首页 > 最新文献

IEEE Transactions on Sustainable Computing最新文献

英文 中文
Memristive Clustering: A Novel Sustainable Parameter Selection Based on Memristive Circuit Model 忆忆聚类:一种基于忆忆电路模型的可持续参数选择方法
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-04-18 DOI: 10.1109/TSUSC.2024.3387727
Kaikai Qiao;Ben Ma;Lidan Wang;Shukai Duan
In recent years, memristors have attracted much attention in the fields of nonvolatile memory, logic operation and neuromorphic computing. As a new type of two-terminal passive electronic component similar to sandwich structure, its main resistance mechanism is the formation and fracture of metal or oxygen vacancy conductive filaments. Traditional clustering algorithms own strong sensitivity to different parameter selection, including partition clustering algorithm and density clustering algorithm. In view of the non-volatile characteristics of memristor and the In-memory computing characteristics of memristive circuit, this paper designs a new memristive clustering paradigm, and further verifies the feasibility and effectiveness of the proposed analog circuit to improve the performance of clustering parameters by exploring the data mining and image segmentation problems of these two types of clustering algorithms.
近年来,忆阻器在非易失性存储、逻辑运算和神经形态计算等领域受到广泛关注。作为一种类似夹层结构的新型双端无源电子元件,其主要电阻机制是金属或氧空位导电细丝的形成和断裂。传统的聚类算法对不同的参数选择具有较强的敏感性,包括分区聚类算法和密度聚类算法。针对忆阻器的非易失性和忆阻电路的内存计算特性,本文设计了一种新的忆阻聚类范式,并通过探索这两种聚类算法的数据挖掘和图像分割问题,进一步验证了所提出的模拟电路提高聚类参数性能的可行性和有效性。
{"title":"Memristive Clustering: A Novel Sustainable Parameter Selection Based on Memristive Circuit Model","authors":"Kaikai Qiao;Ben Ma;Lidan Wang;Shukai Duan","doi":"10.1109/TSUSC.2024.3387727","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3387727","url":null,"abstract":"In recent years, memristors have attracted much attention in the fields of nonvolatile memory, logic operation and neuromorphic computing. As a new type of two-terminal passive electronic component similar to sandwich structure, its main resistance mechanism is the formation and fracture of metal or oxygen vacancy conductive filaments. Traditional clustering algorithms own strong sensitivity to different parameter selection, including partition clustering algorithm and density clustering algorithm. In view of the non-volatile characteristics of memristor and the In-memory computing characteristics of memristive circuit, this paper designs a new memristive clustering paradigm, and further verifies the feasibility and effectiveness of the proposed analog circuit to improve the performance of clustering parameters by exploring the data mining and image segmentation problems of these two types of clustering algorithms.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 1","pages":"18-27"},"PeriodicalIF":3.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Anomaly Detection With Stacked Sparse Shrink Variational Autoencoders and Unbalanced XGBoost 基于堆叠稀疏收缩变分自编码器和不平衡XGBoost的网络异常检测
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-04-16 DOI: 10.1109/TSUSC.2024.3390003
Jing Bi;Ziyue Guan;Haitao Yuan;Jinhong Yang;Jia Zhang
Efficient and accurate identification of network anomalies is significant to network security systems. It is highly challenging to detect abnormal behaviors in the increasing network data accurately. Currently, classification methods based on feature extraction of autoencoders have been proven to be suitable for network anomaly detection. However, traditional detection models with autoencoders have unsatisfying detection accuracy in the face of massive network features. In addition, the hyperparameter optimization of their models cannot be effectively solved. In this letter, based on the improvement of variational autoencoders, stacked sparse shrink variational autoencoders (S3VAEs) are designed. In addition, an Unbalanced XGBoost classifier based on Genetic simulated annealing particle swarm optimization (UXG) is proposed. Finally, the feature extractor of S3VAEs is combined with the UXG classifier, and the anomaly detection model is obtained. Experimental results based on four real-life data sets demonstrate that the proposed anomaly detection model achieves higher classification accuracy and F1 than several state-of-the-art algorithms.
