首页 > 最新文献

Frontiers of Information Technology & Electronic Engineering最新文献

英文 中文
Federated learning on non-IID and long-tailed data via dual-decoupling 通过双解耦对非 IID 和长尾数据进行联合学习
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-07 DOI: 10.1631/fitee.2300284
Zhaohui Wang, Hongjiao Li, Jinguo Li, Renhao Hu, Baojin Wang

Federated learning (FL), a cutting-edge distributed machine learning training paradigm, aims to generate a global model by collaborating on the training of client models without revealing local private data. The cooccurrence of non-independent and identically distributed (non-IID) and long-tailed distribution in FL is one challenge that substantially degrades aggregate performance. In this paper, we present a corresponding solution called federated dual-decoupling via model and logit calibration (FedDDC) for non-IID and long-tailed distributions. The model is characterized by three aspects. First, we decouple the global model into the feature extractor and the classifier to fine-tune the components affected by the joint problem. For the biased feature extractor, we propose a client confidence re-weighting scheme to assist calibration, which assigns optimal weights to each client. For the biased classifier, we apply the classifier re-balancing method for fine-tuning. Then, we calibrate and integrate the client confidence re-weighted logits with the re-balanced logits to obtain the unbiased logits. Finally, we use decoupled knowledge distillation for the first time in the joint problem to enhance the accuracy of the global model by extracting the knowledge of the unbiased model. Numerous experiments demonstrate that on non-IID and long-tailed data in FL, our approach outperforms state-of-the-art methods.

联合学习(FL)是一种前沿的分布式机器学习训练范式,旨在通过协作训练客户端模型来生成全局模型,而不会泄露本地私人数据。在联邦学习中,非独立同分布(non-IID)和长尾分布的共存是大幅降低总体性能的一个挑战。在本文中,我们针对非独立同分布和长尾分布提出了一种相应的解决方案,称为 "通过模型和对数校准进行联合双解耦"(FedDDC)。该模型有三个方面的特点。首先,我们将全局模型解耦为特征提取器和分类器,以微调受联合问题影响的部分。对于有偏差的特征提取器,我们提出了一种客户信心重新加权方案来帮助校准,该方案为每个客户分配了最佳权重。对于有偏差的分类器,我们采用分类器再平衡方法进行微调。然后,我们将客户信心再加权对数与再平衡对数进行校准和整合,以获得无偏对数。最后,我们首次在联合问题中使用解耦知识提炼法,通过提取无偏模型的知识来提高全局模型的准确性。大量实验证明,对于 FL 中的非 IID 和长尾数据,我们的方法优于最先进的方法。
{"title":"Federated learning on non-IID and long-tailed data via dual-decoupling","authors":"Zhaohui Wang, Hongjiao Li, Jinguo Li, Renhao Hu, Baojin Wang","doi":"10.1631/fitee.2300284","DOIUrl":"https://doi.org/10.1631/fitee.2300284","url":null,"abstract":"<p>Federated learning (FL), a cutting-edge distributed machine learning training paradigm, aims to generate a global model by collaborating on the training of client models without revealing local private data. The cooccurrence of non-independent and identically distributed (non-IID) and long-tailed distribution in FL is one challenge that substantially degrades aggregate performance. In this paper, we present a corresponding solution called federated dual-decoupling via model and logit calibration (FedDDC) for non-IID and long-tailed distributions. The model is characterized by three aspects. First, we decouple the global model into the feature extractor and the classifier to fine-tune the components affected by the joint problem. For the biased feature extractor, we propose a client confidence re-weighting scheme to assist calibration, which assigns optimal weights to each client. For the biased classifier, we apply the classifier re-balancing method for fine-tuning. Then, we calibrate and integrate the client confidence re-weighted logits with the re-balanced logits to obtain the unbiased logits. Finally, we use decoupled knowledge distillation for the first time in the joint problem to enhance the accuracy of the global model by extracting the knowledge of the unbiased model. Numerous experiments demonstrate that on non-IID and long-tailed data in FL, our approach outperforms state-of-the-art methods.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"52 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141548132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Target parameter estimation for OTFS-integrated radar and communications based on sparse reconstruction preprocessing 基于稀疏重构预处理的 OTFS 集成雷达和通信的目标参数估计
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-07 DOI: 10.1631/fitee.2300462
Zhenkai Zhang, Xiaoke Shang, Yue Xiao

Orthogonal time–frequency space (OTFS) is a new modulation technique proposed in recent years for high Doppler wireless scenes. To solve the parameter estimation problem of the OTFS-integrated radar and communications system, we propose a parameter estimation method based on sparse reconstruction preprocessing to reduce the computational effort of the traditional weighted subspace fitting (WSF) algorithm. First, an OTFS-integrated echo signal model is constructed. Then, the echo signal is transformed to the time domain to separate the target angle from the range, and the range and angle of the detected target are coarsely estimated by using the sparse reconstruction algorithm. Finally, the WSF algorithm is used to refine the search with the coarse estimate at the center to obtain an accurate estimate. The simulations demonstrate the effectiveness and superiority of the proposed parameter estimation algorithm.

