首页 > 最新文献

International Journal of Intelligent Systems最新文献

英文 中文
Reliable and Timely Short-Packet Communications in Joint Communication and Over-the-Air Computation Offloading Systems: Analysis and Optimization 联合通信和空中计算卸载系统中可靠、及时的短包通信:分析与优化
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-12-09 DOI: 10.1155/2024/1168004
Wei Zhao, Jie Kong, Baogang Li, Qihao Yang, Yaru Ding

This paper addressed the trade-off between timeliness and reliability in joint communication and over-the-air computation offloading (JCACO) system under short-packet communications (SPCs). The inevitable decoding errors introduced by SPC lead to errors in the data aggregation process of over-the-air computation (AirComp). Due to limited resources, pursuing high reliability may prevent the JCACO system from meeting delay requirements, resulting in a trade-off between reliability and timeliness. To address this issue, this paper investigates the timeliness and reliability of the JCACO system. Specifically, the moment generating function method is used to derive the delay outage probability (DOP) of the JCACO system, and the outage probability of AirComp is calculated based on the errors that occur during its data aggregation process. The paper established an asymptotic relationship between blocklength, DOP, and AirComp outage probability (AOP). To balance timeliness and reliability, an AOP minimization problem is formulated under constraints of delay, queue stability, and limited resources based on computation offloading strategies and beamformer design. To overcome the issues of slow convergence and susceptibility to local optima in traditional algorithms, this paper proposed a stochastic successive mean-field game (SS-MFG) algorithm. This algorithm utilizes stochastic continuous convex approximation methods to leverage Nash equilibria among different users, achieving faster convergence to the global optimal solution. Numerical results indicate that SS-MFG reduces AOP by up to 60%, offering up to a 20% improvement in optimization performance compared to other algorithms while also converging faster.

本文研究了短分组通信(SPCs)下联合通信和空中计算卸载(jaco)系统的时效性和可靠性之间的权衡问题。SPC引入的不可避免的解码错误导致了空中计算(AirComp)数据聚合过程中的错误。由于资源有限,追求高可靠性可能会使jaco系统无法满足延迟要求,导致可靠性和时效性之间的权衡。针对这一问题,本文对JCACO系统的时效性和可靠性进行了研究。其中,利用矩量生成函数法推导出jaco系统的延迟中断概率(DOP),并根据AirComp在数据聚合过程中出现的误差计算出其中断概率。本文建立了区块长度、DOP和AirComp中断概率(AOP)之间的渐近关系。为了平衡时效性和可靠性,基于计算卸载策略和波束形成器设计,在时延、队列稳定性和有限资源约束下,提出了AOP最小化问题。针对传统算法收敛速度慢和易受局部最优影响的问题,提出了一种随机逐次平均场博弈(SS-MFG)算法。该算法利用随机连续凸逼近方法,利用不同用户间的纳什均衡,更快地收敛到全局最优解。数值结果表明,SS-MFG将AOP减少了60%,与其他算法相比,优化性能提高了20%,同时收敛速度也更快。
{"title":"Reliable and Timely Short-Packet Communications in Joint Communication and Over-the-Air Computation Offloading Systems: Analysis and Optimization","authors":"Wei Zhao,&nbsp;Jie Kong,&nbsp;Baogang Li,&nbsp;Qihao Yang,&nbsp;Yaru Ding","doi":"10.1155/2024/1168004","DOIUrl":"https://doi.org/10.1155/2024/1168004","url":null,"abstract":"<div>\u0000 <p>This paper addressed the trade-off between timeliness and reliability in joint communication and over-the-air computation offloading (JCACO) system under short-packet communications (SPCs). The inevitable decoding errors introduced by SPC lead to errors in the data aggregation process of over-the-air computation (AirComp). Due to limited resources, pursuing high reliability may prevent the JCACO system from meeting delay requirements, resulting in a trade-off between reliability and timeliness. To address this issue, this paper investigates the timeliness and reliability of the JCACO system. Specifically, the moment generating function method is used to derive the delay outage probability (DOP) of the JCACO system, and the outage probability of AirComp is calculated based on the errors that occur during its data aggregation process. The paper established an asymptotic relationship between blocklength, DOP, and AirComp outage probability (AOP). To balance timeliness and reliability, an AOP minimization problem is formulated under constraints of delay, queue stability, and limited resources based on computation offloading strategies and beamformer design. To overcome the issues of slow convergence and susceptibility to local optima in traditional algorithms, this paper proposed a stochastic successive mean-field game (SS-MFG) algorithm. This algorithm utilizes stochastic continuous convex approximation methods to leverage Nash equilibria among different users, achieving faster convergence to the global optimal solution. Numerical results indicate that SS-MFG reduces AOP by up to 60%, offering up to a 20% improvement in optimization performance compared to other algorithms while also converging faster.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/1168004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142860550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of User Behavior in Online Banking on Cybersecurity Knowledge 网上银行用户行为对网络安全知识的影响
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-12-03 DOI: 10.1155/int/9949510
Hamza Alrababah, Hena Iqbal, Muhammad Adnan Khan

