首页 > 最新文献

IEEE Transactions on Sustainable Computing最新文献

英文 中文
Amplitude-Aligned Personalization and Robust Aggregation for Federated Learning 针对联合学习的振幅对齐个性化和稳健聚合
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-12-12 DOI: 10.1109/TSUSC.2023.3341836
Yongqi Jiang;Siguang Chen;Xiangwen Bao
In practical applications, federated learning (FL) suffers from slow convergence rate and inferior performance resulting from the statistical heterogeneity of distributed data. Personalized FL (pFL) has been proposed to overcome this problem. However, existing pFL approaches mainly focus on measuring differences between entire model dimensions across clients, ignore the layer-wise differences in convolutional neural networks (CNNs), which may lead to inaccurate personalization. Additionally, two potential threats in FL are that malicious clients may attempt to poison the entire federation by tampering with local labels, and the model information uploaded by clients makes them vulnerable to inference attacks. To tackle these issues, 1) we propose a novel pFL approach in which clients minimize local classification errors and align the local and global prototypes for data from the class that is shared with other clients. This method adopts layer-wise collaborative training to achieve more granular personalization and converts local prototypes to the frequency domain to prevent source data leakage; 2) To prevent the FL model from misclassifying certain test samples as expected by poisoners, we design a robust aggregation method to ensure that benign clients who provide trustworthy model predictions for its local data are weighted far more heavily in the aggregation process than malicious clients. Experiments show that our scheme, especially in the data heterogeneity situation, can produce robust performance and more stable convergence while preserving privacy.
在实际应用中,由于分布式数据的统计异质性,联合学习(FL)存在收敛速度慢、性能差的问题。为了克服这一问题,有人提出了个性化联合学习(pFL)。然而,现有的 pFL 方法主要侧重于测量客户端之间整个模型维度的差异,而忽略了卷积神经网络(CNN)的层间差异,这可能会导致个性化不准确。此外,FL 的两个潜在威胁是:恶意客户端可能试图通过篡改本地标签来毒害整个联盟;客户端上传的模型信息容易受到推理攻击。为了解决这些问题,1)我们提出了一种新颖的 pFL 方法,在这种方法中,客户端将局部分类错误最小化,并将与其他客户端共享的类数据的局部原型和全局原型统一起来。这种方法采用分层协同训练来实现更细粒度的个性化,并将局部原型转换为频域,以防止源数据泄漏;2)为了防止 FL 模型误分类中毒者所期望的某些测试样本,我们设计了一种稳健的聚合方法,以确保为其本地数据提供可信模型预测的良性客户端在聚合过程中的权重远远高于恶意客户端。实验表明,我们的方案,尤其是在数据异构的情况下,可以产生稳健的性能和更稳定的收敛,同时保护隐私。
{"title":"Amplitude-Aligned Personalization and Robust Aggregation for Federated Learning","authors":"Yongqi Jiang;Siguang Chen;Xiangwen Bao","doi":"10.1109/TSUSC.2023.3341836","DOIUrl":"https://doi.org/10.1109/TSUSC.2023.3341836","url":null,"abstract":"In practical applications, federated learning (FL) suffers from slow convergence rate and inferior performance resulting from the statistical heterogeneity of distributed data. Personalized FL (pFL) has been proposed to overcome this problem. However, existing pFL approaches mainly focus on measuring differences between entire model dimensions across clients, ignore the layer-wise differences in convolutional neural networks (CNNs), which may lead to inaccurate personalization. Additionally, two potential threats in FL are that malicious clients may attempt to poison the entire federation by tampering with local labels, and the model information uploaded by clients makes them vulnerable to inference attacks. To tackle these issues, 1) we propose a novel pFL approach in which clients minimize local classification errors and align the local and global prototypes for data from the class that is shared with other clients. This method adopts layer-wise collaborative training to achieve more granular personalization and converts local prototypes to the frequency domain to prevent source data leakage; 2) To prevent the FL model from misclassifying certain test samples as expected by poisoners, we design a robust aggregation method to ensure that benign clients who provide trustworthy model predictions for its local data are weighted far more heavily in the aggregation process than malicious clients. Experiments show that our scheme, especially in the data heterogeneity situation, can produce robust performance and more stable convergence while preserving privacy.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"535-547"},"PeriodicalIF":3.9,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141264311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BitFT: An Understandable, Performant and Resource-Efficient Blockchain Consensus BitFT:可理解、高性能、高资源效率的区块链共识
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-12-12 DOI: 10.1109/TSUSC.2023.3341440
Rui Hao;Xiaohai Dai;Weiqi Dai
Blockchain technology has gained prominence for its potential to address security and privacy challenges in Internet-of-Things (IoT) services and Cyber-Physical Systems (CPS) due to its decentralized, traceable, and immutable nature. However, the considerable energy consumption associated with blockchain, exemplified by Bitcoin, has raised sustainability concerns. This paper introduces BitFT, a consensus protocol that combines the strengths of both lottery-based and voting-based mechanisms to offer a sustainable, comprehensible, and high-performance solution. BitFT dissects the block lifecycle into three phases: dissemination, and commitment phases, which correspond to the Bitcoin framework. It leverages a multiple-round sortition algorithm, a Reliable Broadcast (Rbc) protocol, and a Quorum Certificate (QC) mechanism to facilitate efficient protocol operation. The sortition algorithm functions like a lottery algorithm, while the Rbc protocol and $QC$ mechanism are implemented based on votes. In order to maximize network utilization and enhance system throughput, we further introduce a layered architecture to BitFT, which allows for concurrent commitment of multiple blocks at the same height. We perform a comprehensive analysis to verify the correctness of BitFT and conduct various experiments to demonstrate its high performance.
