首页 > 最新文献

Journal of Information and Intelligence最新文献

英文 中文
An efficient self attention-based 1D-CNN-LSTM network for IoT attack detection and identification using network traffic 一种高效的基于自关注的1D-CNN-LSTM网络,用于利用网络流量进行物联网攻击检测和识别
Pub Date : 2025-09-01 DOI: 10.1016/j.jiixd.2024.09.001
Tinshu Sasi , Arash Habibi Lashkari , Rongxing Lu , Pulei Xiong , Shahrear Iqbal
In the last ten years, the IoT has played a crucial role in society's digital transformation. However, because of the wide range of devices it encompasses, it is also facing increased security vulnerabilities. This research presents a novel mechanism called the self-attention-based 1D-CNN-LSTM, which uses convolutional neural networks (CNNs) combined with a long short-term memory (LSTM) model enhanced with a self-attention mechanism for detecting IoT attacks. The proposed mechanism achieves high accuracy and efficiently differentiates malicious and benign network traffic. By employing Shapley additive explanations (SHAP), we identified important predictive features from the preprocessed data, which were retrieved using CICFlowMeter. This has strengthened the dependability of the model. In addition, we enhanced the model by training it on a smaller collection of features, resulting in shorter training time while preserving accuracy. We have also generated nine augmented IoT tabular datasets named CIC-BCCC-NRC_TabularIoTAttack-2024 from accessible IoT datasets to evaluate the model's robustness and showcase its efficacy in IoT security.
在过去十年中,物联网在社会数字化转型中发挥了至关重要的作用。然而,由于它包含的设备范围广泛,它也面临着越来越多的安全漏洞。本研究提出了一种新的基于自注意的1D-CNN-LSTM机制,该机制将卷积神经网络(cnn)与长短期记忆(LSTM)模型相结合,增强了自注意机制,用于检测物联网攻击。该机制能够准确有效地区分良性和恶意网络流量。通过使用Shapley加性解释(SHAP),我们从使用CICFlowMeter检索的预处理数据中识别出重要的预测特征。这加强了模型的可靠性。此外,我们通过在更小的特征集合上训练模型来增强模型,从而在保持准确性的同时缩短了训练时间。我们还从可访问的物联网数据集生成了9个名为CIC-BCCC-NRC_TabularIoTAttack-2024的增强物联网表格数据集,以评估模型的鲁棒性并展示其在物联网安全方面的有效性。
{"title":"An efficient self attention-based 1D-CNN-LSTM network for IoT attack detection and identification using network traffic","authors":"Tinshu Sasi ,&nbsp;Arash Habibi Lashkari ,&nbsp;Rongxing Lu ,&nbsp;Pulei Xiong ,&nbsp;Shahrear Iqbal","doi":"10.1016/j.jiixd.2024.09.001","DOIUrl":"10.1016/j.jiixd.2024.09.001","url":null,"abstract":"<div><div>In the last ten years, the IoT has played a crucial role in society's digital transformation. However, because of the wide range of devices it encompasses, it is also facing increased security vulnerabilities. This research presents a novel mechanism called the self-attention-based 1D-CNN-LSTM, which uses convolutional neural networks (CNNs) combined with a long short-term memory (LSTM) model enhanced with a self-attention mechanism for detecting IoT attacks. The proposed mechanism achieves high accuracy and efficiently differentiates malicious and benign network traffic. By employing Shapley additive explanations (SHAP), we identified important predictive features from the preprocessed data, which were retrieved using CICFlowMeter. This has strengthened the dependability of the model. In addition, we enhanced the model by training it on a smaller collection of features, resulting in shorter training time while preserving accuracy. We have also generated nine augmented IoT tabular datasets named CIC-BCCC-NRC_TabularIoTAttack-2024 from accessible IoT datasets to evaluate the model's robustness and showcase its efficacy in IoT security.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 5","pages":"Pages 375-400"},"PeriodicalIF":0.0,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145371322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DelRightGuard: A secure yet lightweight data deletion notification distribution protocol for safeguarding right to deletion DelRightGuard:一个安全但轻量级的数据删除通知分发协议,用于保护删除权
Pub Date : 2025-07-01 DOI: 10.1016/j.jiixd.2024.11.001
Qipeng Song, Ruiyun Wang, Yue Li, Yiheng Yan, Xingyue Zhu, Hui Li
In recent years, the right to deletion of individual has been recognized by many privacy protection laws and regulations. It stipulates that the data controller receiving individual data deletion request shall not only erase the required data, but also take reasonable steps to inform other data controllers to delete the same data. Prior to irrecoverable data erasure, it is of paramount importance to design a distribution and acknowledgement process of deletion notifications across involved data controllers. The design of such a mechanism is faced with the following challenges: 1) completeness: Ensuring that all relevant data controllers, who possess the data slated for erasure, are duly informed; 2) robustness: Immune from malicious attacks when deletion notifications traverse through untrusted networks; 3) lightweight: Reduce the right to deletion compliance cost and accommodate