有效、准确地识别网络异常对网络安全系统具有重要意义。在日益增长的网络数据中,如何准确地检测异常行为是一个非常具有挑战性的问题。目前,基于自编码器特征提取的分类方法已被证明适用于网络异常检测。然而,传统的带有自编码器的检测模型在面对海量网络特征时,检测精度并不理想。此外,它们的模型的超参数优化问题也不能得到有效解决。本文在改进变分自编码器的基础上,设计了堆叠稀疏收缩变分自编码器(S3VAEs)。此外,提出了一种基于遗传模拟退火粒子群优化(UXG)的不平衡XGBoost分类器。最后,将S3VAEs特征提取器与UXG分类器相结合,得到异常检测模型。基于4个真实数据集的实验结果表明,该异常检测模型比现有的几种算法具有更高的分类精度和F1。
{"title":"Network Anomaly Detection With Stacked Sparse Shrink Variational Autoencoders and Unbalanced XGBoost","authors":"Jing Bi;Ziyue Guan;Haitao Yuan;Jinhong Yang;Jia Zhang","doi":"10.1109/TSUSC.2024.3390003","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3390003","url":null,"abstract":"Efficient and accurate identification of network anomalies is significant to network security systems. It is highly challenging to detect abnormal behaviors in the increasing network data accurately. Currently, classification methods based on feature extraction of autoencoders have been proven to be suitable for network anomaly detection. However, traditional detection models with autoencoders have unsatisfying detection accuracy in the face of massive network features. In addition, the hyperparameter optimization of their models cannot be effectively solved. In this letter, based on the improvement of variational autoencoders, stacked sparse shrink variational autoencoders (S3VAEs) are designed. In addition, an <underline>U</u>nbalanced <underline>X</u>GBoost classifier based on <underline>G</u>enetic simulated annealing particle swarm optimization (UXG) is proposed. Finally, the feature extractor of S3VAEs is combined with the UXG classifier, and the anomaly detection model is obtained. Experimental results based on four real-life data sets demonstrate that the proposed anomaly detection model achieves higher classification accuracy and F1 than several state-of-the-art algorithms.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 1","pages":"28-38"},"PeriodicalIF":3.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Staged Noise Perturbation for Privacy-Preserving Federated Learning 基于阶段噪声摄动的隐私保护联邦学习
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-04-04 DOI: 10.1109/TSUSC.2024.3381812
Zhe Li;Honglong Chen;Yudong Gao;Zhichen Ni;Huansheng Xue;Huajie Shao
Federated learning (FL) is a distributed machine learning paradigm that addresses the challenges of privacy leakage and data silos by collaboratively training the global model through parameter exchange, rather than data, between the central server and local clients. However, recent researches highlight the vulnerability of FL to gradient leakage attacks where adversaries exploit shared parameters from clients to reconstruct sensitive training data. Differential privacy (DP) effectively mitigates this threat by adding noise to shared parameters, yet introduces a trade-off between privacy and accuracy in FL. To better balance the privacy and accuracy, in this paper we propose a staged noise perturbation strategy, called alternating noise permutation (ANP), from a novel perspective. ANP adds Gaussian-distributed random noise to model parameters during the critical learning period of FL, following DP principles. While in non-critical learning period, ANP alternately permutes the noise during odd and even communication rounds, achieving near mutual cancellation and mitigating the negative impact. Experimental results across three datasets and two neural networks under both independent identical distribution (IID) and NonIID scenarios demonstrate that ANP significantly improves classification accuracy and exhibits robustness against gradient leakage attack, ensuring the effectiveness of FL for secure and accurate collaborative model training.