The expanding importance of technology, particularly mobile banking, in the financial industry, is examined in this literature review, as well as the crucial role that cybersecurity knowledge plays in protecting online transactions. Users now have the flexibility to conduct payments whenever and wherever they wish thanks to the advent of mobile banking. Further consumer behavior study is necessary due to difficulties with its acceptability. Given the hazards involved in online and mobile banking, cybersecurity is revealed as a critical component. Users’ actions might lead to financial losses since they represent security concerns. The evaluation places a strong emphasis on the necessity of increasing user cybersecurity knowledge and comprehension. Wireless banking is still in its early phases and needs more study on consumer acceptability and behavior despite the greater accessibility of technology. Furthermore, the research study emphasizes the socio-technical difficulties governments encounter in tackling cybersecurity and emphasizes how urgently better readiness is needed in the face of cyberwarfare threats. It investigated how user behavior in mobile banking in particular geographic areas, such as Thailand, relates to cyberspace knowledge and consciousness. The assessment emphasizes the value of technology in banking, the difficulties associated with cybersecurity, and the demand for increased customer knowledge and comprehension to ensure safe digital transactions. To conduct this research activity, standardized questionnaires are used. The technique employed to get this data was convenience sampling. The statistics collection size stood at 500 and was gathered from males as well as females of all ages, belonging to diverse revenue groups, and numerous professional backgrounds. The survey finds that even while these services are becoming widespread in the UAE, customers’ awareness and understanding of cyber security are still insufficient. Users frequently underrate the security dangers involved with online transactions, which might create openings. Additionally, the study underlines the necessity of more effective training programs and efforts to raise mobile banking consumers’ knowledge of cybersecurity issues. It also emphasizes how crucial it is to build cybersecurity precautions into the structure and functioning of services for mobile banking. The purpose of this study was to examine the demographic characteristics of consumers and companies (online transactions) that use mobile banking apps to get special advantages. It was shown that people’s satisfaction with mobile banking applications was influenced by a number of criteria, including age, employment, income, marital status, and educational attainment. Younger consumers, such as students and recent graduates, are seen to be happy than customers of various ages and vocations, and males are thought to be happier than women.

在这篇文献综述中,研究了技术,特别是移动银行在金融行业中日益扩大的重要性,以及网络安全知识在保护在线交易方面发挥的关键作用。由于手机银行的出现,用户现在可以随时随地灵活地进行支付。由于其难以被接受,因此有必要进行进一步的消费者行为研究。考虑到在线和移动银行所涉及的危害,网络安全被揭示为一个关键组成部分。用户的行为可能会导致经济损失,因为它们代表了安全问题。评估强调了提高用户网络安全知识和理解的必要性。无线银行仍处于早期阶段,尽管技术更容易获得,但仍需要对消费者的接受程度和行为进行更多的研究。此外,该研究强调了政府在处理网络安全问题时遇到的社会技术困难,并强调了面对网络战威胁时迫切需要更好的准备。它调查了泰国等特定地理区域的手机银行用户行为与网络空间知识和意识之间的关系。该评估强调了技术在银行业中的价值、与网络安全相关的困难,以及为确保安全的数字交易而增加客户知识和理解的需求。为了进行这项研究活动,使用了标准化的问卷调查。得到这些数据的方法是方便抽样。统计数据收集规模为500,收集了所有年龄段的男性和女性,属于不同的收入群体,专业背景众多。调查发现,尽管这些服务在阿联酋越来越普及,但客户对网络安全的认识和理解仍然不足。用户经常低估与在线交易有关的安全危险,这可能会造成漏洞。此外,该研究强调了更有效的培训计划和努力的必要性,以提高移动银行消费者对网络安全问题的认识。它还强调了在移动银行服务的结构和功能中建立网络安全预防措施的重要性。本研究的目的是研究使用手机银行应用程序获得特殊优势的消费者和公司(在线交易)的人口统计学特征。研究表明,人们对手机银行应用程序的满意度受到许多标准的影响,包括年龄、就业、收入、婚姻状况和教育程度。年轻的消费者,如学生和刚毕业的学生,被认为比不同年龄和职业的消费者更快乐,男性被认为比女性更快乐。
{"title":"The Effect of User Behavior in Online Banking on Cybersecurity Knowledge","authors":"Hamza Alrababah,&nbsp;Hena Iqbal,&nbsp;Muhammad Adnan Khan","doi":"10.1155/int/9949510","DOIUrl":"https://doi.org/10.1155/int/9949510","url":null,"abstract":"<div>\u0000 <p>The expanding importance of technology, particularly mobile banking, in the financial industry, is examined in this literature review, as well as the crucial role that cybersecurity knowledge plays in protecting online transactions. Users now have the flexibility to conduct payments whenever and wherever they wish thanks to the advent of mobile banking. Further consumer behavior study is necessary due to difficulties with its acceptability. Given the hazards involved in online and mobile banking, cybersecurity is revealed as a critical component. Users’ actions might lead to financial losses since they represent security concerns. The evaluation places a strong emphasis on the necessity of increasing user cybersecurity knowledge and comprehension. Wireless banking is still in its early phases and needs more study on consumer acceptability and behavior despite the greater accessibility of technology. Furthermore, the research study emphasizes the socio-technical difficulties governments encounter in tackling cybersecurity and emphasizes how urgently better readiness is needed in the face of cyberwarfare threats. It investigated how user behavior in mobile banking in particular geographic areas, such as Thailand, relates to cyberspace knowledge and consciousness. The assessment emphasizes the value of technology in banking, the difficulties associated with cybersecurity, and the demand for increased customer knowledge and comprehension to ensure safe digital transactions. To conduct this research activity, standardized questionnaires are used. The technique employed to get this data was convenience sampling. The statistics collection size stood at 500 and was gathered from males as well as females of all ages, belonging to diverse revenue groups, and numerous professional backgrounds. The survey finds that even while these services are becoming widespread in the UAE, customers’ awareness and understanding of cyber security are still insufficient. Users frequently underrate the security dangers involved with online transactions, which might create openings. Additionally, the study underlines the necessity of more effective training programs and efforts to raise mobile banking consumers’ knowledge of cybersecurity issues. It also emphasizes how crucial it is to build cybersecurity precautions into the structure and functioning of services for mobile banking. The purpose of this study was to examine the demographic characteristics of consumers and companies (online transactions) that use mobile banking apps to get special advantages. It was shown that people’s satisfaction with mobile banking applications was influenced by a number of criteria, including age, employment, income, marital status, and educational attainment. Younger consumers, such as students and recent graduates, are seen to be happy than customers of various ages and vocations, and males are thought to be happier than women.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/int/9949510","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142764069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pathological Image Segmentation Method Based on Multiscale and Dual Attention 基于多尺度和双注意的病理图像分割方法
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-29 DOI: 10.1155/int/9987190
Jia Wu, Yuxia Niu, Ziqiang Ling, Jun Zhu, Fangfang Gou