more deletion requests for data controllers. To this end, this article proposes DelRightGuard, which is the first attempt to tackle with the aforementioned challenges. DelRightGuard is built on a cross-plane cooperation architecture between regulatory and service planes. Within regulatory plane, DelRightGuard proposes a cuckoo filters based on data circulation recording algorithm to efficiently ensure the completeness of deletion notifications. Within service plane, DelRightGuard devises a secure yet lightweight deletion notification distribution protocol that runs on a network function hosted by each data controller. This protocol employs HMAC based hop-by-hop forward traversal verification, recursive backward acknowledgement and probabilistic sampling verification, so that it ensure the robustness and lightweight of deletion notification distribution process. We implement a prototype for DelRightGuard. The experimental result confirms that it is practical with acceptable performance.
近年来,个人删除权得到了许多隐私保护法律法规的认可。它规定,收到个人数据删除请求的数据控制者不仅要删除所需的数据,还要采取合理的步骤通知其他数据控制者删除相同的数据。在不可恢复的数据擦除之前,设计一个跨相关数据控制器的删除通知的分发和确认过程是至关重要的。这种机制的设计面临以下挑战:1)完整性:确保所有拥有预定擦除数据的相关数据控制器都得到适当通知;2)健壮性:当删除通知通过不受信任的网络时,免受恶意攻击;3)轻量化:降低删除权合规成本,容纳数据控制器更多的删除请求。为此,本文提出了DelRightGuard,这是解决上述挑战的第一次尝试。DelRightGuard基于监管平面和业务平面的跨平面协作架构。在监管平面内,DelRightGuard提出了一种基于数据循环记录算法的布谷鸟过滤器,有效保证删除通知的完整性。在业务平面内,DelRightGuard设计了一个安全而轻量级的删除通知分发协议,该协议运行在每个数据控制器托管的网络功能上。该协议采用基于HMAC的逐跳前向遍历验证、递归后向确认和概率抽样验证,保证了删除通知分发过程的鲁棒性和轻量化。我们实现了DelRightGuard的原型。实验结果证实了该方法的实用性和可接受的性能。
{"title":"DelRightGuard: A secure yet lightweight data deletion notification distribution protocol for safeguarding right to deletion","authors":"Qipeng Song,&nbsp;Ruiyun Wang,&nbsp;Yue Li,&nbsp;Yiheng Yan,&nbsp;Xingyue Zhu,&nbsp;Hui Li","doi":"10.1016/j.jiixd.2024.11.001","DOIUrl":"10.1016/j.jiixd.2024.11.001","url":null,"abstract":"<div><div>In recent years, the right to deletion of individual has been recognized by many privacy protection laws and regulations. It stipulates that the data controller receiving individual data deletion request shall not only erase the required data, but also take reasonable steps to inform other data controllers to delete the same data. Prior to irrecoverable data erasure, it is of paramount importance to design a distribution and acknowledgement process of deletion notifications across involved data controllers. The design of such a mechanism is faced with the following challenges: 1) completeness: Ensuring that all relevant data controllers, who possess the data slated for erasure, are duly informed; 2) robustness: Immune from malicious attacks when deletion notifications traverse through untrusted networks; 3) lightweight: Reduce the right to deletion compliance cost and accommodate more deletion requests for data controllers. To this end, this article proposes DelRightGuard, which is the first attempt to tackle with the aforementioned challenges. DelRightGuard is built on a cross-plane cooperation architecture between regulatory and service planes. Within regulatory plane, DelRightGuard proposes a cuckoo filters based on data circulation recording algorithm to efficiently ensure the completeness of deletion notifications. Within service plane, DelRightGuard devises a secure yet lightweight deletion notification distribution protocol that runs on a network function hosted by each data controller. This protocol employs HMAC based hop-by-hop forward traversal verification, recursive backward acknowledgement and probabilistic sampling verification, so that it ensure the robustness and lightweight of deletion notification distribution process. We implement a prototype for DelRightGuard. The experimental result confirms that it is practical with acceptable performance.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 4","pages":"Pages 303-325"},"PeriodicalIF":0.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144895163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A social recommendation model based on social semantic mining and denoising 基于社会语义挖掘和去噪的社会推荐模型
Pub Date : 2025-07-01 DOI: 10.1016/j.jiixd.2025.04.003
Lang Qin , Yi Liu , Caihong Mu