区块链技术因其去中心化、可追溯和不可改变的特性,在解决物联网(IoT)服务和网络物理系统(CPS)的安全和隐私挑战方面具有巨大潜力,因而备受瞩目。然而,与区块链相关的大量能源消耗(以比特币为例)引起了人们对可持续发展的关注。本文介绍的 BitFT 是一种共识协议,它结合了抽签机制和投票机制的优点,提供了一种可持续、可理解和高性能的解决方案。BitFT 将区块生命周期划分为三个阶段:传播阶段和承诺阶段,与比特币框架相对应。它利用多轮排序算法、可靠广播(Rbc)协议和法定人数证书(QC)机制来促进协议的高效运行。排序算法的功能类似于抽签算法,而 Rbc 协议和 QC$ 机制则基于投票来实现。为了最大限度地提高网络利用率和系统吞吐量,我们进一步为 BitFT 引入了分层架构,允许在同一高度同时承诺多个区块。我们进行了全面的分析来验证 BitFT 的正确性,并通过各种实验来证明它的高性能。
{"title":"BitFT: An Understandable, Performant and Resource-Efficient Blockchain Consensus","authors":"Rui Hao;Xiaohai Dai;Weiqi Dai","doi":"10.1109/TSUSC.2023.3341440","DOIUrl":"https://doi.org/10.1109/TSUSC.2023.3341440","url":null,"abstract":"Blockchain technology has gained prominence for its potential to address security and privacy challenges in Internet-of-Things (IoT) services and Cyber-Physical Systems (CPS) due to its decentralized, traceable, and immutable nature. However, the considerable energy consumption associated with blockchain, exemplified by Bitcoin, has raised sustainability concerns. This paper introduces BitFT, a consensus protocol that combines the strengths of both lottery-based and voting-based mechanisms to offer a sustainable, comprehensible, and high-performance solution. BitFT dissects the block lifecycle into three phases: dissemination, and commitment phases, which correspond to the Bitcoin framework. It leverages a multiple-round sortition algorithm, a Reliable Broadcast (Rbc) protocol, and a Quorum Certificate (QC) mechanism to facilitate efficient protocol operation. The sortition algorithm functions like a lottery algorithm, while the \u0000<small>Rbc</small>\u0000 protocol and \u0000<inline-formula><tex-math>$QC$</tex-math></inline-formula>\u0000 mechanism are implemented based on votes. In order to maximize network utilization and enhance system throughput, we further introduce a layered architecture to BitFT, which allows for concurrent commitment of multiple blocks at the same height. We perform a comprehensive analysis to verify the correctness of BitFT and conduct various experiments to demonstrate its high performance.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"522-534"},"PeriodicalIF":3.9,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141264515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial Sustainable Defence and Security Systems 编辑可持续防卫与安全系统
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-12-08 DOI: 10.1109/TSUSC.2023.3308471
Paul D. Yoo;Zahir Tari
In an increasingly interconnected world, the sophistication of cyber-attacks is on the rise. Cybersecurity research stands as a pivotal factor in shaping the prosperity of nations. To counter threats to network infrastructure and sensitive data, a multitude of security solutions with varying degrees of efficacy have been proposed. However, these solutions have thus far insufficiently accounted for a critical dimension: sustainability. In this context, sustainability entails the continuous support of processes over time by enhancing the computational requisites, scalability, energy efficiency, and resource utilization of defence and security systems. This special issue endeavors to explore recent strides in model development, innovative methodologies, and insightful observations aimed at enhancing cybersecurity, with a particular emphasis on the sustainability of defence and security systems.