正交时频空间(OTFS)是近年来针对高多普勒无线场景提出的一种新型调制技术。为了解决 OTFS 集成雷达和通信系统的参数估计问题,我们提出了一种基于稀疏重构预处理的参数估计方法,以减少传统加权子空间拟合(WSF)算法的计算量。首先,构建一个 OTFS 集成回波信号模型。然后,将回波信号转换到时域,将目标角度与射程分离,利用稀疏重构算法粗略估计检测到的目标的射程和角度。最后,使用 WSF 算法以粗估计值为中心进行细化搜索,以获得精确估计值。仿真证明了所提出的参数估计算法的有效性和优越性。
{"title":"Target parameter estimation for OTFS-integrated radar and communications based on sparse reconstruction preprocessing","authors":"Zhenkai Zhang, Xiaoke Shang, Yue Xiao","doi":"10.1631/fitee.2300462","DOIUrl":"https://doi.org/10.1631/fitee.2300462","url":null,"abstract":"<p>Orthogonal time–frequency space (OTFS) is a new modulation technique proposed in recent years for high Doppler wireless scenes. To solve the parameter estimation problem of the OTFS-integrated radar and communications system, we propose a parameter estimation method based on sparse reconstruction preprocessing to reduce the computational effort of the traditional weighted subspace fitting (WSF) algorithm. First, an OTFS-integrated echo signal model is constructed. Then, the echo signal is transformed to the time domain to separate the target angle from the range, and the range and angle of the detected target are coarsely estimated by using the sparse reconstruction algorithm. Finally, the WSF algorithm is used to refine the search with the coarse estimate at the center to obtain an accurate estimate. The simulations demonstrate the effectiveness and superiority of the proposed parameter estimation algorithm.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"2014 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141548133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining graph neural network with deep reinforcement learning for resource allocation in computing force networks 将图神经网络与深度强化学习相结合,促进计算力网络的资源分配
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-07 DOI: 10.1631/fitee.2300009
Xueying Han, Mingxi Xie, Ke Yu, Xiaohong Huang, Zongpeng Du, Huijuan Yao

Fueled by the explosive growth of ultra-low-latency and real-time applications with specific computing and network performance requirements, the computing force network (CFN) has become a hot research subject. The primary CFN challenge is to leverage network resources and computing resources. Although recent advances in deep reinforcement learning (DRL) have brought significant improvement in network optimization, these methods still suffer from topology changes and fail to generalize for those topologies not seen in training. This paper proposes a graph neural network (GNN) based DRL framework to accommodate network traffic and computing resources jointly and efficiently. By taking advantage of the generalization capability in GNN, the proposed method can operate over variable topologies and obtain higher performance than the other DRL methods.

在对计算和网络性能有特殊要求的超低延迟和实时应用爆炸式增长的推动下,计算力网络(CFN)已成为一个热门研究课题。计算力网络面临的主要挑战是如何利用网络资源和计算资源。虽然深度强化学习(DRL)的最新进展为网络优化带来了显著改善,但这些方法仍然受到拓扑变化的影响,无法泛化训练中未见的拓扑。本文提出了一种基于图神经网络(GNN)的 DRL 框架,以共同高效地适应网络流量和计算资源。利用图神经网络的泛化能力,所提出的方法可以在多变的拓扑结构中运行,并获得比其他 DRL 方法更高的性能。
{"title":"Combining graph neural network with deep reinforcement learning for resource allocation in computing force networks","authors":"Xueying Han, Mingxi Xie, Ke Yu, Xiaohong Huang, Zongpeng Du, Huijuan Yao","doi":"10.1631/fitee.2300009","DOIUrl":"https://doi.org/10.1631/fitee.2300009","url":null,"abstract":"<p>Fueled by the explosive growth of ultra-low-latency and real-time applications with specific computing and network performance requirements, the computing force network (CFN) has become a hot research subject. The primary CFN challenge is to leverage network resources and computing resources. Although recent advances in deep reinforcement learning (DRL) have brought significant improvement in network optimization, these methods still suffer from topology changes and fail to generalize for those topologies not seen in training. This paper proposes a graph neural network (GNN) based DRL framework to accommodate network traffic and computing resources jointly and efficiently. By taking advantage of the generalization capability in GNN, the proposed method can operate over variable topologies and obtain higher performance than the other DRL methods.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"50 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141548131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of energy-efficient strategies for federated learning inmobile edge computing 移动边缘计算联合学习的节能策略调查
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-07 DOI: 10.1631/fitee.2300181
Kang Yan, Nina Shu, Tao Wu, Chunsheng Liu, Panlong Yang