联邦学习(FL)是一种分布式机器学习范式,它通过在中央服务器和本地客户端之间交换参数而不是数据来协作训练全局模型,从而解决隐私泄露和数据孤岛的挑战。然而,最近的研究强调了FL在梯度泄漏攻击中的脆弱性,攻击者利用客户端的共享参数来重建敏感的训练数据。差分隐私(DP)通过在共享参数中添加噪声有效地减轻了这种威胁,但在FL中引入了隐私和准确性之间的权衡。为了更好地平衡隐私和准确性,本文从一个新的角度提出了一种阶段噪声扰动策略,称为交替噪声置换(ANP)。ANP遵循DP原则,在FL的关键学习期向模型参数中加入高斯分布随机噪声。而在非关键学习期,ANP在奇数和偶数通信轮交替置换噪声,实现了近乎相互抵消,减轻了负面影响。在独立相同分布(IID)和非相同分布(NonIID)两种场景下的三个数据集和两个神经网络的实验结果表明,ANP显著提高了分类精度,并对梯度泄漏攻击具有鲁棒性,确保了FL在安全准确的协同模型训练中的有效性。
{"title":"Staged Noise Perturbation for Privacy-Preserving Federated Learning","authors":"Zhe Li;Honglong Chen;Yudong Gao;Zhichen Ni;Huansheng Xue;Huajie Shao","doi":"10.1109/TSUSC.2024.3381812","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3381812","url":null,"abstract":"Federated learning (FL) is a distributed machine learning paradigm that addresses the challenges of privacy leakage and data silos by collaboratively training the global model through parameter exchange, rather than data, between the central server and local clients. However, recent researches highlight the vulnerability of FL to gradient leakage attacks where adversaries exploit shared parameters from clients to reconstruct sensitive training data. Differential privacy (DP) effectively mitigates this threat by adding noise to shared parameters, yet introduces a trade-off between privacy and accuracy in FL. To better balance the privacy and accuracy, in this paper we propose a staged noise perturbation strategy, called alternating noise permutation (ANP), from a novel perspective. ANP adds Gaussian-distributed random noise to model parameters during the critical learning period of FL, following DP principles. While in non-critical learning period, ANP alternately permutes the noise during odd and even communication rounds, achieving near mutual cancellation and mitigating the negative impact. Experimental results across three datasets and two neural networks under both independent identical distribution (IID) and NonIID scenarios demonstrate that ANP significantly improves classification accuracy and exhibits robustness against gradient leakage attack, ensuring the effectiveness of FL for secure and accurate collaborative model training.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"936-947"},"PeriodicalIF":3.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2024 Reviewers List 2024 年审稿人名单
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-04-03 DOI: 10.1109/TSUSC.2024.3353082
{"title":"2024 Reviewers List","authors":"","doi":"10.1109/TSUSC.2024.3353082","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3353082","url":null,"abstract":"","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 2","pages":"230-233"},"PeriodicalIF":3.9,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10490209","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140345488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APPQ-CNN: An Adaptive CNNs Inference Accelerator for Synergistically Exploiting Pruning and Quantization Based on FPGA 基于FPGA的协同利用修剪和量化的自适应cnn推理加速器APPQ-CNN
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-27 DOI: 10.1109/TSUSC.2024.3382157
Xian Zhang;Guoqing Xiao;Mingxing Duan;Yuedan Chen;Kenli Li
Convolutional neural networks (CNNs) are widely utilized in intelligent edge computing applications such as computational vision and image processing. However, as the number of layers of the CNN model increases, the number of parameters and computations gets larger, making it increasingly challenging to accelerate in edge computing applications. To effectively adapt to the tradeoff between the speed and accuracy of CNNs inference for smart applications. This paper proposes an FPGA-based adaptive CNNs inference accelerator synergistically utilizing filter pruning, fixed-point parameter quantization, and multi-computing unit parallelism called APPQ-CNN. First, the article devises a hybrid pruning algorithm based on the L1-norm and APoZ to measure the filter impact degree and a configurable parameter quantization fixed-point computing architecture instead of floating-point architecture. Then, design a cascade of the CNN pipelined kernel architecture and configurable multiple computation units. Finally, conduct extensive performance exploration and comparison experiments on various real and synthetic datasets. With negligible accuracy loss, the speed performance of our accelerator APPQ-CNN compares with current state-of-the-art FPGA-based accelerators PipeCNN and OctCNN by 2.15× and 1.91×, respectively. Furthermore, APPQ-CNN provides settable fixed-point quantization bit-width parameters, filter pruning rate, and multiple computation unit counts to cope with practical application performance requirements in edge computing.