Medical images play a significant part in biomedical diagnosis, but they have a significant feature. The medical images, influenced by factors such as imaging equipment limitations, local volume effect, and others, inevitably exhibit issues like noise, blurred edges, and inconsistent signal strength. These imperfections pose significant challenges and create obstacles for doctors during their diagnostic processes. To address these issues, we present a pathology image segmentation technique based on the multiscale dual attention mechanism (MSDAUnet), which consists of three primary components. Firstly, an image denoising and enhancement module is constructed by using dynamic residual attention and color histogram to remove image noise and improve image clarity. Then, we propose a dual attention module (DAM), which extracts messages from both channel and spatial dimensions, obtains key features, and makes the edge of the lesion area clearer. Finally, capturing multiscale information in the process of image segmentation addresses the issue of uneven signal strength to a certain extent. Each module is combined for automatic pathological image segmentation. Compared with the traditional and typical U-Net model, MSDAUnet has a better segmentation performance. On the dataset provided by the Research Center for Artificial Intelligence of Monash University, the IOU index is as high as 72.7%, which is nearly 7% higher than that of U-Net, and the DSC index is 84.9%, which is also about 7% higher than that of U-Net.

医学图像在生物医学诊断中占有重要的地位,但它有一个显著的特点。受成像设备限制、局部体积效应等因素的影响,医学图像不可避免地会出现噪声、边缘模糊和信号强度不一致等问题。这些缺陷给医生的诊断过程带来了巨大的挑战和障碍。为了解决这些问题,我们提出了一种基于多尺度双注意机制(MSDAUnet)的病理图像分割技术,该技术由三个主要部分组成。首先,利用动态剩余注意和颜色直方图构建图像去噪增强模块,去除图像噪声,提高图像清晰度;然后,我们提出了一种双注意模块(dual attention module, DAM),该模块从通道和空间两个维度提取信息,获得关键特征,并使病变区域的边缘更加清晰。最后,在图像分割过程中捕获多尺度信息,在一定程度上解决了信号强度不均匀的问题。将各模块结合起来进行病理图像自动分割。与传统和典型的U-Net模型相比,MSDAUnet具有更好的分割性能。在莫纳什大学人工智能研究中心提供的数据集上,IOU指数高达72.7%,比U-Net高出近7%,DSC指数为84.9%,也比U-Net高出约7%。
{"title":"Pathological Image Segmentation Method Based on Multiscale and Dual Attention","authors":"Jia Wu,&nbsp;Yuxia Niu,&nbsp;Ziqiang Ling,&nbsp;Jun Zhu,&nbsp;Fangfang Gou","doi":"10.1155/int/9987190","DOIUrl":"https://doi.org/10.1155/int/9987190","url":null,"abstract":"<div>\u0000 <p>Medical images play a significant part in biomedical diagnosis, but they have a significant feature. The medical images, influenced by factors such as imaging equipment limitations, local volume effect, and others, inevitably exhibit issues like noise, blurred edges, and inconsistent signal strength. These imperfections pose significant challenges and create obstacles for doctors during their diagnostic processes. To address these issues, we present a pathology image segmentation technique based on the multiscale dual attention mechanism (MSDAUnet), which consists of three primary components. Firstly, an image denoising and enhancement module is constructed by using dynamic residual attention and color histogram to remove image noise and improve image clarity. Then, we propose a dual attention module (DAM), which extracts messages from both channel and spatial dimensions, obtains key features, and makes the edge of the lesion area clearer. Finally, capturing multiscale information in the process of image segmentation addresses the issue of uneven signal strength to a certain extent. Each module is combined for automatic pathological image segmentation. Compared with the traditional and typical U-Net model, MSDAUnet has a better segmentation performance. On the dataset provided by the Research Center for Artificial Intelligence of Monash University, the IOU index is as high as 72.7%, which is nearly 7% higher than that of U-Net, and the DSC index is 84.9%, which is also about 7% higher than that of U-Net.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/int/9987190","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142749362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Breast Cancer Detection in Ultrasound Images: An Innovative Approach Using Progressive Fine-Tuning of Vision Transformer Models 在超声图像中增强乳腺癌的检测:一种使用视觉变压器模型渐进微调的创新方法
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-28 DOI: 10.1155/int/6528752
Meshrif Alruily, Alshimaa Abdelraof Mahmoud, Hisham Allahem, Ayman Mohamed Mostafa, Hosameldeen Shabana, Mohamed Ezz

Breast cancer is ranked as the second most common cancer among women globally, highlighting the critical need for precise and early detection methods. Our research introduces a novel approach for classifying benign and malignant breast ultrasound images. We leverage advanced deep learning methodologies, mainly focusing on the vision transformer (ViT) model. Our method distinctively features progressive fine-tuning, a tailored process that incrementally adapts the model to the nuances of breast tissue classification. Ultrasound imaging was chosen for its distinct benefits in medical diagnostics. This modality is noninvasive and cost-effective and demonstrates enhanced specificity, especially in dense breast tissues where traditional methods may struggle. Such characteristics make it an ideal choice for the sensitive task of breast cancer detection. Our extensive experiments utilized the breast ultrasound images dataset, comprising 780 images of both benign and malignant breast tissues. The dataset underwent a comprehensive analysis using several pretrained deep learning models, including VGG16, VGG19, DenseNet121, Inception, ResNet152V2, DenseNet169, DenseNet201, and the ViT. The results presented were achieved without employing data augmentation techniques. The ViT model demonstrated robust accuracy and generalization capabilities with the original dataset size, which consisted of 637 images. Each model’s performance was meticulously evaluated through a robust 10-fold cross-validation technique, ensuring a thorough and unbiased comparison. Our findings are significant, demonstrating that the progressive fine-tuning substantially enhances the ViT model’s capability. This resulted in a remarkable accuracy of 94.49% and an AUC score of 0.921, significantly higher than models without fine-tuning. These results affirm the efficacy of the ViT model and highlight the transformative potential of integrating progressive fine-tuning with transformer models in medical image classification tasks. The study solidifies the role of such advanced methodologies in improving early breast cancer detection and diagnosis, especially when coupled with the unique advantages of ultrasound imaging.