With the booming development of fifth-generation network technology and Internet of Things, the number of end-user devices (EDs) and diverse applications is surging, resulting in massive data generated at the edge of networks. To process these data efficiently, the innovative mobile edge computing (MEC) framework has emerged to guarantee low latency and enable efficient computing close to the user traffic. Recently, federated learning (FL) has demonstrated its empirical success in edge computing due to its privacy-preserving advantages. Thus, it becomes a promising solution for analyzing and processing distributed data on EDs in various machine learning tasks, which are the major workloads in MEC. Unfortunately, EDs are typically powered by batteries with limited capacity, which brings challenges when performing energy-intensive FL tasks. To address these challenges, many strategies have been proposed to save energy in FL. Considering the absence of a survey that thoroughly summarizes and classifies these strategies, in this paper, we provide a comprehensive survey of recent advances in energy-efficient strategies for FL in MEC. Specifically, we first introduce the system model and energy consumption models in FL, in terms of computation and communication. Then we analyze the challenges regarding improving energy efficiency and summarize the energy-efficient strategies from three perspectives: learning-based, resource allocation, and client selection. We conduct a detailed analysis of these strategies, comparing their advantages and disadvantages. Additionally, we visually illustrate the impact of these strategies on the performance of FL by showcasing experimental results. Finally, several potential future research directions for energy-efficient FL are discussed.

随着第五代网络技术和物联网的蓬勃发展,终端用户设备(ED)和各种应用的数量激增,导致网络边缘产生大量数据。为了高效处理这些数据,创新的移动边缘计算(MEC)框架应运而生,以保证低延迟并实现靠近用户流量的高效计算。最近,联合学习(FL)凭借其保护隐私的优势,在边缘计算领域取得了经验上的成功。因此,在 MEC 的主要工作负载--各种机器学习任务中,联合学习成为在 ED 上分析和处理分布式数据的一种有前途的解决方案。遗憾的是,ED 通常由容量有限的电池供电,这给执行能源密集型 FL 任务带来了挑战。为了应对这些挑战,人们提出了许多在 FL 中节能的策略。考虑到缺乏对这些策略进行全面总结和分类的调查报告,我们在本文中对 MEC 中 FL 节能策略的最新进展进行了全面调查。具体来说,我们首先从计算和通信方面介绍了 FL 的系统模型和能耗模型。然后,我们分析了提高能效所面临的挑战,并从三个角度总结了节能策略:基于学习、资源分配和客户端选择。我们对这些策略进行了详细分析,比较了它们的优缺点。此外,我们还通过展示实验结果,直观地说明了这些策略对 FL 性能的影响。最后,我们讨论了高能效 FL 的几个潜在未来研究方向。
{"title":"A survey of energy-efficient strategies for federated learning inmobile edge computing","authors":"Kang Yan, Nina Shu, Tao Wu, Chunsheng Liu, Panlong Yang","doi":"10.1631/fitee.2300181","DOIUrl":"https://doi.org/10.1631/fitee.2300181","url":null,"abstract":"<p>With the booming development of fifth-generation network technology and Internet of Things, the number of end-user devices (EDs) and diverse applications is surging, resulting in massive data generated at the edge of networks. To process these data efficiently, the innovative mobile edge computing (MEC) framework has emerged to guarantee low latency and enable efficient computing close to the user traffic. Recently, federated learning (FL) has demonstrated its empirical success in edge computing due to its privacy-preserving advantages. Thus, it becomes a promising solution for analyzing and processing distributed data on EDs in various machine learning tasks, which are the major workloads in MEC. Unfortunately, EDs are typically powered by batteries with limited capacity, which brings challenges when performing energy-intensive FL tasks. To address these challenges, many strategies have been proposed to save energy in FL. Considering the absence of a survey that thoroughly summarizes and classifies these strategies, in this paper, we provide a comprehensive survey of recent advances in energy-efficient strategies for FL in MEC. Specifically, we first introduce the system model and energy consumption models in FL, in terms of computation and communication. Then we analyze the challenges regarding improving energy efficiency and summarize the energy-efficient strategies from three perspectives: learning-based, resource allocation, and client selection. We conduct a detailed analysis of these strategies, comparing their advantages and disadvantages. Additionally, we visually illustrate the impact of these strategies on the performance of FL by showcasing experimental results. Finally, several potential future research directions for energy-efficient FL are discussed.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"9 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141548284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-exit self-distillation with appropriate teachers 与合适的教师进行多出口自馏
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1631/fitee.2200644
Wujie Sun, Defang Chen, Can Wang, Deshi Ye, Yan Feng, Chun Chen