卷积神经网络(Convolutional neural networks, cnn)广泛应用于计算视觉、图像处理等智能边缘计算应用。然而,随着CNN模型层数的增加,参数和计算量也越来越大,使得在边缘计算应用中的加速变得越来越困难。为了有效地适应智能应用中cnn推理的速度和精度之间的权衡。本文提出了一种协同利用滤波剪枝、定点参数量化和多计算单元并行性的基于fpga的自适应cnn推理加速器,称为APPQ-CNN。首先,本文设计了一种基于l1范数和APoZ的混合剪枝算法来衡量滤波器的影响程度,并设计了一种可配置参数量化的定点计算架构来代替浮点架构。然后,设计了一个层叠的CNN流水线内核架构和可配置的多计算单元。最后,在各种真实数据集和合成数据集上进行广泛的性能探索和对比实验。在精度损失可以忽略不计的情况下,我们的加速器APPQ-CNN的速度性能与目前最先进的基于fpga的加速器PipeCNN和OctCNN相比分别提高了2.15倍和1.91倍。此外,APPQ-CNN还提供了可设置的定点量化位宽参数、滤波器剪枝率和多个计算单元计数,以应对边缘计算中实际应用的性能要求。
{"title":"APPQ-CNN: An Adaptive CNNs Inference Accelerator for Synergistically Exploiting Pruning and Quantization Based on FPGA","authors":"Xian Zhang;Guoqing Xiao;Mingxing Duan;Yuedan Chen;Kenli Li","doi":"10.1109/TSUSC.2024.3382157","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3382157","url":null,"abstract":"Convolutional neural networks (CNNs) are widely utilized in intelligent edge computing applications such as computational vision and image processing. However, as the number of layers of the CNN model increases, the number of parameters and computations gets larger, making it increasingly challenging to accelerate in edge computing applications. To effectively adapt to the tradeoff between the speed and accuracy of CNNs inference for smart applications. This paper proposes an FPGA-based adaptive CNNs inference accelerator synergistically utilizing filter pruning, fixed-point parameter quantization, and multi-computing unit parallelism called APPQ-CNN. First, the article devises a hybrid pruning algorithm based on the L1-norm and APoZ to measure the filter impact degree and a configurable parameter quantization fixed-point computing architecture instead of floating-point architecture. Then, design a cascade of the CNN pipelined kernel architecture and configurable multiple computation units. Finally, conduct extensive performance exploration and comparison experiments on various real and synthetic datasets. With negligible accuracy loss, the speed performance of our accelerator APPQ-CNN compares with current state-of-the-art FPGA-based accelerators PipeCNN and OctCNN by 2.15× and 1.91×, respectively. Furthermore, APPQ-CNN provides settable fixed-point quantization bit-width parameters, filter pruning rate, and multiple computation unit counts to cope with practical application performance requirements in edge computing.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"874-888"},"PeriodicalIF":3.0,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deadline-Aware Cost and Energy Efficient Offloading in Mobile Edge Computing 移动边缘计算中的截止时间感知成本与能效卸载
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-26 DOI: 10.1109/TSUSC.2024.3381841
Mohit Kumar;Avadh Kishor;Pramod Kumar Singh;Kalka Dubey
The rapid advancement of mobile edge computing (MEC) has revolutionized the distributed computing landscape. With the help of MEC, the traditional centralized cloud computing architecture can be extended to the edge of networks, enabling real-time processing of resources and time-sensitive applications. Nevertheless, the problem of efficiently assigning the services to the computing resources is a challenging and prevalent issue due to the dynamic and distributed nature of the edge network's architecture. Thus, we require intelligent real-time decision-making and effective optimization algorithms to allocate resources, such as network bandwidth, memory, and CPU. This paper proposes an MEC architecture to allocate the resources in the network to optimize the quality of services (QoS). In this regard, the resource allocation problem is formulated as a bi-objective optimization problem, including minimizing cost and energy with quality and deadline constraints. A hybrid cascading-based meta-heuristic called GA-PSO is embedded with the proposed MEC architecture to achieve these objectives. Finally, it is compared with three existing approaches to establish its efficacy. The experimental results report statistically better cost and energy in all the considered instances, making it practical and validating its effectiveness.