乳腺癌在全球女性中被列为第二大常见癌症,这凸显了对精确和早期检测方法的迫切需要。本研究提出了一种新的乳腺超声图像良恶性分类方法。我们利用先进的深度学习方法,主要关注视觉转换器(ViT)模型。我们的方法具有渐进式微调的特点,这是一个量身定制的过程,可以逐步使模型适应乳腺组织分类的细微差别。选择超声成像是因为它在医学诊断中的独特优势。这种方式是非侵入性的,具有成本效益,并且具有增强的特异性,特别是在传统方法可能难以解决的致密乳腺组织中。这些特点使其成为乳腺癌检测敏感任务的理想选择。我们广泛的实验利用了乳房超声图像数据集,包括780张良性和恶性乳房组织的图像。使用VGG16、VGG19、DenseNet121、Inception、ResNet152V2、DenseNet169、DenseNet201和ViT等预训练深度学习模型对数据集进行了全面分析。所提出的结果是在不使用数据增强技术的情况下实现的。ViT模型在原始数据集大小(637张图像)下显示出强大的精度和泛化能力。每个模型的性能都通过稳健的10倍交叉验证技术进行了精心评估,确保了彻底和公正的比较。我们的发现意义重大,表明渐进式微调大大提高了ViT模型的能力。结果表明,该模型的准确率为94.49%,AUC得分为0.921,显著高于未进行微调的模型。这些结果肯定了ViT模型的有效性,并突出了将渐进微调与变形模型集成在医学图像分类任务中的变革潜力。这项研究巩固了这种先进的方法在改善早期乳腺癌检测和诊断方面的作用,特别是当与超声成像的独特优势相结合时。
{"title":"Enhancing Breast Cancer Detection in Ultrasound Images: An Innovative Approach Using Progressive Fine-Tuning of Vision Transformer Models","authors":"Meshrif Alruily,&nbsp;Alshimaa Abdelraof Mahmoud,&nbsp;Hisham Allahem,&nbsp;Ayman Mohamed Mostafa,&nbsp;Hosameldeen Shabana,&nbsp;Mohamed Ezz","doi":"10.1155/int/6528752","DOIUrl":"https://doi.org/10.1155/int/6528752","url":null,"abstract":"<div>\u0000 <p>Breast cancer is ranked as the second most common cancer among women globally, highlighting the critical need for precise and early detection methods. Our research introduces a novel approach for classifying benign and malignant breast ultrasound images. We leverage advanced deep learning methodologies, mainly focusing on the vision transformer (ViT) model. Our method distinctively features progressive fine-tuning, a tailored process that incrementally adapts the model to the nuances of breast tissue classification. Ultrasound imaging was chosen for its distinct benefits in medical diagnostics. This modality is noninvasive and cost-effective and demonstrates enhanced specificity, especially in dense breast tissues where traditional methods may struggle. Such characteristics make it an ideal choice for the sensitive task of breast cancer detection. Our extensive experiments utilized the breast ultrasound images dataset, comprising 780 images of both benign and malignant breast tissues. The dataset underwent a comprehensive analysis using several pretrained deep learning models, including VGG16, VGG19, DenseNet121, Inception, ResNet152V2, DenseNet169, DenseNet201, and the ViT. The results presented were achieved without employing data augmentation techniques. The ViT model demonstrated robust accuracy and generalization capabilities with the original dataset size, which consisted of 637 images. Each model’s performance was meticulously evaluated through a robust 10-fold cross-validation technique, ensuring a thorough and unbiased comparison. Our findings are significant, demonstrating that the progressive fine-tuning substantially enhances the ViT model’s capability. This resulted in a remarkable accuracy of 94.49% and an AUC score of 0.921, significantly higher than models without fine-tuning. These results affirm the efficacy of the ViT model and highlight the transformative potential of integrating progressive fine-tuning with transformer models in medical image classification tasks. The study solidifies the role of such advanced methodologies in improving early breast cancer detection and diagnosis, especially when coupled with the unique advantages of ultrasound imaging.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/int/6528752","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142749058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SFCNN: Separation and Fusion Convolutional Neural Network for Radio Frequency Fingerprint Identification 基于分离与融合卷积神经网络的射频指纹识别
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-28 DOI: 10.1155/int/4366040
Shiyuan Wang, Rugui Yao, Xiaoya Zuo, Ye Fan, Xiongfei Li, Qingyan Guo, Xudong Li

The unique fingerprints of radio frequency (RF) devices play a critical role in enhancing wireless security, optimizing spectrum management, and facilitating device authentication through accurate identification. However, high-accuracy identification models for radio frequency fingerprint (RFF) often come with a significant number of parameters and complexity, making them less practical for real-world deployment. To address this challenge, our research presents a deep convolutional neural network (CNN)–based architecture known as the separation and fusion convolutional neural network (SFCNN). This architecture focuses on enhancing the identification accuracy of RF devices with limited complexity. The SFCNN incorporates two customizable modules: the separation layer, which is responsible for partitioning the data group size adapted to the channel dimension to keep the low complexity, and the fusion layer which is designed to perform deep channel fusion to enhance feature representation. The proposed SFCNN demonstrates improved accuracy and enhanced robustness with fewer parameters compared to the state-of-the-art techniques, including the baseline CNN, Inception, ResNet, TCN, MSCNN, STFT-CNN, and the ResNet-50-1D. The experimental results based on the public datasets demonstrate an average identification accuracy of 97.78% among 21 USRP transmitters. The number of parameters is reduced by at least 8% compared with all the other models, and the identification accuracy is improved among all the models under any considered scenarios. The trade-off performance between the complexity and accuracy of the proposed SFCNN suggests that it is an effective architecture with remarkable development potential.

