首页 > 最新文献

Journal of Information and Intelligence最新文献

英文 中文
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges 物联网攻击综合调查:分类、检测机制和挑战
Pub Date : 2024-11-01 Epub Date: 2023-12-22 DOI: 10.1016/j.jiixd.2023.12.001
The Internet of Things (IoT) has set the way for the continuing digitalization of society in various manners during the past decade. The IoT is a vast network of intelligent devices exchanging data online. The security component of IoT is crucial given its rapid expansion as a new technology paradigm since it may entail safety-critical procedures and the online storage of sensitive data. Unfortunately, security is the primary challenge when adopting Internet of Things (IoT) technologies. As a result, manufacturers’ and academics’ top priority now is improving the security of IoT devices. A substantial body of literature on the subject encompasses several issues and potential remedies. However, most existing research fails to offer a comprehensive perspective on attacks inside the IoT. Hence, this survey aims to establish a structure to guide researchers by categorizing attacks in the taxonomy according to various factors such as attack domains, attack threat type, attack executions, software surfaces, IoT protocols, attacks based on device property, attacks based on adversary location and attacks based on information damage level. This is followed by a comprehensive analysis of the countermeasures offered in academic literature. In this discourse, the countermeasures proposed for the most significant security attacks in the IoT are investigated. Following this, a comprehensive classification system for the various domains of security research in the IoT and Industrial Internet of Things (IIoT) is developed, accompanied by their respective remedies. In conclusion, the study has revealed several open research areas pertinent to the subject matter.
过去十年间,物联网(IoT)以各种方式为社会的持续数字化开辟了道路。物联网是一个由在线交换数据的智能设备组成的庞大网络。物联网作为一种新的技术范式迅速发展,其安全问题至关重要,因为它可能涉及安全关键程序和敏感数据的在线存储。遗憾的是,安全问题是采用物联网技术时面临的主要挑战。因此,制造商和学术界的当务之急是提高物联网设备的安全性。有关这一主题的大量文献涵盖了若干问题和潜在的补救措施。然而,大多数现有研究都未能从一个全面的角度来看待物联网内部的攻击。因此,本调查旨在建立一种结构,根据攻击领域、攻击威胁类型、攻击执行、软件表面、物联网协议、基于设备属性的攻击、基于对手位置的攻击和基于信息破坏程度的攻击等各种因素,在分类学中对攻击进行分类,从而为研究人员提供指导。随后对学术文献中提供的对策进行了全面分析。在这一论述中,研究了针对物联网中最重要的安全攻击提出的应对措施。随后,针对物联网和工业物联网(IIoT)安全研究的各个领域制定了一个全面的分类系统,并附有各自的补救措施。总之,本研究揭示了与本主题相关的几个开放研究领域。
{"title":"A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges","authors":"","doi":"10.1016/j.jiixd.2023.12.001","DOIUrl":"10.1016/j.jiixd.2023.12.001","url":null,"abstract":"<div><div>The Internet of Things (IoT) has set the way for the continuing digitalization of society in various manners during the past decade. The IoT is a vast network of intelligent devices exchanging data online. The security component of IoT is crucial given its rapid expansion as a new technology paradigm since it may entail safety-critical procedures and the online storage of sensitive data. Unfortunately, security is the primary challenge when adopting Internet of Things (IoT) technologies. As a result, manufacturers’ and academics’ top priority now is improving the security of IoT devices. A substantial body of literature on the subject encompasses several issues and potential remedies. However, most existing research fails to offer a comprehensive perspective on attacks inside the IoT. Hence, this survey aims to establish a structure to guide researchers by categorizing attacks in the taxonomy according to various factors such as attack domains, attack threat type, attack executions, software surfaces, IoT protocols, attacks based on device property, attacks based on adversary location and attacks based on information damage level. This is followed by a comprehensive analysis of the countermeasures offered in academic literature. In this discourse, the countermeasures proposed for the most significant security attacks in the IoT are investigated. Following this, a comprehensive classification system for the various domains of security research in the IoT and Industrial Internet of Things (IIoT) is developed, accompanied by their respective remedies. In conclusion, the study has revealed several open research areas pertinent to the subject matter.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 6","pages":"Pages 455-513"},"PeriodicalIF":0.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139019229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PGCF: Perception graph collaborative filtering for recommendation PGCF:用于推荐的感知图协同过滤
Pub Date : 2024-11-01 Epub Date: 2024-05-27 DOI: 10.1016/j.jiixd.2024.05.003
Caihong Mu , Keyang Zhang , Jiashen Luo , Yi Liu
Extensive studies have fully proved the effectiveness of collaborative filtering (CF) recommendation models based on graph convolutional networks (GCNs). As an advanced interaction encoder, however, GCN-based CF models do not differentiate neighboring nodes, which will lead to suboptimal recommendation performance. In addition, most GCN-based CF studies pay insufficient attention to the loss function and they simply select the Bayesian personalized ranking (BPR) loss function to train the model. However, we believe that the loss function is as important as the interaction encoder and deserves more attentions. To address the above issues, we propose a novel GCN-based CF model, named perception graph collaborative filtering (PGCF). Specifically, for the interaction encoder, we design a neighborhood-perception GCN to enhance the aggregation of interest-related information of the target node during the information aggregation process, while weakening the propagation of noise and irrelevant information to help the model learn better embedding representation. For the loss function, we design a margin-perception Bayesian personalized ranking (MBPR) loss function, which introduces a self-perception margin, requiring the predicted score of the user-positive sample to be greater than that of the user-negative sample, and also greater than the sum of the predicted score of the user-negative sample and the margin. The experimental results on five benchmark datasets show that PGCF is significantly superior to multiple existing CF models.
大量研究充分证明了基于图卷积网络(GCN)的协同过滤(CF)推荐模型的有效性。然而,作为一种先进的交互编码器,基于 GCN 的 CF 模型并不区分相邻节点,这将导致推荐效果不理想。此外,大多数基于 GCN 的 CF 研究对损失函数不够重视,只是简单地选择贝叶斯个性化排名(BPR)损失函数来训练模型。然而,我们认为损失函数与交互编码器同样重要,值得更多关注。针对上述问题,我们提出了一种基于 GCN 的新型 CF 模型,命名为感知图协同过滤(PGCF)。具体来说,对于交互编码器,我们设计了一个邻域感知 GCN,以增强信息聚合过程中目标节点与兴趣相关信息的聚合,同时弱化噪声和无关信息的传播,帮助模型学习更好的嵌入表示。在损失函数方面,我们设计了边际感知贝叶斯个性化排名(MBPR)损失函数,引入了自我感知边际,要求用户积极样本的预测得分大于用户消极样本的预测得分,同时也大于用户消极样本的预测得分与边际之和。在五个基准数据集上的实验结果表明,PGCF 明显优于现有的多种 CF 模型。
{"title":"PGCF: Perception graph collaborative filtering for recommendation","authors":"Caihong Mu ,&nbsp;Keyang Zhang ,&nbsp;Jiashen Luo ,&nbsp;Yi Liu","doi":"10.1016/j.jiixd.2024.05.003","DOIUrl":"10.1016/j.jiixd.2024.05.003","url":null,"abstract":"<div><div>Extensive studies have fully proved the effectiveness of collaborative filtering (CF) recommendation models based on graph convolutional networks (GCNs). As an advanced interaction encoder, however, GCN-based CF models do not differentiate neighboring nodes, which will lead to suboptimal recommendation performance. In addition, most GCN-based CF studies pay insufficient attention to the loss function and they simply select the Bayesian personalized ranking (BPR) loss function to train the model. However, we believe that the loss function is as important as the interaction encoder and deserves more attentions. To address the above issues, we propose a novel GCN-based CF model, named perception graph collaborative filtering (PGCF). Specifically, for the interaction encoder, we design a neighborhood-perception GCN to enhance the aggregation of interest-related information of the target node during the information aggregation process, while weakening the propagation of noise and irrelevant information to help the model learn better embedding representation. For the loss function, we design a margin-perception Bayesian personalized ranking (MBPR) loss function, which introduces a self-perception margin, requiring the predicted score of the user-positive sample to be greater than that of the user-negative sample, and also greater than the sum of the predicted score of the user-negative sample and the margin. The experimental results on five benchmark datasets show that PGCF is significantly superior to multiple existing CF models.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 6","pages":"Pages 525-534"},"PeriodicalIF":0.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on membership inference attacks and defenses in machine learning 机器学习中的成员推理攻击和防御调查
Pub Date : 2024-09-01 Epub Date: 2024-03-08 DOI: 10.1016/j.jiixd.2024.02.001