In the era of information technology, recommendation systems play a crucial role in information filtering and user preference identification. Notably, the auxiliary information provided by online social platforms offers significant support for enhancing the performance of recommendation systems. Based on the hypothesis that socially connected users share similar preferences, integrating social relationships as supplementary information into recommendation algorithms can significantly enhance recommendation accuracy while effectively mitigating the cold-start problem. However, existing social recommendation systems primarily rely on explicit social relationships as auxiliary information, often overlooking the value of potential social connections. Research indicates that users with potential social links may also possess valuable preference information. We believe that mining potential social relationships can provide valuable auxiliary information, thereby enhancing the performance of recommendation systems. To address this issue, we propose a social recommendation model based on social semantic mining and denoising (SSMD). Specifically, we propose an encoder-decoder architecture to learn explicit social user representations and mine potential social relationships. Considering the potential noise in these implicit connections, we design a denoising module that utilizes user preference information to filter unreliable social links. Furthermore, we implement cross-view information alignment between the potential social graph and interaction graph through an auxiliary loss function. Extensive experiments conducted on multiple public datasets demonstrate that our SSMD method outperforms various baseline approaches with significant improvements.
在信息技术时代,推荐系统在信息过滤和用户偏好识别中起着至关重要的作用。值得注意的是,在线社交平台提供的辅助信息为提升推荐系统的性能提供了重要的支持。基于社交连接用户具有相似偏好的假设,将社交关系作为补充信息整合到推荐算法中,可以显著提高推荐准确率,同时有效缓解冷启动问题。然而,现有的社会推荐系统主要依赖显性社会关系作为辅助信息,往往忽略了潜在社会关系的价值。研究表明,拥有潜在社交联系的用户可能还拥有有价值的偏好信息。我们认为挖掘潜在的社会关系可以提供有价值的辅助信息,从而提高推荐系统的性能。为了解决这个问题,我们提出了一种基于社会语义挖掘和去噪(SSMD)的社会推荐模型。具体来说,我们提出了一个编码器-解码器架构来学习明确的社会用户表示并挖掘潜在的社会关系。考虑到这些隐式连接中潜在的噪声,我们设计了一个去噪模块,利用用户偏好信息来过滤不可靠的社交链接。此外,我们通过辅助损失函数实现潜在社交图和交互图之间的跨视图信息对齐。在多个公共数据集上进行的大量实验表明,我们的SSMD方法具有显著的改进,优于各种基线方法。
{"title":"A social recommendation model based on social semantic mining and denoising","authors":"Lang Qin ,&nbsp;Yi Liu ,&nbsp;Caihong Mu","doi":"10.1016/j.jiixd.2025.04.003","DOIUrl":"10.1016/j.jiixd.2025.04.003","url":null,"abstract":"<div><div>In the era of information technology, recommendation systems play a crucial role in information filtering and user preference identification. Notably, the auxiliary information provided by online social platforms offers significant support for enhancing the performance of recommendation systems. Based on the hypothesis that socially connected users share similar preferences, integrating social relationships as supplementary information into recommendation algorithms can significantly enhance recommendation accuracy while effectively mitigating the cold-start problem. However, existing social recommendation systems primarily rely on explicit social relationships as auxiliary information, often overlooking the value of potential social connections. Research indicates that users with potential social links may also possess valuable preference information. We believe that mining potential social relationships can provide valuable auxiliary information, thereby enhancing the performance of recommendation systems. To address this issue, we propose a social recommendation model based on social semantic mining and denoising (SSMD). Specifically, we propose an encoder-decoder architecture to learn explicit social user representations and mine potential social relationships. Considering the potential noise in these implicit connections, we design a denoising module that utilizes user preference information to filter unreliable social links. Furthermore, we implement cross-view information alignment between the potential social graph and interaction graph through an auxiliary loss function. Extensive experiments conducted on multiple public datasets demonstrate that our SSMD method outperforms various baseline approaches with significant improvements.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 4","pages":"Pages 361-374"},"PeriodicalIF":0.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144895166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-varying formation control with obstacle avoidance for fractional-order multi-agent systems 分数阶多智能体系统的时变避障编队控制
Pub Date : 2025-07-01 DOI: 10.1016/j.jiixd.2025.03.005
Yangyang Cai, Sulan Li, Yongliang Wei, Yunru Zhu
Aiming at the consensus of relative position considering obstacle avoidance for fractional-order multi-agent system, a novel distributed control algorithm is proposed in this paper. Firstly, a synthetic error of each agent under the influence of obstacles is introduced. The consensus protocols are designed based on this error according to sliding mode theory for the order increasing and decreasing, respectively. Then, the Lyapunov function is used to prove the stable convergence of the protocols. Finally, the simulation results show that the protocols can not only prevent the agents from colliding with obstacles, but also enable the agents to quickly recover the expected formation and achieve consensus of the relative position.
