Optimizing bloom filter: Challenges, solutions, and comparisons

L Luo, D Guo, RTB Ma… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Bloom filter (BF) has been widely used to support membership query, ie, to judge whether a
given element x is a member of a given set S or not. Recent years have seen a flourish …

Approximate computing: Concepts, architectures, challenges, applications, and future directions

AM Dalloo, AJ Humaidi, AK Al Mhdawi… - IEEE …, 2024 - ieeexplore.ieee.org
The unprecedented progress in computational technologies led to a substantial proliferation
of artificial intelligence applications, notably in the era of big data and IoT devices. In the …

HeavyKeeper: An Accurate Algorithm for Finding Top- Elephant Flows

T Yang, H Zhang, J Li, J Gong, S Uhlig… - … /ACM Transactions on …, 2019 - ieeexplore.ieee.org
Finding top-k elephant flows is a critical task in network traffic measurement, with many
applications in congestion control, anomaly detection and traffic engineering. As the line …

RNS-based adaptive compression scheme for the block data in the blockchain for IIoT

Z Guo, Z Gao, Q Liu, C Chakraborty… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is the essential component of Industry 4.0. Blockchain
is a promising technology for secure data sharing and trustable cooperation between IIoT …

Memory-efficient performance monitoring on programmable switches with lean algorithms

Z Liu, S Zhou, O Rottenstreich, V Braverman… - … on Algorithmic Principles …, 2020 - SIAM
Network performance problems are notoriously difficult to diagnose. Prior profiling systems
collect performance statistics by keeping information about each network flow, but …

A framework for anomaly detection in blockchain networks with sketches

T Voronov, D Raz… - IEEE/ACM Transactions on …, 2023 - ieeexplore.ieee.org
A blockchain is a distributed ledger composed of immutable blocks of data that often refer to
money transfers. As blockchain networks gain popularity, there is a rising concern for …

[HTML][HTML] Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains

I Baird, B Ghaleb, I Wadhaj, G Russell, WJ Buchanan - Electronics, 2024 - mdpi.com
In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of
data transmission remains a paramount challenge. Routing Protocol for Low-Power and …

Two-layer partitioned and deletable deep bloom filter for large-scale membership query

M Zeng, B Zou, W Zhang, X Yang, G Kong, X Kui… - Information Systems, 2023 - Elsevier
Abstract The recently proposed Learned Bloom Filter (LBF) provides a new perspective on
large-scale membership queries by using machine learning to replace the traditional bloom …

SoK: Applications of Sketches and Rollups in Blockchain Networks

A Kotzer, D Gandelman… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Blockchain networks suffer from a critical scalability problem that is often expressed in two
dimensions: the size of the network state and the computational overhead in processing …

KA: Keyword-based auditing with frequency hiding and retrieval reliability for smart government

J Xue, S Luo, Q Deng, L Shi, X Zhang… - Journal of Systems …, 2023 - Elsevier
In a keyword-based auditing paradigm, users typically focus on specific parts of a dataset
rather than the integrity of the dataset as a whole. However, this approach is subjective and …