首页 > 最新文献

IEEE Transactions on Computational Social Systems最新文献

英文 中文
IEEE Transactions on Computational Social Systems Information for Authors 电气和电子工程师学会计算社会系统论文集 作者信息
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-01-25 DOI: 10.1109/TCSS.2024.3350956
{"title":"IEEE Transactions on Computational Social Systems Information for Authors","authors":"","doi":"10.1109/TCSS.2024.3350956","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3350956","url":null,"abstract":"","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10414271","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139572899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems, Man, and Cybernetics Society Information 电气和电子工程师学会系统、人和控制论学会信息
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-01-25 DOI: 10.1109/TCSS.2024.3350954
{"title":"IEEE Systems, Man, and Cybernetics Society Information","authors":"","doi":"10.1109/TCSS.2024.3350954","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3350954","url":null,"abstract":"","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10414225","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139572621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Computational Social Systems Publication Information 电气和电子工程师学会《计算社会系统期刊》出版信息
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-01-25 DOI: 10.1109/TCSS.2024.3350952
{"title":"IEEE Transactions on Computational Social Systems Publication Information","authors":"","doi":"10.1109/TCSS.2024.3350952","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3350952","url":null,"abstract":"","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10414223","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139572857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Driven Privacy-Preserving Contact-Tracing Framework in Pandemics 区块链驱动的大流行病隐私保护接触追踪框架
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-01-25 DOI: 10.1109/TCSS.2024.3351191
Xiao Li;Weili Wu;Tiantian Chen
Blockchain technology, recognized for its decentralized and privacy-preserving capabilities, holds potential for enhancing privacy in contact tracing applications. Existing blockchain-based contact tracing frameworks often overlook one or more critical design details, such as the blockchain data structure, a decentralized and lightweight consensus mechanism with integrated tracing data verification, and an incentive mechanism to encourage voluntary participation in bearing blockchain costs. Moreover, the absence of framework simulations raises questions about the efficacy of these existing models. To solve above issues, this article introduces a fully third-party independent blockchain-driven contact tracing (BDCT) framework, detailed in its design. The BDCT framework features an Rivest-Shamir-Adleman (RSA) encryption-based transaction verification method (RSA-TVM), achieving over 96% accuracy in contact case recording, even with a 60% probability of individuals failing to verify contact information. Furthermore, we propose a lightweight reputation corrected delegated proof of stake (RC-DPoS) consensus mechanism, coupled with an incentive model, to ensure timely reporting of contact cases while maintaining blockchain decentralization. Additionally, a novel simulation environment for contact tracing is developed, accounting for three distinct contact scenarios with varied population density. Our results and discussions validate the effectiveness, robustness of the RSA-TVM and RC-DPoS, and the low storage demand of the BDCT framework.
区块链技术因其去中心化和保护隐私的能力而广受认可,具有在联系人追踪应用中提高隐私性的潜力。现有的基于区块链的联系人追踪框架往往忽略了一个或多个关键的设计细节,如区块链数据结构、集成追踪数据验证的去中心化轻量级共识机制,以及鼓励自愿参与承担区块链成本的激励机制。此外,由于缺乏框架模拟,人们对这些现有模型的有效性产生了质疑。为解决上述问题,本文介绍了一个完全独立于第三方的区块链驱动的接触追踪(BDCT)框架,并详细介绍了其设计。BDCT 框架采用基于 Rivest-Shamir-Adleman(RSA)加密的交易验证方法(RSA-TVM),即使在个人有 60% 的概率无法验证联系信息的情况下,联系案例记录的准确率也能达到 96% 以上。此外,我们还提出了一种轻量级声誉校正委托权益证明(RC-DPoS)共识机制,并结合激励模型,以确保在保持区块链去中心化的同时及时报告接触案例。此外,我们还开发了一种新颖的接触追踪模拟环境,以应对人口密度不同的三种不同接触场景。我们的结果和讨论验证了 RSA-TVM 和 RC-DPoS 的有效性和稳健性,以及 BDCT 框架的低存储需求。