Multi-exit architecture allows early-stop inference to reduce computational cost, which can be used in resource-constrained circumstances. Recent works combine the multi-exit architecture with self-distillation to simultaneously achieve high efficiency and decent performance at different network depths. However, existing methods mainly transfer knowledge from deep exits or a single ensemble to guide all exits, without considering that inappropriate learning gaps between students and teachers may degrade the model performance, especially in shallow exits. To address this issue, we propose Multi-exit self-distillation with Appropriate TEachers (MATE) to provide diverse and appropriate teacher knowledge for each exit. In MATE, multiple ensemble teachers are obtained from all exits with different trainable weights. Each exit subsequently receives knowledge from all teachers, while focusing mainly on its primary teacher to keep an appropriate gap for efficient knowledge transfer. In this way, MATE achieves diversity in knowledge distillation while ensuring learning efficiency. Experimental results on CIFAR-100, TinyImageNet, and three fine-grained datasets demonstrate that MATE consistently outperforms state-of-the-art multi-exit self-distillation methods with various network architectures.

多退出架构允许提前停止推理以降低计算成本,可用于资源受限的情况。最近的研究将多出口架构与自蒸馏相结合,在不同的网络深度同时实现了高效率和良好的性能。然而,现有方法主要是从深度出口或单一集合中转移知识来指导所有出口,而没有考虑到师生之间不适当的学习差距可能会降低模型性能,尤其是在浅出口中。为了解决这个问题,我们提出了 "多出口自发散与适当的教师"(MATE),为每个出口提供多样化和适当的教师知识。在 MATE 中,从所有出口获得多个具有不同可训练权重的合奏教师。随后,每个出口接收来自所有教师的知识,同时主要关注其主要教师,以保持适当的差距,从而实现高效的知识转移。这样,MATE 在确保学习效率的同时,实现了知识提炼的多样性。在 CIFAR-100、TinyImageNet 和三个细粒度数据集上的实验结果表明,MATE 始终优于采用各种网络架构的最先进的多出口自蒸馏方法。
{"title":"Multi-exit self-distillation with appropriate teachers","authors":"Wujie Sun, Defang Chen, Can Wang, Deshi Ye, Yan Feng, Chun Chen","doi":"10.1631/fitee.2200644","DOIUrl":"https://doi.org/10.1631/fitee.2200644","url":null,"abstract":"<p>Multi-exit architecture allows early-stop inference to reduce computational cost, which can be used in resource-constrained circumstances. Recent works combine the multi-exit architecture with self-distillation to simultaneously achieve high efficiency and decent performance at different network depths. However, existing methods mainly transfer knowledge from deep exits or a single ensemble to guide all exits, without considering that inappropriate learning gaps between students and teachers may degrade the model performance, especially in shallow exits. To address this issue, we propose Multi-exit self-distillation with Appropriate TEachers (MATE) to provide diverse and appropriate teacher knowledge for each exit. In MATE, multiple ensemble teachers are obtained from all exits with different trainable weights. Each exit subsequently receives knowledge from all teachers, while focusing mainly on its primary teacher to keep an appropriate gap for efficient knowledge transfer. In this way, MATE achieves diversity in knowledge distillation while ensuring learning efficiency. Experimental results on CIFAR-100, TinyImageNet, and three fine-grained datasets demonstrate that MATE consistently outperforms state-of-the-art multi-exit self-distillation methods with various network architectures.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"7 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and verification of an FPGA programmable logic element based on Sense-Switch pFLASH 基于感应开关 pFLASH 的 FPGA 可编程逻辑元件的设计与验证
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1631/fitee.2300454
Zhengzhou Cao, Guozhu Liu, Yanfei Zhang, Yueer Shan, Yuting Xu

This paper proposes a kind of programmable logic element (PLE) based on Sense-Switch pFLASH technology. By programming Sense-Switch pFLASH, all three-bit look-up table (LUT3) functions, partial four-bit look-up table (LUT4) functions, latch functions, and d flip flop (DFF) with enable and reset functions can be realized. Because PLE uses a choice of operational logic (COOL) approach for the operation of logic functions, it allows any logic circuit to be implemented at any ratio of combinatorial logic to register. This intrinsic property makes it close to the basic application specific integrated circuit (ASIC) cell in terms of fine granularity, thus allowing ASIC-like cell-based mappers to apply all their optimization potential. By measuring Sense-Switch pFLASH and PLE circuits, the results show that the “on” state driving current of the Sense-Switch pFLASH is about 245.52 µA, and that the “off” state leakage current is about 0.1 pA. The programmable function of PLE works normally. The delay of the typical combinatorial logic operation AND3 is 0.69 ns, and the delay of the sequential logic operation DFF is 0.65 ns, both of which meet the requirements of the design technical index.

