首页 > 最新文献

Journal of Information and Intelligence最新文献

英文 中文
Frontiers of collaborative intelligence systems 协作智能系统的前沿
Pub Date : 2024-01-01 DOI: 10.1016/j.jiixd.2023.10.005
Maoguo Gong , Yajing He , Hao Li , Yue Wu , Mingyang Zhang , Shanfeng Wang , Tianshi Luo

The development of information technology has propelled technological reform in artificial intelligence (AI). To address the needs of diversified and complex applications, AI has been increasingly trending towards intelligent, collaborative, and systematized development across different levels and tasks. Research on intelligent, collaborative and systematized AI can be divided into three levels: micro, meso, and macro. Firstly, the micro-level collaboration is illustrated through the introduction of swarm intelligence collaborative methods related to individuals collaboration and decision variables collaboration. Secondly, the meso-level collaboration is discussed in terms of multi-task collaboration and multi-party collaboration. Thirdly, the macro-level collaboration is primarily in the context of intelligent collaborative systems, such as terrestrial-satellite collaboration, space-air-ground collaboration, space-air-ground-air collaboration, vehicle-road-cloud collaboration and end-edge-cloud collaboration. Finally, this paper provides prospects on the future development of relevant fields from the perspectives of the micro, meso, and macro levels.

信息技术的发展推动了人工智能(AI)的技术改革。为满足多样化、复杂化的应用需求,人工智能越来越趋向于智能化、协同化、系统化的发展,跨越不同的层次和任务。关于人工智能智能化、协同化和系统化的研究可分为微观、中观和宏观三个层面。首先,微观层面的协作通过引入与个体协作和决策变量协作相关的蜂群智能协作方法来说明。其次,从多任务协作和多方协作两个方面探讨中观层面的协作。第三,宏观层面的协同主要结合智能协同系统,如地-卫星协同、空-空-地协同、空-空-地-空协同、车-路-云协同、端-边-云协同等。最后,本文从微观、中观和宏观三个层面对相关领域的未来发展进行了展望。
{"title":"Frontiers of collaborative intelligence systems","authors":"Maoguo Gong ,&nbsp;Yajing He ,&nbsp;Hao Li ,&nbsp;Yue Wu ,&nbsp;Mingyang Zhang ,&nbsp;Shanfeng Wang ,&nbsp;Tianshi Luo","doi":"10.1016/j.jiixd.2023.10.005","DOIUrl":"10.1016/j.jiixd.2023.10.005","url":null,"abstract":"<div><p>The development of information technology has propelled technological reform in artificial intelligence (AI). To address the needs of diversified and complex applications, AI has been increasingly trending towards intelligent, collaborative, and systematized development across different levels and tasks. Research on intelligent, collaborative and systematized AI can be divided into three levels: micro, meso, and macro. Firstly, the micro-level collaboration is illustrated through the introduction of swarm intelligence collaborative methods related to individuals collaboration and decision variables collaboration. Secondly, the meso-level collaboration is discussed in terms of multi-task collaboration and multi-party collaboration. Thirdly, the macro-level collaboration is primarily in the context of intelligent collaborative systems, such as terrestrial-satellite collaboration, space-air-ground collaboration, space-air-ground-air collaboration, vehicle-road-cloud collaboration and end-edge-cloud collaboration. Finally, this paper provides prospects on the future development of relevant fields from the perspectives of the micro, meso, and macro levels.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 1","pages":"Pages 14-27"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S294971592300063X/pdfft?md5=666b324f5aba714a9622c1ecb7cabb7c&pid=1-s2.0-S294971592300063X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136009781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding turbo codes: A signal processing study 了解涡轮编码:信号处理研究
Pub Date : 2024-01-01 DOI: 10.1016/j.jiixd.2023.10.003
Xiang-Gen Xia

In this paper, we study turbo codes from the digital signal processing point of view by defining turbo codes over the complex field. It is known that iterative decoding and interleaving between concatenated parallel codes are two key elements that make turbo codes perform significantly better than the conventional error control codes. This is analytically illustrated in this paper. We show that the decoded noise mean power in the iterative decoding decreases when the number of iterations increases, as long as the interleaving decorrelates the noise after each iterative decoding step. An analytic decreasing rate and the limit of the decoded noise mean power are given. The limit of the decoded noise mean power of the iterative decoding of a turbo code with two parallel codes with their rates less than 1/2 is one third of the noise power before the decoding, which can not be achieved by any non-turbo codes with the same rate. From this study, the role of designing a good interleaver can also be clearly seen.