在一个相互联系日益紧密的世界里,网络攻击的复杂程度在不断上升。网络安全研究是影响国家繁荣的关键因素。为了应对网络基础设施和敏感数据所面临的威胁,人们提出了许多功效各异的安全解决方案。然而,迄今为止,这些解决方案都没有充分考虑到一个重要方面:可持续性。在这种情况下,可持续性意味着通过提高防御和安全系统的计算要求、可扩展性、能源效率和资源利用率,在一段时间内持续支持各种进程。本特刊旨在探讨最近在模型开发、创新方法学方面取得的进展,以及旨在加强网络安全的深刻见解,尤其侧重于国防和安全系统的可持续性。
{"title":"Editorial Sustainable Defence and Security Systems","authors":"Paul D. Yoo;Zahir Tari","doi":"10.1109/TSUSC.2023.3308471","DOIUrl":"https://doi.org/10.1109/TSUSC.2023.3308471","url":null,"abstract":"In an increasingly interconnected world, the sophistication of cyber-attacks is on the rise. Cybersecurity research stands as a pivotal factor in shaping the prosperity of nations. To counter threats to network infrastructure and sensitive data, a multitude of security solutions with varying degrees of efficacy have been proposed. However, these solutions have thus far insufficiently accounted for a critical dimension: sustainability. In this context, sustainability entails the continuous support of processes over time by enhancing the computational requisites, scalability, energy efficiency, and resource utilization of defence and security systems. This special issue endeavors to explore recent strides in model development, innovative methodologies, and insightful observations aimed at enhancing cybersecurity, with a particular emphasis on the sustainability of defence and security systems.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"8 4","pages":"537-539"},"PeriodicalIF":3.9,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10352168","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138558207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
REPFS: Reliability-Ensured Personalized Function Scheduling in Sustainable Serverless Edge Computing REPFS:可持续无服务器边缘计算中的可靠性有保障的个性化功能调度
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-29 DOI: 10.1109/TSUSC.2023.3336691
Kun Cao;Jian Weng
In recent years, serverless edge computing has been widely employed in the deployments of Internet-of-things (IoT) applications. Despite considerable research efforts in this field, existing works fail to jointly consider essential factors such as energy, reliability, personalized user requirements, and stochastic application executions. This oversight results in an inefficient utilization of computation and communication resources within serverless edge computing networks, subsequently diminishing the profit of service providers and degrading the quality-of-experience (QoE) of end users. In this paper, we explore the problem of reliability-ensured personalized function scheduling (REPFS) to jointly optimize the profit of service providers and the holistic QoE of end users in sustainable serverless edge computing. A personality-driven user QoE prediction method is first designed to accurately estimate the QoE of individual end users with differentiated personality types. Afterward, a deterministic function scheduling policy is developed on the problem-specific augmented non-dominated sorting genetic algorithm II (PSA-NSGA-II). Given the inherent uncertainty of application executions, a stochastic function scheduling strategy that can be easily parallelized for modern multicore scheduler platforms is also devised to accelerate solution generation for stochastic applications. Experimental results show that our deterministic function scheduling policy achieves 15% performance enhancement compared with representative multiobjective evolutionary algorithms. Furthermore, our stochastic function scheduling strategy promotes the service profit by 78% and the holistic user QoE by 118% on average compared with the developed deterministic scheduling policy.