针对分数阶多智能体系统考虑避障的相对位置一致性问题,提出了一种新的分布式控制算法。首先,介绍了障碍物影响下各agent的综合误差。基于此误差,根据滑模理论分别设计了阶数递增和阶数递减的共识协议。然后利用Lyapunov函数证明了协议的稳定收敛性。最后,仿真结果表明,该协议不仅可以防止智能体与障碍物碰撞,而且可以使智能体快速恢复预期队形并达成相对位置的共识。
{"title":"Time-varying formation control with obstacle avoidance for fractional-order multi-agent systems","authors":"Yangyang Cai,&nbsp;Sulan Li,&nbsp;Yongliang Wei,&nbsp;Yunru Zhu","doi":"10.1016/j.jiixd.2025.03.005","DOIUrl":"10.1016/j.jiixd.2025.03.005","url":null,"abstract":"<div><div>Aiming at the consensus of relative position considering obstacle avoidance for fractional-order multi-agent system, a novel distributed control algorithm is proposed in this paper. Firstly, a synthetic error of each agent under the influence of obstacles is introduced. The consensus protocols are designed based on this error according to sliding mode theory for the order increasing and decreasing, respectively. Then, the Lyapunov function is used to prove the stable convergence of the protocols. Finally, the simulation results show that the protocols can not only prevent the agents from colliding with obstacles, but also enable the agents to quickly recover the expected formation and achieve consensus of the relative position.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 4","pages":"Pages 289-302"},"PeriodicalIF":0.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144895148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference management for active RIS-aided symbiotic radio networks 有源ris辅助共生无线网络的干扰管理
Pub Date : 2025-07-01 DOI: 10.1016/j.jiixd.2025.03.002
Weidong Wan, Yi Liu, Hailin Zhang
Symbiotic radio (SR) is a technology that facilitates mutually beneficial sharing of spectrum and energy between primary and secondary systems. In SR networks, utilizing active reconfigurable intelligent surface (RIS) as the secondary transmitter (STx) enhances this mutual benefit compared to passive RIS. This paper addresses the interference management challenges that inevitably arise from employing active RIS. We consider a common SR network consisting of three types of users: SR users, non-SR users, and eavesdroppers. Additionally, each SR user has their own unique cellular services. We propose minimizing the total power consumption while satisfying a sufficiently large signal-to-interference-plus-noise ratio (SINR) for SR users, a small enough SINR for eavesdroppers, and a small enough interference temperature for non-SR users. The alternative optimization (AO) method is used for decoupling multi-variables. The non-convex constraints are relaxed as convex ones through first-order Taylor approximation, and the bounded channel state information (CSI) error model is handled using the S-procedure. Simulations validate the superiority of the proposed algorithm and demonstrate that the total power consumption is minimized while meeting performance thresholds. Additionally, the results offer valuable insights for SR network deployment.