{"title":"Blockchain-Driven Privacy-Preserving Contact-Tracing Framework in Pandemics","authors":"Xiao Li;Weili Wu;Tiantian Chen","doi":"10.1109/TCSS.2024.3351191","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3351191","url":null,"abstract":"Blockchain technology, recognized for its decentralized and privacy-preserving capabilities, holds potential for enhancing privacy in contact tracing applications. Existing blockchain-based contact tracing frameworks often overlook one or more critical design details, such as the blockchain data structure, a decentralized and lightweight consensus mechanism with integrated tracing data verification, and an incentive mechanism to encourage voluntary participation in bearing blockchain costs. Moreover, the absence of framework simulations raises questions about the efficacy of these existing models. To solve above issues, this article introduces a fully third-party independent blockchain-driven contact tracing (BDCT) framework, detailed in its design. The BDCT framework features an Rivest-Shamir-Adleman (RSA) encryption-based transaction verification method (RSA-TVM), achieving over 96% accuracy in contact case recording, even with a 60% probability of individuals failing to verify contact information. Furthermore, we propose a lightweight reputation corrected delegated proof of stake (RC-DPoS) consensus mechanism, coupled with an incentive model, to ensure timely reporting of contact cases while maintaining blockchain decentralization. Additionally, a novel simulation environment for contact tracing is developed, accounting for three distinct contact scenarios with varied population density. Our results and discussions validate the effectiveness, robustness of the RSA-TVM and RC-DPoS, and the low storage demand of the BDCT framework.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Targets of Graph Adversarial Attacks With Edge and Feature Perturbations 利用边缘和特征扰动检测图对抗攻击的目标
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-01-25 DOI: 10.1109/TCSS.2023.3344642
Boyi Lee;Jhao-Yin Jhang;Lo-Yao Yeh;Ming-Yi Chang;Chia-Mei Chen;Chih-Ya Shen
Graph neural networks (GNNs) enable many novel applications and achieve excellent performance. However, their performance may be significantly degraded by the graph adversarial attacks, which intentionally add small perturbations to the graph. Previous countermeasures usually handle such attacks by enhancing model robustness. However, robust models cannot identify the target nodes of the adversarial attacks, and thus we are unable to pinpoint the weak spots and analyze the causes or the targets of the attacks. In this article, we study the important research problem to detect the target nodes of graph adversarial attacks under the black-box detection scenario, which is particularly challenging because our detection models do not have any knowledge about the attacker, while the attackers usually employ unnoticeability strategies to minimize the chance of being detected. To our best knowledge, this is the first work that aims at detecting the target nodes of graph adversarial attacks under the black-box detector scenario. We propose two detection models, named Det-H and Det-RL, which employ different techniques that effectively detect the target nodes under the black-box detection scenario against various graph adversarial attacks. To enhance the generalization of the proposed detectors, we further propose two novel surrogate attackers that are able to generate effective attack examples and camouflage their attack traces for training robust detectors. In addition, we propose three strategies to effectively improve the training efficiency. Experimental results on multiple datasets show that our proposed detectors significantly outperform the other baselines against multiple state-of-the-art graph adversarial attackers with various attack strategies. The proposed Det-RL detector achieves an averaged area under curve (AUC) of $0.945$ against all the attackers, and our efficiency-improving strategies are able save up to $91$% of the training time.
图神经网络(GNN)可以实现许多新奇的应用,并且性能卓越。然而,图对抗攻击会故意在图中添加微小扰动,严重降低图神经网络的性能。以往的应对措施通常是通过增强模型的鲁棒性来处理此类攻击。然而,鲁棒性模型无法识别对抗性攻击的目标节点,因此我们无法精确定位薄弱点,也无法分析攻击的原因或目标。在本文中,我们研究了在黑盒检测场景下检测图对抗攻击的目标节点这一重要研究课题。由于我们的检测模型对攻击者一无所知,而攻击者通常采用不引人注意的策略以尽量减少被检测到的机会,因此检测目标节点尤其具有挑战性。据我们所知,这是第一项在黑盒检测器场景下检测图对抗攻击目标节点的工作。我们提出了两种检测模型,分别命名为 Det-H 和 Det-RL,它们采用了不同的技术,能在黑盒检测场景下有效地检测出目标节点,以对抗各种图对抗攻击。为了增强所提检测器的通用性,我们进一步提出了两种新型代理攻击者,它们能够生成有效的攻击示例,并伪装其攻击痕迹以训练健壮的检测器。此外,我们还提出了三种有效提高训练效率的策略。在多个数据集上的实验结果表明,我们提出的检测器在对抗多种攻击策略的最先进图对抗攻击者时,性能明显优于其他基线检测器。所提出的 Det-RL 检测器在对抗所有攻击者时的平均曲线下面积(AUC)达到了 0.945 美元,而我们的提高效率策略能够节省高达 91% 的训练时间。
