首页 > 最新文献

Frontiers of Information Technology & Electronic Engineering最新文献

英文 中文
Secure resource allocation against colluding eavesdropping in a user-centric cell-free massive multiple-input multiple-output system 在以用户为中心的无小区大规模多输入多输出系统中防止串通窃听的安全资源分配
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1631/fitee.2200599
Na Li, Yuanyuan Gao, Kui Xu, Xiaochen Xia, Huazhi Hu, Yang Li, Yueyue Zhang

We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers. To address the problem of limited pilot resources, a scheme is proposed to allocate the pilot with the minimum pollution to users based on access point selection and optimize the pilot transmission power to improve the accuracy of channel estimation. Aiming at the secure transmission problem under a colluding eavesdropping environment by multiple passive eavesdroppers, based on the local partial zero-forcing precoding scheme, a transmission power optimization scheme is formulated to maximize the system’s minimum security spectral efficiency. Simulation results show that the proposed scheme can effectively reduce channel estimation error and improve system security.

我们研究了在多个被动窃听者串通窃听的条件下,无小区大规模多输入多输出系统的资源分配问题。针对先导资源有限的问题,提出了一种基于接入点选择为用户分配污染最小的先导的方案,并优化先导发射功率以提高信道估计的准确性。针对多个被动窃听者串通窃听环境下的安全传输问题,基于局部偏零前置编码方案,提出了一种传输功率优化方案,以最大化系统的最小安全频谱效率。仿真结果表明,所提方案能有效降低信道估计误差,提高系统安全性。
{"title":"Secure resource allocation against colluding eavesdropping in a user-centric cell-free massive multiple-input multiple-output system","authors":"Na Li, Yuanyuan Gao, Kui Xu, Xiaochen Xia, Huazhi Hu, Yang Li, Yueyue Zhang","doi":"10.1631/fitee.2200599","DOIUrl":"https://doi.org/10.1631/fitee.2200599","url":null,"abstract":"<p>We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers. To address the problem of limited pilot resources, a scheme is proposed to allocate the pilot with the minimum pollution to users based on access point selection and optimize the pilot transmission power to improve the accuracy of channel estimation. Aiming at the secure transmission problem under a colluding eavesdropping environment by multiple passive eavesdroppers, based on the local partial zero-forcing precoding scheme, a transmission power optimization scheme is formulated to maximize the system’s minimum security spectral efficiency. Simulation results show that the proposed scheme can effectively reduce channel estimation error and improve system security.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"154 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel design of a compact tunable dual band wireless power transfer (TDB-WPT) system for multiple WPT applications 用于多种 WPT 应用的紧凑型可调双频无线功率传输 (TDB-WPT) 系统的新颖设计
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1631/fitee.2200664
Hany A. Atallah, Rasha Hussein Ahmed, Adel B. Abdel-Rahman

In this study we present the design and realization of a tunable dual band wireless power transfer (TDB-WPT) coupled resonator system. The frequency response of the tunable band can be controlled using a surface-mounted varactor. The transmitter (Tx) and the receiver (Rx) circuits are symmetric. The top layer contains a feed line with an impedance of 50 Ω. Two identical half rings defected ground structures (HR-DGSs) are loaded on the bottom using a varactor diode. We propose a solution for restricted WPT systems working at a single band application according to the operating frequency. The effects of geometry, orientation, relative distance, and misalignments on the coupling coefficients were studied. To validate the simulation results, the proposed TDB-WPT system was fabricated and tested. The system occupied a space of 40 mm×40 mm. It can deliver power to the receiver with an average coupling efficiency of 98% at the tuned band from 817 to 1018 MHz and an efficiency of 95% at a fixed band of 1.6 GHz at a significant transmission distance of 22 mm. The results of the measurements accorded well with those of an equivalent model and the simulation.