移动边缘计算(MEC)的快速发展彻底改变了分布式计算的格局。在移动边缘计算的帮助下,传统的集中式云计算架构可以扩展到网络边缘,实现资源的实时处理和对时间敏感的应用。然而,由于边缘网络架构的动态和分布式特性,如何高效地为计算资源分配服务是一个具有挑战性的普遍问题。因此,我们需要智能的实时决策和有效的优化算法来分配资源,如网络带宽、内存和 CPU。本文提出了一种 MEC 架构来分配网络资源,以优化服务质量(QoS)。在这方面,资源分配问题被表述为一个双目标优化问题,包括在质量和截止日期约束下最小化成本和能量。为实现这些目标,将一种名为 GA-PSO 的基于级联的混合元启发式嵌入到所提出的 MEC 架构中。最后,将其与三种现有方法进行比较,以确定其有效性。实验结果表明,在所有考虑的实例中,该方法的成本和能耗在统计上都更高,因此非常实用并验证了其有效性。
{"title":"Deadline-Aware Cost and Energy Efficient Offloading in Mobile Edge Computing","authors":"Mohit Kumar;Avadh Kishor;Pramod Kumar Singh;Kalka Dubey","doi":"10.1109/TSUSC.2024.3381841","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3381841","url":null,"abstract":"The rapid advancement of mobile edge computing (MEC) has revolutionized the distributed computing landscape. With the help of MEC, the traditional centralized cloud computing architecture can be extended to the edge of networks, enabling real-time processing of resources and time-sensitive applications. Nevertheless, the problem of efficiently assigning the services to the computing resources is a challenging and prevalent issue due to the dynamic and distributed nature of the edge network's architecture. Thus, we require intelligent real-time decision-making and effective optimization algorithms to allocate resources, such as network bandwidth, memory, and CPU. This paper proposes an MEC architecture to allocate the resources in the network to optimize the quality of services (QoS). In this regard, the resource allocation problem is formulated as a bi-objective optimization problem, including minimizing cost and energy with quality and deadline constraints. A hybrid cascading-based meta-heuristic called GA-PSO is embedded with the proposed MEC architecture to achieve these objectives. Finally, it is compared with three existing approaches to establish its efficacy. The experimental results report statistically better cost and energy in all the considered instances, making it practical and validating its effectiveness.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 5","pages":"778-789"},"PeriodicalIF":3.0,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Power Transfer Technologies, Applications, and Future Trends: A Review 无线电力传输技术、应用和未来趋势:综述
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-22 DOI: 10.1109/TSUSC.2024.3380607
Aisha Alabsi;Ammar Hawbani;Xingfu Wang;Ahmed Al-Dubai;Jiankun Hu;Samah Abdel Aziz;Santosh Kumar;Liang Zhao;Alexey V. Shvetsov;Saeed Hamood Alsamhi
Wireless Power Transfer (WPT) is a disruptive technology that allows wireless energy provisioning for energy-limited IoT devices, thus decreasing the over-reliance on batteries and wires. WPT could replace conventional energy provisioning (e.g., energy harvesting) and expand to be deployed in many of our daily-life applications, including but not limited to healthcare, transportation, automation, and smart cities. As a new rising technology, WPT has attracted many researchers from academia and industry about WPT technologies and wireless charging scheduling algorithms. Therefore, in this paper, we review the most recent studies related to WPT, including classifications, advantages, disadvantages, and main domains of application. Furthermore, we review the recently designed wireless charging scheduling algorithms (schemes) for wireless sensor networks. Our study provides a detailed survey of wireless charging scheduling schemes covering the main scheme classifications, evaluation metrics, application domains, advantages, and disadvantages of each charging scheme. We further summarize trends and opportunities for applying WPT at some intersections.
无线能量传输技术(WPT)是一项颠覆性技术,可为能源有限的物联网设备提供无线能量供应,从而减少对电池和电线的过度依赖。WPT 可以取代传统的能量供应(如能量采集),并可扩展到我们日常生活中的许多应用中,包括但不限于医疗保健、交通、自动化和智能城市。作为一项新兴技术,无线充电技术吸引了众多学术界和工业界研究人员对无线充电技术和无线充电调度算法的关注。因此,本文回顾了与 WPT 相关的最新研究,包括分类、优缺点和主要应用领域。此外,我们还回顾了最近为无线传感器网络设计的无线充电调度算法(方案)。我们的研究对无线充电调度方案进行了详细调查,包括主要方案分类、评估指标、应用领域、每种充电方案的优缺点。我们进一步总结了在一些交叉点应用 WPT 的趋势和机遇。
