首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
Secure Communication Using Steganography and Improved Blowfish Cryptographic Methods 使用隐写术和改进的河豚密码方法的安全通信
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-23 DOI: 10.1002/ett.70357
K. Ravindra Reddy, Vijayalakshmi P

In today's digital world, with increasing threats of cyberattacks and unauthorized data access, protecting confidential information demands more robust security mechanisms. Cryptography and steganography are two prominent techniques employed to secure data. However, conventional steganography suffers from reduced embedding capacity and the risk of image distortion. To overcome these challenges, this research proposes a novel hybrid framework to enhance data security and embedding efficiency. The approach comprises two phases including the embedding phase and the extraction phase. In the embedding phase, both the cover and secret images undergo a 3-level discrete wavelet transform (DWT) using the Daubechies wavelet. Region selection in the transformed cover image is optimized by extracting and leveraging various features, including color, shape, deep features, and local Gabor transitional pattern (LGTrP) features. These features are processed via a modified Bidirectional Long Short-Term Memory (Bi-LSTM) model, enhanced with architectural improvements, which boost feature learning. Simultaneously, the secret image undergoes transformation using a modified Arnold map integrated with a Bernoulli map allows faster execution. The modified Arnold function's outcome is subjected to an encryption process. The embedding process is done after the encryption process; the modified Blowfish algorithm is used for the decryption process. Subsequently, the inverse Bernoulli map is utilized, with the resultant output given to the inverse Arnold map. Finally, an inverse 3-level DWT reconstructs the original secret image. Comparative evaluations demonstrate the proposed framework attains lower KPA and KCA rates of 0.12 and 0.15, respectively, which underscores the innovation of integrating a steganography-cryptography model in securing sensitive data against sophisticated attacks.

在当今的数字世界中,随着网络攻击和未经授权的数据访问的威胁日益增加,保护机密信息需要更强大的安全机制。密码学和隐写术是用于保护数据的两种主要技术。然而,传统的隐写术存在嵌入容量降低和图像失真的风险。为了克服这些挑战,本研究提出了一种新的混合框架来提高数据安全性和嵌入效率。该方法包括两个阶段:嵌入阶段和提取阶段。在嵌入阶段,覆盖图像和秘密图像都使用Daubechies小波进行3级离散小波变换(DWT)。通过提取和利用各种特征,包括颜色、形状、深度特征和局部Gabor过渡模式(LGTrP)特征,优化变换后的封面图像的区域选择。这些特征通过改进的双向长短期记忆(Bi-LSTM)模型进行处理,并通过架构改进进行增强,从而促进特征学习。同时,秘密图像经过转换,使用修改的阿诺德地图与伯努利地图集成,从而加快执行速度。修改后的Arnold函数的结果要经过一个加密过程。在加密处理后进行嵌入处理;在解密过程中使用改进的Blowfish算法。随后,利用逆伯努利映射,将结果输出给逆阿诺德映射。最后,对原秘密图像进行逆3级小波变换重建。比较评估表明,所提议的框架分别达到了0.12和0.15的较低KPA和KCA率,这强调了集成隐写加密模型以保护敏感数据免受复杂攻击的创新。
{"title":"Secure Communication Using Steganography and Improved Blowfish Cryptographic Methods","authors":"K. Ravindra Reddy,&nbsp;Vijayalakshmi P","doi":"10.1002/ett.70357","DOIUrl":"https://doi.org/10.1002/ett.70357","url":null,"abstract":"<div>\u0000 \u0000 <p>In today's digital world, with increasing threats of cyberattacks and unauthorized data access, protecting confidential information demands more robust security mechanisms. Cryptography and steganography are two prominent techniques employed to secure data. However, conventional steganography suffers from reduced embedding capacity and the risk of image distortion. To overcome these challenges, this research proposes a novel hybrid framework to enhance data security and embedding efficiency. The approach comprises two phases including the embedding phase and the extraction phase. In the embedding phase, both the cover and secret images undergo a 3-level discrete wavelet transform (DWT) using the Daubechies wavelet. Region selection in the transformed cover