共生无线电(SR)是一种促进主次系统之间频谱和能量互利共享的技术。在SR网络中,与被动RIS相比,利用主动可重构智能表面(RIS)作为二次发射机(STx)增强了这种互利。本文讨论了采用主动RIS不可避免地产生的干扰管理挑战。我们考虑一个普通的SR网络,由三种类型的用户组成:SR用户、非SR用户和窃听者。此外,每个SR用户都有自己独特的蜂窝服务。我们建议最小化总功耗,同时满足SR用户足够大的信噪比(SINR),窃听者足够小的SINR,以及非SR用户足够小的干扰温度。采用备选优化(AO)方法求解多变量解耦。通过一阶泰勒近似将非凸约束放宽为凸约束,并使用s过程处理有界信道状态信息(CSI)误差模型。仿真结果验证了该算法的优越性,并证明在满足性能阈值的情况下,总功耗最小。此外,研究结果为SR网络部署提供了有价值的见解。
{"title":"Interference management for active RIS-aided symbiotic radio networks","authors":"Weidong Wan,&nbsp;Yi Liu,&nbsp;Hailin Zhang","doi":"10.1016/j.jiixd.2025.03.002","DOIUrl":"10.1016/j.jiixd.2025.03.002","url":null,"abstract":"<div><div>Symbiotic radio (SR) is a technology that facilitates mutually beneficial sharing of spectrum and energy between primary and secondary systems. In SR networks, utilizing active reconfigurable intelligent surface (RIS) as the secondary transmitter (STx) enhances this mutual benefit compared to passive RIS. This paper addresses the interference management challenges that inevitably arise from employing active RIS. We consider a common SR network consisting of three types of users: SR users, non-SR users, and eavesdroppers. Additionally, each SR user has their own unique cellular services. We propose minimizing the total power consumption while satisfying a sufficiently large signal-to-interference-plus-noise ratio (SINR) for SR users, a small enough SINR for eavesdroppers, and a small enough interference temperature for non-SR users. The alternative optimization (AO) method is used for decoupling multi-variables. The non-convex constraints are relaxed as convex ones through first-order Taylor approximation, and the bounded channel state information (CSI) error model is handled using the S-procedure. Simulations validate the superiority of the proposed algorithm and demonstrate that the total power consumption is minimized while meeting performance thresholds. Additionally, the results offer valuable insights for SR network deployment.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 4","pages":"Pages 326-344"},"PeriodicalIF":0.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144895164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The interference range of the spatial outage capacity in bipolar wireless networks 双极无线网络空间中断容量的干扰范围
Pub Date : 2025-07-01 DOI: 10.1016/j.jiixd.2025.03.004
Min Ouyang , Tong Wang , Pei Xiao , Jiyi Wu , Shan Gao , Liwei Chen
Interference range plays a critical role in wireless network performance, significantly impacting both link reliability and resource utilization. This paper studies the interference range associated with the spatial outage capacity (SOC), which is the maximum density of reliable links of bipolar networks. We establish a recursive equation based on the transmitter's active probability, establishing a link between the interference range and the SOC. The analytical results are then verified through numerical and network simulations. The experimental results indicate that the interference range may improve the SOC of Poisson bipolar networks while deteriorating the SOC of Poisson cellular networks and random distance bipolar networks.