本文从数字信号处理的角度出发,通过定义复数域上的涡轮编码来研究涡轮编码。众所周知,迭代解码和并行编码之间的交错是使涡轮编码的性能明显优于传统误差控制编码的两个关键因素。本文通过分析说明了这一点。我们证明,只要交织在每个迭代解码步骤后对噪声进行去相关处理,迭代解码中的解码噪声平均功率就会随着迭代次数的增加而减小。给出了解析递减率和解码噪声平均功率的极限。用两个速率小于 1/2 的并行编码对一个涡轮编码进行迭代解码的解码噪声平均功率的极限是解码前噪声功率的三分之一,这是任何具有相同速率的非涡轮编码都无法达到的。从这项研究中,我们也可以清楚地看到设计一个好的交织器的作用。
{"title":"Understanding turbo codes: A signal processing study","authors":"Xiang-Gen Xia","doi":"10.1016/j.jiixd.2023.10.003","DOIUrl":"10.1016/j.jiixd.2023.10.003","url":null,"abstract":"<div><p>In this paper, we study turbo codes from the digital signal processing point of view by defining turbo codes over the complex field. It is known that iterative decoding and interleaving between concatenated parallel codes are two key elements that make turbo codes perform significantly better than the conventional error control codes. This is analytically illustrated in this paper. We show that the decoded noise mean power in the iterative decoding decreases when the number of iterations increases, as long as the interleaving decorrelates the noise after each iterative decoding step. An analytic decreasing rate and the limit of the decoded noise mean power are given. The limit of the decoded noise mean power of the iterative decoding of a turbo code with two parallel codes with their rates less than 1/2 is one third of the noise power before the decoding, which can not be achieved by any non-turbo codes with the same rate. From this study, the role of designing a good interleaver can also be clearly seen.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 1","pages":"Pages 1-13"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715923000616/pdfft?md5=f118ebffb9d9e7932e08138648929b52&pid=1-s2.0-S2949715923000616-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136009520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inherent-attribute-aware dual-graph autoencoder for rating prediction 用于评级预测的固有属性感知双图自动编码器
Pub Date : 2024-01-01 DOI: 10.1016/j.jiixd.2023.10.004
Yangtao Zhou , Qingshan Li , Hua Chu , Jianan Li , Lejia Yang , Biaobiao Wei , Luqiao Wang , Wanqiang Yang

Autoencoder-based rating prediction methods with external attributes have received wide attention due to their ability to accurately capture users' preferences. However, existing methods still have two significant limitations: i) External attributes are often unavailable in the real world due to privacy issues, leading to low quality of representations; and ii) existing methods lack considering complex associations in users' rating behaviors during the encoding process. To meet these challenges, this paper innovatively proposes an inherent-attribute-aware dual-graph autoencoder, named IADGAE, for rating prediction. To address the low quality of representations due to the unavailability of external attributes, we propose an inherent attribute perception module that mines inductive user active patterns and item popularity patterns from users' rating behaviors to strengthen user and item representations. To exploit the complex associations hidden in users’ rating behaviors, we design an encoder on the item-item co-occurrence graph to capture the co-occurrence frequency features among items. Moreover, we propose a dual-graph feature encoder framework to simultaneously encode and fuse the high-order representations learned from the user-item rating graph and item-item co-occurrence graph. Extensive experiments on three real datasets demonstrate that IADGAE is effective and outperforms existing rating prediction methods, which achieves a significant improvement of 4.51%∼41.63 ​% in the RMSE metric.