{"title":"Wireless Power Transfer Technologies, Applications, and Future Trends: A Review","authors":"Aisha Alabsi;Ammar Hawbani;Xingfu Wang;Ahmed Al-Dubai;Jiankun Hu;Samah Abdel Aziz;Santosh Kumar;Liang Zhao;Alexey V. Shvetsov;Saeed Hamood Alsamhi","doi":"10.1109/TSUSC.2024.3380607","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3380607","url":null,"abstract":"Wireless Power Transfer (WPT) is a disruptive technology that allows wireless energy provisioning for energy-limited IoT devices, thus decreasing the over-reliance on batteries and wires. WPT could replace conventional energy provisioning (e.g., energy harvesting) and expand to be deployed in many of our daily-life applications, including but not limited to healthcare, transportation, automation, and smart cities. As a new rising technology, WPT has attracted many researchers from academia and industry about WPT technologies and wireless charging scheduling algorithms. Therefore, in this paper, we review the most recent studies related to WPT, including classifications, advantages, disadvantages, and main domains of application. Furthermore, we review the recently designed wireless charging scheduling algorithms (schemes) for wireless sensor networks. Our study provides a detailed survey of wireless charging scheduling schemes covering the main scheme classifications, evaluation metrics, application domains, advantages, and disadvantages of each charging scheme. We further summarize trends and opportunities for applying WPT at some intersections.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 1","pages":"1-17"},"PeriodicalIF":3.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedGCN: A Federated Graph Convolutional Network for Privacy-Preserving Traffic Prediction 基于联邦图卷积网络的保密性交通预测
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-22 DOI: 10.1109/TSUSC.2024.3395350
Na Hu;Wei Liang;Dafang Zhang;Kun Xie;Kuanching Li;Albert Y. Zomaya
Traffic prediction is crucial for intelligent transportation systems, assisting in making travel decisions, minimizing traffic congestion, and improving traffic operation efficiency. Although effective, existing centralized traffic prediction methods have privacy leakage risks. Federated learning-based traffic prediction methods keep raw data local and train the global model in a distributed way, thus preserving data privacy. Nevertheless, the spatial correlations between local clients will be broken as data exchange between local clients is not allowed in federated learning, leading to missing spatial information and inferior prediction accuracy. To this end, we propose a federated graph neural network with spatial information completion (FedGCN) for privacy-preserving traffic prediction by adopting a federated learning scheme to protect confidentiality and presenting a mending graph convolutional neural network to mend the missing spatial information during capturing spatial dependency to improve prediction accuracy. To complete the missing spatial information efficiently and capture the client-specific spatial pattern, we design a personalized training scheme for the mending graph neural network, reducing communication overhead. The experiments on four public traffic datasets demonstrate that the proposed model outperforms the best baseline with a ratio of 3.82%, 1.82%, 2.13%, and 1.49% in terms of absolute mean error while preserving privacy.
交通预测对智能交通系统至关重要,有助于制定出行决策,减少交通拥堵,提高交通运行效率。现有集中式流量预测方法虽然有效,但存在隐私泄露风险。基于联邦学习的交通预测方法将原始数据保持在本地,并以分布式的方式训练全局模型,从而保护了数据的隐私性。然而,在联邦学习中,由于不允许本地客户端之间的数据交换,会破坏本地客户端之间的空间相关性,导致空间信息缺失,预测精度降低。为此,我们提出了一种具有空间信息补全的联邦图神经网络(FedGCN)用于保护隐私的流量预测,采用联邦学习方案来保护机密性,并提出了一种修复图卷积神经网络来修复捕获空间依赖时缺失的空间信息,以提高预测精度。为了有效地完成缺失的空间信息并捕获客户特定的空间模式,我们设计了一种个性化的补图神经网络训练方案,减少了通信开销。在4个公共交通数据集上的实验表明,该模型在保护隐私的情况下,绝对平均误差分别为3.82%、1.82%、2.13%和1.49%,优于最佳基线。
{"title":"FedGCN: A Federated Graph Convolutional Network for Privacy-Preserving Traffic Prediction","authors":"Na Hu;Wei Liang;Dafang Zhang;Kun Xie;Kuanching Li;Albert Y. Zomaya","doi":"10.1109/TSUSC.2024.3395350","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3395350","url":null,"abstract":"Traffic prediction is crucial for intelligent transportation systems, assisting in making travel decisions, minimizing traffic congestion, and improving traffic operation efficiency. Although effective, existing centralized traffic prediction methods have privacy leakage risks. Federated learning-based traffic prediction methods keep raw data local and train the global model in a distributed way, thus preserving data privacy. Nevertheless, the spatial correlations between local clients will be broken as data exchange between local clients is not allowed in federated learning, leading to missing spatial information and inferior prediction accuracy. To this end, we propose a federated graph neural network with spatial information completion (FedGCN) for privacy-preserving traffic prediction by adopting a federated learning scheme to protect confidentiality and presenting a mending graph convolutional neural network to mend the missing spatial information during capturing spatial dependency to improve prediction accuracy. To complete the missing spatial information efficiently and capture the client-specific spatial pattern, we design a personalized training scheme for the mending graph neural network, reducing communication overhead. The experiments on four public traffic datasets demonstrate that the proposed model outperforms the best baseline with a ratio of 3.82%, 1.82%, 2.13%, and 1.49% in terms of absolute mean error while preserving privacy.