干扰范围在无线网络性能中起着至关重要的作用,对链路可靠性和资源利用率都有重要影响。本文研究了与空间中断容量(SOC)相关的干扰范围,SOC是双极网络中可靠链路的最大密度。我们建立了基于发射机主动概率的递归方程,建立了干扰范围与SOC之间的联系。通过数值模拟和网络仿真验证了分析结果。实验结果表明,干扰范围可以提高泊松双极网络的SOC,而使泊松蜂窝网络和随机距离双极网络的SOC恶化。
{"title":"The interference range of the spatial outage capacity in bipolar wireless networks","authors":"Min Ouyang ,&nbsp;Tong Wang ,&nbsp;Pei Xiao ,&nbsp;Jiyi Wu ,&nbsp;Shan Gao ,&nbsp;Liwei Chen","doi":"10.1016/j.jiixd.2025.03.004","DOIUrl":"10.1016/j.jiixd.2025.03.004","url":null,"abstract":"<div><div>Interference range plays a critical role in wireless network performance, significantly impacting both link reliability and resource utilization. This paper studies the interference range associated with the spatial outage capacity (SOC), which is the maximum density of reliable links of bipolar networks. We establish a recursive equation based on the transmitter's active probability, establishing a link between the interference range and the SOC. The analytical results are then verified through numerical and network simulations. The experimental results indicate that the interference range may improve the SOC of Poisson bipolar networks while deteriorating the SOC of Poisson cellular networks and random distance bipolar networks.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 4","pages":"Pages 345-360"},"PeriodicalIF":0.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144895165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel computation based on multi-scale attention residual network 基于多尺度注意残差网络的信道计算
Pub Date : 2025-05-01 DOI: 10.1016/j.jiixd.2025.03.001
Wengang Li, Deli Zhou, Qiong Ye
Orthogonal time-frequency space (OTFS) modulation can effectively counter ICI in high-speed mobile scenarios, fully enhance the spectral efficiency of communication systems in high Doppler expansion scenarios, and improve the quality of communication systems. Channel estimation performance serves as a critical evaluation parameter within the OTFS modulation system. In this paper, we propose a multi-scale attention residual neural structure for improved channel estimation of OTFS waveforms in different satellite-ground scenario. Firstly, a multi-scale channel feature extraction module is designed, which applies multi-dimensional feature extraction to the channel matrix, thereby bolstering the capability to capture features at diverse scales. Subsequently, a self-attention mechanism is incorporated to concentrate on subtle yet significant features. The extracted features are then integrated and exploited through a residual convolutional architecture to derive an estimation of the channel matrix. Simulations are conducted using the satellite-ground mobile channel model outlined in 3GPP TR 38.811, with the NTN-TDL-C and NTN-TDL-B channel models representing line of sight (LoS) and non-line of sight (NLoS) conditions, respectively. Results demonstrate that the attention-based approach presented surpasses alternative neural network methodologies in terms of mean squared error (MSE), bit error rate (BER), and complexity, and meets the demands of OTFS channel estimation in satellite-ground scenario.
正交时频空间(OTFS)调制可以有效对抗高速移动场景下的ICI,充分增强通信系统在高多普勒扩展场景下的频谱效率,提高通信系统的质量。信道估计性能是OTFS调制系统的一个重要评价参数。本文提出了一种多尺度注意力残差神经网络结构,用于改进不同星地场景下OTFS波形的信道估计。首先,设计了多尺度通道特征提取模块,对通道矩阵进行了多维特征提取,增强了对不同尺度特征的捕获能力;随后,一个自我注意机制被纳入集中在细微但重要的特征。然后通过残差卷积架构对提取的特征进行集成和利用,以得出信道矩阵的估计。利用3GPP TR 38.811中概述的卫星-地面移动信道模型进行了仿真,其中NTN-TDL-C和NTN-TDL-B信道模型分别代表瞄准线(LoS)和非瞄准线(NLoS)条件。结果表明,该方法在均方误差(MSE)、误码率(BER)和复杂度方面均优于其他神经网络方法,能够满足星-地场景下OTFS信道估计的要求。
{"title":"Channel computation based on multi-scale attention residual network","authors":"Wengang Li,&nbsp;Deli Zhou,&nbsp;Qiong Ye","doi":"10.1016/j.jiixd.2025.03.001","DOIUrl":"10.1016/j.jiixd.2025.03.001","url":null,"abstract":"<div><div>Orthogonal time-frequency space (OTFS) modulation can effectively counter ICI in high-speed mobile scenarios, fully enhance the spectral efficiency of communication systems in high Doppler expansion scenarios, and improve the quality of communication systems. Channel estimation performance serves as a critical evaluation parameter within the OTFS modulation system. In this paper, we propose a multi-scale attention residual neural structure for improved channel estimation of OTFS waveforms in different satellite-ground scenario. Firstly, a multi-scale channel feature extraction module is designed, which applies multi-dimensional feature extraction to the channel matrix, thereby bolstering the capability to capture features at diverse scales. Subsequently, a self-attention mechanism is incorporated to concentrate on subtle yet significant features. The extracted features are then integrated and exploited through a residual convolutional architecture to derive an estimation of the channel matrix. Simulations are conducted using the satellite-ground mobile channel model outlined in 3GPP TR 38.811, with the NTN-TDL-C and NTN-TDL-B channel models representing line of sight (LoS) and non-line of sight (NLoS) conditions, respectively. Results demonstrate that the attention-based approach presented surpasses alternative neural network methodologies in terms of mean squared error (MSE), bit error rate (BER), and complexity, and meets the demands of OTFS channel estimation in satellite-ground scenario.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 3","pages":"Pages 275-287"},"PeriodicalIF":0.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144490380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Positionally restricted masked knowledge graph completion via multi-head mutual attention 基于多头相互关注的位置受限掩码知识图谱补全
Pub Date : 2025-05-01 DOI: 10.1016/j.jiixd.2025.02.006
Qiang Yu , Liang Bao , Peng Nie , Lei Zuo
Knowledge graph completion aims to enhance the completeness of knowledge graphs by predicting missing links. Link prediction is a common approach for this task, but existing methods, particularly those based on similarity computation, are often computationally expensive, especially for large models. To address this, we propose a novel method, positionally restricted masked knowledge graph completion (PR-MKGC), which reduces inference time by leveraging masked prediction and relying solely on structural information from the knowledge graph, without using textual data. We introduce a multi-head mutual attention mechanism that aggregates neighbor information more effectively, improving the model's ability to predict missing links. Experimental results demonstrate that PR-MKGC outperforms existing models in terms of both predictive performance and inference time on the FB15K-237 dataset.
