Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

2022

Institution
Keyword
Publication
Publication Type
File Type

Articles 151 - 180 of 255

Full-Text Articles in Physical Sciences and Mathematics

Jet Of Blood Vr: First Playable Demo, Elizabeth Goins, Andy Head, Mason Hayes Apr 2022

Jet Of Blood Vr: First Playable Demo, Elizabeth Goins, Andy Head, Mason Hayes

Frameless

A VR staging of Anonin Artaud’s 1925 surrealist play, Jet of Blood. The project experiments with virtual reality as a means to reimagine performance and frame the player, the audience, as actor. Ideas from Artaud’s philosophy such as the Theatre of Cruelty are incorporated along with spatial storytelling and game design. The project also seeks to expand accessibility to deaf and hard of hearing audiences through use of particle and text effects to visually express audio and sound.


The Studio X Karp Library Fellows: Peer-To-Peer Xr Learning & Engagement, Ayiana Crabtree, Muhammed El-Sayed, Nefle N. Oruç Apr 2022

The Studio X Karp Library Fellows: Peer-To-Peer Xr Learning & Engagement, Ayiana Crabtree, Muhammed El-Sayed, Nefle N. Oruç

Frameless

No abstract provided.


Creating A Virtual Reality Experience In Service To A Non-Profit Agency, Frank Deese, Susan Lakin, Isabelle Anderson Apr 2022

Creating A Virtual Reality Experience In Service To A Non-Profit Agency, Frank Deese, Susan Lakin, Isabelle Anderson

Frameless

In the summer of 2018, RIT Professors Susan Lakin and Frank Deese discussed with the principal officers of the Society for the Protection and Care of Children (SPCC) in Rochester how the new technology of Virtual Reality might be used to not only impart information to viewers, but generate empathy for those receiving services from the organization as well as those performing those services. Their ultimate goal was to create an experience that could be viewed with VR headsets at fundraising events and on a website using low-cost Google Cardboard.


Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero Apr 2022

Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero

Symposium of Student Scholars

Autonomous Vehicles (AVs) refers to smart, connected and multimedia cars with technological megatrends of the fourth industrial revolution (Industry 4.0) and have gained huge strive in today's world. AVs adopt automated driving systems (ADS) technique that permits the vehicle to manage and control driving points without human drivers by utilizing advanced equipment including a combination of sensors, controllers, onboard computers, actuators, algorithms, and advanced software embedded in the different parts of the vehicle. These advanced sensors provide unique inputs to the ADS to generate a path from point A to point B. Ensuring the safety of sensors by limiting maintenance …


Students Certification Management (Scm): Hyperledger Fabric-Based Digital Repository, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero Apr 2022

Students Certification Management (Scm): Hyperledger Fabric-Based Digital Repository, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero

Symposium of Student Scholars

The higher education sector has been heavily impacted financially by the economic downturn caused by the pandemic that has resulted a decline in student enrollments. Finding cost-effective novel technology for storing and sharing student's credentials among academic institutions and potential employers is a demand. Within the current conventional approach, ensuring authentication of a candidate’s credentials is costly and time-consuming which gives burdens to thousands of prospective students and potential employees. As a result, candidates fail to secure opportunities for either delay or non-submission of credentials all over the world. Blockchain technology has the potential for students' control over their credentials; …


A Review Of Dark Web: Crawling And Discovery Of Information, Timothy Williams, Edwin Matthew, Juanjose Rodriguez-Cardenas, Jack Wright, Hossain Shahriar Apr 2022

A Review Of Dark Web: Crawling And Discovery Of Information, Timothy Williams, Edwin Matthew, Juanjose Rodriguez-Cardenas, Jack Wright, Hossain Shahriar

Symposium of Student Scholars

The dark web is often discussed in taboo by many who are unfamiliar with the subject. However, this essay takes a dive into the skeleton of what constructs the dark web by compiling the research of published essays. TOR and other discussed browsers are specialized web browsers that provide anonymity by going through multiple servers and encrypted networks between the host and client, hiding the IP address of both ends. This provides difficulty in terms of controlling or monitoring the dark web, leading to its popularity in criminal underworlds.