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"925-935"},"PeriodicalIF":3.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Third-Party Auditor to Help Federated Learning: An Efficient Byzantine-Robust Federated Learning 使用第三方审计师帮助联邦学习:一个高效的拜占庭-鲁棒联邦学习
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-20 DOI: 10.1109/TSUSC.2024.3379440
Zhuangzhuang Zhang;Libing Wu;Debiao He;Jianxin Li;Na Lu;Xuejiang Wei
Federated Learning (FL), as a distributed machine learning technique, has promise for training models with distributed data in Artificial Intelligence of Things (AIoT). However, FL is vulnerable to Byzantine attacks from diverse participants. While numerous Byzantine-robust FL solutions have been proposed, most of them involve deploying defenses at either the aggregation server or the participant level, significantly impacting the original FL process. Moreover, it will bring extra computational burden to the server or the participant, which is especially unsuitable for the resource-constrained AIoT domain. To resolve the aforementioned concerns, we propose FL-Auditor, a Byzantine-robust FL approach based on public auditing. Its core idea is to use a Third-Party Auditor (TPA) to audit samples from the FL training process, analyzing the trustworthiness of different participants, thereby helping FL obtain a more robust global model. In addition, we also design a lazy update mechanism to reduce the negative impact of sampling audit on the performance of the global model. Extensive experiments have demonstrated the effectiveness of our FL-Auditor in terms of accuracy, robustness against attacks, and flexibility. In particular, compared to the existing method, our FL-Auditor significantly reduces the computation time on the aggregation server by 8×-17×.
联邦学习(FL)作为一种分布式机器学习技术,在人工智能(AIoT)中具有广泛的应用前景。然而,FL很容易受到来自不同参与者的拜占庭式攻击。虽然已经提出了许多拜占庭健壮的FL解决方案,但其中大多数都涉及在聚合服务器或参与者级别部署防御,这对原始FL进程产生了重大影响。此外,它会给服务器或参与者带来额外的计算负担,尤其不适合资源受限的AIoT领域。为了解决上述问题,我们提出FL- auditor,这是一种基于公共审计的拜占庭式稳健FL方法。其核心思想是使用第三方审计师(TPA)对FL培训过程中的样本进行审计,分析不同参与者的可信度,从而帮助FL获得更稳健的全球模型。此外,我们还设计了一个延迟更新机制,以减少抽样审计对全局模型性能的负面影响。大量的实验证明了我们的FL-Auditor在准确性、抗攻击稳健性和灵活性方面的有效性。特别是,与现有方法相比,我们的FL-Auditor通过8×-17×显著减少了聚合服务器上的计算时间。
{"title":"Using Third-Party Auditor to Help Federated Learning: An Efficient Byzantine-Robust Federated Learning","authors":"Zhuangzhuang Zhang;Libing Wu;Debiao He;Jianxin Li;Na Lu;Xuejiang Wei","doi":"10.1109/TSUSC.2024.3379440","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3379440","url":null,"abstract":"Federated Learning (FL), as a distributed machine learning technique, has promise for training models with distributed data in Artificial Intelligence of Things (AIoT). However, FL is vulnerable to Byzantine attacks from diverse participants. While numerous Byzantine-robust FL solutions have been proposed, most of them involve deploying defenses at either the aggregation server or the participant level, significantly impacting the original FL process. Moreover, it will bring extra computational burden to the server or the participant, which is especially unsuitable for the resource-constrained AIoT domain. To resolve the aforementioned concerns, we propose FL-Auditor, a Byzantine-robust FL approach based on public auditing. Its core idea is to use a Third-Party Auditor (TPA) to audit samples from the FL training process, analyzing the trustworthiness of different participants, thereby helping FL obtain a more robust global model. In addition, we also design a lazy update mechanism to reduce the negative impact of sampling audit on the performance of the global model. Extensive experiments have demonstrated the effectiveness of our FL-Auditor in terms of accuracy, robustness against attacks, and flexibility. In particular, compared to the existing method, our FL-Auditor significantly reduces the computation time on the aggregation server by 8×-17×.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"848-861"},"PeriodicalIF":3.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Accurate Personalized Federated Learning With Similarity-Based Model Aggregation 利用基于相似性的模型聚合实现安全、准确的个性化联合学习