本文提出了一种基于 Sense-Switch pFLASH 技术的可编程逻辑元件(PLE)。通过对 Sense-Switch pFLASH 进行编程,可以实现所有三位查找表(LUT3)功能、部分四位查找表(LUT4)功能、锁存功能以及具有使能和复位功能的 d 触发器(DFF)。由于 PLE 采用运算逻辑选择 (COOL) 方法来操作逻辑功能,因此它允许以任意比例的组合逻辑与寄存器来实现任何逻辑电路。这一固有特性使其在细粒度方面接近于基本的专用集成电路(ASIC)单元,从而使类似于 ASIC 单元的映射器能够应用其所有的优化潜力。通过测量 Sense-Switch pFLASH 和 PLE 电路,结果显示 Sense-Switch pFLASH 的 "开 "状态驱动电流约为 245.52 µA,"关 "状态漏电流约为 0.1 pA。PLE 的可编程功能正常工作。典型组合逻辑运算 AND3 的延迟为 0.69 ns,顺序逻辑运算 DFF 的延迟为 0.65 ns,均满足设计技术指标的要求。
{"title":"Design and verification of an FPGA programmable logic element based on Sense-Switch pFLASH","authors":"Zhengzhou Cao, Guozhu Liu, Yanfei Zhang, Yueer Shan, Yuting Xu","doi":"10.1631/fitee.2300454","DOIUrl":"https://doi.org/10.1631/fitee.2300454","url":null,"abstract":"<p>This paper proposes a kind of programmable logic element (PLE) based on Sense-Switch pFLASH technology. By programming Sense-Switch pFLASH, all three-bit look-up table (LUT3) functions, partial four-bit look-up table (LUT4) functions, latch functions, and d flip flop (DFF) with enable and reset functions can be realized. Because PLE uses a choice of operational logic (COOL) approach for the operation of logic functions, it allows any logic circuit to be implemented at any ratio of combinatorial logic to register. This intrinsic property makes it close to the basic application specific integrated circuit (ASIC) cell in terms of fine granularity, thus allowing ASIC-like cell-based mappers to apply all their optimization potential. By measuring Sense-Switch pFLASH and PLE circuits, the results show that the “on” state driving current of the Sense-Switch pFLASH is about 245.52 µA, and that the “off” state leakage current is about 0.1 pA. The programmable function of PLE works normally. The delay of the typical combinatorial logic operation AND3 is 0.69 ns, and the delay of the sequential logic operation DFF is 0.65 ns, both of which meet the requirements of the design technical index.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"246 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140942142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards sustainable adversarial training with successive perturbation generation 利用连续扰动生成实现可持续对抗训练
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1631/fitee.2300474
Wei Lin, Lichuan Liao

Adversarial training with online-generated adversarial examples has achieved promising performance in defending adversarial attacks and improving robustness of convolutional neural network models. However, most existing adversarial training methods are dedicated to finding strong adversarial examples for forcing the model to learn the adversarial data distribution, which inevitably imposes a large computational overhead and results in a decrease in the generalization performance on clean data. In this paper, we show that progressively enhancing the adversarial strength of adversarial examples across training epochs can effectively improve the model robustness, and appropriate model shifting can preserve the generalization performance of models in conjunction with negligible computational cost. To this end, we propose a successive perturbation generation scheme for adversarial training (SPGAT), which progressively strengthens the adversarial examples by adding the perturbations on adversarial examples transferred from the previous epoch and shifts models across the epochs to improve the efficiency of adversarial training. The proposed SPGAT is both efficient and effective; e.g., the computation time of our method is 900 min as against the 4100 min duration observed in the case of standard adversarial training, and the performance boost is more than 7% and 3% in terms of adversarial accuracy and clean accuracy, respectively. We extensively evaluate the SPGAT on various datasets, including small-scale MNIST, middle-scale CIFAR-10, and large-scale CIFAR-100. The experimental results show that our method is more efficient while performing favorably against state-of-the-art methods.