射频设备独特的指纹在增强无线安全、优化频谱管理、通过准确识别实现设备认证等方面发挥着至关重要的作用。然而,射频指纹(RFF)的高精度识别模型通常带有大量参数和复杂性,使得它们在实际部署中不太实用。为了解决这一挑战,我们的研究提出了一种基于深度卷积神经网络(CNN)的架构,称为分离和融合卷积神经网络(SFCNN)。该架构的重点是在有限的复杂度下提高射频器件的识别精度。SFCNN包含两个可定制的模块:分离层负责划分适合信道维度的数据组大小,以保持低复杂度;融合层负责进行深度信道融合,以增强特征表示。与最先进的技术(包括基线CNN、Inception、ResNet、TCN、MSCNN、STFT-CNN和ResNet-50- 1d)相比,所提出的SFCNN以更少的参数提高了准确性和增强的鲁棒性。基于公共数据集的实验结果表明,在21个USRP发射机中,平均识别准确率为97.78%。与所有其他模型相比,该模型的参数数量至少减少了8%,并且在任何考虑的场景下,所有模型的识别精度都有所提高。从复杂度和精度之间的权衡性能来看,所提出的SFCNN是一种具有显著发展潜力的有效架构。
{"title":"SFCNN: Separation and Fusion Convolutional Neural Network for Radio Frequency Fingerprint Identification","authors":"Shiyuan Wang,&nbsp;Rugui Yao,&nbsp;Xiaoya Zuo,&nbsp;Ye Fan,&nbsp;Xiongfei Li,&nbsp;Qingyan Guo,&nbsp;Xudong Li","doi":"10.1155/int/4366040","DOIUrl":"https://doi.org/10.1155/int/4366040","url":null,"abstract":"<div>\u0000 <p>The unique fingerprints of radio frequency (RF) devices play a critical role in enhancing wireless security, optimizing spectrum management, and facilitating device authentication through accurate identification. However, high-accuracy identification models for radio frequency fingerprint (RFF) often come with a significant number of parameters and complexity, making them less practical for real-world deployment. To address this challenge, our research presents a deep convolutional neural network (CNN)–based architecture known as the separation and fusion convolutional neural network (SFCNN). This architecture focuses on enhancing the identification accuracy of RF devices with limited complexity. The SFCNN incorporates two customizable modules: the separation layer, which is responsible for partitioning the data group size adapted to the channel dimension to keep the low complexity, and the fusion layer which is designed to perform deep channel fusion to enhance feature representation. The proposed SFCNN demonstrates improved accuracy and enhanced robustness with fewer parameters compared to the state-of-the-art techniques, including the baseline CNN, Inception, ResNet, TCN, MSCNN, STFT-CNN, and the ResNet-50-1D. The experimental results based on the public datasets demonstrate an average identification accuracy of 97.78% among 21 USRP transmitters. The number of parameters is reduced by at least 8% compared with all the other models, and the identification accuracy is improved among all the models under any considered scenarios. The trade-off performance between the complexity and accuracy of the proposed SFCNN suggests that it is an effective architecture with remarkable development potential.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/int/4366040","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142749057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Approach for Resource-Constrained Edge Devices in Federated Learning 联盟学习中资源受限边缘设备的有效方法
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-27 DOI: 10.1155/2024/8860376
Jun Wen, Xiusheng Li, Yupeng Chen, Xiaoli Li, Hang Mao

Federated learning (FL) is a novel approach to privacy-preserving machine learning, enabling remote devices to collaborate on model training without exchanging data among clients. However, it faces several challenges, including limited client-side processing capabilities and non-IID data distributions. To address these challenges, we propose a partitioned FL architecture that a large CNN is divided into smaller networks, which train concurrently with other clients. Within a cluster, multiple clients concurrently train the ensemble model. The Jensen–Shannon divergence quantifies the similarity of predictions across submodels. To address discrepancies in model parameters between local and global models caused by data distribution, we propose an ensemble learning method that integrates a penalty term into the local model’s loss calculation, thereby ensuring synchronization. This method amalgamates predictions and losses across multiple submodels, effectively mitigating accuracy loss during the integration process. Extensive experiments with various Dirichlet parameters demonstrate that our system achieves accelerated convergence and enhanced performance on the CIFAR-10 and CIFAR-100 image classification tasks while remaining robust to partial participation, diverse datasets, and numerous clients. On the CIFAR-10 dataset, our method outperforms FedAvg, FedProx, and SplitFed by 6%–8%; in contrast, it outperforms them by 12%–18% on CIFAR-100.