基于外部属性的自动编码器评分预测方法因其能够准确捕捉用户偏好而受到广泛关注。然而,现有方法仍存在两个显著的局限性:i) 由于隐私问题,外部属性在现实世界中往往不可用,导致表征质量低下;ii) 现有方法在编码过程中缺乏对用户评分行为中复杂关联的考虑。为了应对这些挑战,本文创新性地提出了一种用于评分预测的固有属性感知双图自动编码器,命名为 IADGAE。为了解决由于外部属性不可用而导致的表征质量低的问题,我们提出了一个固有属性感知模块,从用户的评分行为中挖掘归纳用户活跃模式和项目受欢迎程度模式,以加强用户和项目表征。为了利用隐藏在用户评分行为中的复杂关联,我们设计了一个项目-项目共现图编码器,以捕捉项目间的共现频率特性。此外,我们还提出了一种双图特征编码器框架,可同时对从用户-物品评分图和物品-物品共现图中学习到的高阶表征进行编码和融合。在三个真实数据集上进行的大量实验证明,IADGAE 是有效的,而且优于现有的评分预测方法,在 RMSE 指标上实现了 4.51%∼41.63 % 的显著改进。
{"title":"Inherent-attribute-aware dual-graph autoencoder for rating prediction","authors":"Yangtao Zhou ,&nbsp;Qingshan Li ,&nbsp;Hua Chu ,&nbsp;Jianan Li ,&nbsp;Lejia Yang ,&nbsp;Biaobiao Wei ,&nbsp;Luqiao Wang ,&nbsp;Wanqiang Yang","doi":"10.1016/j.jiixd.2023.10.004","DOIUrl":"10.1016/j.jiixd.2023.10.004","url":null,"abstract":"<div><p>Autoencoder-based rating prediction methods with external attributes have received wide attention due to their ability to accurately capture users' preferences. However, existing methods still have two significant limitations: i) External attributes are often unavailable in the real world due to privacy issues, leading to low quality of representations; and ii) existing methods lack considering complex associations in users' rating behaviors during the encoding process. To meet these challenges, this paper innovatively proposes an inherent-attribute-aware dual-graph autoencoder, named IADGAE, for rating prediction. To address the low quality of representations due to the unavailability of external attributes, we propose an inherent attribute perception module that mines inductive user active patterns and item popularity patterns from users' rating behaviors to strengthen user and item representations. To exploit the complex associations hidden in users’ rating behaviors, we design an encoder on the item-item co-occurrence graph to capture the co-occurrence frequency features among items. Moreover, we propose a dual-graph feature encoder framework to simultaneously encode and fuse the high-order representations learned from the user-item rating graph and item-item co-occurrence graph. Extensive experiments on three real datasets demonstrate that IADGAE is effective and outperforms existing rating prediction methods, which achieves a significant improvement of 4.51%∼41.63 ​% in the RMSE metric.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 1","pages":"Pages 82-97"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715923000628/pdfft?md5=e0de0d732524d082d68a4ba7d99dc225&pid=1-s2.0-S2949715923000628-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136054613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges 物联网攻击综合调查:分类、检测机制和挑战
Pub Date : 2023-12-22 DOI: 10.1016/j.jiixd.2023.12.001
The Internet of Things (IoT) has set the way for the continuing digitalization of society in various manners during the past decade. The IoT is a vast network of intelligent devices exchanging data online. The security component of IoT is crucial given its rapid expansion as a new technology paradigm since it may entail safety-critical procedures and the online storage of sensitive data. Unfortunately, security is the primary challenge when adopting Internet of Things (IoT) technologies. As a result, manufacturers’ and academics’ top priority now is improving the security of IoT devices. A substantial body of literature on the subject encompasses several issues and potential remedies. However, most existing research fails to offer a comprehensive perspective on attacks inside the IoT. Hence, this survey aims to establish a structure to guide researchers by categorizing attacks in the taxonomy according to various factors such as attack domains, attack threat type, attack executions, software surfaces, IoT protocols, attacks based on device property, attacks based on adversary location and attacks based on information damage level. This is followed by a comprehensive analysis of the countermeasures offered in academic literature. In this discourse, the countermeasures proposed for the most significant security attacks in the IoT are investigated. Following this, a comprehensive classification system for the various domains of security research in the IoT and Industrial Internet of Things (IIoT) is developed, accompanied by their respective remedies. In conclusion, the study has revealed several open research areas pertinent to the subject matter.
过去十年间,物联网(IoT)以各种方式为社会的持续数字化开辟了道路。物联网是一个由在线交换数据的智能设备组成的庞大网络。物联网作为一种新的技术范式迅速发展,其安全问题至关重要,因为它可能涉及安全关键程序和敏感数据的在线存储。遗憾的是,安全问题是采用物联网技术时面临的主要挑战。因此,制造商和学术界的当务之急是提高物联网设备的安全性。有关这一主题的大量文献涵盖了若干问题和潜在的补救措施。然而,大多数现有研究都未能从一个全面的角度来看待物联网内部的攻击。因此,本调查旨在建立一种结构,根据攻击领域、攻击威胁类型、攻击执行、软件表面、物联网协议、基于设备属性的攻击、基于对手位置的攻击和基于信息破坏程度的攻击等各种因素,在分类学中对攻击进行分类,从而为研究人员提供指导。随后对学术文献中提供的对策进行了全面分析。在这一论述中,研究了针对物联网中最重要的安全攻击提出的应对措施。随后,针对物联网和工业物联网(IIoT)安全研究的各个领域制定了一个全面的分类系统,并附有各自的补救措施。总之,本研究揭示了与本主题相关的几个开放研究领域。
{"title":"A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges","authors":"","doi":"10.1016/j.jiixd.2023.12.001","DOIUrl":"10.1016/j.jiixd.2023.12.001","url":null,"abstract":"<div><div>The Internet of Things (IoT) has set the way for the continuing digitalization of society in various manners during the past decade. The IoT is a vast network of intelligent devices exchanging data online. The security component of IoT is crucial given its rapid expansion as a new technology paradigm since it may entail safety-critical procedures and the online storage of sensitive data. Unfortunately, security is the primary challenge when adopting Internet of Things (IoT) technologies. As a result, manufacturers’ and academics’ top priority now is improving the security of IoT devices. A substantial body of literature on the subject encompasses several issues and potential remedies. However, most existing research fails to offer a comprehensive perspective on attacks inside the IoT. Hence, this survey aims to establish a structure to guide researchers by categorizing attacks in the taxonomy according to various factors such as attack domains, attack threat type, attack executions, software surfaces, IoT protocols, attacks based on device property, attacks based on adversary location and attacks based on information damage level. This is followed by a comprehensive analysis of the countermeasures offered in academic literature. In this discourse, the countermeasures proposed for the most significant security attacks in the IoT are investigated. Following this, a comprehensive classification system for the various domains of security research in the IoT and Industrial Internet of Things (IIoT) is developed, accompanied by their respective remedies. In conclusion, the study has revealed several open research areas pertinent to the subject matter.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 6","pages":"Pages 455-513"},"PeriodicalIF":0.0,"publicationDate":"2023-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139019229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual electromagnetic environment modeling based data augmentation for drone signal identification 基于虚拟电磁环境建模的无人机信号识别数据增强
Pub Date : 2023-11-01 DOI: 10.1016/j.jiixd.2023.08.002
Hanshuo Zhang , Tao Li , Yongzhao Li , Zhijin Wen