利用在线生成的对抗示例进行对抗训练,在防御对抗攻击和提高卷积神经网络模型的鲁棒性方面取得了可喜的成绩。然而,现有的对抗训练方法大多致力于寻找强对抗范例,以迫使模型学习对抗数据分布,这不可避免地会带来大量计算开销,并导致模型在干净数据上的泛化性能下降。在本文中,我们证明了在训练历时中逐步增强对抗性示例的对抗强度可以有效提高模型的鲁棒性,而适当的模型转换可以在保持模型泛化性能的同时,使计算成本降低到可以忽略不计的程度。为此,我们提出了一种用于对抗训练的连续扰动生成方案(SPGAT),该方案通过对上一训练时程转移过来的对抗示例添加扰动来逐步增强对抗示例,并在各训练时程之间转移模型,从而提高对抗训练的效率。我们提出的 SPGAT 既高效又有效,例如,我们方法的计算时间为 900 分钟,而标准对抗训练的计算时间为 4100 分钟,在对抗准确率和干净准确率方面的性能提升分别超过 7% 和 3%。我们在各种数据集上广泛评估了 SPGAT,包括小型 MNIST、中型 CIFAR-10 和大型 CIFAR-100。实验结果表明,与最先进的方法相比,我们的方法更加高效。
{"title":"Towards sustainable adversarial training with successive perturbation generation","authors":"Wei Lin, Lichuan Liao","doi":"10.1631/fitee.2300474","DOIUrl":"https://doi.org/10.1631/fitee.2300474","url":null,"abstract":"<p>Adversarial training with online-generated adversarial examples has achieved promising performance in defending adversarial attacks and improving robustness of convolutional neural network models. However, most existing adversarial training methods are dedicated to finding strong adversarial examples for forcing the model to learn the adversarial data distribution, which inevitably imposes a large computational overhead and results in a decrease in the generalization performance on clean data. In this paper, we show that progressively enhancing the adversarial strength of adversarial examples across training epochs can effectively improve the model robustness, and appropriate model shifting can preserve the generalization performance of models in conjunction with negligible computational cost. To this end, we propose a successive perturbation generation scheme for adversarial training (SPGAT), which progressively strengthens the adversarial examples by adding the perturbations on adversarial examples transferred from the previous epoch and shifts models across the epochs to improve the efficiency of adversarial training. The proposed SPGAT is both efficient and effective; e.g., the computation time of our method is 900 min as against the 4100 min duration observed in the case of standard adversarial training, and the performance boost is more than 7% and 3% in terms of adversarial accuracy and clean accuracy, respectively. We extensively evaluate the SPGAT on various datasets, including small-scale MNIST, middle-scale CIFAR-10, and large-scale CIFAR-100. The experimental results show that our method is more efficient while performing favorably against state-of-the-art methods.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"59 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks 确保多链共识免受区块链网络中多样化矿工行为的攻击
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1631/fitee.2200505
Wenbo Zhang, Tao Wang, Chaoyang Zhang, Jingyu Feng

As cross-chain technologies enable interactions among different blockchains (hereinafter “chains”), multi-chain consensus is becoming increasingly important in blockchain networks. However, more attention has been paid to single-chain consensus schemes. Multi-chain consensus schemes with trusted miner participation have not been considered, thus offering opportunities for malicious users to launch diverse miner behavior (DMB) attacks on different chains. DMB attackers can be friendly in the consensus process on some chains, called mask chains, to enhance their trust value, while on others, called kill chains, they engage in destructive behaviors on the network. In this paper, we propose a multi-chain consensus scheme named Proof-of-DiscTrust (PoDT) to defend against DMB attacks. The idea of distinctive trust (DiscTrust) is introduced to evaluate the trust value of each user across different chains. The trustworthiness of a user is split into local and global trust values. A dynamic behavior prediction scheme is designed to enforce DiscTrust to prevent an intensive DMB attacker from maintaining strong trust by alternately creating true or false blocks on the kill chain. Three trusted miner selection algorithms for multi-chain environments can be implemented to select network miners, chain miners, and chain miner leaders, separately. Simulation results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chain environments.