Membership inference (MI) attacks mainly aim to infer whether a data record was used to train a target model or not. Due to the serious privacy risks, MI attacks have been attracting a tremendous amount of attention in the research community. One existing work conducted — to our best knowledge — the first dedicated survey study in this specific area: The survey provides a comprehensive review of the literature during the period of 2017∼2021 (e.g., over 100 papers). However, due to the tremendous amount of progress (i.e., 176 papers) made in this area since 2021, the survey conducted by the one existing work has unfortunately already become very limited in the following two aspects: (1) Although the entire literature from 2017∼2021 covers 18 ways to categorize (all the proposed) MI attacks, the literature during the period of 2017∼2021, which was reviewed in the one existing work, only covered 5 ways to categorize MI attacks. With 13 ways missing, the survey conducted by the one existing work only covers 27% of the landscape (in terms of how to categorize MI attacks) if a retrospective view is taken. (2) Since the literature during the period of 2017∼2021 only covers 27% of the landscape (in terms of how to categorize), the number of new insights (i.e., why an MI attack could succeed) behind all the proposed MI attacks has been significantly increasing since year 2021. As a result, although none of the previous work has made the insights as a main focus of their studies, we found that the various insights leveraged in the literature can be broken down into 10 groups. Without making the insights as a main focus, a survey study could fail to help researchers gain adequate intellectual depth in this area of research. In this work, we conduct a systematic study to address these limitations. In particular, in order to address the first limitation, we make the 13 newly emerged ways to categorize MI attacks as a main focus on the study. In order to address the second limitation, we provide — to our best knowledge — the first review of the various insights leveraged in the entire literature. We found that the various insights leveraged in the literature can be broken down into 10 groups. Moreover, our survey also provides a comprehensive review of the existing defenses against MI attacks, the existing applications of MI attacks, the widely used datasets (e.g., 107 new datasets), and the evaluation metrics (e.g., 20 new evaluation metrics).

