首页 > 最新文献

IEEE Transactions on Emerging Topics in Computing最新文献

英文 中文
IEEE Transactions on Emerging Topics in Computing Publication Information IEEE计算出版信息新兴主题汇刊
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-05 DOI: 10.1109/TETC.2025.3633547
{"title":"IEEE Transactions on Emerging Topics in Computing Publication Information","authors":"","doi":"10.1109/TETC.2025.3633547","DOIUrl":"https://doi.org/10.1109/TETC.2025.3633547","url":null,"abstract":"","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"C2-C2"},"PeriodicalIF":5.4,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11279973","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145674761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-View Partial Multi-Label Learning via Class Activation Specific Features Collaborative Learning 基于类激活的多视图部分多标签学习
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-12 DOI: 10.1109/TETC.2025.3629677
Anhui Tan;Jianhang Xu;Weiping Ding;Jiye Liang;Witold Pedrycz
Multi-view partial multi-label learning deals with scenarios where samples contain heterogeneous features and are associated with both relevant and corrupted labels. Existing methods struggle to effectively capture label-related features through adequate feature interaction while simultaneously integrating inter- and intra-view features. To address these challenges, we propose a robust and scalable framework, Class Activation Specific Features Collaborative Network, designed to handle feature heterogeneity and facilitate comprehensive feature fusion in multi-view partial multi-label learning. The framework integrates label-specific feature extraction with collaborative information propagation through two key components: 1) View-Specific Class Activation Map, which transforms multi-view features into compact class label representations and 2) Class Information Propagation Correction, which refines and propagates accurate class label information by leveraging graph convolutional networks and transformers. Additionally, we introduce a multi-faceted loss function that promotes robust feature learning and architectural stability via consistency-based structural loss, while improving generalization through knowledge distillation. Extensive experiments on benchmark datasets demonstrate that the proposed model significantly outperforms state-of-the-art methods in multi-view partial multi-label learning tasks.
多视图部分多标签学习处理样本包含异构特征并与相关和损坏标签相关联的场景。现有的方法很难通过充分的特征交互来有效地捕获与标签相关的特征,同时集成视图间和视图内的特征。为了解决这些挑战,我们提出了一个强大且可扩展的框架,类激活特定特征协作网络,旨在处理特征异质性并促进多视图部分多标签学习中的全面特征融合。该框架通过两个关键组件将特定于标签的特征提取与协同信息传播集成在一起:1)特定于视图的类激活图(View-Specific Class Activation Map),它将多视图特征转换为紧凑的类标签表示;2)类信息传播校正(Class information propagation Correction),它利用图卷积网络和变压器精炼和传播准确的类标签信息。此外,我们引入了一个多面损失函数,通过基于一致性的结构损失促进鲁棒特征学习和架构稳定性,同时通过知识蒸馏提高泛化。在基准数据集上的大量实验表明,所提出的模型在多视图部分多标签学习任务中显著优于最先进的方法。
{"title":"Multi-View Partial Multi-Label Learning via Class Activation Specific Features Collaborative Learning","authors":"Anhui Tan;Jianhang Xu;Weiping Ding;Jiye Liang;Witold Pedrycz","doi":"10.1109/TETC.2025.3629677","DOIUrl":"https://doi.org/10.1109/TETC.2025.3629677","url":null,"abstract":"Multi-view partial multi-label learning deals with scenarios where samples contain heterogeneous features and are associated with both relevant and corrupted labels. Existing methods struggle to effectively capture label-related features through adequate feature interaction while simultaneously integrating inter- and intra-view features. To address these challenges, we propose a robust and scalable framework, Class Activation Specific Features Collaborative Network, designed to handle feature heterogeneity and facilitate comprehensive feature fusion in multi-view partial multi-label learning. The framework integrates label-specific feature extraction with collaborative information propagation through two key components: 1) View-Specific Class Activation Map, which transforms multi-view features into compact class label representations and 2) Class Information Propagation Correction, which refines and propagates accurate class label information by leveraging graph convolutional networks and transformers. Additionally, we introduce a multi-faceted loss function that promotes robust feature learning and architectural stability via consistency-based structural loss, while improving generalization through knowledge distillation. Extensive experiments on benchmark datasets demonstrate that the proposed model significantly outperforms state-of-the-art methods in multi-view partial multi-label learning tasks.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1522-1535"},"PeriodicalIF":5.4,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HIFLA: Hilbert-Inspired Federated Learning via Action Principles HIFLA:希尔伯特启发的基于行动原则的联邦学习
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-11 DOI: 10.1109/TETC.2025.3629528
Koffka Khan
Federated learning (FL) often suffers from client heterogeneity – differences in data distributions and learning behavior across clients that can degrade the global model’s performance. This paper addresses this challenge with HIFLA (Hilbert-Inspired Federated Learning via Action Principles), a novel approach that leverages variational mechanics. HIFLA formulates the federated training process as the minimization of a global action functional, yielding entropy- regularized Euler–Lagrange dynamics for client and server updates. A key innovation is the introduction of an interaction potential among client models, which mitigates divergence caused by non-i.i.d. data by coupling their updates in the action formulation. Empirically, HIFLA improves model accuracy on heterogeneous FL benchmarks, outperforming standard methods in the presence of statistical heterogeneity. It also demonstrates enhanced robustness against adversarial clients: even when a fraction of participants behave maliciously or send corrupted updates, the HIFLA-based model converges reliably with minimal performance loss. Overall, our results indicate that an action-principle-driven paradigm can effectively tackle client heterogeneity and adversarial robustness in federated learning, paving the way for more resilient and generalizable FL systems.
