首页期刊导航|计算机科学前沿
期刊信息/Journal information
计算机科学前沿
高等教育出版社,Springer
计算机科学前沿

高等教育出版社,Springer

季刊

2095-2228

100029

北京市朝阳区惠新东街4号富盛大厦15层

计算机科学前沿/Journal Frontiers of Computer ScienceCSCDCSTPCDEISCI
查看更多>>涉及领域包括(但不限于)软件工程,计算机体系结构,程序设计理论,算法,人工智能,计算机图形学与虚拟现实,因特网,安全与密码学,生物信息,中文信息处理,智能人机接口,数据库以及相关新兴学科和交叉学科。
正式出版
收录年代

    Single image super-resolution:a comprehensive review and recent insight

    Hanadi AL-MEKHLAFIShiguang LIU
    139-156页
    查看更多>>摘要:Super-resolution(SR)is a long-standing problem in image processing and computer vision and has attracted great attention from researchers over the decades.The main concept of SR is to reconstruct images from low-resolution(LR)to high-resolution(HR).It is an ongoing process in image technology,through up-sampling,de-blurring,and de-noising.Convolution neural network(CNN)has been widely used to enhance the resolution of images in recent years.Several alternative methods use deep learning to improve the progress of image super-resolution based on CNN.Here,we review the recent findings of single image super-resolution using deep learning with an emphasis on distillation knowledge used to enhance image super-resolution.,it is also to highlight the potential applications of image super-resolution in security monitoring,medical diagnosis,microscopy image processing,satellite remote sensing,communication transmission,the digital multimedia industry and video enhancement.Finally,we present the challenges and assess future trends in super-resolution based on deep learning.

    DNACDS:cloud IoE big data security and accessing scheme based on DNA cryptography

    Ashish SINGHAbhinav KUMARSuyel NAMASUDRA
    157-170页
    查看更多>>摘要:The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data world.This approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the cloud.The IoE-based cloud computing services are located at remote locations without the control of the data owner.The data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security capabilities.The lack of knowledge about security capabilities and control over data raises several security issues.Deoxyribonucleic Acid(DNA)computing is a biological concept that can improve the security of IoE big data.The IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher algorithms.This paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access issues.The experimental results illustrated that DNACDS performs better than other DNA-based security schemes.The theoretical security analysis of the DNACDS shows better resistance capabilities.

    Non-interactive SM2 threshold signature scheme with identifiable abort

    Huiqiang LIANGJianhua CHEN
    171-185页
    查看更多>>摘要:A threshold signature is a special digital signature in which the N-signer share the private key x and can construct a valid signature for any subset of the included t-signer,but less than t-signer cannot obtain any information.Considering the breakthrough achievements of threshold ECDSA signature and threshold Schnorr signature,the existing threshold SM2 signature is still limited to two parties or based on the honest majority setting,there is no more effective solution for the multiparty case.To make the SM2 signature have more flexible application scenarios,promote the application of the SM2 signature scheme in the blockchain system and secure cryptocurrency wallets.This paper designs a non-interactive threshold SM2 signature scheme based on partially homomorphic encryption and zero-knowledge proof.Only the last round requires the message input,so make our scheme non-interactive,and the pre-signing process takes 2 rounds of communication to complete after the key generation.We allow arbitrary threshold t ≤ n and design a key update strategy.It can achieve security with identifiable abort under the malicious majority,which means that if the signature process fails,we can find the failed party.Performance analysis shows that the computation and communication costs of the pre-signing process grows linearly with the parties,and it is only 1/3 of the Canetti's threshold ECDSA(CCS'20).

    Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query

    Xingxin LIYouwen ZHURui XUJian WANG...
    187-198页
    查看更多>>摘要:Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,such as privacy-preserving machine learning and secure biometric identification.Several solutions have been put forward to solve this challenging problem.However,the existing schemes still suffer from various limitations in terms of efficiency and flexibility.In this paper,we propose a new encrypt-then-index strategy for the secure k-NN query,which can simultaneously achieve sub-linear search complexity(efficiency)and support dynamical update over the encrypted database(flexibility).Specifically,we propose a novel algorithm to transform the encrypted database and encrypted query points in the cloud.By indexing the transformed database using spatial data structures such as the R-tree index,our strategy enables sub-linear complexity for secure k-NN queries and allows users to dynamically update the encrypted database.To the best of our knowledge,the proposed strategy is the first to simultaneously provide these two properties.Through theoretical analysis and extensive experiments,we formally prove the security and demonstrate the efficiency of our scheme.