成员推断(MI)攻击的主要目的是推断数据记录是否用于训练目标模型。由于存在严重的隐私风险,MI 攻击在研究界引起了极大的关注。据我们所知,现有的一项工作是首次对这一特定领域进行专门调查研究:该调查对 2017-2021 年间的文献(如 100 多篇论文)进行了全面回顾。然而,由于 2021 年以来该领域取得的巨大进步(即 176 篇论文),现有的一项工作所进行的调查在以下两个方面已经变得非常有限:(1) 虽然 2017-2021 年期间的全部文献涵盖了 18 种 MI 攻击的分类方法(所有提议的),但现有的一项工作所回顾的 2017-2021 年期间的文献仅涵盖了 5 种 MI 攻击的分类方法。由于缺少 13 种方法,如果从回顾的角度来看,现有的一项工作所进行的调查只涵盖了(如何对 MI 攻击进行分类的)27% 的情况。(2)由于 2017 年至 2021 年期间的文献只覆盖了 27%的领域(在如何分类方面),因此自 2021 年以来,所有提出的 MI 攻击背后的新见解(即 MI 攻击为何能够成功)的数量一直在显著增加。因此,尽管之前的研究都没有将洞察力作为研究重点,但我们发现,文献中利用的各种洞察力可分为 10 组。如果不把洞察力作为研究重点,调查研究可能无法帮助研究人员在这一研究领域获得足够的知识深度。在这项工作中,我们针对这些局限性开展了一项系统研究。其中,针对第一个局限,我们将新出现的 13 种 MI 攻击分类方法作为研究重点。为了解决第二个局限性,据我们所知,我们首次对整个文献中利用的各种见解进行了回顾。我们发现,文献中的各种见解可分为 10 组。此外,我们的调查还全面回顾了针对 MI 攻击的现有防御、MI 攻击的现有应用、广泛使用的数据集(如 107 个新数据集)和评估指标(如 20 个新评估指标)。
{"title":"A survey on membership inference attacks and defenses in machine learning","authors":"","doi":"10.1016/j.jiixd.2024.02.001","DOIUrl":"10.1016/j.jiixd.2024.02.001","url":null,"abstract":"<div><p>Membership inference (MI) attacks mainly aim to infer whether a data record was used to train a target model or not. Due to the serious privacy risks, MI attacks have been attracting a tremendous amount of attention in the research community. One existing work conducted — to our best knowledge — the first dedicated survey study in this specific area: The survey provides a comprehensive review of the literature during the period of 2017∼2021 (e.g., over 100 papers). However, due to the tremendous amount of progress (i.e., 176 papers) made in this area since 2021, the survey conducted by the one existing work has unfortunately already become very limited in the following two aspects: (1) Although the entire literature from 2017∼2021 covers 18 ways to categorize (all the proposed) MI attacks, the literature during the period of 2017∼2021, which was reviewed in the one existing work, only covered 5 ways to categorize MI attacks. With 13 ways missing, the survey conducted by the one existing work only covers 27% of the landscape (in terms of how to categorize MI attacks) if a retrospective view is taken. (2) Since the literature during the period of 2017∼2021 only covers 27% of the landscape (in terms of how to categorize), the number of new insights (i.e., why an MI attack could succeed) behind all the proposed MI attacks has been significantly increasing since year 2021. As a result, although none of the previous work has made the insights as a main focus of their studies, we found that the various insights leveraged in the literature can be broken down into 10 groups. Without making the insights as a main focus, a survey study could fail to help researchers gain adequate intellectual depth in this area of research. In this work, we conduct a systematic study to address these limitations. In particular, in order to address the first limitation, we make the 13 newly emerged ways to categorize MI attacks as a main focus on the study. In order to address the second limitation, we provide — to our best knowledge — the first review of the various insights leveraged in the entire literature. We found that the various insights leveraged in the literature can be broken down into 10 groups. Moreover, our survey also provides a comprehensive review of the existing defenses against MI attacks, the existing applications of MI attacks, the widely used datasets (e.g., 107 new datasets), and the evaluation metrics (e.g., 20 new evaluation metrics).</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 5","pages":"Pages 404-454"},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000064/pdfft?md5=a51bb65bff0598f8d5676e4453da8337&pid=1-s2.0-S2949715924000064-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140090679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental full-duplex amplify-and-forward relay scheme for OFDM with power gain control 带功率增益控制的 OFDM 实验性全双工放大前向中继方案
Pub Date : 2024-09-01 Epub Date: 2024-05-24 DOI: 10.1016/j.jiixd.2024.05.001