近年来,无服务器边缘计算被广泛应用于物联网(IoT)应用的部署中。尽管在这一领域开展了大量研究工作,但现有工作未能共同考虑能源、可靠性、个性化用户需求和随机应用执行等基本因素。这种疏忽导致了无服务器边缘计算网络中计算和通信资源的低效利用,进而降低了服务提供商的利润和终端用户的体验质量(QoE)。本文探讨了可靠性保证的个性化功能调度(REPFS)问题,以在可持续的无服务器边缘计算中共同优化服务提供商的利润和终端用户的整体 QoE。首先设计了一种个性驱动的用户 QoE 预测方法,以准确估计具有不同个性类型的单个终端用户的 QoE。之后,在特定问题增强非支配排序遗传算法 II(PSA-NSGA-II)上开发了一种确定性功能调度策略。考虑到应用执行的内在不确定性,我们还设计了一种可在现代多核调度平台上轻松并行化的随机函数调度策略,以加速随机应用解决方案的生成。实验结果表明,与具有代表性的多目标进化算法相比,我们的确定性函数调度策略的性能提高了 15%。此外,与开发的确定性调度策略相比,我们的随机函数调度策略平均提高了 78% 的服务利润和 118% 的整体用户 QoE。
{"title":"REPFS: Reliability-Ensured Personalized Function Scheduling in Sustainable Serverless Edge Computing","authors":"Kun Cao;Jian Weng","doi":"10.1109/TSUSC.2023.3336691","DOIUrl":"https://doi.org/10.1109/TSUSC.2023.3336691","url":null,"abstract":"In recent years, serverless edge computing has been widely employed in the deployments of Internet-of-things (IoT) applications. Despite considerable research efforts in this field, existing works fail to jointly consider essential factors such as energy, reliability, personalized user requirements, and stochastic application executions. This oversight results in an inefficient utilization of computation and communication resources within serverless edge computing networks, subsequently diminishing the profit of service providers and degrading the quality-of-experience (QoE) of end users. In this paper, we explore the problem of reliability-ensured personalized function scheduling (REPFS) to jointly optimize the profit of service providers and the holistic QoE of end users in sustainable serverless edge computing. A personality-driven user QoE prediction method is first designed to accurately estimate the QoE of individual end users with differentiated personality types. Afterward, a deterministic function scheduling policy is developed on the problem-specific augmented non-dominated sorting genetic algorithm II (PSA-NSGA-II). Given the inherent uncertainty of application executions, a stochastic function scheduling strategy that can be easily parallelized for modern multicore scheduler platforms is also devised to accelerate solution generation for stochastic applications. Experimental results show that our deterministic function scheduling policy achieves 15% performance enhancement compared with representative multiobjective evolutionary algorithms. Furthermore, our stochastic function scheduling strategy promotes the service profit by 78% and the holistic user QoE by 118% on average compared with the developed deterministic scheduling policy.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"494-511"},"PeriodicalIF":3.9,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10334010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141264524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is Hot IT a False Economy? An Analysis of Server and Data Center Energy Efficiency as Temperatures Rise 热门 IT 是虚假经济吗?温度升高时服务器和数据中心能效分析
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-27 DOI: 10.1109/TSUSC.2023.3336801
Stephen Clement;Kat Burdett;Nour Rteil;Astrid Wynne;Rich Kenny
As demand for digital services grows, there is need to improve efficiency and reduce the environmental impact of data centers. The largest energy consumer in any data center is the IT, followed by the systems dedicated to cooling. Aiming to improve efficiency, and driven by metrics like PUE, there is a trend towards running data centers hotter to reduce the cooling energy. There is little research investigating the effect this will have on the IT beyond failure rates. To ensure overall efficiency is improving, we must view the data center as a system of systems, taking a holistic view rather than focusing on individual sub-systems. In this paper we use industry standard benchmarks and a wind-tunnel to profile typical enterprise IT. We analyze the effect of environmental conditions on IT efficiency, showing minor increases in temperature or pressure impact the efficiency of servers. Using an idealized, simulated data center case study we show that the interaction between cooling systems, server behavior and local climate are non-trivial and increasing temperatures has potential to worsen efficiency.
随着数字服务需求的增长,需要提高数据中心的效率并减少对环境的影响。数据中心最大的能源消耗者是 IT,其次是专用于冷却的系统。为了提高效率,在 PUE 等指标的驱动下,数据中心的运行温度有升高的趋势,以减少冷却能耗。除故障率外,几乎没有研究调查这对 IT 的影响。为确保提高整体效率,我们必须将数据中心视为一个由多个系统组成的系统,从整体上而不是只关注单个子系统。在本文中,我们使用行业标准基准和风洞来剖析典型的企业 IT。我们分析了环境条件对 IT 效率的影响,表明温度或压力的微小增加都会影响服务器的效率。通过一个理想化的模拟数据中心案例研究,我们发现冷却系统、服务器行为和当地气候之间的相互作用并不复杂,温度升高有可能导致效率恶化。
{"title":"Is Hot IT a False Economy? An Analysis of Server and Data Center Energy Efficiency as Temperatures Rise","authors":"Stephen Clement;Kat Burdett;Nour Rteil;Astrid Wynne;Rich Kenny","doi":"10.1109/TSUSC.2023.3336801","DOIUrl":"https://doi.org/10.1109/TSUSC.2023.3336801","url":null,"abstract":"As demand for digital services grows, there is need to improve efficiency and reduce the environmental impact of data centers. The largest energy consumer in any data center is the IT, followed by the systems dedicated to cooling. Aiming to improve efficiency, and driven by metrics like PUE, there is a trend towards running data centers hotter to reduce the cooling energy. There is little research investigating the effect this will have on the IT beyond failure rates. To ensure overall efficiency is improving, we must view the data center as a system of systems, taking a holistic view rather than focusing on individual sub-systems. In this paper we use industry standard benchmarks and a wind-tunnel to profile typical enterprise IT. We analyze the effect of environmental conditions on IT efficiency, showing minor increases in temperature or pressure impact the efficiency of servers. Using an idealized, simulated data center case study we show that the interaction between cooling systems, server behavior and local climate are non-trivial and increasing temperatures has potential to worsen efficiency.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"482-493"},"PeriodicalIF":3.9,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141264312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Hybrid RF/VLC Energy Harvested Terrestrial-Underwater System 地面-水下混合射频/VLC 能量收集系统性能分析
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-24 DOI: 10.1109/TSUSC.2023.3336374
Krati Mittal;Akash Gupta;Nikhil Sharma;Manan Jani;Parul Garg
In this paper, we study the performance analysis of a cooperative terrestrial-underwater visible light communication (UWVLC) system, considering energy harvesting at a decode and forward (DF) relay on the ship. The transmitter to the ship link is modelled by shadowed Rician fading channel, while the UWVLC link is characterised by mixture exponential generalized gamma (EGG) distribution. The energy constrained relay harvests energy from the received signal based on power splitting (PS) scheme, assuming a part of received power is used for energy harvesting. Energy harvesting at the relay node makes the system sustainable by reducing the carbon footprints. We derive novel closed form expressions for bit error rate (BER), outage probability and ergodic capacity for the considered system at the underwater node, considering the effects of various parameters that include bubble level, temperature and salinity.