在这项研究中,我们介绍了可调双频无线功率传输(TDB-WPT)耦合谐振器系统的设计与实现。可调频段的频率响应可通过表面贴装的变容器来控制。发射器(Tx)和接收器(Rx)电路是对称的。顶层包含一条阻抗为 50 Ω 的馈电线,底部使用变容二极管加载两个相同的半环缺陷接地结构(HR-DGS)。我们提出了一种根据工作频率在单一波段应用的受限 WPT 系统解决方案。我们研究了几何形状、方向、相对距离和错位对耦合系数的影响。为了验证仿真结果,对所提出的 TDB-WPT 系统进行了制造和测试。该系统占用的空间为 40 毫米×40 毫米。在 817 至 1018 MHz 的调谐频段,它能以 98% 的平均耦合效率向接收器输送功率;在 1.6 GHz 的固定频段,它能以 95% 的效率向接收器输送功率。测量结果与等效模型和模拟结果十分吻合。
{"title":"Novel design of a compact tunable dual band wireless power transfer (TDB-WPT) system for multiple WPT applications","authors":"Hany A. Atallah, Rasha Hussein Ahmed, Adel B. Abdel-Rahman","doi":"10.1631/fitee.2200664","DOIUrl":"https://doi.org/10.1631/fitee.2200664","url":null,"abstract":"<p>In this study we present the design and realization of a tunable dual band wireless power transfer (TDB-WPT) coupled resonator system. The frequency response of the tunable band can be controlled using a surface-mounted varactor. The transmitter (Tx) and the receiver (Rx) circuits are symmetric. The top layer contains a feed line with an impedance of 50 Ω. Two identical half rings defected ground structures (HR-DGSs) are loaded on the bottom using a varactor diode. We propose a solution for restricted WPT systems working at a single band application according to the operating frequency. The effects of geometry, orientation, relative distance, and misalignments on the coupling coefficients were studied. To validate the simulation results, the proposed TDB-WPT system was fabricated and tested. The system occupied a space of 40 mm×40 mm. It can deliver power to the receiver with an average coupling efficiency of 98% at the tuned band from 817 to 1018 MHz and an efficiency of 95% at a fixed band of 1.6 GHz at a significant transmission distance of 22 mm. The results of the measurements accorded well with those of an equivalent model and the simulation.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"100 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A spaceborne advanced storage system for remote sensing microsatellites 遥感微型卫星的星载高级存储系统
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1631/fitee.2200445
Shilei Tu, Huiquan Wang, Yue Huang, Zhonghe Jin

With the development of satellite miniaturization and remote sensing, the establishment of microsatellite constellations is an inevitable trend. Due to their limited size, weight, and power, spaceborne storage systems with excellent scalability, performance, and reliability are still one of the technical bottlenecks of remote sensing microsatellites. Based on the commercial off-the-shelf field-programmable gate array and memory devices, a spaceborne advanced storage system (SASS) is proposed in this paper. This work provides a dynamic programming, queue scheduling multiple-input multiple-output cache technique and a high-speed, high-reliability NAND flash controller for multiple microsatellite payload data. Experimental results show that SASS has outstanding scalability with a maximum write rate of 2429 Mb/s and preserves at least 78.53% of the performance when a single NAND flash fails. The scheduling technique effectively shortens the data scheduling time, and the data remapping method of the NAND flash controller can reduce the retention error by at least 50.73% and the program disturbance error by at least 37.80%.

随着卫星微型化和遥感技术的发展,建立微型卫星星座是必然趋势。由于体积、重量和功率有限,具有良好扩展性、性能和可靠性的星载存储系统仍然是遥感微卫星的技术瓶颈之一。本文基于现成的商用现场可编程门阵列和存储器件,提出了一种星载高级存储系统(SASS)。这项工作为多个微卫星有效载荷数据提供了动态编程、队列调度多输入多输出缓存技术和高速、高可靠性 NAND 闪存控制器。实验结果表明,SASS 具有出色的可扩展性,最大写入速率可达 2429 Mb/s,并且在单个 NAND 闪存出现故障时至少能保留 78.53% 的性能。调度技术有效缩短了数据调度时间,而 NAND 闪存控制器的数据重映射方法可将保留误差至少减少 50.73%,将程序干扰误差至少减少 37.80%。
{"title":"A spaceborne advanced storage system for remote sensing microsatellites","authors":"Shilei Tu, Huiquan Wang, Yue Huang, Zhonghe Jin","doi":"10.1631/fitee.2200445","DOIUrl":"https://doi.org/10.1631/fitee.2200445","url":null,"abstract":"<p>With the development of satellite miniaturization and remote sensing, the establishment of microsatellite constellations is an inevitable trend. Due to their limited size, weight, and power, spaceborne storage systems with excellent scalability, performance, and reliability are still one of the technical bottlenecks of remote sensing microsatellites. Based on the commercial off-the-shelf field-programmable gate array and memory devices, a spaceborne advanced storage system (SASS) is proposed in this paper. This work provides a dynamic programming, queue scheduling multiple-input multiple-output cache technique and a high-speed, high-reliability NAND flash controller for multiple microsatellite payload data. Experimental results show that SASS has outstanding scalability with a maximum write rate of 2429 Mb/s and preserves at least 78.53% of the performance when a single NAND flash fails. The scheduling technique effectively shortens the data scheduling time, and the data remapping method of the NAND flash controller can reduce the retention error by at least 50.73% and the program disturbance error by at least 37.80%.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"21 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Availability evaluation of controller area networks under the influence of intermittent connection faults 间歇性连接故障影响下的控制器区域网络可用性评估
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-10 DOI: 10.1631/fitee.2200592
Longkai Wang, Leiming Zhang, Yong Lei