联合学习(FL)是一种保护隐私的机器学习新方法,它使远程设备能够在不交换客户端数据的情况下协作进行模型训练。然而,它也面临着一些挑战,包括客户端处理能力有限和非 IID 数据分布。为了应对这些挑战,我们提出了一种分区 FL 架构,即将大型 CNN 分成较小的网络,这些网络与其他客户端同时进行训练。在一个集群内,多个客户端同时训练集合模型。詹森-香农分歧(Jensen-Shannon divergence)可量化子模型间预测的相似性。为了解决数据分布造成的局部模型和全局模型之间的模型参数差异,我们提出了一种集合学习方法,将惩罚项整合到局部模型的损失计算中,从而确保同步。这种方法综合了多个子模型的预测和损失,有效地减少了整合过程中的精度损失。使用各种 Dirichlet 参数进行的广泛实验表明,我们的系统在 CIFAR-10 和 CIFAR-100 图像分类任务中实现了加速收敛和增强性能,同时对部分参与、多样化数据集和众多客户端保持了鲁棒性。在 CIFAR-10 数据集上,我们的方法优于 FedAvg、FedProx 和 SplitFed 6%-8%;相比之下,在 CIFAR-100 数据集上,我们的方法优于它们 12%-18%。
{"title":"An Effective Approach for Resource-Constrained Edge Devices in Federated Learning","authors":"Jun Wen,&nbsp;Xiusheng Li,&nbsp;Yupeng Chen,&nbsp;Xiaoli Li,&nbsp;Hang Mao","doi":"10.1155/2024/8860376","DOIUrl":"https://doi.org/10.1155/2024/8860376","url":null,"abstract":"<div>\u0000 <p>Federated learning (FL) is a novel approach to privacy-preserving machine learning, enabling remote devices to collaborate on model training without exchanging data among clients. However, it faces several challenges, including limited client-side processing capabilities and non-IID data distributions. To address these challenges, we propose a partitioned FL architecture that a large CNN is divided into smaller networks, which train concurrently with other clients. Within a cluster, multiple clients concurrently train the ensemble model. The Jensen–Shannon divergence quantifies the similarity of predictions across submodels. To address discrepancies in model parameters between local and global models caused by data distribution, we propose an ensemble learning method that integrates a penalty term into the local model’s loss calculation, thereby ensuring synchronization. This method amalgamates predictions and losses across multiple submodels, effectively mitigating accuracy loss during the integration process. Extensive experiments with various Dirichlet parameters demonstrate that our system achieves accelerated convergence and enhanced performance on the CIFAR-10 and CIFAR-100 image classification tasks while remaining robust to partial participation, diverse datasets, and numerous clients. On the CIFAR-10 dataset, our method outperforms FedAvg, FedProx, and SplitFed by 6%–8%; in contrast, it outperforms them by 12%–18% on CIFAR-100.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/8860376","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142724219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Counterfactual Regret Minimization With Information Gain to Solve Extensive Games With Unknown Environments 将反事实后悔最小化与信息增益相结合,解决未知环境下的广泛博弈问题
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-26 DOI: 10.1155/int/9482323
Chen Qiu, Xuan Wang, Tianzi Ma, Yaojun Wen, Jiajia Zhang

Counterfactual regret minimization (CFR) is an effective algorithm for solving extensive-form games with imperfect information (IIEGs). However, CFR is only allowed to be applied in known environments, where the transition function of the chance player and the reward function of the terminal node in IIEGs are known. In uncertain situations, such as reinforcement learning (RL) problems, CFR is not applicable. Thus, applying CFR in unknown environments is a significant challenge that can also address some difficulties in the real world. Currently, advanced solutions require more interactions with the environment and are limited by large single-sampling variances to narrow the gap with the real environment. In this paper, we propose a method that combines CFR with information gain to compute the Nash equilibrium (NE) of IIEGs with unknown environments. We use a curiosity-driven approach to explore unknown environments and minimize the discrepancy between uncertain and real environments. In addition, by incorporating information into the reward, the average strategy calculated by CFR can be directly implemented as the interaction policy with the environment, thereby improving the exploration efficiency of our method in uncertain environments. Through experiments on standard testbeds such as Kuhn poker and Leduc poker, our method significantly reduces the number of interactions with the environment compared to the different baselines and computes a more accurate approximate NE within the same number of interaction rounds.

反事实遗憾最小化(CFR)是解决信息不完全的广域博弈(IIEGs)的一种有效算法。然而,CFR 只允许在已知环境中应用,即 IIEGs 中机会玩家的过渡函数和终端节点的奖励函数是已知的。在不确定的情况下,如强化学习(RL)问题,CFR 并不适用。因此,在未知环境中应用 CFR 是一项重大挑战,也能解决现实世界中的一些难题。目前,先进的解决方案需要与环境进行更多的交互,并且受限于较大的单次采样方差,无法缩小与真实环境的差距。在本文中,我们提出了一种将 CFR 与信息增益相结合的方法,用于计算未知环境下 IIEG 的纳什均衡(NE)。我们采用好奇心驱动的方法来探索未知环境,最大限度地减少不确定环境与真实环境之间的差异。此外,通过将信息纳入奖励,CFR 计算出的平均策略可以直接作为与环境的交互策略,从而提高了我们的方法在不确定环境中的探索效率。通过在库恩扑克和勒杜克扑克等标准测试平台上的实验,与不同基线相比,我们的方法显著减少了与环境的交互次数,并在相同的交互轮数内计算出了更精确的近似近境。
{"title":"Combining Counterfactual Regret Minimization With Information Gain to Solve Extensive Games With Unknown Environments","authors":"Chen Qiu,&nbsp;Xuan Wang,&nbsp;Tianzi Ma,&nbsp;Yaojun Wen,&nbsp;Jiajia Zhang","doi":"10.1155/int/9482323","DOIUrl":"https://doi.org/10.1155/int/9482323","url":null,"abstract":"<div>\u0000 <p>Counterfactual regret minimization (CFR) is an effective algorithm for solving extensive-form games with imperfect information (IIEGs). However, CFR is only allowed to be applied in known environments, where the transition function of the chance player and the reward function of the terminal node in IIEGs are known. In uncertain situations, such as reinforcement learning (RL) problems, CFR is not applicable. Thus, applying CFR in unknown environments is a significant challenge that can also address some difficulties in the real world. Currently, advanced solutions require more interactions with the environment and are limited by large single-sampling variances to narrow the gap with the real environment. In this paper, we propose a method that combines CFR with information gain to compute the Nash equilibrium (NE) of IIEGs with unknown environments. We use a curiosity-driven approach to explore unknown environments and minimize the discrepancy between uncertain and real environments. In addition, by incorporating information into the reward, the average strategy calculated by CFR can be directly implemented as the interaction policy with the environment, thereby improving the exploration efficiency of our method in uncertain environments. Through experiments on standard testbeds such as Kuhn poker and Leduc poker, our method significantly reduces the number of interactions with the environment compared to the different baselines and computes a more accurate approximate NE within the same number of interaction rounds.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/int/9482323","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142724236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Networks With Linear Adaptive Batch Normalization and Swarm Intelligence Calibration for Real-Time Gaze Estimation on Smartphones 采用线性自适应批量归一化和群集智能校准的神经网络用于智能手机的实时注视估计
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-21 DOI: 10.1155/2024/2644725
Gancheng Zhu, Yongkai Li, Shuai Zhang, Xiaoting Duan, Zehao Huang, Zhaomin Yao, Rong Wang, Zhiguo Wang