联邦学习(FL)经常受到客户机异构性的困扰——客户机之间数据分布和学习行为的差异会降低全局模型的性能。本文通过HIFLA (Hilbert-Inspired Federated Learning via Action Principles)解决了这一挑战,HIFLA是一种利用变分机制的新方法。HIFLA将联邦训练过程表述为全局动作函数的最小化,为客户端和服务器更新产生熵-正则化欧拉-拉格朗日动态。一个关键的创新是引入了客户模型之间的交互潜力,这减轻了由非i.d引起的分歧。数据通过在动作公式中耦合它们的更新。从经验上看,HIFLA提高了异构FL基准上的模型准确性,在存在统计异质性的情况下优于标准方法。它还展示了针对对抗性客户端的增强鲁棒性:即使一小部分参与者行为恶意或发送损坏的更新,基于hifl的模型也能以最小的性能损失可靠地收敛。总体而言,我们的研究结果表明,行动原则驱动的范式可以有效地解决联邦学习中的客户异质性和对抗性鲁棒性,为更具弹性和可泛化的FL系统铺平道路。
{"title":"HIFLA: Hilbert-Inspired Federated Learning via Action Principles","authors":"Koffka Khan","doi":"10.1109/TETC.2025.3629528","DOIUrl":"https://doi.org/10.1109/TETC.2025.3629528","url":null,"abstract":"Federated learning (FL) often suffers from client heterogeneity – differences in data distributions and learning behavior across clients that can degrade the global model’s performance. This paper addresses this challenge with HIFLA (Hilbert-Inspired Federated Learning via Action Principles), a novel approach that leverages variational mechanics. HIFLA formulates the federated training process as the minimization of a global action functional, yielding entropy- regularized Euler–Lagrange dynamics for client and server updates. A key innovation is the introduction of an <italic>interaction potential</i> among client models, which mitigates divergence caused by non-i.i.d. data by coupling their updates in the action formulation. Empirically, HIFLA improves model accuracy on heterogeneous FL benchmarks, outperforming standard methods in the presence of statistical heterogeneity. It also demonstrates enhanced robustness against adversarial clients: even when a fraction of participants behave maliciously or send corrupted updates, the HIFLA-based model converges reliably with minimal performance loss. Overall, our results indicate that an action-principle-driven paradigm can effectively tackle client heterogeneity and adversarial robustness in federated learning, paving the way for more resilient and generalizable FL systems.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1536-1552"},"PeriodicalIF":5.4,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Proportional-Integral-Parameter Zeroing Neural Network and Its Application to the Quaternion-Valued Time-Varying Linear Matrix Inequality 一种新型比例-积分-参数归零神经网络及其在四元数值时变线性矩阵不等式中的应用
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-11 DOI: 10.1109/TETC.2025.3629357
Jiajie Luo;Jiguang Li;Lin Xiao;Jichun Li;Wenxing Ji;William Holderbaum;Peng Qi
Zeroing neural network (ZNN) with variable convergence parameter has been a research hotspot recently, and it can be divided into two categories: the varying-parameter ZNN (VP-ZNN) model, and the fuzzy-parameter ZNN (FP-ZNN) model. Both of the two models have their own advantages and disadvantages. VP-ZNN models are usually efficient but not intelligent, while FP-ZNN models are usually intelligent but not efficient. Inspired by the classic proportional–integral–derivative (PID) control technology, we proposed a novel proportional-integral-parameter ZNN (PIP-ZNN) model, which is both efficient and intelligent, to solve the quaternion-valued time-varying linear matrix inequalities (QVTV-LMI) problem. Integrated with adaptive convergence parameters (ACP), the PIP-ZNN model dynamically adjusts its convergence in response to error changes and then achieves optimized performance. Compared with FP-ZNN models which are based on fuzzy logic systems, the PID-based PIP-ZNN models are simpler and more efficient. With the incorporation of a robust activation function (RAF), the PIP-ZNN model demonstrates fixed-time stability and robustness in the presence of both attenuated and constant disturbances. Theoretical analyses in this paper establish the fixed-time stability and robustness of the PIP-ZNN model, including an estimation of the upper bound of the settling-time function. Numerical experiments here validate these advanced features further, emphasizing the efficacy and excellent performance of the proposed PIP-ZNN model.