Radio frequency (RF)-based drone identification technologies have the advantages of long effective distances and low environmental dependence, which has become indispensable for drone surveillance systems. However, since drones operate in unlicensed frequency bands, a large number of co-frequency devices exist in these bands, which brings a great challenge to traditional signal identification methods. Deep learning techniques provide a new approach to complete end-to-end signal identification by directly learning the distribution of RF data. In such scenarios, due to the complexity and high dynamics of the electromagnetic environments, a massive amount of data that can reflect the various propagation conditions of drone signals is necessary for a robust neural network (NN) for identifying drones. In reality, signal acquisition and labeling that meet the above requirements are too costly to implement. Therefore, we propose a virtual electromagnetic environment modeling based data augmentation (DA) method to improve the diversity of drone signal data. The DA method focuses on simulating the spectrograms of drone signals transmitted in real-world environments and randomly generates extra training data in each training epoch. Furthermore, considering the limited processing capability of RF receivers, we modify the original YOLOv5s model to a more lightweight version. Without losing the identification performance, more hardware-friendly designs are applied and the number of parameters decreases about 10-fold. For performance evaluation, we utilized a universal software radio peripheral (USRP) X310 platform to collect RF signals of four drones in an anechoic chamber and a practical wireless scenario. Experiment results reveal that the NN trained with augmented data performs as well as that trained with practical data in the complex electromagnetic environment.

基于射频(RF)的无人机识别技术具有有效距离远、环境依赖性低等优点,已成为无人机监控系统不可或缺的一部分。然而,由于无人机在未经许可的频段内运行,这些频段内存在大量的共频设备,这给传统的信号识别方法带来了很大的挑战。深度学习技术通过直接学习射频数据的分布,提供了一种完成端到端信号识别的新方法。在这种情况下,由于电磁环境的复杂性和高动态性,能够反映无人机信号各种传播条件的大量数据是鲁棒神经网络(NN)识别无人机的必要条件。在现实中,满足上述要求的信号采集和标记成本过高,难以实现。为此,我们提出了一种基于虚拟电磁环境建模的数据增强(DA)方法来提高无人机信号数据的多样性。该方法侧重于模拟无人机信号在真实环境中传输的频谱图,并在每个训练历元随机生成额外的训练数据。此外,考虑到射频接收器的有限处理能力,我们将原来的YOLOv5s模型修改为更轻量化的版本。在不损失识别性能的情况下,采用了更加硬件友好的设计,参数数量减少了约10倍。为了进行性能评估,我们利用通用软件无线电外设(USRP) X310平台在消声室和实际无线场景中收集了四架无人机的射频信号。实验结果表明,在复杂的电磁环境下,用增强数据训练的神经网络的性能与用实际数据训练的神经网络相当。
{"title":"Virtual electromagnetic environment modeling based data augmentation for drone signal identification","authors":"Hanshuo Zhang ,&nbsp;Tao Li ,&nbsp;Yongzhao Li ,&nbsp;Zhijin Wen","doi":"10.1016/j.jiixd.2023.08.002","DOIUrl":"10.1016/j.jiixd.2023.08.002","url":null,"abstract":"<div><p>Radio frequency (RF)-based drone identification technologies have the advantages of long effective distances and low environmental dependence, which has become indispensable for drone surveillance systems. However, since drones operate in unlicensed frequency bands, a large number of co-frequency devices exist in these bands, which brings a great challenge to traditional signal identification methods. Deep learning techniques provide a new approach to complete end-to-end signal identification by directly learning the distribution of RF data. In such scenarios, due to the complexity and high dynamics of the electromagnetic environments, a massive amount of data that can reflect the various propagation conditions of drone signals is necessary for a robust neural network (NN) for identifying drones. In reality, signal acquisition and labeling that meet the above requirements are too costly to implement. Therefore, we propose a virtual electromagnetic environment modeling based data augmentation (DA) method to improve the diversity of drone signal data. The DA method focuses on simulating the spectrograms of drone signals transmitted in real-world environments and randomly generates extra training data in each training epoch. Furthermore, considering the limited processing capability of RF receivers, we modify the original YOLOv5s model to a more lightweight version. Without losing the identification performance, more hardware-friendly designs are applied and the number of parameters decreases about 10-fold. For performance evaluation, we utilized a universal software radio peripheral (USRP) X310 platform to collect RF signals of four drones in an anechoic chamber and a practical wireless scenario. Experiment results reveal that the NN trained with augmented data performs as well as that trained with practical data in the complex electromagnetic environment.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"1 4","pages":"Pages 308-320"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715923000549/pdfft?md5=4b920cfffcd3ff0aed9277f6c038530d&pid=1-s2.0-S2949715923000549-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75714017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convolution neural network and 77 ​GHz millimeter wave radar based intelligent liquid classification system 基于卷积神经网络和77 GHz毫米波雷达的智能液体分类系统
Pub Date : 2023-11-01 DOI: 10.1016/j.jiixd.2023.06.001
Jiayu Chen, Xinhuai Wang, Yin Xu, Ye Peng, Wen Wang, Junyan Xiang, Qihang Xu