知识图谱补全的目的是通过预测缺失环节来提高知识图谱的完备性。链接预测是该任务的常用方法,但是现有的方法,特别是基于相似性计算的方法,通常计算成本很高,特别是对于大型模型。为了解决这个问题,我们提出了一种新的方法,位置限制掩膜知识图补全(PR-MKGC),该方法通过利用掩膜预测和仅依赖知识图中的结构信息来减少推理时间,而不使用文本数据。我们引入了多头相互注意机制,更有效地聚合邻居信息,提高了模型预测缺失链接的能力。实验结果表明,PR-MKGC在FB15K-237数据集上的预测性能和推理时间都优于现有模型。
{"title":"Positionally restricted masked knowledge graph completion via multi-head mutual attention","authors":"Qiang Yu ,&nbsp;Liang Bao ,&nbsp;Peng Nie ,&nbsp;Lei Zuo","doi":"10.1016/j.jiixd.2025.02.006","DOIUrl":"10.1016/j.jiixd.2025.02.006","url":null,"abstract":"<div><div>Knowledge graph completion aims to enhance the completeness of knowledge graphs by predicting missing links. Link prediction is a common approach for this task, but existing methods, particularly those based on similarity computation, are often computationally expensive, especially for large models. To address this, we propose a novel method, positionally restricted masked knowledge graph completion (PR-MKGC), which reduces inference time by leveraging masked prediction and relying solely on structural information from the knowledge graph, without using textual data. We introduce a multi-head mutual attention mechanism that aggregates neighbor information more effectively, improving the model's ability to predict missing links. Experimental results demonstrate that PR-MKGC outperforms existing models in terms of both predictive performance and inference time on the FB15K-237 dataset.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 3","pages":"Pages 210-222"},"PeriodicalIF":0.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144490376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METRIC: Multiple preferences learning with refined item attributes for multimodal recommendation 度量:多重偏好学习与改进项目属性的多模式推荐
Pub Date : 2025-05-01 DOI: 10.1016/j.jiixd.2025.04.001
Yunfei Zhao , Jie Guo , Longyu Wen , Letian Wang
In recent years, there has been a burgeoning interest in multimodal recommender systems, which integrate various data types to achieve more personalized recommendations. Despite this, the effective incorporation of user preferences for multimodal data and the exploration of inherent semantic relationships between modalities still need to be explored. Prior research typically utilizes multimodal data to construct item graphs, often overlooking the nuanced details within the data. As a result, these studies fail to thoroughly examine the semantic relationships between items and user behavioral patterns. Our proposed approach, METRIC, addresses this gap by delving deeper into multimodal information. METRIC consists of two primary modules: the multiple preference modelling (MPM) module and the item semantic enhancement (ISE) module. The ISE module performs relational mining across multiple attributes, leveraging the semantic structural relationships inherent in items. In contrast, the MPM module enables users to articulate their preferences across different modalities and facilitates adaptive fusion through an attention mechanism. This approach not only improves precision in capturing user preferences and interests but also minimizes interference from varying modalities. Our extensive experiments on three benchmark datasets substantiate METRIC's superiority and the efficacy of its core components.