image is optimized by extracting and leveraging various features, including color, shape, deep features, and local Gabor transitional pattern (LGTrP) features. These features are processed via a modified Bidirectional Long Short-Term Memory (Bi-LSTM) model, enhanced with architectural improvements, which boost feature learning. Simultaneously, the secret image undergoes transformation using a modified Arnold map integrated with a Bernoulli map allows faster execution. The modified Arnold function's outcome is subjected to an encryption process. The embedding process is done after the encryption process; the modified Blowfish algorithm is used for the decryption process. Subsequently, the inverse Bernoulli map is utilized, with the resultant output given to the inverse Arnold map. Finally, an inverse 3-level DWT reconstructs the original secret image. Comparative evaluations demonstrate the proposed framework attains lower KPA and KCA rates of 0.12 and 0.15, respectively, which underscores the innovation of integrating a steganography-cryptography model in securing sensitive data against sophisticated attacks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Transfer Active Learning With Quantized Neural Cryptography for Healthcare 用于医疗保健的量化神经密码学的联邦转移主动学习
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-22 DOI: 10.1002/ett.70362
N. Malathy, J. Grace Sophia, S. Swathi, K. VijayaSubasri

Healthcare data holds immense potential to improve diagnostics and treatment, but centralized collection risks patient privacy and suffers from limited labeled samples. Existing methods fall short in securely leveraging distributed data while reducing annotation costs. To address this, we propose FTAL-QNC—a novel Federated Transfer Active Learning framework with Quantized Neural Cryptography—that enables privacy-preserving, communication-efficient, and label-efficient collaborative model training. FTAL-QNC integrates four core components in a unified architecture: (1) Federated learning for decentralized model training without data sharing, (2) Transfer learning to handle data heterogeneity across hospitals, (3) Active learning to minimize manual labeling by prioritizing informative samples, and (4) Quantized neural cryptography to ensure secure, low-overhead exchange of encrypted model updates. Empirical evaluations on real-world datasets, including Lung CT and ChestX-ray14, demonstrate that FTAL-QNC enhances segmentation and classification accuracy to 97.3% and 97.0% recall for Lung CT, respectively, while significantly reducing annotation effort compared to standard federated learning and other sampling methods. Our contributions include a privacy-preserving and communication-efficient collaborative framework, an integrated active learning mechanism for efficient data labeling, and a secure aggregation protocol via quantized neural cryptography. These results demonstrate FTAL-QNC's potential to advance safe, collaborative medical research and improve patient outcomes.

医疗保健数据在改善诊断和治疗方面具有巨大的潜力,但集中收集会给患者隐私带来风险,并且标签样本有限。现有方法在降低注释成本的同时无法安全地利用分布式数据。为了解决这个问题,我们提出了ftal - qnc——一种具有量化神经密码学的新型联邦转移主动学习框架,它可以实现隐私保护、通信效率和标签效率的协作模型训练。FTAL-QNC在统一架构中集成了四个核心组件:(1)用于不共享数据的分散模型训练的联邦学习;(2)处理跨医院数据异构的迁移学习;(3)主动学习,通过对信息样本进行优先排序来减少人工标记;(4)量化神经加密,确保加密模型更新的安全、低开销交换。对真实数据集(包括Lung CT和ChestX-ray14)的实证评估表明,FTAL-QNC将Lung CT的分割和分类准确率分别提高到97.3%和97.0%的召回率,同时与标准联邦学习和其他采样方法相比,显著减少了注释工作量。我们的贡献包括一个隐私保护和通信高效的协作框架,一个集成的有效数据标记的主动学习机制,以及一个通过量化神经密码学的安全聚合协议。这些结果证明了FTAL-QNC在推进安全、协作的医学研究和改善患者预后方面的潜力。