由于跨链技术实现了不同区块链(以下简称 "链")之间的互动,多链共识在区块链网络中变得越来越重要。然而,人们更关注单链共识方案。有可信矿工参与的多链共识方案尚未得到考虑,这就为恶意用户在不同链上发起多样化矿工行为(DMB)攻击提供了机会。DMB 攻击者可以在一些链(称为掩码链)上友好地参与共识过程,以提高自己的信任值,而在另一些链(称为杀伤链)上,他们则会对网络实施破坏行为。在本文中,我们提出了一种名为 "不信任证明"(PoDT)的多链共识方案来抵御 DMB 攻击。我们引入了独特信任(DiscTrust)的概念来评估每个用户在不同链上的信任值。用户的可信度分为本地信任值和全局信任值。设计了一种动态行为预测方案来强制执行 DiscTrust,以防止密集 DMB 攻击者通过在杀链上交替创建真实或虚假区块来维持强信任。多链环境下的三种可信矿工选择算法可分别用于选择网络矿工、链矿工和链矿工领导者。仿真结果表明,PoDT 可安全抵御 DMB 攻击,在多链环境中比传统共识方案更有效。
{"title":"Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks","authors":"Wenbo Zhang, Tao Wang, Chaoyang Zhang, Jingyu Feng","doi":"10.1631/fitee.2200505","DOIUrl":"https://doi.org/10.1631/fitee.2200505","url":null,"abstract":"<p>As cross-chain technologies enable interactions among different blockchains (hereinafter “chains”), multi-chain consensus is becoming increasingly important in blockchain networks. However, more attention has been paid to single-chain consensus schemes. Multi-chain consensus schemes with trusted miner participation have not been considered, thus offering opportunities for malicious users to launch diverse miner behavior (DMB) attacks on different chains. DMB attackers can be friendly in the consensus process on some chains, called mask chains, to enhance their trust value, while on others, called kill chains, they engage in destructive behaviors on the network. In this paper, we propose a multi-chain consensus scheme named Proof-of-DiscTrust (PoDT) to defend against DMB attacks. The idea of distinctive trust (DiscTrust) is introduced to evaluate the trust value of each user across different chains. The trustworthiness of a user is split into local and global trust values. A dynamic behavior prediction scheme is designed to enforce DiscTrust to prevent an intensive DMB attacker from maintaining strong trust by alternately creating true or false blocks on the kill chain. Three trusted miner selection algorithms for multi-chain environments can be implemented to select network miners, chain miners, and chain miner leaders, separately. Simulation results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chain environments.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"154 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140926190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An anti-collision algorithm for robotic search-and-rescue tasks in unknown dynamic environments 未知动态环境中机器人搜救任务的防碰撞算法
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1631/fitee.2300151
Yang Chen, Dianxi Shi, Huanhuan Yang, Tongyue Li, Zhen Wang

This paper deals with the search-and-rescue tasks of a mobile robot with multiple interesting targets in an unknown dynamic environment. The problem is challenging because the mobile robot needs to search for multiple targets while avoiding obstacles simultaneously. To ensure that the mobile robot avoids obstacles properly, we propose a mixed-strategy Nash equilibrium based Dyna-Q (MNDQ) algorithm. First, a multi-objective layered structure is introduced to simplify the representation of multiple objectives and reduce computational complexity. This structure divides the overall task into subtasks, including searching for targets and avoiding obstacles. Second, a risk-monitoring mechanism is proposed based on the relative positions of dynamic risks. This mechanism helps the robot avoid potential collisions and unnecessary detours. Then, to improve sampling efficiency, MNDQ is presented, which combines Dyna-Q and mixed-strategy Nash equilibrium. By using mixed-strategy Nash equilibrium, the agent makes decisions in the form of probabilities, maximizing the expected rewards and improving the overall performance of the Dyna-Q algorithm. Furthermore, a series of simulations are conducted to verify the effectiveness of the proposed method. The results show that MNDQ performs well and exhibits robustness, providing a competitive solution for future autonomous robot navigation tasks.