本文研究了陆地-水下可见光合作通信(UWVLC)系统的性能分析,考虑了船上解码和转发(DF)中继器的能量收集。发射机到船上的链路以阴影里氏衰落信道为模型,而 UWVLC 链路则以混合指数广义伽马(EGG)分布为特征。能量受限的中继节点根据功率分配(PS)方案从接收到的信号中收集能量,假设接收到的部分功率用于能量收集。中继节点的能量收集可减少碳足迹,从而使系统具有可持续性。考虑到气泡水平、温度和盐度等各种参数的影响,我们推导出了所考虑的水下节点系统的误码率 (BER)、中断概率和遍历容量的新型闭式表达式。
{"title":"Performance Analysis of Hybrid RF/VLC Energy Harvested Terrestrial-Underwater System","authors":"Krati Mittal;Akash Gupta;Nikhil Sharma;Manan Jani;Parul Garg","doi":"10.1109/TSUSC.2023.3336374","DOIUrl":"https://doi.org/10.1109/TSUSC.2023.3336374","url":null,"abstract":"In this paper, we study the performance analysis of a cooperative terrestrial-underwater visible light communication (UWVLC) system, considering energy harvesting at a decode and forward (DF) relay on the ship. The transmitter to the ship link is modelled by shadowed Rician fading channel, while the UWVLC link is characterised by mixture exponential generalized gamma (EGG) distribution. The energy constrained relay harvests energy from the received signal based on power splitting (PS) scheme, assuming a part of received power is used for energy harvesting. Energy harvesting at the relay node makes the system sustainable by reducing the carbon footprints. We derive novel closed form expressions for bit error rate (BER), outage probability and ergodic capacity for the considered system at the underwater node, considering the effects of various parameters that include bubble level, temperature and salinity.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"512-521"},"PeriodicalIF":3.9,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141264335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Privacy-Preserving and Practical Data Trading for Aggregate Statistic 为汇总统计实现隐私保护和实用数据交易
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-13 DOI: 10.1109/TSUSC.2023.3331179
Fan Yang;Xiaofeng Liao;Xinyu Lei;Nankun Mu;Di Zhang
Data trading is an effective way for commercial companies to obtain massive personal data to develop their data-driven businesses. However, when data owners may want to sell their data without revealing privacy, data consumers also face the dilemma of high purchase costs due to purchasing too much invalid data. Therefore, there is an urgent need for a data trading scheme that can protect personal privacy and save expenses simultaneously. In this paper, we design a privACy-preserving and praCtical aggrEgate StatiStic trading scheme (named as ACCESS). Technically, we focus on the group-level pricing strategy to make ACCESS easier to implement. The differential privacy technique is applied to protect the data owners’ privacy, and the sampling algorithm is adopted to reduce the data consumers’ costs. Specifically, to provide a maximum tolerant privacy loss guarantee for the data owners, we design a decision algorithm to detect whether a conflict occurs between the consumer-specified accuracy level and the maximum tolerable privacy loss budget. Besides, to minimize the purchase cost for the data brokers, we develop a sampling-based aggregation method consisting of two sampling algorithms (called as BUSA and BKSA, respectively). BUSA enables reducing purchase costs with no additional background knowledge. Once the data broker knows the data boundary, BKSA can significantly reduce the amount of data that needs to be purchased, thereby the purchase cost is reduced. Rigorous theoretical analysis and extensive experiments (over four real-world and public datasets) further demonstrate the practicability of ACCESS.