The fundamental challenges for full-duplex (FD) relay networks are the self-interference cancellation (SIC) and the cooperative transmission design at the relay. This paper presents a practical amplify-and-forward (AF) FD one-way relay scheme for orthogonal frequency division multiplexing (OFDM) transmission with multi-domain SIC. It is found that the residual self-interference (SI) signals at the relay can be regarded as an equivalent multipath model. The effects of the residual SI at the relay are incorporated into the equivalent end-to-end channel model, and the inter-block interference can be removed at the destination by using cyclic prefix (CP) protection. Based on the equivalent multipath model, we present a solution for optimizing the amplification factor on the performance of signal-to-interference-plus-noise ratio (SINR) when the equivalent multipath length is longer than the CP. Furthermore, a practical one way FD relay network with 3 nodes is built and measured. The simulation and measured results verify the superior performance of the proposed scheme.

全双工(FD)中继网络面临的基本挑战是自干扰消除(SIC)和中继站的合作传输设计。本文提出了一种实用的放大-前向(AF)全双工单向中继方案,用于具有多域自干扰消除功能的正交频分复用(OFDM)传输。研究发现,中继站的残余自干扰(SI)信号可视为等效多径模型。中继站残余自干扰信号的影响被纳入等效端到端信道模型,通过使用循环前缀(CP)保护,可以在目的地消除块间干扰。基于等效多径模型,我们提出了当等效多径长度长于 CP 时放大系数对信号干扰加噪声比(SINR)性能的优化方案。此外,还构建并测量了一个有 3 个节点的实用单向 FD 中继网络。仿真和测量结果验证了所提方案的优越性能。
{"title":"Experimental full-duplex amplify-and-forward relay scheme for OFDM with power gain control","authors":"","doi":"10.1016/j.jiixd.2024.05.001","DOIUrl":"10.1016/j.jiixd.2024.05.001","url":null,"abstract":"<div><p>The fundamental challenges for full-duplex (FD) relay networks are the self-interference cancellation (SIC) and the cooperative transmission design at the relay. This paper presents a practical amplify-and-forward (AF) FD one-way relay scheme for orthogonal frequency division multiplexing (OFDM) transmission with multi-domain SIC. It is found that the residual self-interference (SI) signals at the relay can be regarded as an equivalent multipath model. The effects of the residual SI at the relay are incorporated into the equivalent end-to-end channel model, and the inter-block interference can be removed at the destination by using cyclic prefix (CP) protection. Based on the equivalent multipath model, we present a solution for optimizing the amplification factor on the performance of signal-to-interference-plus-noise ratio (SINR) when the equivalent multipath length is longer than the CP. Furthermore, a practical one way FD relay network with 3 nodes is built and measured. The simulation and measured results verify the superior performance of the proposed scheme.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 5","pages":"Pages 375-387"},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000362/pdfft?md5=fe196ceb9fd9ca78d469646703de4d63&pid=1-s2.0-S2949715924000362-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141138652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DI-VTR: Dual inter-modal interaction model for video-text retrieval DI-VTR:用于视频文本检索的双模态交互模型
Pub Date : 2024-09-01 Epub Date: 2024-03-15 DOI: 10.1016/j.jiixd.2024.03.003