本文讨论的是移动机器人在未知动态环境中搜索和救援多个有趣目标的任务。这个问题具有挑战性,因为移动机器人需要同时搜索多个目标并避开障碍物。为了确保移动机器人正确避开障碍物,我们提出了一种基于纳什均衡的混合策略 Dyna-Q 算法(MNDQ)。首先,我们引入了一种多目标分层结构,以简化多目标表示并降低计算复杂度。该结构将总体任务划分为多个子任务,包括搜索目标和避开障碍物。其次,基于动态风险的相对位置,提出了一种风险监测机制。这种机制可以帮助机器人避免潜在的碰撞和不必要的绕行。然后,为了提高采样效率,提出了 MNDQ,它结合了 Dyna-Q 和混合策略纳什均衡。通过使用混合策略纳什均衡,机器人以概率的形式做出决策,最大化了预期回报,提高了 Dyna-Q 算法的整体性能。此外,我们还进行了一系列模拟,以验证所提方法的有效性。结果表明,MNDQ 性能良好,表现出鲁棒性,为未来的自主机器人导航任务提供了一种有竞争力的解决方案。
{"title":"An anti-collision algorithm for robotic search-and-rescue tasks in unknown dynamic environments","authors":"Yang Chen, Dianxi Shi, Huanhuan Yang, Tongyue Li, Zhen Wang","doi":"10.1631/fitee.2300151","DOIUrl":"https://doi.org/10.1631/fitee.2300151","url":null,"abstract":"<p>This paper deals with the search-and-rescue tasks of a mobile robot with multiple interesting targets in an unknown dynamic environment. The problem is challenging because the mobile robot needs to search for multiple targets while avoiding obstacles simultaneously. To ensure that the mobile robot avoids obstacles properly, we propose a mixed-strategy Nash equilibrium based Dyna-Q (MNDQ) algorithm. First, a multi-objective layered structure is introduced to simplify the representation of multiple objectives and reduce computational complexity. This structure divides the overall task into subtasks, including searching for targets and avoiding obstacles. Second, a risk-monitoring mechanism is proposed based on the relative positions of dynamic risks. This mechanism helps the robot avoid potential collisions and unnecessary detours. Then, to improve sampling efficiency, MNDQ is presented, which combines Dyna-Q and mixed-strategy Nash equilibrium. By using mixed-strategy Nash equilibrium, the agent makes decisions in the form of probabilities, maximizing the expected rewards and improving the overall performance of the Dyna-Q algorithm. Furthermore, a series of simulations are conducted to verify the effectiveness of the proposed method. The results show that MNDQ performs well and exhibits robustness, providing a competitive solution for future autonomous robot navigation tasks.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"3 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FaSRnet: a feature and semantics refinement network for human pose estimation FaSRnet:用于人体姿态估计的特征和语义细化网络
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1631/fitee.2200639
Yuanhong Zhong, Qianfeng Xu, Daidi Zhong, Xun Yang, Shanshan Wang

Due to factors such as motion blur, video out-of-focus, and occlusion, multi-frame human pose estimation is a challenging task. Exploiting temporal consistency between consecutive frames is an efficient approach for addressing this issue. Currently, most methods explore temporal consistency through refinements of the final heatmaps. The heatmaps contain the semantics information of key points, and can improve the detection quality to a certain extent. However, they are generated by features, and feature-level refinements are rarely considered. In this paper, we propose a human pose estimation framework with refinements at the feature and semantics levels. We align auxiliary features with the features of the current frame to reduce the loss caused by different feature distributions. An attention mechanism is then used to fuse auxiliary features with current features. In terms of semantics, we use the difference information between adjacent heatmaps as auxiliary features to refine the current heatmaps. The method is validated on the large-scale benchmark datasets PoseTrack2017 and PoseTrack2018, and the results demonstrate the effectiveness of our method.

由于运动模糊、视频失焦和遮挡等因素,多帧人体姿态估计是一项具有挑战性的任务。利用连续帧之间的时间一致性是解决这一问题的有效方法。目前,大多数方法都是通过完善最终热图来探索时间一致性。热图包含关键点的语义信息,可以在一定程度上提高检测质量。然而,热图是由特征生成的,很少考虑特征级的细化。在本文中,我们提出了一种在特征和语义层面进行细化的人体姿态估计框架。我们将辅助特征与当前帧的特征对齐,以减少不同特征分布造成的损失。然后使用注意力机制将辅助特征与当前特征进行融合。在语义方面,我们使用相邻热图之间的差异信息作为辅助特征来完善当前热图。该方法在大规模基准数据集 PoseTrack2017 和 PoseTrack2018 上进行了验证,结果证明了我们方法的有效性。
{"title":"FaSRnet: a feature and semantics refinement network for human pose estimation","authors":"Yuanhong Zhong, Qianfeng Xu, Daidi Zhong, Xun Yang, Shanshan Wang","doi":"10.1631/fitee.2200639","DOIUrl":"https://doi.org/10.1631/fitee.2200639","url":null,"abstract":"<p>Due to factors such as motion blur, video out-of-focus, and occlusion, multi-frame human pose estimation is a challenging task. Exploiting temporal consistency between consecutive frames is an efficient approach for addressing this issue. Currently, most methods explore temporal consistency through refinements of the final heatmaps. The heatmaps contain the semantics information of key points, and can improve the detection quality to a certain extent. However, they are generated by features, and feature-level refinements are rarely considered. In this paper, we propose a human pose estimation framework with refinements at the feature and semantics levels. We align auxiliary features with the features of the current frame to reduce the loss caused by different feature distributions. An attention mechanism is then used to fuse auxiliary features with current features. In terms of semantics, we use the difference information between adjacent heatmaps as auxiliary features to refine the current heatmaps. The method is validated on the large-scale benchmark datasets PoseTrack2017 and PoseTrack2018, and the results demonstrate the effectiveness of our method.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"13 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Frontiers of Information Technology & Electronic Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1