近年来,人们对多模式推荐系统产生了浓厚的兴趣,多模式推荐系统集成了各种数据类型,以实现更个性化的推荐。尽管如此,有效地整合用户对多模态数据的偏好和探索模态之间固有的语义关系仍然需要探索。先前的研究通常利用多模态数据来构建项目图,往往忽略了数据中细微的细节。因此,这些研究未能彻底检查项目与用户行为模式之间的语义关系。我们提出的方法METRIC通过深入研究多模态信息来解决这一差距。METRIC由两个主要模块组成:多偏好建模(MPM)模块和项目语义增强(ISE)模块。ISE模块跨多个属性执行关系挖掘,利用项目中固有的语义结构关系。相比之下,MPM模块使用户能够在不同的模式中表达自己的偏好,并通过注意机制促进自适应融合。这种方法不仅提高了捕获用户偏好和兴趣的精度,而且最大限度地减少了来自不同模式的干扰。我们在三个基准数据集上的广泛实验证实了METRIC的优越性及其核心组件的有效性。
{"title":"METRIC: Multiple preferences learning with refined item attributes for multimodal recommendation","authors":"Yunfei Zhao ,&nbsp;Jie Guo ,&nbsp;Longyu Wen ,&nbsp;Letian Wang","doi":"10.1016/j.jiixd.2025.04.001","DOIUrl":"10.1016/j.jiixd.2025.04.001","url":null,"abstract":"<div><div>In recent years, there has been a burgeoning interest in multimodal recommender systems, which integrate various data types to achieve more personalized recommendations. Despite this, the effective incorporation of user preferences for multimodal data and the exploration of inherent semantic relationships between modalities still need to be explored. Prior research typically utilizes multimodal data to construct item graphs, often overlooking the nuanced details within the data. As a result, these studies fail to thoroughly examine the semantic relationships between items and user behavioral patterns. Our proposed approach, METRIC, addresses this gap by delving deeper into multimodal information. METRIC consists of two primary modules: the multiple preference modelling (MPM) module and the item semantic enhancement (ISE) module. The ISE module performs relational mining across multiple attributes, leveraging the semantic structural relationships inherent in items. In contrast, the MPM module enables users to articulate their preferences across different modalities and facilitates adaptive fusion through an attention mechanism. This approach not only improves precision in capturing user preferences and interests but also minimizes interference from varying modalities. Our extensive experiments on three benchmark datasets substantiate METRIC's superiority and the efficacy of its core components.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 3","pages":"Pages 242-256"},"PeriodicalIF":0.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144490378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rethink delay Doppler channels and time-frequency coding 重新考虑延迟多普勒信道和时频编码
Pub Date : 2025-05-01 DOI: 10.1016/j.jiixd.2025.02.002
Xiang-Gen Xia
In this paper, we rethink delay Doppler channels (also called doubly selective channels). We prove that no modulation schemes (including the current active VOFDM/OTFS) can compensate a non-trivial Doppler spread well. We then discuss some of the existing methods to deal with time-varying channels, in particular time-frequency (TF) coding in an OFDM system. TF coding is equivalent to space-time coding in the math part. We also summarize state of the art on space-time coding that was an active research topic over a decade ago.
本文重新考虑了延迟多普勒信道(也称为双选择信道)。我们证明了任何调制方案(包括当前有源VOFDM/OTFS)都不能很好地补偿非平凡的多普勒扩频。然后讨论了一些处理时变信道的现有方法,特别是OFDM系统中的时频(TF)编码。TF编码在数学部分相当于空时编码。我们还总结了十多年前一个活跃的研究课题——时空编码的最新进展。
{"title":"Rethink delay Doppler channels and time-frequency coding","authors":"Xiang-Gen Xia","doi":"10.1016/j.jiixd.2025.02.002","DOIUrl":"10.1016/j.jiixd.2025.02.002","url":null,"abstract":"<div><div>In this paper, we rethink delay Doppler channels (also called doubly selective channels). We prove that no modulation schemes (including the current active VOFDM/OTFS) can compensate a non-trivial Doppler spread well. We then discuss some of the existing methods to deal with time-varying channels, in particular time-frequency (TF) coding in an OFDM system. TF coding is equivalent to space-time coding in the math part. We also summarize state of the art on space-time coding that was an active research topic over a decade ago.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 3","pages":"Pages 189-193"},"PeriodicalIF":0.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144490374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information and Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1