数据交易是商业公司获取海量个人数据以发展数据驱动型业务的有效途径。然而,当数据拥有者希望在不泄露隐私的情况下出售数据时,数据消费者也面临着因购买过多无效数据而导致购买成本过高的窘境。因此,我们迫切需要一种既能保护个人隐私又能节省开支的数据交易方案。在本文中,我们设计了一种既能保护个人隐私,又能提高效率的数据交易方案(命名为 ACCESS)。在技术上,我们将重点放在组级定价策略上,以使 ACCESS 更容易实施。采用差分隐私技术保护数据所有者的隐私,采用抽样算法降低数据消费者的成本。具体来说,为了给数据所有者提供最大可容忍隐私损失保证,我们设计了一种决策算法来检测消费者指定的准确度水平与最大可容忍隐私损失预算之间是否存在冲突。此外,为了使数据经纪商的购买成本最小化,我们开发了一种基于采样的聚合方法,该方法由两种采样算法(分别称为 BUSA 和 BKSA)组成。BUSA 无需额外的背景知识就能降低购买成本。一旦数据经纪人知道了数据边界,BKSA 就能大大减少需要购买的数据量,从而降低购买成本。严谨的理论分析和广泛的实验(超过四个真实世界和公共数据集)进一步证明了 ACCESS 的实用性。
{"title":"Towards Privacy-Preserving and Practical Data Trading for Aggregate Statistic","authors":"Fan Yang;Xiaofeng Liao;Xinyu Lei;Nankun Mu;Di Zhang","doi":"10.1109/TSUSC.2023.3331179","DOIUrl":"10.1109/TSUSC.2023.3331179","url":null,"abstract":"Data trading is an effective way for commercial companies to obtain massive personal data to develop their data-driven businesses. However, when data owners may want to sell their data without revealing privacy, data consumers also face the dilemma of high purchase costs due to purchasing too much invalid data. Therefore, there is an urgent need for a data trading scheme that can protect personal privacy and save expenses simultaneously. In this paper, we design a priv\u0000<bold>AC</b>\u0000y-preserving and pra\u0000<bold>C</b>\u0000tical aggr\u0000<bold>E</b>\u0000gate \u0000<bold>S</b>\u0000tati\u0000<bold>S</b>\u0000tic trading scheme (named as ACCESS). Technically, we focus on the group-level pricing strategy to make ACCESS easier to implement. The differential privacy technique is applied to protect the data owners’ privacy, and the sampling algorithm is adopted to reduce the data consumers’ costs. Specifically, to provide a maximum tolerant privacy loss guarantee for the data owners, we design a decision algorithm to detect whether a conflict occurs between the consumer-specified accuracy level and the maximum tolerable privacy loss budget. Besides, to minimize the purchase cost for the data brokers, we develop a sampling-based aggregation method consisting of two sampling algorithms (called as BUSA and BKSA, respectively). BUSA enables reducing purchase costs with no additional background knowledge. Once the data broker knows the data boundary, BKSA can significantly reduce the amount of data that needs to be purchased, thereby the purchase cost is reduced. Rigorous theoretical analysis and extensive experiments (over four real-world and public datasets) further demonstrate the practicability of ACCESS.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"452-463"},"PeriodicalIF":3.9,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135610928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Software Tailoring for Optimal Performance 自动定制软件,实现最佳性能
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-06 DOI: 10.1109/TSUSC.2023.3330671
José Miguel Aragón-Jurado;Juan Carlos de la Torre;Patricia Ruiz;Pedro L. Galindo;Albert Y. Zomaya;Bernabé Dorronsoro
Efficient green software solutions require being aware of the characteristics of both the software and the hardware where it is executed. Separately optimizing them leads to inefficient results, and there is a need for a perfect synergy between software and hardware for optimal outcomes. We present a novel combinatorial optimization problem for the minimization of the software execution time on a specific hardware, taking into account the existing uncertainty in the system. A solution to the problem is a sequence of LLVM code transformations, and a cellular genetic algorithm is used to find it. Assuming that hardware does not change, reducing the software runtime typically leads to a greener version with lower consumption. To cope with the uncertainty, two novel approaches relying on bootstrap method to compute confident intervals of the software runtime at negligible cost are proposed and compared to three other techniques and −O3 Clang compilation flag over four hardware architectures. Results show how the proposed approach effectively copes with the uncertainty, providing more robust solutions with respect to the compared methods. The execution time of the raw program is reduced from 28.1% to up to 63.2%, outperforming −O3 flag by 13.9% to 26.3%, for the different architectures.