Video-text retrieval is a challenging task for multimodal information processing due to the semantic gap between different modalities. However, most existing methods do not fully mine the intra-modal interactions, as with the temporal correlation of video frames, which results in poor matching performance. Additionally, the imbalanced semantic information between videos and texts also leads to difficulty in the alignment of the two modalities. To this end, we propose a dual inter-modal interaction network for video-text retrieval, i.e., DI-VTR. To learn the intra-modal interaction of video frames, we design a contextual-related video encoder to obtain more fine-grained content-oriented video representations. We also propose a dual inter-modal interaction module to accomplish accurate multilingual alignment between the video and text modalities by introducing multilingual text to improve the representation ability of text semantic features. Extensive experimental results on commonly-used video-text retrieval datasets, including MSR-VTT, MSVD and VATEX, show that the proposed method achieves significantly improved performance compared with state-of-the-art methods.

由于不同模态之间存在语义差距,视频-文本检索是多模态信息处理中一项具有挑战性的任务。然而,现有的大多数方法并不能充分挖掘模态内的交互作用,如视频帧的时间相关性,从而导致匹配效果不佳。此外,视频和文本之间语义信息的不平衡也会导致两种模态难以对齐。为此,我们提出了一种用于视频-文本检索的双模态交互网络,即 DI-VTR。为了学习视频帧的模内交互,我们设计了一种与上下文相关的视频编码器,以获得更精细的面向内容的视频表示。我们还提出了双模态间交互模块,通过引入多语言文本来提高文本语义特征的表征能力,从而实现视频模态和文本模态之间的多语言精确对齐。在常用的视频-文本检索数据集(包括 MSR-VTT、MSVD 和 VATEX)上进行的大量实验结果表明,与最先进的方法相比,所提出的方法显著提高了性能。
{"title":"DI-VTR: Dual inter-modal interaction model for video-text retrieval","authors":"","doi":"10.1016/j.jiixd.2024.03.003","DOIUrl":"10.1016/j.jiixd.2024.03.003","url":null,"abstract":"<div><p>Video-text retrieval is a challenging task for multimodal information processing due to the semantic gap between different modalities. However, most existing methods do not fully mine the intra-modal interactions, as with the temporal correlation of video frames, which results in poor matching performance. Additionally, the imbalanced semantic information between videos and texts also leads to difficulty in the alignment of the two modalities. To this end, we propose a dual inter-modal interaction network for video-text retrieval, i.e., DI-VTR. To learn the intra-modal interaction of video frames, we design a contextual-related video encoder to obtain more fine-grained content-oriented video representations. We also propose a dual inter-modal interaction module to accomplish accurate multilingual alignment between the video and text modalities by introducing multilingual text to improve the representation ability of text semantic features. Extensive experimental results on commonly-used video-text retrieval datasets, including MSR-VTT, MSVD and VATEX, show that the proposed method achieves significantly improved performance compared with state-of-the-art methods.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 5","pages":"Pages 388-403"},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S294971592400026X/pdfft?md5=99a5f02c39ebbf60a2f3d5a6ebd243c0&pid=1-s2.0-S294971592400026X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140268908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A polarisation coding scheme based on an integrated sensing and communication system 基于综合传感与通信系统的极化编码方案
Pub Date : 2024-07-01 Epub Date: 2024-02-28 DOI: 10.1016/j.jiixd.2024.02.008
Yao Zeng, Luping Xiang, Kun Yang

Integrated sensing and communication (ISAC) technology enhances the spectrum utilization of the system by interchanging the spectrum between communication and sensing, which has gained popularity in scenarios such as vehicle-to-everything (V2X). With the aim of providing more dependable services for vehicles in high-speed mobile scenarios, we propose a scheme based on sense-assisted polarisation coding. Specifically, the base station acquires the vehicle's positional information and channel strength parameters through the forward time slot echo information. This information informs the creation of the coding architecture for the following time slot. This approach not only optimizes resource consumption but also enhances system dependability. Our simulation results confirm that the introduced scheme displays a notable improvement in the bit error rate (BER) when compared to traditional communication frameworks, maintaining this advantage across both unimpeded and compromised channel conditions.