In this work, we provide an overview of data mining and …


Rethinking The Design Of Online Professor Reputation Systems, Haley Tatum Apr 2022

Rethinking The Design Of Online Professor Reputation Systems, Haley Tatum

LSU Master's Theses

Online Professor Reputation (OPR) systems, such as RateMyProfessors.com (RMP), are frequently used by college students to post and access peer evaluations of their pro- fessors. However, recent evidence has shown that these platforms suffer from major bias problems. Failing to address bias in online professor ratings not only leads to negative expectations and experiences in class, but also poor performance on exams. To address these concerns, in this thesis, we study bias in OPR systems from a software design point of view. At the first phase of our analysis, we conduct a systematic literature review of 23 interdisciplinary studies on …


Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte Apr 2022

Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte

Electronic Thesis and Dissertation Repository

The work presented in this dissertation represents work which addresses some of the main challenges of fault localization methods in electrical distribution grids. The methods developed largely assume access to sophisticated data sources that may not be available and that any data sets recorded by devices are synchronized. These issues have created a barrier to the adoption of many solutions by industry. The goal of the research presented in this dissertation is to address these challenges through the development of three elements. These elements are a synchronization protocol, a fault localization technique, and a sensor placement algorithm.

The synchronization protocol …


Leaderboard Design Principles Influencing User Engagement In An Online Discussion, Brian S. Bovee Apr 2022

Leaderboard Design Principles Influencing User Engagement In An Online Discussion, Brian S. Bovee

Masters Theses & Doctoral Dissertations

Along with the popularity of gamification, there has been increased interest in using leaderboards to promote engagement with online learning systems. The existing literature suggests that when leaderboards are designed well they have the potential to improve learning, but qualitative investigations are required in order to reveal design principles that will improve engagement. In order to address this gap, this qualitative study aims to explore students' overall perceptions of popular leaderboard designs in a gamified, online discussion. Using two leaderboards reflecting performance in an online discussion, this study evaluated multiple leaderboard designs from student interviews and other data sources regarding …


Interactive Sc Historical Map Application By Capistonsker, Joseph Cammarata, James Davis, Matt Duggan, Lauren Hodges, Ian Urton Apr 2022

Interactive Sc Historical Map Application By Capistonsker, Joseph Cammarata, James Davis, Matt Duggan, Lauren Hodges, Ian Urton

Senior Theses

The Interactive SC Historical Map Application by CapiStonsker, hereby known as CapiStonsker, is an android application that creates a comprehensive user experience for individuals and groups to engage with their local Columbia history. Users of this application can discover local historical landmarks by scrolling through the interactive map on the home screen, searching for markers by name using the search bar, filtering by county, or scrolling through a list of markers sorted by proximity. If a marker catches a user's attention, he or she can tap it to learn more information, get directions, or save it for later by adding …


Comai: Enabling Lightweight, Collaborative Intelligence By Retrofitting Vision Dnns, Kasthuri Jayarajah, Dhanuja Wanniarachchige, Tarek Abdelzaher, Archan Misra Apr 2022

Comai: Enabling Lightweight, Collaborative Intelligence By Retrofitting Vision Dnns, Kasthuri Jayarajah, Dhanuja Wanniarachchige, Tarek Abdelzaher, Archan Misra

Research Collection School Of Computing and Information Systems

While Deep Neural Network (DNN) models have transformed machine vision capabilities, their extremely high computational complexity and model sizes present a formidable deployment roadblock for AIoT applications. We show that the complexity-vs-accuracy-vs-communication tradeoffs for such DNN models can be significantly addressed via a novel, lightweight form of “collaborative machine intelligence” that requires only runtime changes to the inference process. In our proposed approach, called ComAI, the DNN pipelines of different vision sensors share intermediate processing state with one another, effectively providing hints about objects located within their mutually-overlapping Field-of-Views (FoVs). CoMAI uses two novel techniques: (a) a secondary shallow ML …


