teaching, such as preclass preparation, in-class links, teaching content, and teaching methods and designs an online and offline hybrid teaching mode for physical education courses based on a fuzzy comprehensive evaluation to construct an evaluation system, determine its fuzzy operators, determine indicators, and evaluate them comprehensively, reasonably and accurately through experiments. The fuzzy comprehensive evaluation method is based on the fuzzy mathematics comprehensive evaluation method, which can evaluate the evaluation object from all aspects, can objectively reflect the essential characteristics of things, and the evaluation process of the mixed mode construction of physical education courses is more scientific and reasonable. The application of the fuzzy comprehensive evaluation method has effectively promoted the reform and improvement of education and provided a foundation for the continuous improvement and innovation of students’ learning and teachers’ teaching effects.
Broken Heart: Privacy Leakage Analysis on ECG-Based Authentication Schemes
Authentications using biometrics, such as fingerprint recognition and electrocardiogram (ECG), have been actively used in various applications. Unlike traditional authentication methods, such as passwords or PINs, biometric-based authentication has an advantage in terms of security owing to its capability of liveness detection. Among the various types of biometrics, ECG-based authentication is widely utilized in many fields. Because of the inherent characteristics of ECG, however, the incautious design of ECG-based authentication may result in serious leakage of personal private information. In this paper, we extensively investigate ECG-based authentication schemes previously proposed in the literature and analyze possible privacy leakages by employing machine learning and deep learning techniques. We found that most schemes suffer from vulnerabilities that lead to the leakage of personal information, such as gender, age, and even diseases. We also identified some privacy-insensitive ECG fiducial points by utilizing feature selection algorithms. Based on these features, we present a privacy-preserving ECG-based authentication scheme.
Blockchain-Aided Searchable Encryption-Based Two-Way Attribute Access Control Research
In the Internet of Things (IoT), data sharing security is important to social security. It is a huge challenge to enable more accurate and secure access to data by authorized users. Blockchain access control schemes are mostly one-way access control, which cannot meet the need for ciphertext search, two-way confirmation of users and data, and secure data transmission. Thus, this paper proposes a blockchain-aided searchable encryption-based two-way attribute access control scheme (STW-ABE). The scheme combines ciphertext attribute access control, key attribute access control, and ciphertext search. In particular, two-way access control meets the requirement of mutual confirmation between users and data. The ciphertext search avoids information leakage during transmission, thus improving overall efficiency and security during data sharing. Moreover, user keys are generated by the coalition blockchain. Besides, the ciphertext search and pre-decryption are outsourced to cloud servers, reducing the computing pressure on users and adapting to the needs of lightweight users in the IoT. Security analysis proves that our scheme is secure under a chosen-plaintext attack and a chosen keyword attack. Simulations show that the cost of encryption and decryption, keyword token generation, and ciphertext search of our scheme are preferable.
Security and Privacy Threats to Federated Learning: Issues, Methods, and Challenges
Federated learning (FL) has nourished a promising method for data silos, which enables multiple participants to construct a joint model collaboratively without centralizing data. The security and privacy considerations of FL are focused on ensuring the robustness of the global model and the privacy of participants’ information. However, the FL paradigm is under various security threats from the adversary aggregator and participants. Therefore, it is necessary to comprehensively identify and classify potential threats to provide a theoretical basis for FL with security guarantees. In this paper, a unique classification of attacks, which reviews state-of-the-art research on security and privacy issues for FL, is constructed from the perspective of malicious threats based on different computing parties. Specifically, we categorize attacks with respect to performed by aggregator and participant, highlighting the Deep Gradients Leakage attacks and Generative Adversarial Networks attacks. Following an overview of attack methods, we discuss the primary mitigation techniques against security risks and privacy breaches, especially the application of blockchain and Trusted Execution Environments. Finally, several promising directions for future research are discussed.
Design and Management of Comprehensive Art Student Information Database from the Perspective of Internet plus Education
With the rapid development of information technology and network technology, all kinds of data increase exponentially, and the traditional relational databases cannot handle these data well, which is also reflected in the sharp increase in the number of college students. The amount of students' information is increasing exponentially and the simple management method in the past can no longer meet the needs of the new situation. This paper adopts B/S mode and three-tier architecture and relies on network technology and ASP.NET technology to design and implement the student information management system. The system is divided into eight functional modules: comprehensive information inquiry for students, scholarship evaluation, evaluation and award, economic recognition, student loan management, student violation, communication and feedback, and system management. Different operation interfaces are designed according to four users with different permissions: students, class tutors, college administrators, and student affairs offices. This paper describes the system analysis, design, and implementation in detail. The practice results show that the initial use of the student information database management reflects well and achieves the expected goal. The system is easy to maintain and extensible and has good application value. The operation of the system has greatly improved the management efficiency of student affairs and enabled the student affairs administrators to complete various student affairs more efficiently. Campus information construction is becoming an important part of the overall construction of colleges and universities, and it is also a basic and continuous work. Accelerating the establishment of a set of comprehensive, perfect, and efficient student comprehensive management information systems is an urgent need to promote the modernization of college student management. The modernization, informatization, and standardization of college student management are a complex systematic project. Only by relying on modern information technology can we cope with the base pressure brought by the continuous enrollment expansion of college students, promote the flat and intensive utilization of college management information, and improve the efficiency and quality of service.