综合传感与通信(ISAC)技术通过在通信和传感之间交换频谱来提高系统的频谱利用率,在车对物(V2X)等场景中得到了广泛应用。为了在高速移动场景中为车辆提供更可靠的服务,我们提出了一种基于感知辅助极化编码的方案。具体来说,基站通过前向时隙回波信息获取车辆的位置信息和信道强度参数。这些信息可为下一时隙的编码架构提供参考。这种方法不仅能优化资源消耗,还能提高系统的可靠性。我们的仿真结果证实,与传统的通信框架相比,引入的方案在误码率(BER)方面有明显的改进,而且在无障碍和受干扰的信道条件下都能保持这一优势。
{"title":"A polarisation coding scheme based on an integrated sensing and communication system","authors":"Yao Zeng,&nbsp;Luping Xiang,&nbsp;Kun Yang","doi":"10.1016/j.jiixd.2024.02.008","DOIUrl":"https://doi.org/10.1016/j.jiixd.2024.02.008","url":null,"abstract":"<div><p>Integrated sensing and communication (ISAC) technology enhances the spectrum utilization of the system by interchanging the spectrum between communication and sensing, which has gained popularity in scenarios such as vehicle-to-everything (V2X). With the aim of providing more dependable services for vehicles in high-speed mobile scenarios, we propose a scheme based on sense-assisted polarisation coding. Specifically, the base station acquires the vehicle's positional information and channel strength parameters through the forward time slot echo information. This information informs the creation of the coding architecture for the following time slot. This approach not only optimizes resource consumption but also enhances system dependability. Our simulation results confirm that the introduced scheme displays a notable improvement in the bit error rate (BER) when compared to traditional communication frameworks, maintaining this advantage across both unimpeded and compromised channel conditions.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 4","pages":"Pages 289-301"},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000131/pdfft?md5=536a83f349ccc8ad1a305fb97ca19139&pid=1-s2.0-S2949715924000131-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141582575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of communications, sensing and computing 通信、传感和计算一体化
Pub Date : 2024-07-01 Epub Date: 2024-07-09 DOI: 10.1016/j.jiixd.2024.05.004
Zhi-Quan Luo, Hongwei Liu, Zhi Tian, Nan Zhao
{"title":"Integration of communications, sensing and computing","authors":"Zhi-Quan Luo,&nbsp;Hongwei Liu,&nbsp;Zhi Tian,&nbsp;Nan Zhao","doi":"10.1016/j.jiixd.2024.05.004","DOIUrl":"https://doi.org/10.1016/j.jiixd.2024.05.004","url":null,"abstract":"","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 4","pages":"Pages 287-288"},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000398/pdfft?md5=776426c73a955932ce337a2dd3a51d5e&pid=1-s2.0-S2949715924000398-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141582577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster-based RSU deployment strategy for vehicular ad hoc networks with integration of communication, sensing and computing 集群式 RSU 部署策略,用于集成通信、传感和计算功能的车载 Ad Hoc 网络
Pub Date : 2024-07-01 Epub Date: 2024-02-24 DOI: 10.1016/j.jiixd.2024.02.002
Xinrui Gu, Shengfeng Wang, Zhiqing Wei, Zhiyong Feng

The integration of communications, sensing and computing (I-CSC) has significant applications in vehicular ad hoc networks (VANETs). A roadside unit (RSU) plays an important role in I-CSC by performing functions such as information transmission and edge computing in vehicular communication. Due to the constraints of limited resources, RSU cannot achieve full coverage and deploying RSUs at key cluster heads of hierarchical structures of road networks is an effective management method. However, direct extracting the hierarchical structures for the resource allocation in VANETs is an open issue. In this paper, we proposed a network-based renormalization method based on information flow and geographical location to hierarchically deploy the RSU on the road networks. The renormalization method is compared with two deployment schemes: genetic algorithm (GA) and memetic framework-based optimal RSU deployment (MFRD), to verify the improvement of communication performance. Our results show that the renormalization method is superior to other schemes in terms of RSU coverage and information reception rate.