{"title":"Federated Transfer Active Learning With Quantized Neural Cryptography for Healthcare","authors":"N. Malathy,&nbsp;J. Grace Sophia,&nbsp;S. Swathi,&nbsp;K. VijayaSubasri","doi":"10.1002/ett.70362","DOIUrl":"https://doi.org/10.1002/ett.70362","url":null,"abstract":"<div>\u0000 \u0000 <p>Healthcare data holds immense potential to improve diagnostics and treatment, but centralized collection risks patient privacy and suffers from limited labeled samples. Existing methods fall short in securely leveraging distributed data while reducing annotation costs. To address this, we propose FTAL-QNC—a novel Federated Transfer Active Learning framework with Quantized Neural Cryptography—that enables privacy-preserving, communication-efficient, and label-efficient collaborative model training. FTAL-QNC integrates four core components in a unified architecture: (1) Federated learning for decentralized model training without data sharing, (2) Transfer learning to handle data heterogeneity across hospitals, (3) Active learning to minimize manual labeling by prioritizing informative samples, and (4) Quantized neural cryptography to ensure secure, low-overhead exchange of encrypted model updates. Empirical evaluations on real-world datasets, including Lung CT and ChestX-ray14, demonstrate that FTAL-QNC enhances segmentation and classification accuracy to 97.3% and 97.0% recall for Lung CT, respectively, while significantly reducing annotation effort compared to standard federated learning and other sampling methods. Our contributions include a privacy-preserving and communication-efficient collaborative framework, an integrated active learning mechanism for efficient data labeling, and a secure aggregation protocol via quantized neural cryptography. These results demonstrate FTAL-QNC's potential to advance safe, collaborative medical research and improve patient outcomes.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Feature Selection-Based Cyber Attack Detection Using a Polymorphic Graph Gudermannian Neural Network With Encryption Approach 基于多态图古德曼神经网络的有效特征选择网络攻击检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-22 DOI: 10.1002/ett.70358
S. Raja Shree, Maya S. Bembde, L. Sharmila, A. Jemshia Miriam

The rapid expansion of digitalization has intensified cybersecurity risks, exposing critical network vulnerabilities despite significant advances in encryption and intrusion detection systems (IDS). Many existing deep learning–based IDS still struggle with high false-positive rates, misclassification, and limited adaptability, reducing their effectiveness in real-time defense scenarios. To address these limitations, this study proposes a Polymorphic Graph Gudermannian Neural Network integrated with Adaptive Chaotic Satin Bowerbird Optimization (PG-GNN-AC-SBO), complemented by a lightweight encryption mechanism. The framework incorporates a Fuzzy K-Top Matching Value (FKTMV) module for robust preprocessing and normalization, along with a Hybrid Cat Hunting Sea-Horse Optimizer (H-CHO-SHO) for efficient and interpretable feature selection. The PG-GNN classifier employs graph-based learning and a Gudermannian nonlinear activation function to effectively capture complex traffic behavior, while AC-SBO dynamically tunes hyperparameters to enhance stability and classification accuracy. To ensure data confidentiality, a Synchronously Scrambled Diffuse Encryption (SSDE) scheme is applied, delivering strong security with low computational overhead. Experimental evaluations on the NSL-KDD and CICIDS2017 datasets demonstrate the superiority of the proposed approach, achieving up to 99.82% accuracy and outperforming state-of-the-art methods. The encryption and decryption times of 3.50 and 3.55 ms further confirm the model's lightweight design. Overall, the proposed system provides high throughput with minimal latency, demonstrating strong potential for real-time and large-scale cybersecurity deployments.