An intelligent liquid classification system based on 77 ​GHz ​millimeter wave radar and convolution neural network are proposed in this paper. The data are collected by the AWR1843 radar platform and processed by the neural network on the host PC in real-time. The doppler heatmap generated by radar signal processing is tried for the first time as the input of the system. The information carried by the heatmap in 2 dimensions is analyzed and the reason why the doppler heatmap could be used for classification is explained. The feasible experiment proved that the proposed method can successfully classify 8 kinds of common liquid with high accuracy. The result of the experiment is explained and the limitations of the experiment are discussed. It can be drawn that the combination of FMCW millimeter wave radar and convolution neural network is a method with great potential for liquid classification. The advantages of real time, non-invasive and unilateral measurement can also be used for the detection of dangerous liquids.

提出了一种基于77 GHz毫米波雷达和卷积神经网络的智能液体分类系统。数据由AWR1843雷达平台采集,由上位机的神经网络进行实时处理。首次尝试将雷达信号处理生成的多普勒热图作为系统的输入。分析了二维热图所携带的信息,并解释了多普勒热图可以用于分类的原因。可行的实验证明,该方法能够成功地对8种常见液体进行分类,并具有较高的准确率。对实验结果进行了说明,并讨论了实验的局限性。由此可见,FMCW毫米波雷达与卷积神经网络相结合是一种极具潜力的液体分类方法。实时、无创、单侧测量的优点也可用于危险液体的检测。
{"title":"Convolution neural network and 77 ​GHz millimeter wave radar based intelligent liquid classification system","authors":"Jiayu Chen,&nbsp;Xinhuai Wang,&nbsp;Yin Xu,&nbsp;Ye Peng,&nbsp;Wen Wang,&nbsp;Junyan Xiang,&nbsp;Qihang Xu","doi":"10.1016/j.jiixd.2023.06.001","DOIUrl":"10.1016/j.jiixd.2023.06.001","url":null,"abstract":"<div><p>An intelligent liquid classification system based on 77 ​GHz ​millimeter wave radar and convolution neural network are proposed in this paper. The data are collected by the AWR1843 radar platform and processed by the neural network on the host PC in real-time. The doppler heatmap generated by radar signal processing is tried for the first time as the input of the system. The information carried by the heatmap in 2 dimensions is analyzed and the reason why the doppler heatmap could be used for classification is explained. The feasible experiment proved that the proposed method can successfully classify 8 kinds of common liquid with high accuracy. The result of the experiment is explained and the limitations of the experiment are discussed. It can be drawn that the combination of FMCW millimeter wave radar and convolution neural network is a method with great potential for liquid classification. The advantages of real time, non-invasive and unilateral measurement can also be used for the detection of dangerous liquids.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"1 4","pages":"Pages 352-363"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715923000240/pdfft?md5=1cebbe1c620b36aad1661a58580268ea&pid=1-s2.0-S2949715923000240-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75229978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust peer-to-peer learning via secure multi-party computation 通过安全多方计算实现健壮的点对点学习
Pub Date : 2023-11-01 DOI: 10.1016/j.jiixd.2023.08.003
Yongkang Luo , Wenjian Luo , Ruizhuo Zhang , Hongwei Zhang , Yuhui Shi