{"title":"Detecting Targets of Graph Adversarial Attacks With Edge and Feature Perturbations","authors":"Boyi Lee;Jhao-Yin Jhang;Lo-Yao Yeh;Ming-Yi Chang;Chia-Mei Chen;Chih-Ya Shen","doi":"10.1109/TCSS.2023.3344642","DOIUrl":"https://doi.org/10.1109/TCSS.2023.3344642","url":null,"abstract":"Graph neural networks (GNNs) enable many novel applications and achieve excellent performance. However, their performance may be significantly degraded by the graph adversarial attacks, which intentionally add small perturbations to the graph. Previous countermeasures usually handle such attacks by enhancing model robustness. However, robust models cannot identify the \u0000<italic>target nodes</i>\u0000 of the adversarial attacks, and thus we are unable to pinpoint the weak spots and analyze the causes or the targets of the attacks. In this article, we study the important research problem to detect the \u0000<italic>target nodes</i>\u0000 of graph adversarial attacks under the \u0000<italic>black-box detection</i>\u0000 scenario, which is particularly challenging because our detection models do not have any knowledge about the attacker, while the attackers usually employ unnoticeability strategies to minimize the chance of being detected. To our best knowledge, this is the first work that aims at detecting the \u0000<italic>target nodes</i>\u0000 of graph adversarial attacks under the \u0000<italic>black-box detector</i>\u0000 scenario. We propose two detection models, named \u0000<italic>Det-H</i>\u0000 and \u0000<italic>Det-RL</i>\u0000, which employ different techniques that effectively detect the target nodes under the black-box detection scenario against various graph adversarial attacks. To enhance the generalization of the proposed detectors, we further propose two novel surrogate attackers that are able to generate effective attack examples and camouflage their attack traces for training robust detectors. In addition, we propose three strategies to effectively improve the training efficiency. Experimental results on multiple datasets show that our proposed detectors significantly outperform the other baselines against multiple state-of-the-art graph adversarial attackers with various attack strategies. The proposed \u0000<italic>Det-RL</i>\u0000 detector achieves an averaged area under curve (AUC) of \u0000<inline-formula><tex-math>$0.945$</tex-math></inline-formula>\u0000 against all the attackers, and our efficiency-improving strategies are able save up to \u0000<inline-formula><tex-math>$91$</tex-math></inline-formula>\u0000% of the training time.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Emergence of Collective Behavior for Information Dissemination in Complex Networks 复杂网络中信息传播集体行为的兴起研究
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-01-25 DOI: 10.1109/TCSS.2024.3352611
Shan Liu;Xiaoqing Wu
Collective behavior frequently emerges in this dynamic and interconnected world, making in-depth research into its societal impacts both highly significant and challenging. The emergence and development of collective behavior in social systems are intricately linked to the dissemination of event information. A rational dissemination model needs to be constructed as a foundation for analysis, exploring factors influencing collective behavior, and predicting the onset of such behaviors. During the information dissemination progress, individual interactions are exceedingly intricate and subject to dynamic changes, some of which may even involve nonlinear mutations. Therefore, this article dissects interpersonal interactions into psychological and behavioral dimensions, and establish an emergency dissemination model, considering the coevolution of dissemination strategies, and dissemination behaviors. Additionally, the influence of the initial probability distribution on strategies, dissemination cost, and time decay coefficients on the propagation trends was examined through simulation analysis. Building upon this model, a methodology is proposed for predicting the emergence timepoint from four indicators. Empirical validation and analysis substantiate the proposed approach, affirming its rationality, advancement, and efficacy in addressing the research objectives.