尽管在加密和入侵检测系统(IDS)方面取得了重大进展,但数字化的快速发展加剧了网络安全风险,暴露了关键的网络漏洞。许多现有的基于深度学习的IDS仍然存在高假阳性率、错误分类和有限的适应性,降低了它们在实时防御场景中的有效性。为了解决这些限制,本研究提出了一种集成了自适应混沌缎面园丁鸟优化(PG-GNN-AC-SBO)的多态图古德曼神经网络,并辅以轻量级加密机制。该框架结合了一个模糊K-Top匹配值(FKTMV)模块,用于鲁棒预处理和规范化,以及一个混合猫狩猎海马优化器(H-CHO-SHO),用于高效和可解释的特征选择。PG-GNN分类器采用基于图的学习和古德曼非线性激活函数来有效捕获复杂的交通行为,AC-SBO动态调整超参数来提高稳定性和分类精度。为了保证数据的机密性,采用了同步打乱漫射加密(SSDE)方案,具有较强的安全性和较低的计算开销。在NSL-KDD和CICIDS2017数据集上的实验评估证明了该方法的优越性,准确率高达99.82%,优于目前最先进的方法。加密和解密时间分别为3.50和3.55 ms,进一步证实了该型号的轻量化设计。总体而言,所提出的系统提供了高吞吐量和最小延迟,显示出实时和大规模网络安全部署的强大潜力。
{"title":"An Effective Feature Selection-Based Cyber Attack Detection Using a Polymorphic Graph Gudermannian Neural Network With Encryption Approach","authors":"S. Raja Shree,&nbsp;Maya S. Bembde,&nbsp;L. Sharmila,&nbsp;A. Jemshia Miriam","doi":"10.1002/ett.70358","DOIUrl":"https://doi.org/10.1002/ett.70358","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid expansion of digitalization has intensified cybersecurity risks, exposing critical network vulnerabilities despite significant advances in encryption and intrusion detection systems (IDS). Many existing deep learning–based IDS still struggle with high false-positive rates, misclassification, and limited adaptability, reducing their effectiveness in real-time defense scenarios. To address these limitations, this study proposes a Polymorphic Graph Gudermannian Neural Network integrated with Adaptive Chaotic Satin Bowerbird Optimization (PG-GNN-AC-SBO), complemented by a lightweight encryption mechanism. The framework incorporates a Fuzzy K-Top Matching Value (FKTMV) module for robust preprocessing and normalization, along with a Hybrid Cat Hunting Sea-Horse Optimizer (H-CHO-SHO) for efficient and interpretable feature selection. The PG-GNN classifier employs graph-based learning and a Gudermannian nonlinear activation function to effectively capture complex traffic behavior, while AC-SBO dynamically tunes hyperparameters to enhance stability and classification accuracy. To ensure data confidentiality, a Synchronously Scrambled Diffuse Encryption (SSDE) scheme is applied, delivering strong security with low computational overhead. Experimental evaluations on the NSL-KDD and CICIDS2017 datasets demonstrate the superiority of the proposed approach, achieving up to 99.82% accuracy and outperforming state-of-the-art methods. The encryption and decryption times of 3.50 and 3.55 ms further confirm the model's lightweight design. Overall, the proposed system provides high throughput with minimal latency, demonstrating strong potential for real-time and large-scale cybersecurity deployments.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146091523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Deep Reinforcement Learning-Based Optimized Ensemble Approaches for IoT Network Intrusion Detection 基于深度强化学习的物联网网络入侵检测优化集成新方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-22 DOI: 10.1002/ett.70360
C. H. Mahaboob Subhani Shaik, Yamarthi Narasimha Rao

The rise in network intrusions has led to significant consequences, including privacy violations, financial losses, and unauthorized data transfers. Attackers exploit vulnerabilities in network systems, compromising security and disrupting services. Traditional intrusion detection systems (IDS) often face challenges such as false positives, delayed threat identification, and poor detection of minority attack classes. To address these issues, this research proposes advanced deep reinforcement learning with deep learning-based NIDS for improved threat detection and mitigation. Data from IoT-2023, BoT-IoT, CIC-IoT 2023, and RT-IoT 2022 datasets are preprocessed through null value handling, data cleaning, one-hot encoding, and Min-Max normalization. To enhance the detection of minority attacks, the Tabular Auxiliary Classifier Generative Adversarial Network (TACGAN) is employed for synthetic data augmentation. Feature extraction is performed using the Graph Sample and Aggregate Attention Network (GSAAN), which captures basic, content, and traffic-based features. Significant features are selected using the Mountaineering Team-Based Optimization (MTBO). Attack classification is carried out using a novel ensemble of the Improved Double Deep Q-Network (IDDQN) and Deep Autoregression Feature Augmented Bidirectional LSTM (DAF-BiLSTM), which is termed the OptIDQDBiLSTM approach, ensuring robust learning of spatial and temporal dependencies. Hyperparameter tuning is optimized using the Boosted Wild Horse Optimization Algorithm (BWHOA). Experimental results show that the proposed approach outperforms existing IDS methods, achieving higher detection rates, improved accuracy, and a reduced false alarm rate while maintaining computational efficiency. While comparing with existing state of the art approaches, the proposed approach surpasses existing methods with over 99.64% accuracy, 99.34% precision, and 99.42% recall. These findings demonstrate the effectiveness of deep reinforcement learning in enhancing network security against evolving cyber threats.