Controller area networks (CANs), as one of the widely used fieldbuses in the industry, have been extended to the automation field with strict standards for safety and reliability. In practice, factors such as fatigue and insulation wear of the cables can cause intermittent connection (IC) faults to occur frequently in the CAN, which will affect the dynamic behavior and the safety of the system. Hence, quantitatively evaluating the performance of the CAN under the influence of IC faults is crucial to real-time health monitoring of the system. In this paper, a novel methodology is proposed for real-time quantitative evaluation of CAN availability when considering IC faults, with the system availability parameter being calculated based on the network state transition model. First, the causal relationship between IC fault and network error response is constructed, based on which the IC fault arrival rate is estimated. Second, the states of the network considering IC faults are analyzed, and the deterministic and stochastic Petri net (DSPN) model is applied to describe the transition relationship of the states. Then, the parameters of the DSPN model are determined and the availability of the system is calculated based on the probability distribution and physical meaning of markings in the DSPN model. A testbed is constructed and case studies are conducted to verify the proposed methodology under various experimental setups. Experimental results show that the estimation results obtained using the proposed method agree well with the actual values.

控制器区域网络(CAN)作为工业中广泛使用的现场总线之一,已被扩展到自动化领域,其安全性和可靠性有着严格的标准。在实际应用中,电缆的疲劳和绝缘磨损等因素会导致 CAN 频繁出现间歇性连接(IC)故障,从而影响系统的动态行为和安全性。因此,定量评估 CAN 在 IC 故障影响下的性能对系统的实时健康监测至关重要。本文提出了一种在考虑集成电路故障时对 CAN 可用性进行实时定量评估的新方法,根据网络状态转换模型计算系统可用性参数。首先,构建集成电路故障与网络错误响应之间的因果关系,并据此估算集成电路故障到达率。其次,分析考虑集成电路故障的网络状态,并应用确定性和随机性 Petri 网(DSPN)模型来描述状态的转换关系。然后,确定 DSPN 模型的参数,并根据 DSPN 模型中标记的概率分布和物理意义计算系统的可用性。我们构建了一个测试平台,并进行了案例研究,以在各种实验设置下验证所提出的方法。实验结果表明,使用建议方法获得的估算结果与实际值非常吻合。
{"title":"Availability evaluation of controller area networks under the influence of intermittent connection faults","authors":"Longkai Wang, Leiming Zhang, Yong Lei","doi":"10.1631/fitee.2200592","DOIUrl":"https://doi.org/10.1631/fitee.2200592","url":null,"abstract":"<p>Controller area networks (CANs), as one of the widely used fieldbuses in the industry, have been extended to the automation field with strict standards for safety and reliability. In practice, factors such as fatigue and insulation wear of the cables can cause intermittent connection (IC) faults to occur frequently in the CAN, which will affect the dynamic behavior and the safety of the system. Hence, quantitatively evaluating the performance of the CAN under the influence of IC faults is crucial to real-time health monitoring of the system. In this paper, a novel methodology is proposed for real-time quantitative evaluation of CAN availability when considering IC faults, with the system availability parameter being calculated based on the network state transition model. First, the causal relationship between IC fault and network error response is constructed, based on which the IC fault arrival rate is estimated. Second, the states of the network considering IC faults are analyzed, and the deterministic and stochastic Petri net (DSPN) model is applied to describe the transition relationship of the states. Then, the parameters of the DSPN model are determined and the availability of the system is calculated based on the probability distribution and physical meaning of markings in the DSPN model. A testbed is constructed and case studies are conducted to verify the proposed methodology under various experimental setups. Experimental results show that the estimation results obtained using the proposed method agree well with the actual values.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"20 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission 缓解以信息为中心的卫星网络突发流量的最佳复制策略:聚焦遥感图像传输
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-18 DOI: 10.1631/fitee.2400025
Ziyang Xing, Xiaoqiang Di, Hui Qi, Jing Chen, Jinhui Cao, Jinyao Liu, Xusheng Li, Zichu Zhang, Yuchen Zhu, Lei Chen, Kai Huang, Xinghan Huo