Data Source Selection In Federated Learning: A Submodular Optimization Approach, Ruisheng Zhang, Yansheng Wang, Zimu Zhou, Ziyao Ren, Yongxin Tong, Ke Xu Apr 2022

Data Source Selection In Federated Learning: A Submodular Optimization Approach, Ruisheng Zhang, Yansheng Wang, Zimu Zhou, Ziyao Ren, Yongxin Tong, Ke Xu

Research Collection School Of Computing and Information Systems

Federated learning is a new learning paradigm that jointly trains a model from multiple data sources without sharing raw data. For the practical deployment of federated learning, data source selection is compulsory due to the limited communication cost and budget in real-world applications. The necessity of data source selection is further amplified in presence of data heterogeneity among clients. Prior solutions are either low in efficiency with exponential time cost or lack theoretical guarantees. Inspired by the diminishing marginal accuracy phenomenon in federated learning, we study the problem from the perspective of submodular optimization. In this paper, we aim at …


Chatbot4qr: Interactive Query Refinement For Technical Question Retrieval, Neng Zhang, Qiao Huang, Xin Xia, Ying Zou, David Lo, Zhenchang Xing Apr 2022

Chatbot4qr: Interactive Query Refinement For Technical Question Retrieval, Neng Zhang, Qiao Huang, Xin Xia, Ying Zou, David Lo, Zhenchang Xing

Research Collection School Of Computing and Information Systems

Technical Q&A sites (e.g., Stack Overflow(SO)) are important resources for developers to search for knowledge about technical problems. Search engines provided in Q&A sites and information retrieval approaches have limited capabilities to retrieve relevant questions when queries are imprecisely specified, such as missing important technical details (e.g., the user's preferred programming languages). Although many automatic query expansion approaches have been proposed to improve the quality of queries by expanding queries with relevant terms, the information missed is not identified. Moreover, without user involvement, the existing query expansion approaches may introduce unexpected terms and lead to undesired results. In this paper, …


Performance Analysis And Improvement For Scalable And Distributed Applications Based On Asynchronous Many-Task Systems, Nanmiao Wu Mar 2022

Performance Analysis And Improvement For Scalable And Distributed Applications Based On Asynchronous Many-Task Systems, Nanmiao Wu

LSU Doctoral Dissertations

As the complexity of recent and future large-scale data and exascale systems architectures grows, so do productivity, portability, software scalability, and efficient utilization of system resources challenges presented to both industry and the research community. Software solutions and applications are expected to scale in performance on such complex systems. Asynchronous many-task (AMT) systems, taking advantage of multi-core architectures with light-weight threads, asynchronous executions, and smart scheduling, are showing promise in addressing these challenges.

In this research, we implement several scalable and distributed applications based on HPX, an exemplar AMT runtime system. First, a distributed HPX implementation for a parameterized benchmark …


The Impact Of Dynamic Difficulty Adjustment On Player Experience In Video Games, Chineng Vang Mar 2022

The Impact Of Dynamic Difficulty Adjustment On Player Experience In Video Games, Chineng Vang

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Dynamic Difficulty Adjustment (DDA) is a process by which a video game adjusts its level of challenge to match a player’s skill level. Its popularity in the video game industry continues to grow as it has the ability to keep players continuously engaged in a game, a concept referred to as Flow. However, the influence of DDA on games has received mixed responses, specifically that it can enhance player experience as well as hinder it. This paper explores DDA through the Monte Carlo Tree Search algorithm and Reinforcement Learning, gathering feedback from players seeking to understand what about DDA is …


Design And Development Of Software With A Graphical User Interface To Display And Convert Multiple Microscopic Histology Images, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy Mar 2022