变收敛参数归零神经网络(ZNN)是近年来的研究热点,可分为变参数ZNN (VP-ZNN)模型和模糊参数ZNN (FP-ZNN)模型两大类。这两种模式都有各自的优点和缺点。VP-ZNN模型通常是高效的而不是智能的,而FP-ZNN模型通常是智能的而不是高效的。在经典的比例-积分-导数(PID)控制技术的启发下,针对四元数值时变线性矩阵不等式(QVTV-LMI)问题,提出了一种高效智能的比例-积分-参数ZNN (PIP-ZNN)模型。结合自适应收敛参数(ACP), PIP-ZNN模型根据误差变化动态调整收敛,从而达到最优性能。与基于模糊逻辑系统的PIP-ZNN模型相比,基于pid的PIP-ZNN模型更简单,效率更高。通过引入鲁棒激活函数(RAF), PIP-ZNN模型在衰减和恒定干扰下都具有固定时间稳定性和鲁棒性。本文通过理论分析,建立了PIP-ZNN模型的定时稳定性和鲁棒性,包括对沉降时间函数上界的估计。本文的数值实验进一步验证了这些先进的特征,强调了PIP-ZNN模型的有效性和优异的性能。
{"title":"A Novel Proportional-Integral-Parameter Zeroing Neural Network and Its Application to the Quaternion-Valued Time-Varying Linear Matrix Inequality","authors":"Jiajie Luo;Jiguang Li;Lin Xiao;Jichun Li;Wenxing Ji;William Holderbaum;Peng Qi","doi":"10.1109/TETC.2025.3629357","DOIUrl":"https://doi.org/10.1109/TETC.2025.3629357","url":null,"abstract":"Zeroing neural network (ZNN) with variable convergence parameter has been a research hotspot recently, and it can be divided into two categories: the varying-parameter ZNN (VP-ZNN) model, and the fuzzy-parameter ZNN (FP-ZNN) model. Both of the two models have their own advantages and disadvantages. VP-ZNN models are usually efficient but not intelligent, while FP-ZNN models are usually intelligent but not efficient. Inspired by the classic proportional–integral–derivative (PID) control technology, we proposed a novel proportional-integral-parameter ZNN (PIP-ZNN) model, which is both efficient and intelligent, to solve the quaternion-valued time-varying linear matrix inequalities (QVTV-LMI) problem. Integrated with adaptive convergence parameters (ACP), the PIP-ZNN model dynamically adjusts its convergence in response to error changes and then achieves optimized performance. Compared with FP-ZNN models which are based on fuzzy logic systems, the PID-based PIP-ZNN models are simpler and more efficient. With the incorporation of a robust activation function (RAF), the PIP-ZNN model demonstrates fixed-time stability and robustness in the presence of both attenuated and constant disturbances. Theoretical analyses in this paper establish the fixed-time stability and robustness of the PIP-ZNN model, including an estimation of the upper bound of the settling-time function. Numerical experiments here validate these advanced features further, emphasizing the efficacy and excellent performance of the proposed PIP-ZNN model.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1565-1576"},"PeriodicalIF":5.4,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GraphMamba: Graph Tokenization Mamba for Hyperspectral Image Classification 用于高光谱图像分类的图标记化曼巴
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-05 DOI: 10.1109/TETC.2025.3626943
Muhammad Ahmad;Manuel Mazzara;Salvatore Distefano;Adil Mehmood Khan;Muhammad Hassaan Farooq Butt;Muhammad Usama;Danfeng Hong
Hyperspectral image (HSI) classification plays a pivotal role in domains such as environmental monitoring, agriculture, and urban planning. Traditional methods, including conventional machine learning and convolutional neural networks (CNNs), often struggle to effectively capture intricate spectral-spatial features and global contextual information. Transformer-based models, while powerful in capturing long-range dependencies, often demand substantial computational resources, posing challenges in scenarios where labeled datasets are limited, as in HSI applications. To overcome such challenges, this work proposes GraphMamba, a hybrid model that combines spectral-spatial token generation, graph-based token prioritization, and cross-attention mechanisms. The model introduces a novel hybridization of state-space modeling and Gated Recurrent Units (GRU), capturing both linear and nonlinear spatial-spectral dynamics. This approach enhances the ability to model complex spatial-spectral relationships while maintaining scalability and computational efficiency across diverse HSI datasets. Through comprehensive experiments, we demonstrate that GraphMamba outperforms existing state-of-the-art models, offering a scalable and robust solution for complex HSI classification tasks.