To solve the data island problem, federated learning (FL) provides a solution paradigm where each client sends the model parameters but not the data to a server for model aggregation. Peer-to-peer (P2P) federated learning further improves the robustness of the system, in which there is no server and each client communicates directly with the other. For secure aggregation, secure multi-party computing (SMPC) protocols have been utilized in peer-to-peer manner. However, the ideal SMPC protocols could fail when some clients drop out. In this paper, we propose a robust peer-to-peer learning (RP2PL) algorithm via SMPC to resist clients dropping out. We improve the segment-based SMPC protocol by adding a check and designing the generation method of random segments. In RP2PL, each client aggregates their models by the improved robust secure multi-part computation protocol when finishes the local training. Experimental results demonstrate that the RP2PL paradigm can mitigate clients dropping out with no significant degradation in performance.

为了解决数据孤岛问题,联邦学习(FL)提供了一种解决方案范例,其中每个客户端将模型参数(而不是数据)发送到服务器以进行模型聚合。点对点(P2P)联合学习进一步提高了系统的鲁棒性,其中没有服务器,每个客户端都直接与另一个客户端通信。为了实现安全聚合,安全多方计算(SMPC)协议被采用点对点的方式。然而,当一些客户端退出时,理想的SMPC协议可能会失败。在本文中,我们提出了一种基于SMPC的鲁棒点对点学习(RP2PL)算法来防止客户端退出。我们改进了基于段的SMPC协议,增加了一个校验,并设计了随机段的生成方法。在RP2PL中,每个客户端在完成本地训练后,通过改进的鲁棒安全多部分计算协议聚合各自的模型。实验结果表明,RP2PL模式可以在不显著降低性能的情况下减少客户端退出。
{"title":"Robust peer-to-peer learning via secure multi-party computation","authors":"Yongkang Luo ,&nbsp;Wenjian Luo ,&nbsp;Ruizhuo Zhang ,&nbsp;Hongwei Zhang ,&nbsp;Yuhui Shi","doi":"10.1016/j.jiixd.2023.08.003","DOIUrl":"10.1016/j.jiixd.2023.08.003","url":null,"abstract":"<div><p>To solve the data island problem, federated learning (FL) provides a solution paradigm where each client sends the model parameters but not the data to a server for model aggregation. Peer-to-peer (P2P) federated learning further improves the robustness of the system, in which there is no server and each client communicates directly with the other. For secure aggregation, secure multi-party computing (SMPC) protocols have been utilized in peer-to-peer manner. However, the ideal SMPC protocols could fail when some clients drop out. In this paper, we propose a robust peer-to-peer learning (RP2PL) algorithm via SMPC to resist clients dropping out. We improve the segment-based SMPC protocol by adding a check and designing the generation method of random segments. In RP2PL, each client aggregates their models by the improved robust secure multi-part computation protocol when finishes the local training. Experimental results demonstrate that the RP2PL paradigm can mitigate clients dropping out with no significant degradation in performance.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"1 4","pages":"Pages 341-351"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715923000550/pdfft?md5=bc876c86904042971fa81e6e58d46700&pid=1-s2.0-S2949715923000550-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77738320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and coverage analysis of heterogeneous sub-6GHz-millimeter wave networks 6ghz以下非均匀毫米波网络建模与覆盖分析
Pub Date : 2023-11-01 DOI: 10.1016/j.jiixd.2023.06.002
Cheng Pan , Yi Guo , Gang Liu , Haiyang Ding , Zhihang Fu

The joint adoption of sub-6GHz and millimeter wave (mmWave) technology can prevent the blind spots of coverage, enabling comprehensive coverage while realizing high-speed communication rate. According to the sensitivity of mmWave, base stations should be more densely deployed, which is not well described by existing Poisson hole process (PHP) and the Poisson point process (PPP) models. This paper establishes a sub-6GHz and mmWave hybrid heterogeneous cellular network based on the modified Poisson hole process (MPHP). In our proposed model, the sub-6GHz base stations follow the PPP, and the mmWave base stations (MBSs) follow MPHP distribution. The expressions of the coverage probability are derived by using the interference calculation method of integrating the nearest sector exclusion area. Our theoretical analysis has been verified through simulation results, suggesting that the increase in the cell radius decreases the coverage probability of signal-to-interference-plus-noise ratio (SINR), whereas the increase in the sector parameter has the opposite effect. The variation of sub-6GHz base stations (SBSs) density imposes more significant impact than the MBSs on the SINR coverage probability. In addition, the decrease in MBSs density will reduce the average bandwidth allocated to the user equipment (UE), thus reducing the rate coverage probability.