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-20 DOI: 10.1109/TSUSC.2024.3403427
Zhouyong Tan;Junqing Le;Fan Yang;Min Huang;Tao Xiang;Xiaofeng Liao
Personalized federated learning (PFL) combines client needs and data characteristics to train personalized models for local clients. However, the most of previous PFL schemes encountered challenges such as low model prediction accuracy and privacy leakage when applied to practical datasets. Besides, the existing privacy protection methods fail to achieve satisfactory results in terms of model prediction accuracy and security simultaneously. In this paper, we propose a Privacy-preserving Personalized Federated Learning under Secure Multi-party Computation (SMC-PPFL), which can preserve privacy while obtaining a local personalized model with high prediction accuracy. In SMC-PPFL, noise perturbation is utilized to protect similarity computation, and secure multi-party computation is employed for model sub-aggregations. This combination ensures that clients’ privacy is preserved, and the computed values remain unbiased without compromising security. Then, we propose a weighted sub-aggregation strategy based on the similarity of clients and introduce a regularization term in the local training to improve prediction accuracy. Finally, we evaluate the performance of SMC-PPFL on three common datasets. The experimental results show that SMC-PPFL achieves $2%!sim! 15%$ higher prediction accuracy compared to the previous PFL schemes. Besides, the security analysis also verifies that SMC-PPFL can resist model inversion attacks and membership inference attacks.
个性化联邦学习(PFL)结合客户需求和数据特征,为本地客户训练个性化模型。然而,以往的大多数PFL方案在应用于实际数据集时都遇到了模型预测精度低、隐私泄露等问题。此外,现有的隐私保护方法在模型预测精度和安全性方面都不能同时达到令人满意的效果。本文提出了一种安全多方计算下的隐私保护个性化联邦学习(SMC-PPFL)方法,该方法可以在保护隐私的同时获得具有较高预测精度的局部个性化模型。在SMC-PPFL中,利用噪声扰动保护相似性计算,采用安全多方计算进行模型子聚合。这种组合确保了客户端的隐私得到保护,并且计算值在不影响安全性的情况下保持公正。然后,我们提出了一种基于客户端相似度的加权子聚合策略,并在局部训练中引入正则化项来提高预测精度。最后,我们评估了SMC-PPFL在三个常用数据集上的性能。实验结果表明,SMC-PPFL达到了$2%!与以前的PFL方案相比,预测精度提高了15%。此外,安全性分析也验证了SMC-PPFL能够抵御模型反转攻击和隶属推理攻击。
{"title":"Secure and Accurate Personalized Federated Learning With Similarity-Based Model Aggregation","authors":"Zhouyong Tan;Junqing Le;Fan Yang;Min Huang;Tao Xiang;Xiaofeng Liao","doi":"10.1109/TSUSC.2024.3403427","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3403427","url":null,"abstract":"Personalized federated learning (PFL) combines client needs and data characteristics to train personalized models for local clients. However, the most of previous PFL schemes encountered challenges such as low model prediction accuracy and privacy leakage when applied to practical datasets. Besides, the existing privacy protection methods fail to achieve satisfactory results in terms of model prediction accuracy and security simultaneously. In this paper, we propose a <u>P</u>rivacy-preserving <u>P</u>ersonalized <u>F</u>ederated <u>L</u>earning under <u>S</u>ecure <u>M</u>ulti-party <u>C</u>omputation (SMC-PPFL), which can preserve privacy while obtaining a local personalized model with high prediction accuracy. In SMC-PPFL, noise perturbation is utilized to protect similarity computation, and secure multi-party computation is employed for model sub-aggregations. This combination ensures that clients’ privacy is preserved, and the computed values remain unbiased without compromising security. Then, we propose a weighted sub-aggregation strategy based on the similarity of clients and introduce a regularization term in the local training to improve prediction accuracy. Finally, we evaluate the performance of SMC-PPFL on three common datasets. The experimental results show that SMC-PPFL achieves <inline-formula><tex-math>$2%!sim! 15%$</tex-math></inline-formula> higher prediction accuracy compared to the previous PFL schemes. Besides, the security analysis also verifies that SMC-PPFL can resist model inversion attacks and membership inference attacks.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 1","pages":"132-145"},"PeriodicalIF":3.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Sustainable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1