网络入侵的增加导致了严重的后果,包括侵犯隐私、经济损失和未经授权的数据传输。攻击者利用网络系统中的漏洞,危及安全性并破坏服务。传统的入侵检测系统(IDS)经常面临误报、威胁识别延迟以及对少数攻击类检测不力等挑战。为了解决这些问题,本研究提出了基于深度学习的NIDS的高级深度强化学习,以改进威胁检测和缓解。对IoT-2023、BoT-IoT、CIC-IoT 2023、RT-IoT 2022数据集的数据进行空值处理、数据清洗、单热编码、Min-Max归一化等预处理。为了提高对少数攻击的检测能力,采用表格辅助分类器生成对抗网络(TACGAN)进行综合数据增强。特征提取使用图样本和聚合注意力网络(GSAAN)来执行,它捕获基本的、内容的和基于流量的特征。使用登山队优化(MTBO)选择重要特征。攻击分类使用改进的双深度q网络(IDDQN)和深度自回归特征增强双向LSTM (DAF-BiLSTM)的新集成进行,称为OptIDQDBiLSTM方法,确保对空间和时间依赖性的鲁棒学习。超参数调优使用增强野马优化算法(bwow)进行优化。实验结果表明,该方法优于现有的IDS方法,在保持计算效率的同时,实现了更高的检测率、更高的准确率和更低的虚警率。与现有方法相比,该方法的准确率超过99.64%,精密度超过99.34%,召回率超过99.42%。这些发现证明了深度强化学习在增强网络安全以应对不断变化的网络威胁方面的有效性。
{"title":"Novel Deep Reinforcement Learning-Based Optimized Ensemble Approaches for IoT Network Intrusion Detection","authors":"C. H. Mahaboob Subhani Shaik,&nbsp;Yamarthi Narasimha Rao","doi":"10.1002/ett.70360","DOIUrl":"https://doi.org/10.1002/ett.70360","url":null,"abstract":"<div>\u0000 \u0000 <p>The rise in network intrusions has led to significant consequences, including privacy violations, financial losses, and unauthorized data transfers. Attackers exploit vulnerabilities in network systems, compromising security and disrupting services. Traditional intrusion detection systems (IDS) often face challenges such as false positives, delayed threat identification, and poor detection of minority attack classes. To address these issues, this research proposes advanced deep reinforcement learning with deep learning-based NIDS for improved threat detection and mitigation. Data from IoT-2023, BoT-IoT, CIC-IoT 2023, and RT-IoT 2022 datasets are preprocessed through null value handling, data cleaning, one-hot encoding, and Min-Max normalization. To enhance the detection of minority attacks, the Tabular Auxiliary Classifier Generative Adversarial Network (TACGAN) is employed for synthetic data augmentation. Feature extraction is performed using the Graph Sample and Aggregate Attention Network (GSAAN), which captures basic, content, and traffic-based features. Significant features are selected using the Mountaineering Team-Based Optimization (MTBO). Attack classification is carried out using a novel ensemble of the Improved Double Deep Q-Network (IDDQN) and Deep Autoregression Feature Augmented Bidirectional LSTM (DAF-BiLSTM), which is termed the OptIDQDBiLSTM approach, ensuring robust learning of spatial and temporal dependencies. Hyperparameter tuning is optimized using the Boosted Wild Horse Optimization Algorithm (BWHOA). Experimental results show that the proposed approach outperforms existing IDS methods, achieving higher detection rates, improved accuracy, and a reduced false alarm rate while maintaining computational efficiency. While comparing with existing state of the art approaches, the proposed approach surpasses existing methods with over 99.64% accuracy, 99.34% precision, and 99.42% recall. These findings demonstrate the effectiveness of deep reinforcement learning in enhancing network security against evolving cyber threats.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146091520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Protection for IoT System With Intelligent Swift Scan Quantum-Resilient Intrusion Detection System (ISS-QR-IDS) 智能Swift扫描量子弹性入侵检测系统(ISS-QR-IDS)增强物联网系统防护
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-21 DOI: 10.1002/ett.70331
K. Vinay Bharadwaj, L. Vidya Shree