Information-centric satellite networks play a crucial role in remote sensing applications, particularly in the transmission of remote sensing images. However, the occurrence of burst traffic poses significant challenges in meeting the increased bandwidth demands. Traditional content delivery networks are ill-equipped to handle such bursts due to their pre-deployed content. In this paper, we propose an optimal replication strategy for mitigating burst traffic in information-centric satellite networks, specifically focusing on the transmission of remote sensing images. Our strategy involves selecting the most optimal replication delivery satellite node when multiple users subscribe to the same remote sensing content within a short time, effectively reducing network transmission data and preventing throughput degradation caused by burst traffic expansion. We formulate the content delivery process as a multi-objective optimization problem and apply Markov decision processes to determine the optimal value for burst traffic reduction. To address these challenges, we leverage federated reinforcement learning techniques. Additionally, we use bloom filters with subdivision and data identification methods to enable rapid retrieval and encoding of remote sensing images. Through software-based simulations using a low Earth orbit satellite constellation, we validate the effectiveness of our proposed strategy, achieving a significant 17% reduction in the average delivery delay. This paper offers valuable insights into efficient content delivery in satellite networks, specifically targeting the transmission of remote sensing images, and presents a promising approach to mitigate burst traffic challenges in information-centric environments.

以信息为中心的卫星网络在遥感应用中发挥着至关重要的作用,尤其是在遥感图像传输方面。然而,突发流量的出现给满足日益增长的带宽需求带来了巨大挑战。传统的内容传输网络由于预先部署了内容,因此不具备处理这种突发流量的能力。在本文中,我们提出了一种最佳复制策略,用于缓解以信息为中心的卫星网络中的突发流量,尤其侧重于遥感图像的传输。我们的策略包括当多个用户在短时间内订阅相同的遥感内容时,选择最优的复制交付卫星节点,从而有效减少网络传输数据,防止突发流量扩展造成的吞吐量下降。我们将内容交付过程表述为一个多目标优化问题,并应用马尔可夫决策过程来确定减少突发流量的最优值。为了应对这些挑战,我们利用了联合强化学习技术。此外,我们还使用了带有细分和数据识别方法的 Bloom 过滤器,以实现遥感图像的快速检索和编码。通过使用低地球轨道卫星星座进行基于软件的模拟,我们验证了所提策略的有效性,使平均传输延迟大幅减少了 17%。本文为卫星网络中的高效内容传输提供了宝贵的见解,特别是针对遥感图像的传输,并提出了一种在以信息为中心的环境中缓解突发流量挑战的可行方法。
{"title":"Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission","authors":"Ziyang Xing, Xiaoqiang Di, Hui Qi, Jing Chen, Jinhui Cao, Jinyao Liu, Xusheng Li, Zichu Zhang, Yuchen Zhu, Lei Chen, Kai Huang, Xinghan Huo","doi":"10.1631/fitee.2400025","DOIUrl":"https://doi.org/10.1631/fitee.2400025","url":null,"abstract":"<p>Information-centric satellite networks play a crucial role in remote sensing applications, particularly in the transmission of remote sensing images. However, the occurrence of burst traffic poses significant challenges in meeting the increased bandwidth demands. Traditional content delivery networks are ill-equipped to handle such bursts due to their pre-deployed content. In this paper, we propose an optimal replication strategy for mitigating burst traffic in information-centric satellite networks, specifically focusing on the transmission of remote sensing images. Our strategy involves selecting the most optimal replication delivery satellite node when multiple users subscribe to the same remote sensing content within a short time, effectively reducing network transmission data and preventing throughput degradation caused by burst traffic expansion. We formulate the content delivery process as a multi-objective optimization problem and apply Markov decision processes to determine the optimal value for burst traffic reduction. To address these challenges, we leverage federated reinforcement learning techniques. Additionally, we use bloom filters with subdivision and data identification methods to enable rapid retrieval and encoding of remote sensing images. Through software-based simulations using a low Earth orbit satellite constellation, we validate the effectiveness of our proposed strategy, achieving a significant 17% reduction in the average delivery delay. This paper offers valuable insights into efficient content delivery in satellite networks, specifically targeting the transmission of remote sensing images, and presents a promising approach to mitigate burst traffic challenges in information-centric environments.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"41 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140629464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust tensor watermarking algorithm for diffusion-tensor images 扩散张量图像的鲁棒张量水印算法
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-23 DOI: 10.1631/fitee.2200628
Chengmeng Liu, Zhi Li, Guomei Wang, Long Zheng

Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning networks. However, after embedding watermark signals by convolution, the feature fusion efficiency of convolution is relatively low; this can easily lead to distortion in the embedded image. When distortion occurs in medical images, especially in diffusion tensor images (DTIs), the clinical value of the DTI is lost. To address this issue, a robust watermarking algorithm for DTIs implemented by fusing convolution with a Transformer is proposed to ensure the robustness of the watermark and the consistency of sampling distance, which enhances the quality of the reconstructed image of the watermarked DTIs after embedding the watermark signals. In the watermark-embedding network, T1-weighted (T1w) images are used as prior knowledge. The correlation between T1w images and the original DTI is proposed to calculate the most significant features from the T1w images by using the Transformer mechanism. The maximum of the correlation is used as the most significant feature weight to improve the quality of the reconstructed DTI. In the watermark extraction network, the most significant watermark features from the watermarked DTI are adequately learned by the Transformer to robustly extract the watermark signals from the watermark features. Experimental results show that the average peak signal-to-noise ratio of the watermarked DTI reaches 50.47 dB, the diffusion characteristics such as mean diffusivity and fractional anisotropy remain unchanged, and the main axis deflection angle αAC is close to 1. Our proposed algorithm can effectively protect the copyright of the DTI and barely affects the clinical diagnosis.