高效的绿色软件解决方案需要同时了解软件和硬件的特性。对它们进行单独优化会导致效率低下,因此需要在软件和硬件之间实现完美协同,以获得最佳结果。考虑到系统中存在的不确定性,我们提出了一个新的组合优化问题,即在特定硬件上最小化软件执行时间。该问题的解决方案是一系列 LLVM 代码转换,并使用细胞遗传算法来找到它。假设硬件不发生变化,减少软件运行时间通常会带来消耗更低的绿色版本。为了应对这种不确定性,我们提出了两种新方法,依靠引导法以可忽略不计的成本计算软件运行时间的置信区间,并在四种硬件架构上与其他三种技术和 -O3 Clang 编译标志进行了比较。结果表明,所提出的方法能有效地应对不确定性,与其他方法相比,能提供更稳健的解决方案。对于不同的体系结构,原始程序的执行时间从 28.1% 缩短到 63.2%,优于 -O3 flag 13.9% 到 26.3%。
{"title":"Automatic Software Tailoring for Optimal Performance","authors":"José Miguel Aragón-Jurado;Juan Carlos de la Torre;Patricia Ruiz;Pedro L. Galindo;Albert Y. Zomaya;Bernabé Dorronsoro","doi":"10.1109/TSUSC.2023.3330671","DOIUrl":"10.1109/TSUSC.2023.3330671","url":null,"abstract":"Efficient green software solutions require being aware of the characteristics of both the software and the hardware where it is executed. Separately optimizing them leads to inefficient results, and there is a need for a perfect synergy between software and hardware for optimal outcomes. We present a novel combinatorial optimization problem for the minimization of the software execution time on a specific hardware, taking into account the existing uncertainty in the system. A solution to the problem is a sequence of LLVM code transformations, and a cellular genetic algorithm is used to find it. Assuming that hardware does not change, reducing the software runtime typically leads to a greener version with lower consumption. To cope with the uncertainty, two novel approaches relying on bootstrap method to compute confident intervals of the software runtime at negligible cost are proposed and compared to three other techniques and −O3 Clang compilation flag over four hardware architectures. Results show how the proposed approach effectively copes with the uncertainty, providing more robust solutions with respect to the compared methods. The execution time of the raw program is reduced from 28.1% to up to 63.2%, outperforming −O3 flag by 13.9% to 26.3%, for the different architectures.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"464-481"},"PeriodicalIF":3.9,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135501605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallel Trajectory Training of Recurrent Neural Network Controllers With Levenberg–Marquardt and Forward Accumulation Through Time in Closed-Loop Control Systems 在闭环控制系统中利用 Levenberg-Marquardt 和时间前向累积对递归神经网络控制器进行并行轨迹训练
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-06 DOI: 10.1109/TSUSC.2023.3330573
Xingang Fu;Jordan Sturtz;Eduardo Alonso;Rajab Challoo;Letu Qingge
This paper introduces a novel parallel trajectory mechanism that combines Levenberg-Marquardt and Forward Accumulation Through Time algorithms to train a recurrent neural network controller in a closed-loop control system by distributing the calculation of trajectories across Central Processing Unit (CPU) cores/workers depending on the computing platforms, computing program languages, and software packages available. Without loss of generality, the recurrent neural network controller of a grid-connected converter for solar integration to a power system was selected as the benchmark test closed-loop control system. Two software packages were developed in Matlab and C++ to verify and demonstrate the efficiency of the proposed parallel training method. The training of the deep neural network controller was migrated from a single workstation to both cloud computing platforms and High-Performance Computing clusters. The training results show excellent speed-up performance, which significantly reduces the training time for a large number of trajectories with high sampling frequency, and further demonstrates the effectiveness and scalability of the proposed parallel mechanism.