高光谱图像(HSI)分类在环境监测、农业和城市规划等领域发挥着关键作用。传统的方法,包括传统的机器学习和卷积神经网络(cnn),往往难以有效地捕获复杂的光谱空间特征和全局上下文信息。基于转换器的模型虽然在捕获远程依赖关系方面功能强大,但通常需要大量的计算资源,这在标记数据集有限的情况下(如在HSI应用程序中)提出了挑战。为了克服这些挑战,本研究提出了GraphMamba,这是一个混合模型,结合了频谱空间令牌生成、基于图形的令牌优先级和交叉注意机制。该模型引入了一种新的状态空间建模和门控循环单元(GRU)的杂交,捕捉线性和非线性空间光谱动力学。这种方法增强了对复杂空间-光谱关系建模的能力,同时保持了跨不同HSI数据集的可扩展性和计算效率。通过全面的实验,我们证明GraphMamba优于现有的最先进的模型,为复杂的HSI分类任务提供了可扩展和健壮的解决方案。
{"title":"GraphMamba: Graph Tokenization Mamba for Hyperspectral Image Classification","authors":"Muhammad Ahmad;Manuel Mazzara;Salvatore Distefano;Adil Mehmood Khan;Muhammad Hassaan Farooq Butt;Muhammad Usama;Danfeng Hong","doi":"10.1109/TETC.2025.3626943","DOIUrl":"https://doi.org/10.1109/TETC.2025.3626943","url":null,"abstract":"Hyperspectral image (HSI) classification plays a pivotal role in domains such as environmental monitoring, agriculture, and urban planning. Traditional methods, including conventional machine learning and convolutional neural networks (CNNs), often struggle to effectively capture intricate spectral-spatial features and global contextual information. Transformer-based models, while powerful in capturing long-range dependencies, often demand substantial computational resources, posing challenges in scenarios where labeled datasets are limited, as in HSI applications. To overcome such challenges, this work proposes GraphMamba, a hybrid model that combines spectral-spatial token generation, graph-based token prioritization, and cross-attention mechanisms. The model introduces a novel hybridization of state-space modeling and Gated Recurrent Units (GRU), capturing both linear and nonlinear spatial-spectral dynamics. This approach enhances the ability to model complex spatial-spectral relationships while maintaining scalability and computational efficiency across diverse HSI datasets. Through comprehensive experiments, we demonstrate that GraphMamba outperforms existing state-of-the-art models, offering a scalable and robust solution for complex HSI classification tasks.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1510-1521"},"PeriodicalIF":5.4,"publicationDate":"2025-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating and Mitigating Critical Faults in Floating-Point and Posit Arithmetic Hardware 浮点和正算术硬件关键故障的调查和缓解
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-06 DOI: 10.1109/TETC.2025.3615827
Josie E. Rodriguez Condia;Juan-David Guerrero-Balaguera;Robert Limas Sierra;Matteo Sonza Reorda
Mature computing formats, such as Floating-Point (FP), provide optimal accuracy to process real values and are essential in most scientific domains. However, the massive market adoption of highly parallel systems, with advanced technology nodes, in several domains exacerbates the need for highly reliable systems. Formerly, most reliability evaluations targeted FP hardware. Unfortunately, fine-grain assessments on cores with recent arithmetic format alternatives, such as Posit (particularly suited for Artificial Intelligence), have remained partially unexplored. Similarly, the effects of corruption on operations due to faulty hardware are not well-known, which may prevent the proposal of effective mitigation mechanisms. This work exhaustively evaluates the fine-grain effects of permanent faults in the hardware of arithmetic cores for the three most extensively used operations in modern applications (Add, Multiply, and Multiply and Add), including machine learning, implemented in Posit and FP. Our results indicate that Posit cores are less fault-vulnerable than FP ones. However, Posit cores are more prone to induce significant operational corruption than FP ones (5.2% to 7.5%). We also found that absolute errors in faulty FP cores are higher by up to 2 orders of magnitude than in Posit ones. Finally, we applied and evaluated three mitigation mechanisms (Self-Check and repair, Dual Modular Redundancy, and Triple Modular Redundancy), effectively reducing the most critical errors with moderate area costs (20% to 110%).