在对深度学习网络的研究中,使用卷积神经网络的水印算法表现出良好的鲁棒性。然而,通过卷积嵌入水印信号后,卷积的特征融合效率相对较低,这很容易导致嵌入图像失真。当医学图像,尤其是弥散张量图像(DTI)发生失真时,DTI 的临床价值就会丧失。为解决这一问题,本文提出了一种通过融合卷积与变换器实现的 DTI 稳健水印算法,以确保水印的稳健性和采样距离的一致性,从而提高水印信号嵌入后 DTI 重建图像的质量。在水印嵌入网络中,T1 加权(T1w)图像被用作先验知识。建议利用 T1w 图像与原始 DTI 之间的相关性,通过变换器机制从 T1w 图像中计算出最重要的特征。相关性的最大值被用作最重要的特征权重,以提高重建 DTI 的质量。在水印提取网络中,Transformer 可以从带水印的 DTI 中充分学习最重要的水印特征,从而从水印特征中稳健地提取水印信号。实验结果表明,水印 DTI 的平均峰值信噪比达到 50.47 dB,平均扩散率和分数各向异性等扩散特征保持不变,主轴偏转角 αAC 接近 1。我们提出的算法能有效保护 DTI 的版权,对临床诊断几乎没有影响。
{"title":"A robust tensor watermarking algorithm for diffusion-tensor images","authors":"Chengmeng Liu, Zhi Li, Guomei Wang, Long Zheng","doi":"10.1631/fitee.2200628","DOIUrl":"https://doi.org/10.1631/fitee.2200628","url":null,"abstract":"<p>Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning networks. However, after embedding watermark signals by convolution, the feature fusion efficiency of convolution is relatively low; this can easily lead to distortion in the embedded image. When distortion occurs in medical images, especially in diffusion tensor images (DTIs), the clinical value of the DTI is lost. To address this issue, a robust watermarking algorithm for DTIs implemented by fusing convolution with a Transformer is proposed to ensure the robustness of the watermark and the consistency of sampling distance, which enhances the quality of the reconstructed image of the watermarked DTIs after embedding the watermark signals. In the watermark-embedding network, T1-weighted (T1w) images are used as prior knowledge. The correlation between T1w images and the original DTI is proposed to calculate the most significant features from the T1w images by using the Transformer mechanism. The maximum of the correlation is used as the most significant feature weight to improve the quality of the reconstructed DTI. In the watermark extraction network, the most significant watermark features from the watermarked DTI are adequately learned by the Transformer to robustly extract the watermark signals from the watermark features. Experimental results show that the average peak signal-to-noise ratio of the watermarked DTI reaches 50.47 dB, the diffusion characteristics such as mean diffusivity and fractional anisotropy remain unchanged, and the main axis deflection angle <i>α</i><sub>AC</sub> is close to 1. Our proposed algorithm can effectively protect the copyright of the DTI and barely affects the clinical diagnosis.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"364 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system 基于身份的网格可搜索属性签名加密,用于基于区块链的医疗系统
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-23 DOI: 10.1631/fitee.-2300248
Huifang Yu, Xiaoping Bai

Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage. To solve these issues, we propose an identity-based searchable attribute signcryption in lattice for a blockchain-based medical system (BCMS-LIDSASC). BCMS-LIDSASC achieves decentralization and anti-quantum security in the blockchain environment, and provides fine-grained access control and searchability. Furthermore, smart contracts are used to replace traditional trusted third parties, and the interplanetary file system (IPFS) is used for ciphertext storage to alleviate storage pressure on the blockchain. Compared to other schemes, BCMS-LIDSASC requires smaller key size and less storage, and has lower computation cost. It contributes to secure and efficient management of medical data and can protect patient privacy and ensure the integrity of electronic healthcare systems.