sub-6GHz和毫米波(mmWave)技术的联合采用可以防止覆盖盲点,在实现高速通信速率的同时实现全面覆盖。根据毫米波的灵敏度,基站的部署应该更加密集,而现有的泊松孔过程(PHP)和泊松点过程(PPP)模型并没有很好地描述这一点。本文建立了一种基于改进泊松空穴过程(MPHP)的sub-6GHz和毫米波混合异构蜂窝网络。在我们提出的模型中,6ghz以下的基站遵循PPP分布,毫米波基站(mbs)遵循MPHP分布。采用积分最近扇区排斥区的干扰计算方法,导出了覆盖概率表达式。我们的理论分析已通过仿真结果得到验证,表明小区半径的增加会降低信噪比(SINR)的覆盖概率,而扇区参数的增加则会产生相反的效果。sub-6GHz基站密度的变化对信噪比覆盖概率的影响比基站密度的变化更显著。此外,mbs密度的降低会减少分配给用户设备(UE)的平均带宽,从而降低速率覆盖概率。
{"title":"Modeling and coverage analysis of heterogeneous sub-6GHz-millimeter wave networks","authors":"Cheng Pan ,&nbsp;Yi Guo ,&nbsp;Gang Liu ,&nbsp;Haiyang Ding ,&nbsp;Zhihang Fu","doi":"10.1016/j.jiixd.2023.06.002","DOIUrl":"10.1016/j.jiixd.2023.06.002","url":null,"abstract":"<div><p>The joint adoption of sub-6GHz and millimeter wave (mmWave) technology can prevent the blind spots of coverage, enabling comprehensive coverage while realizing high-speed communication rate. According to the sensitivity of mmWave, base stations should be more densely deployed, which is not well described by existing Poisson hole process (PHP) and the Poisson point process (PPP) models. This paper establishes a sub-6GHz and mmWave hybrid heterogeneous cellular network based on the modified Poisson hole process (MPHP). In our proposed model, the sub-6GHz base stations follow the PPP, and the mmWave base stations (MBSs) follow MPHP distribution. The expressions of the coverage probability are derived by using the interference calculation method of integrating the nearest sector exclusion area. Our theoretical analysis has been verified through simulation results, suggesting that the increase in the cell radius decreases the coverage probability of signal-to-interference-plus-noise ratio (SINR), whereas the increase in the sector parameter has the opposite effect. The variation of sub-6GHz base stations (SBSs) density imposes more significant impact than the MBSs on the SINR coverage probability. In addition, the decrease in MBSs density will reduce the average bandwidth allocated to the user equipment (UE), thus reducing the rate coverage probability.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"1 4","pages":"Pages 321-329"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715923000252/pdfft?md5=eec6bbb4eb23cd6b9124579fd0e57b91&pid=1-s2.0-S2949715923000252-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79225631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pri-EMO: A universal perturbation method for privacy preserving facial emotion recognition Pri-EMO:一种保护隐私的通用摄动面部情绪识别方法
Pub Date : 2023-11-01 DOI: 10.1016/j.jiixd.2023.08.001
Yong Zeng, Zhenyu Zhang, Jiale Liu, Jianfeng Ma, Zhihong Liu

Facial emotion have great significance in human-computer interaction, virtual reality and people's communication. Existing methods for facial emotion privacy mainly concentrate on the perturbation of facial emotion images. However, cryptography-based perturbation algorithms are highly computationally expensive, and transformation-based perturbation algorithms only target specific recognition models. In this paper, we propose a universal feature vector-based privacy-preserving perturbation algorithm for facial emotion. Our method implements privacy-preserving facial emotion images on the feature space by computing tiny perturbations and adding them to the original images. In addition, the proposed algorithm can also enable expression images to be recognized as specific labels. Experiments show that the protection success rate of our method is above 95% and the image quality evaluation degrades no more than 0.003. The quantitative and qualitative results show that our proposed method has a balance between privacy and usability.