在这个充满活力、相互联系的世界里,集体行为频频出现,因此深入研究其社会影响既意义重大,又极具挑战性。社会系统中集体行为的产生和发展与事件信息的传播密切相关。需要构建合理的传播模型作为分析基础,探索影响集体行为的因素,预测集体行为的发生。在信息传播过程中,个体间的互动关系错综复杂,并会发生动态变化,有些甚至会涉及非线性突变。因此,本文将人际互动分为心理和行为两个维度,并建立了一个应急传播模型,考虑了传播策略和传播行为的共同演化。此外,还通过模拟分析研究了策略的初始概率分布、传播成本和时间衰减系数对传播趋势的影响。在这一模型的基础上,提出了从四个指标预测出现时间点的方法。实证验证和分析证实了所提出的方法,肯定了其在实现研究目标方面的合理性、先进性和有效性。
{"title":"Research on Emergence of Collective Behavior for Information Dissemination in Complex Networks","authors":"Shan Liu;Xiaoqing Wu","doi":"10.1109/TCSS.2024.3352611","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3352611","url":null,"abstract":"Collective behavior frequently emerges in this dynamic and interconnected world, making in-depth research into its societal impacts both highly significant and challenging. The emergence and development of collective behavior in social systems are intricately linked to the dissemination of event information. A rational dissemination model needs to be constructed as a foundation for analysis, exploring factors influencing collective behavior, and predicting the onset of such behaviors. During the information dissemination progress, individual interactions are exceedingly intricate and subject to dynamic changes, some of which may even involve nonlinear mutations. Therefore, this article dissects interpersonal interactions into psychological and behavioral dimensions, and establish an emergency dissemination model, considering the coevolution of dissemination strategies, and dissemination behaviors. Additionally, the influence of the initial probability distribution on strategies, dissemination cost, and time decay coefficients on the propagation trends was examined through simulation analysis. Building upon this model, a methodology is proposed for predicting the emergence timepoint from four indicators. Empirical validation and analysis substantiate the proposed approach, affirming its rationality, advancement, and efficacy in addressing the research objectives.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physiological Electrosignal Asynchronous Acquisition Technology: Insight and Perspectives 生理电信号异步采集技术:洞察与展望
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-01-25 DOI: 10.1109/TCSS.2024.3350958
Bin Hu;Lixian Zhu;Qunxi Dong;Kun Qian;Hanshu Cai;Fuze Tian
With great pride and enthusiasm, we present the inaugural edition of IEEE Transactions on Computational Social Systems (TCSS) for 2024. Reflecting on the year gone by, 2023 stands as a hallmark of academic excellence and prolific output, wherein our journal has successfully disseminated a substantial volume of scholarly work—301 articles encompassing approximately 3600 pages, distributed across six distinct issues.
我们怀着极大的自豪和热情,向您介绍《IEEE 计算社会系统论文集》(TCSS)2024 年的创刊号。回顾过去的一年,2023 年是学术卓越、成果丰硕的一年,我们的期刊成功地传播了大量学术成果--301 篇文章,约 3600 页,分布在六个不同的期刊中。
{"title":"Physiological Electrosignal Asynchronous Acquisition Technology: Insight and Perspectives","authors":"Bin Hu;Lixian Zhu;Qunxi Dong;Kun Qian;Hanshu Cai;Fuze Tian","doi":"10.1109/TCSS.2024.3350958","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3350958","url":null,"abstract":"With great pride and enthusiasm, we present the inaugural edition of IEEE Transactions on Computational Social Systems (TCSS) for 2024. Reflecting on the year gone by, 2023 stands as a hallmark of academic excellence and prolific output, wherein our journal has successfully disseminated a substantial volume of scholarly work—301 articles encompassing approximately 3600 pages, distributed across six distinct issues.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10414277","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139572858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TriMPA: Triggerless Targeted Model Poisoning Attack in DNN TriMPA:DNN 中的无触发器定向模型中毒攻击
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-01-24 DOI: 10.1109/TCSS.2023.3349269
Debasmita Manna;Somanath Tripathy
Due to its admirable accuracy and performance across a wide range of classification and identification tasks, deep learning algorithms have gained popularity in several applications. However, the models’ security has become a serious concern, as antagonists could use them to promote their malicious goals. This work proposes a triggerless targeted model poisoning attack (TriMPA) against deep neural network without requiring any change in input to trigger the backdoor. TriMPA identifies active neurons that highly contribute to the prediction of the victim output label and replaces those neurons with that corresponding to the target output label. The performance of the proposed mechanism is evaluated through experiments as well as analyzed theoretically. It is shown that TriMPA achieves a higher attack success rate.