Eye tracking has emerged as a valuable tool for both research and clinical applications. However, traditional eye-tracking systems are often bulky and expensive, limiting their widespread adoption in various fields. Smartphone eye tracking has become feasible with advanced deep learning and edge computing technologies. However, the field still faces practical challenges related to large-scale datasets, model inference speed, and gaze estimation accuracy. The present study created a new dataset that contains over 3.2 million face images collected with recent phone models and presents a comprehensive smartphone eye-tracking pipeline comprising a deep neural network framework (MGazeNet), a personalized model calibration method, and a heuristic gaze signal filter. The MGazeNet model introduced a linear adaptive batch normalization module to efficiently combine eye and face features, achieving the state-of-the-art gaze estimation accuracy of 1.59 cm on the GazeCapture dataset and 1.48 cm on our custom dataset. In addition, an algorithm that utilizes multiverse optimization to optimize the hyperparameters of support vector regression (MVO–SVR) was proposed to improve eye-tracking calibration accuracy with 13 or fewer ground-truth gaze points, further improving gaze estimation accuracy to 0.89 cm. This integrated approach allows for eye tracking with accuracy comparable to that of research-grade eye trackers, offering new application possibilities for smartphone eye tracking.

眼动跟踪已成为研究和临床应用的重要工具。然而,传统的眼动追踪系统往往体积庞大、价格昂贵,限制了其在各个领域的广泛应用。借助先进的深度学习和边缘计算技术,智能手机眼动追踪变得可行。然而,该领域仍然面临着与大规模数据集、模型推理速度和注视估计精度有关的实际挑战。本研究创建了一个新的数据集,其中包含用最新手机模型收集的超过 320 万张人脸图像,并提出了一个全面的智能手机眼球跟踪管道,包括一个深度神经网络框架(MGazeNet)、一个个性化模型校准方法和一个启发式凝视信号滤波器。MGazeNet模型引入了线性自适应批量归一化模块,有效地结合了眼部和面部特征,在GazeCapture数据集上实现了1.59厘米的最先进注视估计精度,在我们的自定义数据集上实现了1.48厘米的最先进注视估计精度。此外,我们还提出了一种利用多元宇宙优化来优化支持向量回归超参数(MVO-SVR)的算法,以提高 13 个或更少的地面真实注视点的眼球跟踪校准精度,从而将注视估计精度进一步提高到 0.89 厘米。这种综合方法使眼球跟踪的精确度可与研究级眼球跟踪仪相媲美,为智能手机眼球跟踪提供了新的应用可能性。
{"title":"Neural Networks With Linear Adaptive Batch Normalization and Swarm Intelligence Calibration for Real-Time Gaze Estimation on Smartphones","authors":"Gancheng Zhu,&nbsp;Yongkai Li,&nbsp;Shuai Zhang,&nbsp;Xiaoting Duan,&nbsp;Zehao Huang,&nbsp;Zhaomin Yao,&nbsp;Rong Wang,&nbsp;Zhiguo Wang","doi":"10.1155/2024/2644725","DOIUrl":"https://doi.org/10.1155/2024/2644725","url":null,"abstract":"<div>\u0000 <p>Eye tracking has emerged as a valuable tool for both research and clinical applications. However, traditional eye-tracking systems are often bulky and expensive, limiting their widespread adoption in various fields. Smartphone eye tracking has become feasible with advanced deep learning and edge computing technologies. However, the field still faces practical challenges related to large-scale datasets, model inference speed, and gaze estimation accuracy. The present study created a new dataset that contains over 3.2 million face images collected with recent phone models and presents a comprehensive smartphone eye-tracking pipeline comprising a deep neural network framework (MGazeNet), a personalized model calibration method, and a heuristic gaze signal filter. The MGazeNet model introduced a linear adaptive batch normalization module to efficiently combine eye and face features, achieving the state-of-the-art gaze estimation accuracy of 1.59 cm on the GazeCapture dataset and 1.48 cm on our custom dataset. In addition, an algorithm that utilizes multiverse optimization to optimize the hyperparameters of support vector regression (MVO–SVR) was proposed to improve eye-tracking calibration accuracy with 13 or fewer ground-truth gaze points, further improving gaze estimation accuracy to 0.89 cm. This integrated approach allows for eye tracking with accuracy comparable to that of research-grade eye trackers, offering new application possibilities for smartphone eye tracking.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/2644725","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Power Control and Resource Allocation With Task Offloading for Collaborative Device-Edge-Cloud Computing Systems 针对协作式设备边缘云计算系统的任务卸载联合功率控制与资源分配
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-20 DOI: 10.1155/2024/6852701
Shumin Xie, Kangshun Li, Wenxiang Wang, Hui Wang, Hassan Jalil

Collaborative edge and cloud computing is a promising computing paradigm for reducing the task response delay and energy consumption of devices. In this paper, we aim to jointly optimize task offloading strategy, power control for devices, and resource allocation for edge servers within a collaborative device-edge-cloud computing system. We formulate this problem as a constrained multiobjective optimization problem and propose a joint optimization algorithm (JO-DEC) based on a multiobjective evolutionary algorithm to solve it. To address the tight coupling of the variables and the high-dimensional decision space, we propose a decoupling encoding strategy (DES) and a boundary point sampling strategy (BPS) to improve the performance of the algorithm. The DES is utilized to decouple the correlations among decision variables, and BPS is employed to enhance the convergence speed and population diversity of the algorithm. Simulation results demonstrate that JO-DEC outperforms three state-of-the-art algorithms in terms of convergence and diversity, enabling it to achieve a smaller task response delay and lower energy consumption.