The Internet of Things (IoT) is particularly vulnerable in this new era, as IoT devices often rely on lightweight encryption and security measures due to their limited processing capabilities and power constraints. Existing signature-based intrusion detection strategies are inadequate against the advanced and adaptive nature of quantum attacks, which can exploit the polymorphic and metamorphic behavior of quantum-enhanced malware. This research addresses the challenges posed by a possible attack scenario named the “Quantum-Enhanced Cloak Malware (QECM) Attack” and aims to provide enhanced protection to IoT systems against this sophisticated threat. The proposed “Intelligent Swift Scan Quantum-Resilient Intrusion Detection System (ISS-QR-IDS)” integrates advanced techniques to enhance detection speed and accuracy, mitigate risks associated with polymorphic and metamorphic malware behaviors, and secure communication channels against quantum threats. The model incorporates the Parallel Vario-Isolation Detector, which combines Variational Autoencoders (VAEs) and Parallelized Isolation Forests to detect quantum-enhanced malware, and Hypergraph Attention Networks (HGA-Net), leveraging Hypergraph Neural Networks (HGNNs) and Graph Attention Networks (GATs) to detect the critical interactions and improve anomaly detection accuracy. Additionally, postquantum cryptographic algorithms like NTRU Encrypt and FALCON ensure secure communication channels and data integrity. By combining these advanced techniques, ISS-QR-IDS aims to provide a robust defense mechanism against sophisticated cyber threats targeting IoT networks, ensuring their security and resilience in the face of quantum computing advancements.

物联网(IoT)在这个新时代尤其脆弱,因为物联网设备由于其有限的处理能力和功率限制,通常依赖于轻量级加密和安全措施。现有的基于签名的入侵检测策略不足以对抗量子攻击的高级和自适应特性,量子攻击可以利用量子增强恶意软件的多态和变形行为。本研究解决了一种名为“量子增强斗篷恶意软件(QECM)攻击”的可能攻击场景所带来的挑战,旨在为物联网系统提供增强的保护,抵御这种复杂的威胁。提出的“智能Swift扫描量子弹性入侵检测系统(ISS-QR-IDS)”集成了先进的技术,以提高检测速度和准确性,降低与多态和变质恶意软件行为相关的风险,并保护通信通道免受量子威胁。该模型结合了并行变分自编码器(VAEs)和并行隔离森林来检测量子增强恶意软件的并行变隔离检测器,以及利用超图神经网络(hgnn)和图注意网络(GATs)来检测关键交互并提高异常检测精度的超图注意网络(HGA-Net)。此外,NTRU Encrypt和FALCON等后量子加密算法确保了通信通道的安全性和数据完整性。通过结合这些先进技术,ISS-QR-IDS旨在为针对物联网网络的复杂网络威胁提供强大的防御机制,确保其在面对量子计算进步时的安全性和弹性。
{"title":"Enhanced Protection for IoT System With Intelligent Swift Scan Quantum-Resilient Intrusion Detection System (ISS-QR-IDS)","authors":"K. Vinay Bharadwaj,&nbsp;L. Vidya Shree","doi":"10.1002/ett.70331","DOIUrl":"https://doi.org/10.1002/ett.70331","url":null,"abstract":"<div>\u0000 \u0000 <p>The Internet of Things (IoT) is particularly vulnerable in this new era, as IoT devices often rely on lightweight encryption and security measures due to their limited processing capabilities and power constraints. Existing signature-based intrusion detection strategies are inadequate against the advanced and adaptive nature of quantum attacks, which can exploit the polymorphic and metamorphic behavior of quantum-enhanced malware. This research addresses the challenges posed by a possible attack scenario named the “Quantum-Enhanced Cloak Malware (QECM) Attack” and aims to provide enhanced protection to IoT systems against this sophisticated threat. The proposed “Intelligent Swift Scan Quantum-Resilient Intrusion Detection System (ISS-QR-IDS)” integrates advanced techniques to enhance detection speed and accuracy, mitigate risks associated with polymorphic and metamorphic malware behaviors, and secure communication channels against quantum threats. The model incorporates the Parallel Vario-Isolation Detector, which combines Variational Autoencoders (VAEs) and Parallelized Isolation Forests to detect quantum-enhanced malware, and Hypergraph Attention Networks (HGA-Net), leveraging Hypergraph Neural Networks (HGNNs) and Graph Attention Networks (GATs) to detect the critical interactions and improve anomaly detection accuracy. Additionally, postquantum cryptographic algorithms like NTRU Encrypt and FALCON ensure secure communication channels and data integrity. By combining these advanced techniques, ISS-QR-IDS aims to provide a robust defense mechanism against sophisticated cyber threats targeting IoT networks, ensuring their security and resilience in the face of quantum computing advancements.