Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2023

Open Access 01-12-2023 | Editorial

Machine learning for trust, security, and privacy in computing and communications

Authors: Chin-Ling Chen, Haishuai Wang, Abel C. H. Chen, Chunjia Han, Yu-Chih Wei, Xiaoyan Li

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2023

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …
Notes

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
In recent years, various machine learning methods such as supervised methods (e.g. k nearest neighbors (kNN), Bayes' classifier, decision tree (DT), support vector machine (SVM), random forest (RF), neural network (NN), convolutional neural network (CNN), recurrent neural network (RNN), long short-term memory (LSTM) network, gated recurrent unit (GRU) network) [13], unsupervised methods (e.g. association rules, k-means, density-based spatial clustering of applications with noise (DBSCAN), hierarchical clustering, deep belief networks (DBN), deep Boltzmann machine (DBM), auto-encoder (AE), de-noising auto-encoder, etc.) [4, 5], reinforcement learning methods (e.g. generative adversarial network (GAN), deep Q-network (DQN), trust region policy optimization, etc.) [6], and federated learning methods have been applied to trust, security, and privacy in computing and communications. These methods have been utilized to analyze data streams in networks and detect patterns of malicious activity for intrusion detection systems, as well as to propose time-series methods for preventing cyber-attacks and malfunctions.
Despite the rapid expansion of the field of machine learning methods for trust, security, and privacy in computing and communications, there are still several open research questions that need to be addressed. For instance, improving machine learning methods for detecting malicious activity, attack detection, mobile endpoint analysis, repetitive security task automation, and zero-day vulnerability prevention are critical issues in the field. Therefore, the special issue entitled “Machine Learning for Trust, Security and Privacy in Computing and Communications” in the EURASIP Journal on Wireless Communications and Networking aims to solicit papers on these and related topics across various disciplines of trust, security, and privacy in computing and communications.
Topics covered in this issue are categorized into the following five themes: (1) network and security, (2) machine learning and artificial intelligence, (3) communication and routing strategies, (4) optimization and algorithms, and (5) data analysis. This special issue has received a substantial number of submissions, resulting in a collection of 21 papers from several countries/regions including China, USA, UK, Finland, Saudi Arabia, and Japan. The careful selection process ensures that only high-quality papers with significant results are chosen for publication.

1 Network and security

Four papers on network and security are listed as follows: (1) “A blockchain-based secure storage scheme for medical information,” by Sun et al. [7]; (2) “Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder,” by Lv et al. [8]; (3) “A security method of hardware Trojan detection using path tracking algorithm,” by Huang et al. [9]; (4) “Early warning system for drivers’ phone usage with deep learning network,” by Hou et al. [10]. Detailed information of each article could be found in [710].

2 Machine learning and artificial intelligence

Six papers on machine learning and artificial intelligence are listed as follows: (1) “A framework for self-supervised federated domain adaptation,” by Wang et al. [11]; (2) “Mixed-type data generation method based on generative adversarial networks,” by Wei et al. [12]; (3) “The analysis of financial market risk based on machine learning and particle swarm optimization algorithm,” by Liu and Yu [13]; (4) “Application of machine learning in intelligent encryption for digital information of real-time image text under big data,” by Liu et al. [14]; (5) “Effects of psychological fatigue on college athletes’ error-related negativity based on artificial intelligence computing method,” by Li et al. [15]; (6) “ABOS: an attention-based one-stage framework for person search,” by Chen et al. [16]. Detailed information of each article could be found in [1116].

3 Communication and routing strategies

Two papers on communication and routing strategies are listed as follows: (1) “Asynchronous dissipative control for networked time-delay Markov jump systems with the event-triggered scheme and packet dropouts,” by Chen et al. [17]; (2) “LEO laser microwave hybrid inter-satellite routing strategy based on modified Q-routing algorithm,” by Zheng et al. [18]. Detailed information of each article could be found in [17, 18].

4 Optimization and algorithms

Four papers on optimization and algorithms are listed as follows: (1) “Algorithm: an optimized consensus mechanism for private Blockchain enabled technologies,” by Tariq [19]; (2) “DOA estimation algorithm based on spread spectrum sequence in low signal-to-noise ratio,” by Zhou et al. [20]; (3) “A two-stage detection method of copy-move forgery based on parallel feature fusion,” by Ye et al. [21]; (4) “Heuristic approaches for the car sequencing problems with block batches,” by Yu et al. [22]. Detailed information of each article could be found in [1922].

5 Data analysis

Five papers on data analysis are listed as follows: (1) “Coverless image steganography using morphed face recognition based on convolutional neural network,” by Li et al. [23]; (2) “Robust watermarking algorithm for medical images based on log-polar transform,” by Li et al. [24]; (3) “MFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture,” by Li et al. [25]; (4) “SKDStream: a dynamic clustering algorithm on time-decaying data stream,” by Liu et al. [26]; (5) “A novel high-dimensional trajectories construction network based on multi-clustering algorithm,” by Ren et al. [27]. Detailed information of each article could be found in [2327].

Declarations

Competing interests

Guest Editors declare no conflict of interest.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creativecommons.​org/​licenses/​by/​4.​0/​.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Literature
Metadata
Title
Machine learning for trust, security, and privacy in computing and communications
Authors
Chin-Ling Chen
Haishuai Wang
Abel C. H. Chen
Chunjia Han
Yu-Chih Wei
Xiaoyan Li
Publication date
01-12-2023
Publisher
Springer International Publishing
DOI
https://doi.org/10.1186/s13638-023-02249-0

Other articles of this Issue 1/2023

EURASIP Journal on Wireless Communications and Networking 1/2023 Go to the issue

Premium Partner