通信、传感和计算一体化(I-CSC)在车载特设网络(VANET)中有着重要的应用。路边单元(RSU)在 I-CSC 中发挥着重要作用,它在车辆通信中承担着信息传输和边缘计算等功能。由于资源有限,RSU 无法实现全覆盖,在路网分层结构的关键簇头部署 RSU 是一种有效的管理方法。然而,在 VANET 中直接提取分层结构进行资源分配是一个尚未解决的问题。在本文中,我们提出了一种基于信息流和地理位置的网络重归一化方法,在路网中分层部署 RSU。我们将重归一化方法与两种部署方案:遗传算法(GA)和基于记忆框架的 RSU 优化部署(MFRD)进行了比较,以验证通信性能的提高。结果表明,就 RSU 覆盖范围和信息接收率而言,重归一化方法优于其他方案。
{"title":"Cluster-based RSU deployment strategy for vehicular ad hoc networks with integration of communication, sensing and computing","authors":"Xinrui Gu,&nbsp;Shengfeng Wang,&nbsp;Zhiqing Wei,&nbsp;Zhiyong Feng","doi":"10.1016/j.jiixd.2024.02.002","DOIUrl":"10.1016/j.jiixd.2024.02.002","url":null,"abstract":"<div><p>The integration of communications, sensing and computing (I-CSC) has significant applications in vehicular ad hoc networks (VANETs). A roadside unit (RSU) plays an important role in I-CSC by performing functions such as information transmission and edge computing in vehicular communication. Due to the constraints of limited resources, RSU cannot achieve full coverage and deploying RSUs at key cluster heads of hierarchical structures of road networks is an effective management method. However, direct extracting the hierarchical structures for the resource allocation in VANETs is an open issue. In this paper, we proposed a network-based renormalization method based on information flow and geographical location to hierarchically deploy the RSU on the road networks. The renormalization method is compared with two deployment schemes: genetic algorithm (GA) and memetic framework-based optimal RSU deployment (MFRD), to verify the improvement of communication performance. Our results show that the renormalization method is superior to other schemes in terms of RSU coverage and information reception rate.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 4","pages":"Pages 325-338"},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000076/pdfft?md5=a20a6663048dfba2bb125f3763e3db1b&pid=1-s2.0-S2949715924000076-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140467533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative sensing, communication and computation resource allocation in mobile edge computing-enabled vehicular networks 支持边缘计算的移动车载网络中的合作传感、通信和计算资源分配
Pub Date : 2024-07-01 Epub Date: 2024-03-04 DOI: 10.1016/j.jiixd.2024.02.006
Zhenyu Li , Yuchuan Fu , Mengqiu Tian , Changle Li

The combination of integrated sensing and communication (ISAC) with mobile edge computing (MEC) enhances the overall safety and efficiency for vehicle to everything (V2X) system. However, existing works have not considered the potential impacts on base station (BS) sensing performance when users offload their computational tasks via uplink. This could leave insufficient resources allocated to the sensing tasks, resulting in low sensing performance. To address this issue, we propose a cooperative power, bandwidth and computation resource allocation (RA) scheme in this paper, maximizing the overall utility of Cramér-Rao bound (CRB) for sensing accuracy, computation latency for processing sensing information, and communication and computation latency for computational tasks. To solve the RA problem, a twin delayed deep deterministic policy gradient (TD3) algorithm is adopted to explore and obtain the effective solution of the RA problem. Furthermore, we investigate the performance tradeoff between sensing accuracy and summation of communication latency and computation latency for computational tasks, as well as the relationship between computation latency for processing sensing information and that of computational tasks by numerical simulations. Simulation demonstrates that compared to other benchmark methods, TD3 achieves an average utility improvement of 97.11% and 27.90% in terms of the maximum summation of communication latency and computation latency for computational tasks and improves 3.60 and 1.04 times regarding the maximum computation latency for processing sensing information.