    EMPSI:efficient multiparty private set intersection(with cardinality)

    Yunbo YANGXiaolei DONGZhenfu CAOJiachen SHEN...
    199-213页
    查看更多>>摘要:Multiparty private set intersection(PSI)allows several parties,each holding a set of elements,to jointly compute the intersection without leaking any additional information.With the development of cloud computing,PSI has a wide range of applications in privacy protection.However,it is complex to build an efficient and reliable scheme to protect user privacy.To address this issue,we propose EMPSI,an efficient PSI(with cardinality)protocol in a multiparty setting.EMPSI avoids using heavy cryptographic primitives(mainly rely on symmetric-key encryption)to achieve better performance.In addition,both PSI and PSI with the cardinality of EMPSI are secure against semi-honest adversaries and allow any number of colluding clients(at least one honest client).We also do experiments to compare EMPSI with some state-of-the-art works.The experimental results show that proposed EMPSI(-CA)has better performance and is scalable in the number of clients and the set size.

    cKBET:assessing goodness of batch effect correction for single-cell RNA-seq

    Yameng ZHAOYin GUOLimin LI
    215-228页
    查看更多>>摘要:Single-cell RNA sequencing reveals the gene structure and gene expression status of a single cell,which can reflect the heterogeneity between cells.However,batch effects caused by non-biological factors may hinder data integration and downstream analysis.Although the batch effect can be evaluated by visualizing the data,which actually is subjective and inaccurate.In this work,we propose a quantitative method cKBET,which considers the batch and cell type information simultaneously.The cKBET method accesses batch effects by comparing the global and local fraction of cells of different batches in different cell types.We verify the performance of our cKBET method on simulated and real biological data sets.The experimental results show that our cKBET method is superior to existing methods in most cases.In general,our cKBET method can detect batch effect with either balanced or unbalanced cell types,and thus evaluate batch correction methods.

    A computational model to identify fertility-related proteins using sequence information

    Yan LINJiashu WANGXiaowei LIUXueqin XIE...
    229-237页
    查看更多>>摘要:Fertility is the most crucial step in the development process,which is controlled by many fertility-related proteins,including spermatogenesis-,oogenesis-and embryogenesis-related proteins.The identification of fertility-related proteins can provide important clues for studying the role of these proteins in development.Therefore,in this study,we constructed a two-layer classifier to identify fertility-related proteins.In this classifier,we first used the composition of amino acids(AA)and their physical and chemical properties to code these three fertility-related proteins.Then,the feature set is optimized by analysis of variance(ANOVA)and incremental feature selection(IFS)to obtain the optimal feature subset.Through five-fold cross-validation(CV)and independent data tests,the performance of models constructed by different machine learning(ML)methods is evaluated and compared.Finally,based on support vector machine(SVM),we obtained a two-layer model to classify three fertility-related proteins.On the independent test data set,the accuracy(ACC)and the area under the receiver operating characteristic curve(AUC)of the first layer classifier are 81.95%and 0.89,respectively,and them of the second layer classifier are 84.74%and 0.90,respectively.These results show that the proposed model has stable performance and satisfactory prediction accuracy,and can become a powerful model to identify more fertility related proteins.

    MMCo:using multimodal deep learning to detect malicious traffic with noisy labels

    Qingjun YUANGaopeng GOUYuefei ZHUYongjuan WANG...
    239-241页

    TEPG:a traffic engineering based power-aware greedy routing algorithm in backbone networks with bundled links

    Jinhong ZHANGXingwei WANGRuixia LIBo YI...
    243-245页

    Improving fault localization with pre-training

    Zhuo ZHANGYa LIJianxin XUEXiaoguang MAO...
    247-249页