由于深度学习算法在广泛的分类和识别任务中具有令人钦佩的准确性和性能,它已在多个应用中得到普及。然而,模型的安全性已成为一个令人严重关切的问题,因为对抗者可能会利用它们来实现自己的恶意目标。本研究提出了一种针对深度神经网络的无触发定向模型中毒攻击(TriMPA),无需改变输入即可触发后门。TriMPA 能识别对预测受害者输出标签贡献大的活跃神经元,并将这些神经元替换为与目标输出标签相对应的神经元。我们通过实验和理论分析评估了所提机制的性能。结果表明,TriMPA 实现了更高的攻击成功率。
{"title":"TriMPA: Triggerless Targeted Model Poisoning Attack in DNN","authors":"Debasmita Manna;Somanath Tripathy","doi":"10.1109/TCSS.2023.3349269","DOIUrl":"https://doi.org/10.1109/TCSS.2023.3349269","url":null,"abstract":"Due to its admirable accuracy and performance across a wide range of classification and identification tasks, deep learning algorithms have gained popularity in several applications. However, the models’ security has become a serious concern, as antagonists could use them to promote their malicious goals. This work proposes a triggerless targeted model poisoning attack (TriMPA) against deep neural network without requiring any change in input to trigger the backdoor. TriMPA identifies active neurons that highly contribute to the prediction of the victim output label and replaces those neurons with that corresponding to the target output label. The performance of the proposed mechanism is evaluated through experiments as well as analyzed theoretically. It is shown that TriMPA achieves a higher attack success rate.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiattribute E-CARGO Task Assignment Model Based on Adaptive Heterogeneous Residual Networks 基于自适应异构残差网络的多属性 E-CARGO 任务分配模型
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-01-24 DOI: 10.1109/TCSS.2023.3344173
Zhaowei Liu;Zongxing Zhao
Mobile crowd sensing (MCS) is an emerging approach to collect data using smart devices. In MCS, task assignment is described as assigning existing tasks to known workers outside the constraints of task demand attributes and worker attributes, and maximizing the profit of the platform. However, workers and tasks often exist in different environments and heterogeneous features such as workers with attributes are not considered, leading to nondeterministic polynomial (NP)-hard task assignment problems. To optimize such problems, this article proposes a multiattribute environments-classes, agents, roles, groups, and objects (E-CARGO) task assignment model based on adaptive heterogeneous residual networks (AHRNets). The AHRNet is integrated into deep reinforcement learning (DRL) to optimize the NP-hard problem, dynamically adjust task assignment decisions and learn the relationship between workers with different attributes and task requirements. Multiattribute E-CARGO uses group task assignment policy to obtain the ideal worker-task assignment relationship. Compared with traditional heuristic algorithms for solving NP-hard, this method has the flexibility and applicability of adaptive networks, enabling the solver to interact with and adapt to new environments and generalize its experience to different situations. Under various experimental conditions, a large number of numerical results show that this method can achieve better results than the reference scheme.
移动人群感知(MCS)是一种利用智能设备收集数据的新兴方法。在 MCS 中,任务分配被描述为在任务需求属性和工人属性的约束下,将现有任务分配给已知工人,并实现平台利润最大化。然而,工人和任务往往存在于不同的环境中,而且不考虑工人属性等异构特征,从而导致非确定性多项式(NP)-困难任务分配问题。为优化此类问题,本文提出了一种基于自适应异构残差网络(AHRNets)的多属性环境-类、代理、角色、组和对象(E-CARGO)任务分配模型。AHRNet 被集成到深度强化学习(DRL)中,以优化 NP 难问题,动态调整任务分配决策,并学习不同属性和任务要求的工人之间的关系。多属性 E-CARGO 利用群体任务分配策略来获得理想的工人任务分配关系。与解决 NP 难的传统启发式算法相比,该方法具有自适应网络的灵活性和适用性,使求解器能够与新环境交互并适应新环境,并将其经验推广到不同情况下。在各种实验条件下,大量数值结果表明,该方法能取得比参考方案更好的结果。
{"title":"Multiattribute E-CARGO Task Assignment Model Based on Adaptive Heterogeneous Residual Networks","authors":"Zhaowei Liu;Zongxing Zhao","doi":"10.1109/TCSS.2023.3344173","DOIUrl":"https://doi.org/10.1109/TCSS.2023.3344173","url":null,"abstract":"Mobile crowd sensing (MCS) is an emerging approach to collect data using smart devices. In MCS, task assignment is described as assigning existing tasks to known workers outside the constraints of task demand attributes and worker attributes, and maximizing the profit of the platform. However, workers and tasks often exist in different environments and heterogeneous features such as workers with attributes are not considered, leading to nondeterministic polynomial (NP)-hard task assignment problems. To optimize such problems, this article proposes a multiattribute environments-classes, agents, roles, groups, and objects (E-CARGO) task assignment model based on adaptive heterogeneous residual networks (AHRNets). The AHRNet is integrated into deep reinforcement learning (DRL) to optimize the NP-hard problem, dynamically adjust task assignment decisions and learn the relationship between workers with different attributes and task requirements. Multiattribute E-CARGO uses group task assignment policy to obtain the ideal worker-task assignment relationship. Compared with traditional heuristic algorithms for solving NP-hard, this method has the flexibility and applicability of adaptive networks, enabling the solver to interact with and adapt to new environments and generalize its experience to different situations. Under various experimental conditions, a large number of numerical results show that this method can achieve better results than the reference scheme.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141326334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential Game Strategies for Social Networks With Self-Interested Individuals 有利己个体的社会网络的差异博弈策略