成熟的计算格式,如浮点(FP),提供了处理实际值的最佳精度,在大多数科学领域都是必不可少的。然而,在一些领域,高度并行系统和先进技术节点的大量市场采用加剧了对高度可靠系统的需求。以前,大多数可靠性评估都针对FP硬件。不幸的是,使用最近的算术格式替代方案(如Posit(特别适合人工智能))对核心进行细粒度评估仍然部分未被探索。同样,由于硬件故障造成的腐败对业务的影响并不为人所知,这可能妨碍提出有效的缓解机制。这项工作详尽地评估了现代应用程序中三种最广泛使用的运算(加、乘和乘法)的算术核心硬件中永久故障的细颗粒影响,包括机器学习,在Posit和FP中实现。我们的研究结果表明,Posit核比FP核更不容易发生故障。然而,Posit核心比FP核心更容易导致严重的操作腐败(5.2%至7.5%)。我们还发现,有缺陷的FP核的绝对误差比正态核高2个数量级。最后,我们应用并评估了三种缓解机制(自检和修复、双模块冗余和三模块冗余),以适度的面积成本(20%至110%)有效地减少了最严重的错误。
{"title":"Investigating and Mitigating Critical Faults in Floating-Point and Posit Arithmetic Hardware","authors":"Josie E. Rodriguez Condia;Juan-David Guerrero-Balaguera;Robert Limas Sierra;Matteo Sonza Reorda","doi":"10.1109/TETC.2025.3615827","DOIUrl":"https://doi.org/10.1109/TETC.2025.3615827","url":null,"abstract":"Mature computing formats, such as Floating-Point (FP), provide optimal accuracy to process real values and are essential in most scientific domains. However, the massive market adoption of highly parallel systems, with advanced technology nodes, in several domains exacerbates the need for highly reliable systems. Formerly, most reliability evaluations targeted FP hardware. Unfortunately, fine-grain assessments on cores with recent arithmetic format alternatives, such as Posit (particularly suited for Artificial Intelligence), have remained partially unexplored. Similarly, the effects of corruption on operations due to faulty hardware are not well-known, which may prevent the proposal of effective mitigation mechanisms. This work exhaustively evaluates the fine-grain effects of permanent faults in the hardware of arithmetic cores for the three most extensively used operations in modern applications (<italic>Add</i>, <italic>Multiply</i>, and <italic>Multiply and Add</i>), including machine learning, implemented in Posit and FP. Our results indicate that Posit cores are less fault-vulnerable than FP ones. However, Posit cores are more prone to induce significant operational corruption than FP ones (5.2% to 7.5%). We also found that absolute errors in faulty FP cores are higher by up to 2 orders of magnitude than in Posit ones. Finally, we applied and evaluated three mitigation mechanisms (<italic>Self-Check and repair</i>, <italic>Dual Modular Redundancy</i>, and <italic>Triple Modular Redundancy</i>), effectively reducing the most critical errors with moderate area costs (20% to 110%).","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1605-1617"},"PeriodicalIF":5.4,"publicationDate":"2025-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145674752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-Driven Task Scheduling Under Deadline Constraints for MPSoCs With Untrusted 3PIP Cores 具有不可信3PIP内核的mpsoc在截止日期约束下的安全驱动任务调度
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-02 DOI: 10.1109/TETC.2025.3614659
Nan Wang;Lijun Lu;Songping Liu;Hongqing Zhu;Yu Zhu
The high penetration of third-party intellectual property in MPSoCs gives rise to security concerns, and a set of security-driven constraints is imposed into the task scheduling step of the design process to protect MPSoCs against hardware Trojan attacks. Due to the significant performance and area overheads incurred, designers start to selectively apply security-driven constraints to achieve the design targets, but they often ignore that parts of a design may be more vulnerable to hardware Trojan attacks. In this study, the differences in vulnerability to hardware Trojan attacks are also considered in the MPSoC design process, and a security-driven task scheduling method is proposed to minimize both the design vulnerability and chip area under deadline constraints. First, the schedule length is iteratively optimized by a maximum weight independent set-based method that minimizes the vulnerability increment. Second, tasks are assigned to IP vendors with a minimized number of cores required by maximizing the core sharing of tasks. Finally, tasks are scheduled to time periods using the force-directed scheduling method. Experimental results demonstrate the effectiveness of the proposed method in reducing the number of cores while maintaining system security under deadline constraints.