Design And Development Of Software With A Graphical User Interface To Display And Convert Multiple Microscopic Histology Images, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy

UNO Student Research and Creative Activity Fair

Histological images are widely used to assess the microscopic anatomy of biological tissues. Recent advancements in image analysis allow the identification of structural features on histological sections that can help advance medical device development, brain and cancer research, drug discovery, vascular mechanobiology, and many other fields. Histological slide scanners create images in SVS and TIFF formats that were designed to archive image blocks and high-resolution textual information. Because these formats were primarily intended for storage, they are often not compatible with conventional image analysis software and require conversion before they can be used in research. We have developed a user-friendly …


Ad-Corre: Adaptive Correlation-Based Loss For Facial Expression Recognition In The Wild, Ali Pourramezan Fard, Mohammad H. Mahoor Mar 2022

Ad-Corre: Adaptive Correlation-Based Loss For Facial Expression Recognition In The Wild, Ali Pourramezan Fard, Mohammad H. Mahoor

Electrical and Computer Engineering: Faculty Scholarship

Automated Facial Expression Recognition (FER) in the wild using deep neural networks is still challenging due to intra-class variations and inter-class similarities in facial images. Deep Metric Learning (DML) is among the widely used methods to deal with these issues by improving the discriminative power of the learned embedded features. This paper proposes an Adaptive Correlation (Ad-Corre) Loss to guide the network towards generating embedded feature vectors with high correlation for within-class samples and less correlation for between-class samples. Ad-Corre consists of 3 components called Feature Discriminator, Mean Discriminator, and Embedding Discriminator. We design the Feature Discriminator component to guide …


Digital Discrimination In The Sharing Economy: Evidence, Policy, And Feature Analysis, Miroslav Tushev Mar 2022

Digital Discrimination In The Sharing Economy: Evidence, Policy, And Feature Analysis, Miroslav Tushev

LSU Doctoral Dissertations

Applications (apps) of the Digital Sharing Economy (DSE), such as Uber, Airbnb, and TaskRabbit, have become a main facilitator of economic growth and shared prosperity in modern-day societies. However, recent research has revealed that the participation of minority groups in DSE activities is often hindered by different forms of bias and discrimination. Evidence of such behavior has been documented across almost all domains of DSE, including ridesharing, lodging, and freelancing. However, little is known about the under- lying design decisions of DSE systems which allow certain demographics of the market to gain unfair advantage over others. To bridge this knowledge …


Improving Adversarial Attacks Against Malconv, Justin Burr Mar 2022

Improving Adversarial Attacks Against Malconv, Justin Burr

Masters Theses & Doctoral Dissertations

This dissertation proposes several improvements to existing adversarial attacks against MalConv, a raw-byte malware classifier for Windows PE files. The included contributions greatly improve the success rates and performance of gradient-based file overlay attacks. All improvements are included in a new open-source attack utility called BitCamo.

Several new payload initialization strategies for use with gradient-based attacks are proposed and evaluated as potential replacements for the randomized initialization method used by current attacks. An algorithm for determining the optimal payload size is also proposed. The resulting improvements achieve a 100% evasion rate against eligible target executables using an average payload size …


Learning Program Semantics With Code Representations: An Empirical Study, Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu Mar 2022

Learning Program Semantics With Code Representations: An Empirical Study, Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu

Research Collection School Of Computing and Information Systems

Program semantics learning is the core and fundamental for various code intelligent tasks e.g., vulnerability detection, clone detection. A considerable amount of existing works propose diverse approaches to learn the program semantics for different tasks and these works have achieved state-of-the-art performance. However, currently, a comprehensive and systematic study on evaluating different program representation techniques across diverse tasks is still missed. From this starting point, in this paper, we conduct an empirical study to evaluate different program representation techniques. Specifically, we categorize current mainstream code representation techniques into four categories i.e., Feature-based, Sequence-based, Tree-based, and Graph-based program representation technique and …


Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan Mar 2022

Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan

Research Collection School Of Computing and Information Systems

Digital payment has become one of the most popular payment methods all around the world, especially in countries that witnessed the rapid development of internet. As a traditional financial institution, commercial banks have been impacted by newly developed payment technology since third payment platforms have attracted customers to use the digital payment for daily consumption, transferring, and even investment. This paper focuses on analyzing whether and how the commercial banks in China have been affected by digital payment by using empirical methods. Systematic Generalized Method of Moments (SYS-GMM) is used to test the relationship between the productivity of commercial banks …


Bug Triage Automation Approaches: A Comparative Study, Dr Khaled Nagaty, Madonna Mayez, Khaled Ahmed Nagay Dr. Mar 2022

Bug Triage Automation Approaches: A Comparative Study, Dr Khaled Nagaty, Madonna Mayez, Khaled Ahmed Nagay Dr.

Computer Science

Bug triage is an essential task in the software maintenance phase. It is the process of assigning a developer (fixer) to bug report. Triaging process is performed by the triager, who has to analyze developers’ profiles and bug reports for the purpose of making a suitable assignment. Manual assignment consumes time, financial resources and human resources; to get a high-quality software with minimum cost, automating this process is necessary. Previous researchers tackled this problem as a classification problem from different perspectives, either information retrieval approach or machine learning algorithms, some researchers handled it as an optimization problem using optimization and …


Formal Spark Verification Of Various Resampling Methods In Particle Filters, Osiris J. Terry Mar 2022

Formal Spark Verification Of Various Resampling Methods In Particle Filters, Osiris J. Terry

Theses and Dissertations

The software verification in this thesis concentrates on verifying a particle filter for use in tracking and estimation, a key application area for the Air Force. The development and verification process described in this thesis is a demonstration of the power, limitation, and compromises involved in applying automated software verification tools to critical embedded software applications.


Classifying Dead Code In Software Development, Arman Alavizadeh Mar 2022

Classifying Dead Code In Software Development, Arman Alavizadeh

University Honors Theses

Dead code pervades as an issue in the world of software development as a source of many famous software disasters such as the ARIANE 5 rocket failure and chemical bank withdrawal error. Defining dead code on narrow levels of granularity has not been fully explored, yet is crucial to better our understanding of dead code. Here we will be starting a discussion on how to approach classifying dead code via comparing dead code research specific to an industry segment. Research will be compared primarily by methodology and limitations. Dead code subtype classifications are gleaned from research comparisons and can serve …


Strangan: Adversarially-Learnt Spatial Transformer For Scalable Human Activity Recognition, Abu Zaher Md Faridee, Avijoy Chakma, Archan Misra, Nirmalya Roy Mar 2022

Strangan: Adversarially-Learnt Spatial Transformer For Scalable Human Activity Recognition, Abu Zaher Md Faridee, Avijoy Chakma, Archan Misra, Nirmalya Roy

Research Collection School Of Computing and Information Systems

We tackle the problem of domain adaptation for inertial sensing-based human activity recognition (HAR) applications -i.e., in developing mechanisms that allow a classifier trained on sensor samples collected under a certain narrow context to continue to achieve high activity recognition accuracy even when applied to other contexts. This is a problem of high practical importance as the current requirement of labeled training data for adapting such classifiers to every new individual, device, or on-body location is a major roadblock to community-scale adoption of HAR-based applications. We particularly investigate the possibility of ensuring robust classifier operation, without requiring any new labeled …


Jscsp: A Novel Policy-Based Xss Defense Mechanism For Browsers, Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang Mar 2022

Jscsp: A Novel Policy-Based Xss Defense Mechanism For Browsers, Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang

Research Collection School Of Computing and Information Systems

To mitigate cross-site scripting attacks (XSS), the W3C group recommends web service providers to employ a computer security standard called Content Security Policy (CSP). However, less than 3.7 percent of real-world websites are equipped with CSP according to Google’s survey. The low scalability of CSP is incurred by the difficulty of deployment and non-compatibility for state-of-art browsers. To explore the scalability of CSP, in this article, we propose JavaScript based CSP (JSCSP), which is able to support most of real-world browsers but also to generate security policies automatically. Specifically, JSCSP offers a novel self-defined security policy which enforces essential confinements …


Androevolve: Automated Android Api Update With Data Flow Analysis And Variable Denormalization, Stefanus A. Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller Mar 2022

Androevolve: Automated Android Api Update With Data Flow Analysis And Variable Denormalization, Stefanus A. Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller

Research Collection School Of Computing and Information Systems

The Android operating system is frequently updated, with each version bringing a new set of APIs. New versions may involve API deprecation; Android apps using deprecated APIs need to be updated to ensure the apps’ compatibility with old and new Android versions. Updating deprecated APIs is a time-consuming endeavor. Hence, automating the updates of Android APIs can be beneficial for developers. CocciEvolve is the state-of-the-art approach for this automation. However, it has several limitations, including its inability to resolve out-of-method variables and the low code readability of its updates due to the addition of temporary variables. In an attempt to …


Revisiting Neuron Coverage Metrics And Quality Of Deep Neural Networks, Zhou Yang, Jieke Shi, Muhammad Hilmi Asyrofi, David Lo Mar 2022

Revisiting Neuron Coverage Metrics And Quality Of Deep Neural Networks, Zhou Yang, Jieke Shi, Muhammad Hilmi Asyrofi, David Lo

Research Collection School Of Computing and Information Systems

Deep neural networks (DNN) have been widely applied in modern life, including critical domains like autonomous driving, making it essential to ensure the reliability and robustness of DNN-powered systems. As an analogy to code coverage metrics for testing conventional software, researchers have proposed neuron coverage metrics and coverage-driven methods to generate DNN test cases. However, Yan et al. doubt the usefulness of existing coverage criteria in DNN testing. They show that a coverage-driven method is less effective than a gradient-based method in terms of both uncovering defects and improving model robustness. In this paper, we conduct a replication study of …


Aspect-Based Api Review Classification: How Far Can Pre-Trained Transformer Model Go?, Chengran Yang, Bowen Xu, Junaed Younus Khan, Gias Uddin, Donggyun Han, Zhou Yang, David Lo Mar 2022

Aspect-Based Api Review Classification: How Far Can Pre-Trained Transformer Model Go?, Chengran Yang, Bowen Xu, Junaed Younus Khan, Gias Uddin, Donggyun Han, Zhou Yang, David Lo

Research Collection School Of Computing and Information Systems

APIs (Application Programming Interfaces) are reusable software libraries and are building blocks for modern rapid software development. Previous research shows that programmers frequently share and search for reviews of APIs on the mainstream software question and answer (Q&A) platforms like Stack Overflow, which motivates researchers to design tasks and approaches related to process API reviews automatically. Among these tasks, classifying API reviews into different aspects (e.g., performance or security), which is called the aspect-based API review classification, is of great importance. The current state-of-the-art (SOTA) solution to this task is based on the traditional machine learning algorithm. Inspired by the …


Match In My Way: Fine-Grained Bilateral Access Control For Secure Cloud-Fog Computing, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng Mar 2022

Match In My Way: Fine-Grained Bilateral Access Control For Secure Cloud-Fog Computing, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng

Research Collection School Of Computing and Information Systems

Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to provide a variety of on demand data services via the edge network. Many cryptographic tools have been introduced to preserve data confidentiality against the untrustworthy network and cloud servers. However, how to efficiently identify and retrieve useful data from a large number of ciphertexts without a costly decryption mechanism remains a challenging problem. In this paper, we introduce a cloud fog-device data sharing system (CFDS) with data confidentiality and data source identification simultaneously based on a new cryptographic primitive named matchmaking attribute-based encryption (MABE) by extending …