协同边缘和云计算是一种很有前途的计算模式,可以减少设备的任务响应延迟和能耗。本文旨在联合优化设备-边缘-云计算协作系统中的任务卸载策略、设备功率控制和边缘服务器的资源分配。我们将该问题表述为一个约束多目标优化问题,并提出了一种基于多目标进化算法的联合优化算法(JO-DEC)来解决该问题。为了解决变量和高维决策空间的紧密耦合问题,我们提出了解耦编码策略(DES)和边界点采样策略(BPS),以提高算法的性能。DES 用于解耦决策变量之间的相关性,BPS 用于提高算法的收敛速度和群体多样性。仿真结果表明,JO-DEC 在收敛性和多样性方面优于三种最先进的算法,使其能够实现更小的任务响应延迟和更低的能耗。
{"title":"Joint Power Control and Resource Allocation With Task Offloading for Collaborative Device-Edge-Cloud Computing Systems","authors":"Shumin Xie,&nbsp;Kangshun Li,&nbsp;Wenxiang Wang,&nbsp;Hui Wang,&nbsp;Hassan Jalil","doi":"10.1155/2024/6852701","DOIUrl":"https://doi.org/10.1155/2024/6852701","url":null,"abstract":"<div>\u0000 <p>Collaborative edge and cloud computing is a promising computing paradigm for reducing the task response delay and energy consumption of devices. In this paper, we aim to jointly optimize task offloading strategy, power control for devices, and resource allocation for edge servers within a collaborative device-edge-cloud computing system. We formulate this problem as a constrained multiobjective optimization problem and propose a joint optimization algorithm (JO-DEC) based on a multiobjective evolutionary algorithm to solve it. To address the tight coupling of the variables and the high-dimensional decision space, we propose a decoupling encoding strategy (DES) and a boundary point sampling strategy (BPS) to improve the performance of the algorithm. The DES is utilized to decouple the correlations among decision variables, and BPS is employed to enhance the convergence speed and population diversity of the algorithm. Simulation results demonstrate that JO-DEC outperforms three state-of-the-art algorithms in terms of convergence and diversity, enabling it to achieve a smaller task response delay and lower energy consumption.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/6852701","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of Large Language Models on API Misuse Programming Repair 关于 API 滥用编程修复的大型语言模型的安全分析
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-19 DOI: 10.1155/2024/7135765
Rui Zhang, Ziyue Qiao, Yong Yu

Application programming interface (API) misuse refers to misconceptions or carelessness in the anticipated usage of APIs, threatening the software system’s security. Moreover, API misuses demonstrate significant concealment and are challenging to uncover. Recent advancements have explored enhanced LLMs in a variety of software engineering (SE) activities, such as code repair. Nonetheless, the security implications of using LLMs for these purposes remain underexplored, particularly concerning the issue of API misuse. In this paper, we present an empirical study to observe the bug-fixing capabilities of LLMs in addressing API misuse related to monitoring resource management (MRM API misuse). Initially, we propose APImisRepair, a real-world benchmark for repairing MRM API misuse, including buggy programs, corresponding fixed programs, and descriptions of API misuse. Subsequently, we assess the performance of several LLMs using the APImisRepair benchmark. Findings reveal the vulnerabilities of LLMs in repairing MRM API misuse and find several reasons, encompassing factors such as fault localization and a lack of awareness regarding API misuse. Additionally, we have insights on improving LLMs in terms of their ability to fix MRM API misuse and introduce a crafted approach, APImisAP. Experimental results demonstrate that APImisAP exhibits a certain degree of improvement in the security of LLMs.

应用程序接口(API)滥用是指在预期使用 API 时出现误解或疏忽,从而威胁到软件系统的安全。此外,应用程序接口误用具有很大的隐蔽性,揭露起来也很困难。最近的进展是在代码修复等各种软件工程(SE)活动中探索增强型 LLM。然而,将 LLMs 用于这些目的的安全影响仍未得到充分探索,尤其是在 API 滥用问题上。在本文中,我们介绍了一项实证研究,以观察 LLM 在解决与监控资源管理相关的 API 滥用(MRM API 滥用)方面的错误修复能力。首先,我们提出了 APImisRepair,这是一个用于修复 MRM API 滥用的真实世界基准,其中包括错误程序、相应的修复程序以及 API 滥用的描述。随后,我们使用 APImisRepair 基准评估了几种 LLM 的性能。研究结果揭示了 LLM 在修复 MRM API 误用方面的漏洞,并发现了若干原因,其中包括故障定位和缺乏对 API 误用的认识等因素。此外,我们还就如何提高 LLM 修复 MRM API 误用的能力提出了见解,并介绍了一种精心设计的方法 APImisAP。实验结果表明,APImisAP 在一定程度上提高了 LLM 的安全性。
{"title":"Security Analysis of Large Language Models on API Misuse Programming Repair","authors":"Rui Zhang,&nbsp;Ziyue Qiao,&nbsp;Yong Yu","doi":"10.1155/2024/7135765","DOIUrl":"https://doi.org/10.1155/2024/7135765","url":null,"abstract":"<div>\u0000 <p>Application programming interface (API) misuse refers to misconceptions or carelessness in the anticipated usage of APIs, threatening the software system’s security. Moreover, API misuses demonstrate significant concealment and are challenging to uncover. Recent advancements have explored enhanced LLMs in a variety of software engineering (SE) activities, such as code repair. Nonetheless, the security implications of using LLMs for these purposes remain underexplored, particularly concerning the issue of API misuse. In this paper, we present an empirical study to observe the bug-fixing capabilities of LLMs in addressing API misuse related to monitoring resource management (MRM API misuse). Initially, we propose APImisRepair, a real-world benchmark for repairing MRM API misuse, including buggy programs, corresponding fixed programs, and descriptions of API misuse. Subsequently, we assess the performance of several LLMs using the APImisRepair benchmark. Findings reveal the vulnerabilities of LLMs in repairing MRM API misuse and find several reasons, encompassing factors such as fault localization and a lack of awareness regarding API misuse. Additionally, we have insights on improving LLMs in terms of their ability to fix MRM API misuse and introduce a crafted approach, APImisAP. Experimental results demonstrate that APImisAP exhibits a certain degree of improvement in the security of LLMs.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/7135765","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Intelligent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1