由于第三方知识产权在mpsoc中的高度渗透,引起了人们对安全问题的关注,在设计过程的任务调度步骤中引入了一套安全驱动的约束,以保护mpsoc免受硬件木马攻击。由于产生了显著的性能和面积开销,设计人员开始选择性地应用安全驱动的约束来实现设计目标,但他们经常忽略设计的某些部分可能更容易受到硬件木马攻击。在本研究中,在MPSoC设计过程中也考虑了硬件木马攻击漏洞的差异,并提出了一种安全驱动的任务调度方法,以最大限度地减少设计漏洞和在期限约束下的芯片面积。首先,采用基于最大权无关集的方法迭代优化调度长度,使漏洞增量最小化;其次,将任务分配给IP供应商,通过最大化任务的核心共享来最小化所需的核心数量。最后,使用强制调度方法将任务调度到时间段。实验结果表明,该方法可以有效地减少核数,同时在截止日期约束下保持系统的安全性。
{"title":"Security-Driven Task Scheduling Under Deadline Constraints for MPSoCs With Untrusted 3PIP Cores","authors":"Nan Wang;Lijun Lu;Songping Liu;Hongqing Zhu;Yu Zhu","doi":"10.1109/TETC.2025.3614659","DOIUrl":"https://doi.org/10.1109/TETC.2025.3614659","url":null,"abstract":"The high penetration of third-party intellectual property in MPSoCs gives rise to security concerns, and a set of security-driven constraints is imposed into the task scheduling step of the design process to protect MPSoCs against hardware Trojan attacks. Due to the significant performance and area overheads incurred, designers start to selectively apply security-driven constraints to achieve the design targets, but they often ignore that parts of a design may be more vulnerable to hardware Trojan attacks. In this study, the differences in vulnerability to hardware Trojan attacks are also considered in the MPSoC design process, and a security-driven task scheduling method is proposed to minimize both the design vulnerability and chip area under deadline constraints. First, the schedule length is iteratively optimized by a maximum weight independent set-based method that minimizes the vulnerability increment. Second, tasks are assigned to IP vendors with a minimized number of cores required by maximizing the core sharing of tasks. Finally, tasks are scheduled to time periods using the force-directed scheduling method. Experimental results demonstrate the effectiveness of the proposed method in reducing the number of cores while maintaining system security under deadline constraints.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1577-1590"},"PeriodicalIF":5.4,"publicationDate":"2025-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145674811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asyn2F: An Asynchronous Federated Learning Framework With Bidirectional Model Aggregation Asyn2F:具有双向模型聚合的异步联邦学习框架
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-22 DOI: 10.1109/TETC.2025.3609004
Tien-Dung Cao;Nguyen T. Vuong;Thai Q. Le;Hoang V. N. Dao;Tram Truong-Huu
In federated learning, the models can be trained synchronously or asynchronously. Many existing works have focused on developing an aggregation method for the server to aggregate multiple local models into the global model with improved performance. They ignore the heterogeneity of the training workers, which causes the delay in the training of the local models, leading to the obsolete information issue. In this paper, we design and develop Asyn2F, an Asynchronous Federated learning Framework with bidirectional model aggregation. By bidirectional aggregation, Asyn2F, on one hand, allows the server to asynchronously aggregate multiple local models and generate a new global model. On the other hand, it allows the training workers to aggregate the new version of the global model into a local model, which is being optimized even in the middle of a training epoch. We develop Asyn2F considering various practical implementation requirements with geographically distributed and heterogeneous training workers. Extensive experiments with different datasets show that the models trained by Asyn2F achieve higher performance compared to the state-of-the-art techniques. The experiments also demonstrate the effectiveness, practicality, and scalability of Asyn2F, making it ready for practical deployment.