本文介绍了一种新颖的并行轨迹机制,该机制结合了 Levenberg-Marquardt 算法和时间前向累加算法,可在闭环控制系统中训练递归神经网络控制器,方法是根据计算平台、计算程序语言和可用软件包的不同,将轨迹计算分配到中央处理器(CPU)内核/处理器上。在不失一般性的前提下,我们选择了用于太阳能并入电力系统的并网转换器的递归神经网络控制器作为闭环控制系统的基准测试。为了验证和展示所提出的并行训练方法的效率,我们用 Matlab 和 C++ 开发了两个软件包。深度神经网络控制器的训练从单个工作站迁移到云计算平台和高性能计算集群。训练结果显示了优异的加速性能,在大量高采样频率轨迹的情况下显著缩短了训练时间,进一步证明了所提出的并行机制的有效性和可扩展性。
{"title":"Parallel Trajectory Training of Recurrent Neural Network Controllers With Levenberg–Marquardt and Forward Accumulation Through Time in Closed-Loop Control Systems","authors":"Xingang Fu;Jordan Sturtz;Eduardo Alonso;Rajab Challoo;Letu Qingge","doi":"10.1109/TSUSC.2023.3330573","DOIUrl":"10.1109/TSUSC.2023.3330573","url":null,"abstract":"This paper introduces a novel parallel trajectory mechanism that combines Levenberg-Marquardt and Forward Accumulation Through Time algorithms to train a recurrent neural network controller in a closed-loop control system by distributing the calculation of trajectories across Central Processing Unit (CPU) cores/workers depending on the computing platforms, computing program languages, and software packages available. Without loss of generality, the recurrent neural network controller of a grid-connected converter for solar integration to a power system was selected as the benchmark test closed-loop control system. Two software packages were developed in Matlab and C++ to verify and demonstrate the efficiency of the proposed parallel training method. The training of the deep neural network controller was migrated from a single workstation to both cloud computing platforms and High-Performance Computing clusters. The training results show excellent speed-up performance, which significantly reduces the training time for a large number of trajectories with high sampling frequency, and further demonstrates the effectiveness and scalability of the proposed parallel mechanism.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 2","pages":"222-229"},"PeriodicalIF":3.9,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135501371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shortest Paths Publishing With Differential Privacy 利用差分隐私发布最短路径
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-03 DOI: 10.1109/TSUSC.2023.3329995
Bin Cai;Weihong Sheng;Jiajun Chen;Chunqiang Hu;Jiguo Yu
The growing prevalence of graphs representations in our society has led to a corresponding rise in the publishing of graphs by researchers and organizations. To protect the privacy, it is important to ensure that graphs including sensitive data are not disclosed. Since the weight of edges could be utilized to infer confidential information, the graph should be privately published to avoid ethical and legal issues. In this paper, we propose a novel method for privately publishing shortest paths while preserving the privacy of sensitive edge weights in graph. Specifically, we divide the edge weights into internal and external edges based on their edge betweenness centrality. Then, we give two different differentially private algorithms to perturb edge weights based on the distinction between internal and external edges, respectively. To reduce the error ratios between differentially private shortest paths and real shortest paths, we employ edge betweenness centrality to search for the shortest path, which is closest to the true one. Our experimental results show that our mechanisms can effectively reduce the error in the average shortest path distance by 1.1% for large graphs, while for the shortest path change rate, our mechanisms can reduce it by 8.3%.
在我们的社会中,图形表示法越来越普遍,导致研究人员和机构发布图形的数量也相应增加。为了保护隐私,必须确保不公开包含敏感数据的图。由于边的权重可用于推断机密信息,因此应私下发布图,以避免道德和法律问题。在本文中,我们提出了一种既能私下发布最短路径,又能保护图中敏感边权重隐私的新方法。具体来说,我们根据边的中心度将边权重分为内部边和外部边。然后,我们根据内部边和外部边的区别,分别给出了两种不同的隐私算法来扰动边权重。为了降低差异化私有最短路径和真实最短路径之间的误差比,我们利用边间中心性来搜索最接近真实路径的最短路径。实验结果表明,对于大型图,我们的机制能有效地将平均最短路径距离的误差降低 1.1%,而对于最短路径变化率,我们的机制能将其降低 8.3%。
{"title":"Shortest Paths Publishing With Differential Privacy","authors":"Bin Cai;Weihong Sheng;Jiajun Chen;Chunqiang Hu;Jiguo Yu","doi":"10.1109/TSUSC.2023.3329995","DOIUrl":"10.1109/TSUSC.2023.3329995","url":null,"abstract":"The growing prevalence of graphs representations in our society has led to a corresponding rise in the publishing of graphs by researchers and organizations. To protect the privacy, it is important to ensure that graphs including sensitive data are not disclosed. Since the weight of edges could be utilized to infer confidential information, the graph should be privately published to avoid ethical and legal issues. In this paper, we propose a novel method for privately publishing shortest paths while preserving the privacy of sensitive edge weights in graph. Specifically, we divide the edge weights into internal and external edges based on their edge betweenness centrality. Then, we give two different differentially private algorithms to perturb edge weights based on the distinction between internal and external edges, respectively. To reduce the error ratios between differentially private shortest paths and real shortest paths, we employ edge betweenness centrality to search for the shortest path, which is closest to the true one. Our experimental results show that our mechanisms can effectively reduce the error in the average shortest path distance by 1.1% for large graphs, while for the shortest path change rate, our mechanisms can reduce it by 8.3%.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 2","pages":"209-221"},"PeriodicalIF":3.9,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134982272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Sustainable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1