电子医疗系统可以提供便利,但也面临着数据伪造和信息泄露的风险。为了解决这些问题,我们提出了一种基于身份的可搜索网格属性签名加密技术(BCMS-LIDSASC),用于基于区块链的医疗系统。BCMS-LIDSASC 在区块链环境中实现了去中心化和反量子安全,并提供了细粒度访问控制和可搜索性。此外,还使用智能合约取代传统的可信第三方,并使用星际文件系统(IPFS)进行密文存储,以减轻区块链的存储压力。与其他方案相比,BCMS-LIDSASC 所需的密钥大小和存储量更小,计算成本更低。它有助于安全、高效地管理医疗数据,保护患者隐私,确保电子医疗系统的完整性。
{"title":"Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system","authors":"Huifang Yu, Xiaoping Bai","doi":"10.1631/fitee.-2300248","DOIUrl":"https://doi.org/10.1631/fitee.-2300248","url":null,"abstract":"<p>Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage. To solve these issues, we propose an identity-based searchable attribute signcryption in lattice for a blockchain-based medical system (BCMS-LIDSASC). BCMS-LIDSASC achieves decentralization and anti-quantum security in the blockchain environment, and provides fine-grained access control and searchability. Furthermore, smart contracts are used to replace traditional trusted third parties, and the interplanetary file system (IPFS) is used for ciphertext storage to alleviate storage pressure on the blockchain. Compared to other schemes, BCMS-LIDSASC requires smaller key size and less storage, and has lower computation cost. It contributes to secure and efficient management of medical data and can protect patient privacy and ensure the integrity of electronic healthcare systems.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"72 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive and augmented active anomaly detection on dynamic network traffic streams 动态网络流量流的自适应和增强型主动异常检测
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-23 DOI: 10.1631/fitee.2300244
Bin Li, Yijie Wang, Li Cheng

Active anomaly detection queries labels of sampled instances and uses them to incrementally update the detection model, and has been widely adopted in detecting network attacks. However, existing methods cannot achieve desirable performance on dynamic network traffic streams because (1) their query strategies cannot sample informative instances to make the detection model adapt to the evolving stream and (2) their model updating relies on limited query instances only and fails to leverage the enormous unlabeled instances on streams. To address these issues, we propose an active tree based model, adaptive and augmented active prior-knowledge forest (A3PF), for anomaly detection on network traffic streams. A prior-knowledge forest is constructed using prior knowledge of network attacks to find feature subspaces that better distinguish network anomalies from normal traffic. On one hand, to make the model adapt to the evolving stream, a novel adaptive query strategy is designed to sample informative instances from two aspects: the changes in dynamic data distribution and the uncertainty of anomalies. On the other hand, based on the similarity of instances in the neighborhood, we devise an augmented update method to generate pseudo labels for the unlabeled neighbors of query instances, which enables usage of the enormous unlabeled instances during model updating. Extensive experiments on two benchmarks, CIC-IDS2017 and UNSW-NB15, demonstrate that A3PF achieves significant improvements over previous active methods in terms of the area under the receiver operating characteristic curve (AUC-ROC) (20.9% and 21.5%) and the area under the precision-recall curve (AUC-PR) (44.6% and 64.1%).

主动异常检测法查询采样实例的标签,并利用这些标签增量更新检测模型,已被广泛应用于检测网络攻击。然而,现有方法无法在动态网络流量流中实现理想的性能,原因在于:(1)它们的查询策略无法对信息实例进行采样,从而使检测模型适应不断变化的网络流量;(2)它们的模型更新仅依赖于有限的查询实例,无法充分利用网络流中大量未标记的实例。为了解决这些问题,我们提出了一种基于主动树的模型--自适应增强主动先验知识森林(A3PF),用于网络流量流的异常检测。先验知识森林是利用网络攻击的先验知识构建的,目的是找到能更好地区分网络异常与正常流量的特征子空间。一方面,为使模型适应不断变化的数据流,设计了一种新颖的自适应查询策略,从动态数据分布变化和异常的不确定性两方面对信息实例进行采样。另一方面,基于邻域中实例的相似性,我们设计了一种增强更新方法,为查询实例的未标记邻域生成伪标签,从而在模型更新过程中使用大量未标记实例。在 CIC-IDS2017 和 UNSW-NB15 这两个基准上进行的广泛实验表明,A3PF 在接收者操作特征曲线下面积(AUC-ROC)(20.9% 和 21.5%)和精度-召回曲线下面积(AUC-PR)(44.6% 和 64.1%)方面都比以前的主动方法有显著改进。
{"title":"Adaptive and augmented active anomaly detection on dynamic network traffic streams","authors":"Bin Li, Yijie Wang, Li Cheng","doi":"10.1631/fitee.2300244","DOIUrl":"https://doi.org/10.1631/fitee.2300244","url":null,"abstract":"<p>Active anomaly detection queries labels of sampled instances and uses them to incrementally update the detection model, and has been widely adopted in detecting network attacks. However, existing methods cannot achieve desirable performance on dynamic network traffic streams because (1) their query strategies cannot sample informative instances to make the detection model adapt to the evolving stream and (2) their model updating relies on limited query instances only and fails to leverage the enormous unlabeled instances on streams. To address these issues, we propose an active tree based model, adaptive and augmented active prior-knowledge forest (A<sup>3</sup>PF), for anomaly detection on network traffic streams. A prior-knowledge forest is constructed using prior knowledge of network attacks to find feature subspaces that better distinguish network anomalies from normal traffic. On one hand, to make the model adapt to the evolving stream, a novel adaptive query strategy is designed to sample informative instances from two aspects: the changes in dynamic data distribution and the uncertainty of anomalies. On the other hand, based on the similarity of instances in the neighborhood, we devise an augmented update method to generate pseudo labels for the unlabeled neighbors of query instances, which enables usage of the enormous unlabeled instances during model updating. Extensive experiments on two benchmarks, CIC-IDS2017 and UNSW-NB15, demonstrate that A<sup>3</sup>PF achieves significant improvements over previous active methods in terms of the area under the receiver operating characteristic curve (AUC-ROC) (20.9% and 21.5%) and the area under the precision-recall curve (AUC-PR) (44.6% and 64.1%).</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"157 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-rank matrix recovery with total generalized variation for defending adversarial examples 利用总广义变异恢复低等级矩阵以防御对抗性实例
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-23 DOI: 10.1631/fitee.2300017
Wen Li, Hengyou Wang, Lianzhi Huo, Qiang He, Linlin Chen, Zhiquan He, Wing W. Y. Ng