在联邦学习中,可以同步或异步地训练模型。许多现有的工作都集中在为服务器开发一种聚合方法,以便将多个局部模型聚合到全局模型中,从而提高性能。他们忽视了培训人员的异质性,导致了本地模型培训的延迟,导致了信息过时的问题。在本文中,我们设计和开发了一个双向模型聚合的异步联邦学习框架Asyn2F。通过双向聚合,一方面,Asyn2F允许服务器异步聚合多个本地模型并生成新的全局模型。另一方面,它允许培训人员将全局模型的新版本聚合到局部模型中,即使在培训阶段中期也可以对其进行优化。我们在开发Asyn2F时考虑了地理分布和异构培训工作者的各种实际实现需求。不同数据集的大量实验表明,与最先进的技术相比,由Asyn2F训练的模型实现了更高的性能。实验还证明了Asyn2F的有效性、实用性和可扩展性,为实际部署做好了准备。
{"title":"Asyn2F: An Asynchronous Federated Learning Framework With Bidirectional Model Aggregation","authors":"Tien-Dung Cao;Nguyen T. Vuong;Thai Q. Le;Hoang V. N. Dao;Tram Truong-Huu","doi":"10.1109/TETC.2025.3609004","DOIUrl":"https://doi.org/10.1109/TETC.2025.3609004","url":null,"abstract":"In federated learning, the models can be trained synchronously or asynchronously. Many existing works have focused on developing an aggregation method for the server to aggregate multiple local models into the global model with improved performance. They ignore the heterogeneity of the training workers, which causes the delay in the training of the local models, leading to the obsolete information issue. In this paper, we design and develop <sc>Asyn2F</small>, an <sc>Asyn</small>chronous <sc>F</small>ederated learning <sc>F</small>ramework with bidirectional model aggregation. By bidirectional aggregation, <sc>Asyn2F</small>, on one hand, allows the server to asynchronously aggregate multiple local models and generate a new global model. On the other hand, it allows the training workers to aggregate the new version of the global model into a local model, which is being optimized even in the middle of a training epoch. We develop <sc>Asyn2F</small> considering various practical implementation requirements with geographically distributed and heterogeneous training workers. Extensive experiments with different datasets show that the models trained by <sc>Asyn2F</small> achieve higher performance compared to the state-of-the-art techniques. The experiments also demonstrate the effectiveness, practicality, and scalability of <sc>Asyn2F</small>, making it ready for practical deployment.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1618-1632"},"PeriodicalIF":5.4,"publicationDate":"2025-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Genetic Approach for Automatic AxC Design Exploration at RTL Based on Assertion Mining and Fault Analysis 基于断言挖掘和故障分析的RTL自动AxC设计探索遗传方法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-19 DOI: 10.1109/TETC.2025.3609050
Alberto Bosio;Samuele Germiniani;Graziano Pravadelli;Marcello Traiola
In Approximate Computing (AxC), design exploration methods have been introduced to automatically identify approximation targets at the gate level. However, only some of them are applicable at Register Transfer Level (RTL); furthermore, the benefits of combining information from assertions and fault analysis have not been fully explored. This paper proposes a novel methodology for guiding AxC design exploration at RTL considering two approximation techniques: bit-width reduction and statement reduction. Then, it employs fault injection to mimic the approximation effect on the design under approximation. To guide the designer while assessing the approximation choices, assertions, which formally capture the behaviors implemented in the design, are dynamically generated from the RTL simulation traces. Then, the impact of fault injections on the truth values of the assertions is employed as a proxy for measuring the functional accuracy of the corresponding approximations. Based on this evaluation, a genetic algorithm is finally used to rank and cluster the approximation targets, thus providing the designer with an efficient and effective way to automatically analyze AxC variants in terms of the trade-off between accuracy and performance. The experiments carried out on state-of-the-art benchmarks show that the proposed approach represents a promising solution for the automation of AxC design exploration at RTL.
在近似计算(AxC)中,引入了设计探索方法来自动识别门级近似目标。然而,其中只有一部分适用于注册转移级别(RTL);此外,结合来自断言和故障分析的信息的好处还没有得到充分的探讨。本文提出了一种新的方法来指导RTL中的AxC设计探索,该方法考虑了两种近似技术:位宽缩减和语句缩减。然后,利用故障注入模拟近似对近似下设计的影响。为了在评估近似选择时指导设计者,断言从RTL模拟跟踪动态生成,它正式捕获了设计中实现的行为。然后,采用故障注入对断言真值的影响作为度量相应逼近的功能精度的代理。在此基础上,最后利用遗传算法对逼近目标进行排序和聚类,从而为设计人员提供了一种高效、有效的方法来自动分析精度和性能之间的权衡。在最先进的基准上进行的实验表明,所提出的方法代表了RTL AxC设计探索自动化的有前途的解决方案。
{"title":"A Genetic Approach for Automatic AxC Design Exploration at RTL Based on Assertion Mining and Fault Analysis","authors":"Alberto Bosio;Samuele Germiniani;Graziano Pravadelli;Marcello Traiola","doi":"10.1109/TETC.2025.3609050","DOIUrl":"https://doi.org/10.1109/TETC.2025.3609050","url":null,"abstract":"In Approximate Computing (AxC), design exploration methods have been introduced to automatically identify approximation targets at the gate level. However, only some of them are applicable at Register Transfer Level (RTL); furthermore, the benefits of combining information from assertions and fault analysis have not been fully explored. This paper proposes a novel methodology for guiding AxC design exploration at RTL considering two approximation techniques: bit-width reduction and statement reduction. Then, it employs fault injection to mimic