面部情感在人机交互、虚拟现实和人与人之间的交流中具有重要意义。现有的面部情绪隐私方法主要集中在面部情绪图像的摄动上。然而,基于密码学的摄动算法计算成本很高,而基于变换的摄动算法只针对特定的识别模型。本文提出了一种通用的基于特征向量的面部情绪隐私保护摄动算法。我们的方法通过计算微小的扰动并将其添加到原始图像中,在特征空间上实现了隐私保护的面部情绪图像。此外,该算法还可以将表情图像识别为特定标签。实验表明,该方法的保护成功率在95%以上,图像质量评价下降不超过0.003。定量和定性结果表明,我们提出的方法在隐私性和可用性之间取得了平衡。
{"title":"Pri-EMO: A universal perturbation method for privacy preserving facial emotion recognition","authors":"Yong Zeng,&nbsp;Zhenyu Zhang,&nbsp;Jiale Liu,&nbsp;Jianfeng Ma,&nbsp;Zhihong Liu","doi":"10.1016/j.jiixd.2023.08.001","DOIUrl":"10.1016/j.jiixd.2023.08.001","url":null,"abstract":"<div><p>Facial emotion have great significance in human-computer interaction, virtual reality and people's communication. Existing methods for facial emotion privacy mainly concentrate on the perturbation of facial emotion images. However, cryptography-based perturbation algorithms are highly computationally expensive, and transformation-based perturbation algorithms only target specific recognition models. In this paper, we propose a universal feature vector-based privacy-preserving perturbation algorithm for facial emotion. Our method implements privacy-preserving facial emotion images on the feature space by computing tiny perturbations and adding them to the original images. In addition, the proposed algorithm can also enable expression images to be recognized as specific labels. Experiments show that the protection success rate of our method is above 95% and the image quality evaluation degrades no more than 0.003. The quantitative and qualitative results show that our proposed method has a balance between privacy and usability.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"1 4","pages":"Pages 330-340"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715923000513/pdfft?md5=6acd805c7dcedd8fb30cc2ecf57750e3&pid=1-s2.0-S2949715923000513-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84208076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSC-GCN: Contrastive semantic calibration for graph convolution network 图卷积网络的对比语义校正
Pub Date : 2023-11-01 DOI: 10.1016/j.jiixd.2023.10.001
Xu Yang, Kun Wei, Cheng Deng

Graph convolutional networks (GCNs) have been successfully applied to node representation learning in various real-world applications. However, the performance of GCNs drops rapidly when the labeled data are severely scarce, and the node features are prone to being indistinguishable with stacking more layers, causing over-fitting and over-smoothing problems. In this paper, we propose a simple yet effective contrastive semantic calibration for graph convolution network (CSC-GCN), which integrates stochastic identity aggregation and semantic calibration to overcome these weaknesses. The basic idea is the node features obtained from different aggregation operations should be similar. Toward that end, identity aggregation is utilized to extract semantic features from labeled nodes, while stochastic label noise is adopted to alleviate the over-fitting problem. Then, contrastive learning is employed to improve the discriminative ability of the node features, and the features from different aggregation operations are calibrated according to the class center similarity. In this way, the similarity between unlabeled features and labeled ones from the same class is enhanced while effectively reducing the over-smoothing problem. Experimental results on eight popular datasets show that the proposed CSC-GCN outperforms state-of-the-art methods on various classification tasks.

图卷积网络(GCNs)已经成功地应用于各种实际应用中的节点表示学习。然而,当标记数据严重稀缺时,GCNs的性能迅速下降,并且随着层数的增加,节点特征容易难以区分,导致过拟合和过平滑问题。本文提出了一种简单而有效的图卷积网络(CSC-GCN)对比语义校准方法,该方法将随机同一性聚合和语义校准相结合,克服了这些缺点。其基本思想是通过不同的聚合操作得到的节点特征应该是相似的。为此,利用身份聚合从标记节点中提取语义特征,同时采用随机标记噪声来缓解过拟合问题。然后,采用对比学习方法提高节点特征的判别能力,并根据类中心相似度对不同聚合操作的特征进行标定;这样可以增强未标记特征与同一类标记特征之间的相似度,同时有效地减少了过度平滑问题。在8个流行数据集上的实验结果表明,本文提出的CSC-GCN在各种分类任务上都优于最先进的方法。
{"title":"CSC-GCN: Contrastive semantic calibration for graph convolution network","authors":"Xu Yang,&nbsp;Kun Wei,&nbsp;Cheng Deng","doi":"10.1016/j.jiixd.2023.10.001","DOIUrl":"10.1016/j.jiixd.2023.10.001","url":null,"abstract":"<div><p>Graph convolutional networks (GCNs) have been successfully applied to node representation learning in various real-world applications. However, the performance of GCNs drops rapidly when the labeled data are severely scarce, and the node features are prone to being indistinguishable with stacking more layers, causing over-fitting and over-smoothing problems. In this paper, we propose a simple yet effective contrastive semantic calibration for graph convolution network (CSC-GCN), which integrates stochastic identity aggregation and semantic calibration to overcome these weaknesses. The basic idea is the node features obtained from different aggregation operations should be similar. Toward that end, identity aggregation is utilized to extract semantic features from labeled nodes, while stochastic label noise is adopted to alleviate the over-fitting problem. Then, contrastive learning is employed to improve the discriminative ability of the node features, and the features from different aggregation operations are calibrated according to the class center similarity. In this way, the similarity between unlabeled features and labeled ones from the same class is enhanced while effectively reducing the over-smoothing problem. Experimental results on eight popular datasets show that the proposed CSC-GCN outperforms state-of-the-art methods on various classification tasks.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"1 4","pages":"Pages 295-307"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715923000598/pdfft?md5=efb05ea241fae4078424c9e6580d2e50&pid=1-s2.0-S2949715923000598-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135762387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information and Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1