Low-rank matrix decomposition with first-order total variation (TV) regularization exhibits excellent performance in exploration of image structure. Taking advantage of its excellent performance in image denoising, we apply it to improve the robustness of deep neural networks. However, although TV regularization can improve the robustness of the model, it reduces the accuracy of normal samples due to its over-smoothing. In our work, we develop a new low-rank matrix recovery model, called LRTGV, which incorporates total generalized variation (TGV) regularization into the reweighted low-rank matrix recovery model. In the proposed model, TGV is used to better reconstruct texture information without over-smoothing. The reweighted nuclear norm and L1-norm can enhance the global structure information. Thus, the proposed LRTGV can destroy the structure of adversarial noise while re-enhancing the global structure and local texture of the image. To solve the challenging optimal model issue, we propose an algorithm based on the alternating direction method of multipliers. Experimental results show that the proposed algorithm has a certain defense capability against black-box attacks, and outperforms state-of-the-art low-rank matrix recovery methods in image restoration.

采用一阶总变异(TV)正则化的低秩矩阵分解在探索图像结构方面表现出色。利用其在图像去噪方面的优异性能,我们将其用于提高深度神经网络的鲁棒性。然而,尽管 TV 正则化可以提高模型的鲁棒性,但由于其过度平滑,会降低正常样本的准确性。在我们的工作中,我们开发了一种新的低秩矩阵恢复模型,称为 LRTGV,它将总广义变异(TGV)正则化纳入了重新加权的低秩矩阵恢复模型。在提出的模型中,TGV 被用来更好地重建纹理信息,而不会过度平滑。重新加权的核规范和 L1 规范可以增强全局结构信息。因此,所提出的 LRTGV 可以破坏对抗噪声的结构,同时重新增强图像的全局结构和局部纹理。为了解决具有挑战性的最优模型问题,我们提出了一种基于交替方向乘法的算法。实验结果表明,所提出的算法对黑盒攻击有一定的防御能力,在图像复原中优于最先进的低秩矩阵恢复方法。
{"title":"Low-rank matrix recovery with total generalized variation for defending adversarial examples","authors":"Wen Li, Hengyou Wang, Lianzhi Huo, Qiang He, Linlin Chen, Zhiquan He, Wing W. Y. Ng","doi":"10.1631/fitee.2300017","DOIUrl":"https://doi.org/10.1631/fitee.2300017","url":null,"abstract":"<p>Low-rank matrix decomposition with first-order total variation (TV) regularization exhibits excellent performance in exploration of image structure. Taking advantage of its excellent performance in image denoising, we apply it to improve the robustness of deep neural networks. However, although TV regularization can improve the robustness of the model, it reduces the accuracy of normal samples due to its over-smoothing. In our work, we develop a new low-rank matrix recovery model, called LRTGV, which incorporates total generalized variation (TGV) regularization into the reweighted low-rank matrix recovery model. In the proposed model, TGV is used to better reconstruct texture information without over-smoothing. The reweighted nuclear norm and <i>L</i><sub>1</sub>-norm can enhance the global structure information. Thus, the proposed LRTGV can destroy the structure of adversarial noise while re-enhancing the global structure and local texture of the image. To solve the challenging optimal model issue, we propose an algorithm based on the alternating direction method of multipliers. Experimental results show that the proposed algorithm has a certain defense capability against black-box attacks, and outperforms state-of-the-art low-rank matrix recovery methods in image restoration.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"67 7 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards understanding bogus traffic service in online social networks 了解在线社交网络中的虚假流量服务
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-23 DOI: 10.1631/fitee.2300068
Ping He, Xuhong Zhang, Changting Lin, Ting Wang, Shouling Ji