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-01-22 DOI: 10.1109/TCSS.2024.3350736
Hossein B. Jond
A social network population engages in collective actions as a direct result of forming a particular opinion. The strategic interactions among the individuals acting independently and selfishly naturally portray a noncooperative game. Nash equilibrium allows for self-enforcing strategic interactions between selfish and self-interested individuals. This article presents a differential game approach to the opinion formation problem in social networks to investigate the evolution of opinions as a result of a Nash equilibrium. The opinion of each individual is described by a differential equation, which is the continuous-time Hegselmann–Krause model for opinion dynamics with a time delay in input. The objective of each individual is to seek optimal strategies for its own opinion evolution by minimizing an individual cost function. Two differential game problems emerge, one for a population that is not stubborn and another for a population that is stubborn. The open-loop Nash equilibrium actions and their associated opinion trajectories are derived for both differential games using Pontryagin's principle. Additionally, the receding horizon control scheme is used to practice feedback strategies where the information flow is restricted by fixed and complete social graphs, as well as the second neighborhood concept. The game strategies were executed on the well-known Zachary's Karate Club social network and a representative family opinion network. The resulting opinion trajectories associated with the game strategies showed consensus, polarization, and disagreement in final opinions.
社会网络人群参与集体行动是形成特定观点的直接结果。独立行事、自私自利的个体之间的战略互动自然地描绘了一场非合作博弈。纳什均衡允许自私自利的个体之间进行自我强化的战略互动。本文针对社交网络中的意见形成问题提出了一种微分博弈方法,以研究纳什均衡所导致的意见演变。每个人的观点都由一个微分方程来描述,该方程是输入有时间延迟的连续时间 Hegselmann-Krause 观点动态模型。每个个体的目标都是通过最小化个体成本函数来寻求自身意见演变的最优策略。这就出现了两个不同的博弈问题,一个是针对不固执的人群,另一个是针对固执的人群。利用庞特里亚金原理,可以推导出这两个微分博弈的开环纳什均衡行动及其相关的意见轨迹。此外,在信息流受到固定和完整社会图以及第二邻域概念限制的情况下,利用后退视界控制方案来实践反馈策略。博弈策略在著名的 Zachary 空手道俱乐部社交网络和具有代表性的家庭舆论网络上执行。由此产生的与游戏策略相关的意见轨迹显示了最终意见的共识、两极分化和分歧。
{"title":"Differential Game Strategies for Social Networks With Self-Interested Individuals","authors":"Hossein B. Jond","doi":"10.1109/TCSS.2024.3350736","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3350736","url":null,"abstract":"A social network population engages in collective actions as a direct result of forming a particular opinion. The strategic interactions among the individuals acting independently and selfishly naturally portray a noncooperative game. Nash equilibrium allows for self-enforcing strategic interactions between selfish and self-interested individuals. This article presents a differential game approach to the opinion formation problem in social networks to investigate the evolution of opinions as a result of a Nash equilibrium. The opinion of each individual is described by a differential equation, which is the continuous-time Hegselmann–Krause model for opinion dynamics with a time delay in input. The objective of each individual is to seek optimal strategies for its own opinion evolution by minimizing an individual cost function. Two differential game problems emerge, one for a population that is not stubborn and another for a population that is stubborn. The open-loop Nash equilibrium actions and their associated opinion trajectories are derived for both differential games using Pontryagin's principle. Additionally, the receding horizon control scheme is used to practice feedback strategies where the information flow is restricted by fixed and complete social graphs, as well as the second neighborhood concept. The game strategies were executed on the well-known Zachary's Karate Club social network and a representative family opinion network. The resulting opinion trajectories associated with the game strategies showed consensus, polarization, and disagreement in final opinions.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Computational Social Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1