the approximation effect on the design under approximation. To guide the designer while assessing the approximation choices, assertions, which formally capture the behaviors implemented in the design, are dynamically generated from the RTL simulation traces. Then, the impact of fault injections on the truth values of the assertions is employed as a proxy for measuring the functional accuracy of the corresponding approximations. Based on this evaluation, a genetic algorithm is finally used to rank and cluster the approximation targets, thus providing the designer with an efficient and effective way to automatically analyze AxC variants in terms of the trade-off between accuracy and performance. The experiments carried out on state-of-the-art benchmarks show that the proposed approach represents a promising solution for the automation of AxC design exploration at RTL.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1633-1648"},"PeriodicalIF":5.4,"publicationDate":"2025-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11174094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OER-Miner: One-Off Episode Rule Mining for Process Event Logs over - miner:过程事件日志的一次性事件规则挖掘
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-16 DOI: 10.1109/TETC.2025.3607892
Youxi Wu;Zhihong Dong;Jing Liu;Yan Li;Cong Liu;Lijie Wen;Xindong Wu
Episode mining is an active subfield of data mining in which the aim is to retrieve important knowledge from temporal data and can be used to analyze fault reports and web navigation logs. However, existing methods generally do not consider time gap constraints, and overestimate the frequency of episodes, which may lead to mining a large number of episodes that users are not interested in. To tackle this problem, this paper investigates one-off episode rule (OER) mining with time gap constraints for process event logs and proposes a one-off episode rule mining algorithm called OER-Miner that can mine frequent one-off episodes and the implicit relationship among them. To generate fewer and prune unpromising candidate episodes, OER-Miner utilizes episode join and pruning strategies, respectively. To efficiently calculate the candidate episode support, position indexes, and depth-first search and backtracking strategies are applied to calculate the number of occurrences. Experimental results verify that OER-Miner yields a better performance than seven other competitive algorithms on nine publicly available event logs. More importantly, OER-Miner can be applied to a real-industrial log to identify rework phenomena in the production process by mining strong one-off episode rules, to discover the optimal processes and deficiencies of the system, and provide recommendations for further improvement.
事件挖掘是数据挖掘的一个活跃的分支领域,其目的是从时态数据中检索重要的知识,并可用于分析故障报告和web导航日志。然而,现有的方法一般没有考虑时间间隔的约束,并且高估了剧集的频率,这可能导致挖掘出大量用户不感兴趣的剧集。为了解决这一问题,本文研究了过程事件日志中具有时间间隔约束的一次性事件规则(OER)挖掘,提出了一种一次性事件规则挖掘算法OER- miner,该算法可以挖掘频繁的一次性事件及其隐含关系。为了生成更少的候选集并修剪没有希望的候选集,OER-Miner分别使用集连接和修剪策略。为了有效地计算候选集支持度,采用了位置索引、深度优先搜索和回溯策略来计算出现次数。实验结果证明,在9个公开可用的事件日志上,OER-Miner比其他7种竞争算法产生了更好的性能。更重要的是,OER-Miner可以应用到实际工业日志中,通过挖掘强一次性事件规则,识别生产过程中的返工现象,发现系统的最优流程和不足,并为进一步改进提供建议。
{"title":"OER-Miner: One-Off Episode Rule Mining for Process Event Logs","authors":"Youxi Wu;Zhihong Dong;Jing Liu;Yan Li;Cong Liu;Lijie Wen;Xindong Wu","doi":"10.1109/TETC.2025.3607892","DOIUrl":"https://doi.org/10.1109/TETC.2025.3607892","url":null,"abstract":"Episode mining is an active subfield of data mining in which the aim is to retrieve important knowledge from temporal data and can be used to analyze fault reports and web navigation logs. However, existing methods generally do not consider time gap constraints, and overestimate the frequency of episodes, which may lead to mining a large number of episodes that users are not interested in. To tackle this problem, this paper investigates one-off episode rule (OER) mining with time gap constraints for process event logs and proposes a one-off episode rule mining algorithm called OER-Miner that can mine frequent one-off episodes and the implicit relationship among them. To generate fewer and prune unpromising candidate episodes, OER-Miner utilizes episode join and pruning strategies, respectively. To efficiently calculate the candidate episode support, position indexes, and depth-first search and backtracking strategies are applied to calculate the number of occurrences. Experimental results verify that OER-Miner yields a better performance than seven other competitive algorithms on nine publicly available event logs. More importantly, OER-Miner can be applied to a real-industrial log to identify rework phenomena in the production process by mining strong one-off episode rules, to discover the optimal processes and deficiencies of the system, and provide recommendations for further improvement.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1497-1509"},"PeriodicalIF":5.4,"publicationDate":"2025-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145674812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Emerging Topics in Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1