综合传感与通信(ISAC)与移动边缘计算(MEC)的结合提高了车对万物(V2X)系统的整体安全性和效率。然而,现有研究并未考虑用户通过上行链路卸载计算任务时对基站(BS)传感性能的潜在影响。这可能导致分配给传感任务的资源不足,从而降低传感性能。为解决这一问题,我们在本文中提出了一种协同功率、带宽和计算资源分配(RA)方案,最大限度地提高感知精度的克拉梅尔-拉奥约束(CRB)、处理感知信息的计算延迟以及计算任务的通信和计算延迟的整体效用。为解决 RA 问题,我们采用了孪生延迟深度确定性策略梯度(TD3)算法,探索并获得了 RA 问题的有效解决方案。此外,我们还通过数值模拟研究了传感精度与通信延迟和计算任务计算延迟之间的性能权衡,以及处理传感信息的计算延迟与计算任务计算延迟之间的关系。仿真表明,与其他基准方法相比,TD3 在计算任务的最大通信延迟和计算延迟总和方面的平均效用分别提高了 97.11% 和 27.90%,在处理传感信息的最大计算延迟方面分别提高了 3.60 倍和 1.04 倍。
{"title":"Cooperative sensing, communication and computation resource allocation in mobile edge computing-enabled vehicular networks","authors":"Zhenyu Li ,&nbsp;Yuchuan Fu ,&nbsp;Mengqiu Tian ,&nbsp;Changle Li","doi":"10.1016/j.jiixd.2024.02.006","DOIUrl":"https://doi.org/10.1016/j.jiixd.2024.02.006","url":null,"abstract":"<div><p>The combination of integrated sensing and communication (ISAC) with mobile edge computing (MEC) enhances the overall safety and efficiency for vehicle to everything (V2X) system. However, existing works have not considered the potential impacts on base station (BS) sensing performance when users offload their computational tasks via uplink. This could leave insufficient resources allocated to the sensing tasks, resulting in low sensing performance. To address this issue, we propose a cooperative power, bandwidth and computation resource allocation (RA) scheme in this paper, maximizing the overall utility of Cramér-Rao bound (CRB) for sensing accuracy, computation latency for processing sensing information, and communication and computation latency for computational tasks. To solve the RA problem, a twin delayed deep deterministic policy gradient (TD3) algorithm is adopted to explore and obtain the effective solution of the RA problem. Furthermore, we investigate the performance tradeoff between sensing accuracy and summation of communication latency and computation latency for computational tasks, as well as the relationship between computation latency for processing sensing information and that of computational tasks by numerical simulations. Simulation demonstrates that compared to other benchmark methods, TD3 achieves an average utility improvement of 97.11% and 27.90% in terms of the maximum summation of communication latency and computation latency for computational tasks and improves 3.60 and 1.04 times regarding the maximum computation latency for processing sensing information.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 4","pages":"Pages 339-354"},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000118/pdfft?md5=7da67833638c1d345742ffcf41afbff6&pid=1-s2.0-S2949715924000118-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141582578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A statistical sensing method by utilizing Wi-Fi CSI subcarriers: Empirical study and performance enhancement 利用 Wi-Fi CSI 子载波的统计传感方法:实证研究与性能提升
Pub Date : 2024-07-01 Epub Date: 2024-05-24 DOI: 10.1016/j.jiixd.2024.05.002
Tao Deng , Bowen Zheng , Rui Du , Fan Liu , Tony Xiao Han

In modern Wi-Fi systems, channel state information (CSI) serves as a foundational support for various sensing applications. Currently, existing CSI-based techniques exhibit limitations in terms of environmental adaptability. As such, optimizing the utilization of subcarrier CSI stands as a critical avenue for enhancing sensing performance. Within the OFDM communication framework, this work derives sensing outcomes for both detection and estimation by harnessing the CSI from every individual measured subcarrier, subsequently consolidating these outcomes. When contrasted against results derived from CSI based on specific extraction protocols or those obtained through weighted summation, the methodology introduced in this study offers substantial improvements in CSI-based detection and estimation performance. This approach not only underscores the significance but also serves as a robust exemplar for the comprehensive application of CSI.

在现代 Wi-Fi 系统中,信道状态信息(CSI)是各种传感应用的基础支持。目前,基于 CSI 的现有技术在环境适应性方面表现出局限性。因此,优化子载波 CSI 的利用是提高传感性能的关键途径。在 OFDM 通信框架内,这项工作通过利用每个单独测量的子载波的 CSI 来获得检测和估算的传感结果,然后将这些结果进行整合。与基于特定提取协议或通过加权求和获得的 CSI 结果相比,本研究中引入的方法大大提高了基于 CSI 的检测和估计性能。这种方法不仅凸显了 CSI 的重要意义,也为 CSI 的全面应用提供了一个强有力的范例。
{"title":"A statistical sensing method by utilizing Wi-Fi CSI subcarriers: Empirical study and performance enhancement","authors":"Tao Deng ,&nbsp;Bowen Zheng ,&nbsp;Rui Du ,&nbsp;Fan Liu ,&nbsp;Tony Xiao Han","doi":"10.1016/j.jiixd.2024.05.002","DOIUrl":"10.1016/j.jiixd.2024.05.002","url":null,"abstract":"<div><p>In modern Wi-Fi systems, channel state information (CSI) serves as a foundational support for various sensing applications. Currently, existing CSI-based techniques exhibit limitations in terms of environmental adaptability. As such, optimizing the utilization of subcarrier CSI stands as a critical avenue for enhancing sensing performance. Within the OFDM communication framework, this work derives sensing outcomes for both detection and estimation by harnessing the CSI from every individual measured subcarrier, subsequently consolidating these outcomes. When contrasted against results derived from CSI based on specific extraction protocols or those obtained through weighted summation, the methodology introduced in this study offers substantial improvements in CSI-based detection and estimation performance. This approach not only underscores the significance but also serves as a robust exemplar for the comprehensive application of CSI.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 4","pages":"Pages 365-374"},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000374/pdfft?md5=90504ae06b478f8e48c78218ff4dd240&pid=1-s2.0-S2949715924000374-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141132936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information and Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1