Critical functionality and huge influence of the hot trend/topic page (HTP) in microblogging sites have driven the creation of a new kind of underground service called the bogus traffic service (BTS). BTS provides a kind of illegal service which hijacks the HTP by pushing the controlled topics into it for malicious customers with the goal of guiding public opinions. To hijack HTP, the agents of BTS maintain an army of black-market accounts called bogus traffic accounts (BTAs) and control BTAs to generate a burst of fake traffic by massively retweeting the tweets containing the customer desired topic (hashtag). Although this service has been extensively exploited by malicious customers, little has been done to understand it. In this paper, we conduct a systematic measurement study of the BTS. We first investigate and collect 125 BTS agents from a variety of sources and set up a honey pot account to capture BTAs from these agents. We then build a BTA detector that detects 162 218 BTAs from Weibo, the largest Chinese microblogging site, with a precision of 94.5%. We further use them as a bridge to uncover 296 916 topics that might be involved in bogus traffic. Finally, we uncover the operating mechanism from the perspectives of the attack cycle and the attack entity. The highlights of our findings include the temporal attack patterns and intelligent evasion tactics of the BTAs. These findings bring BTS into the spotlight. Our work will help in understanding and ultimately eliminating this threat.

微博热门话题页面(HTP)的重要功能和巨大影响力促使一种新型地下服务--虚假流量服务(BTS)应运而生。BTS 提供的是一种非法服务,它劫持 HTP,将受控话题推送给恶意客户,以达到引导舆论的目的。为了劫持 HTP,BTS 的代理维护着一支被称为虚假流量账户(BTA)的黑市账户大军,并控制 BTA 通过大量转发包含客户所需话题(标签)的推文来产生虚假流量。虽然这项服务已被恶意客户广泛利用,但人们对其了解甚少。在本文中,我们对 BTS 进行了系统的测量研究。我们首先调查并从各种来源收集了 125 个 BTS 代理,并建立了一个蜜罐账户来捕获这些代理的 BTA。然后,我们建立了一个 BTA 检测器,从中国最大的微博网站--微博中检测出 162 218 个 BTA,精确度高达 94.5%。我们还以它们为桥梁,发现了 296 916 个可能涉及虚假流量的话题。最后,我们从攻击周期和攻击实体的角度揭示了其运行机制。我们的发现重点包括 BTA 的时间攻击模式和智能规避策略。这些发现使 BTS 成为焦点。我们的工作将有助于了解并最终消除这一威胁。
{"title":"Towards understanding bogus traffic service in online social networks","authors":"Ping He, Xuhong Zhang, Changting Lin, Ting Wang, Shouling Ji","doi":"10.1631/fitee.2300068","DOIUrl":"https://doi.org/10.1631/fitee.2300068","url":null,"abstract":"<p>Critical functionality and huge influence of the hot trend/topic page (HTP) in microblogging sites have driven the creation of a new kind of underground service called the bogus traffic service (BTS). BTS provides a kind of illegal service which hijacks the HTP by pushing the controlled topics into it for malicious customers with the goal of guiding public opinions. To hijack HTP, the agents of BTS maintain an army of black-market accounts called bogus traffic accounts (BTAs) and control BTAs to generate a burst of fake traffic by massively retweeting the tweets containing the customer desired topic (hashtag). Although this service has been extensively exploited by malicious customers, little has been done to understand it. In this paper, we conduct a systematic measurement study of the BTS. We first investigate and collect 125 BTS agents from a variety of sources and set up a honey pot account to capture BTAs from these agents. We then build a BTA detector that detects 162 218 BTAs from Weibo, the largest Chinese microblogging site, with a precision of 94.5%. We further use them as a bridge to uncover 296 916 topics that might be involved in bogus traffic. Finally, we uncover the operating mechanism from the perspectives of the attack cycle and the attack entity. The highlights of our findings include the temporal attack patterns and intelligent evasion tactics of the BTAs. These findings bring BTS into the spotlight. Our work will help in understanding and ultimately eliminating this threat.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"164 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Frontiers of Information Technology & Electronic Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1