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146096461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Deep Learning and Classification Framework for Automatic Traffic Inspection Classification Based on Image Detection 基于图像检测的交通检测自动分类混合深度学习与分类框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-21 DOI: 10.1002/ett.70325
Qingning Chen, Yong Zhao, Xiangsheng Luo, Wanjun He, Guanyu Shi

To address the challenges of false negatives and false positives of small objects and the difficulty of fine-grained behavior recognition in complex traffic scenarios, this paper constructs a hybrid deep learning framework based on image detection to synergistically improve multi-object localization accuracy and semantic understanding capabilities. The framework first uses a combination of Gaussian and bilateral filtering for denoising, enhancing input quality and improving detection sensitivity for small objects. In the detection phase, the YOLOv5s (You Only Look Once 5s) model is used as the baseline. The Convolutional Block Attention Module (CBAM) attention mechanism is applied to enhance the representation of key features. K-means clustering is used to adaptively generate prior anchor boxes that match the scale distribution of objects in traffic scenarios. The CIoU (Complete Intersection over Union) loss function is also used to optimize bounding box regression accuracy, improving small object detection performance while maintaining model lightweight. To achieve fine-grained semantic understanding, a two-branch classification network is designed. The attribute branch uses the ConvNeXt-Tiny (Convolutional Next-Generation Tiny) structure to extract static appearance features, while the event branch utilizes the nonlocal operations module to capture dynamic contextual dependencies. Weighted fusion of these two features enables joint recognition of attributes and behaviors. A GNN-CNN (Graph Neural Network-Convolutional Neural Network) hybrid classification module is also constructed. The GNN models the spatiotemporal interactions between vehicles, while a lightweight CNN extracts local texture features. These features are adaptively fused using the Squeeze-and-Excitation (SE) attention mechanism, and a softmax classifier performs traffic behavior judgment. Experiments show that the YOLOv5s-CBAM model achieves a mean average precision (mAP) of 0.55 for detecting extremely small objects (< 16 × 16). In the overloaded vehicle detection task, the GNN-CNN module achieves accuracy and recall of 0.92 and 0.90, respectively. This hybrid deep learning framework provides reliable technical support for automated traffic inspections. It improves the accuracy and stability of small object detection and fine-grained event recognition in complex traffic scenarios. Its modular design and strong scalability make it widely applicable and conducive to promoting intelligent transportation towards higher levels of automation.

针对复杂交通场景下小目标的假阴性和假阳性以及细粒度行为识别的困难,本文构建了基于图像检测的混合深度学习框架,协同提高多目标定位精度和语义理解能力。该框架首先结合高斯滤波和双边滤波进行去噪,增强输入质量,提高对小物体的检测灵敏度。在检测阶段,使用YOLOv5s (You Only Look Once 5s)模型作为基线。采用卷积块注意模块(CBAM)注意机制来增强关键特征的表示。采用K-means聚类自适应生成匹配交通场景中目标尺度分布的先验锚盒。CIoU (Complete Intersection over Union)损失函数也用于优化边界盒回归精度,在保持模型轻量化的同时提高小目标检测性能。为了实现细粒度的语义理解,设计了一个双分支分类网络。属性分支使用卷积极小结构提取静态外观特征,而事件分支使用非局部操作模块捕获动态上下文依赖关系。这两个特征的加权融合可以实现属性和行为的联合识别。构建了GNN-CNN(图神经网络-卷积神经网络)混合分类模块。GNN对车辆之间的时空相互作用进行建模,而轻量级CNN提取局部纹理特征。这些特征使用挤压和激励(SE)注意机制自适应融合,并使用softmax分类器进行流量行为判断。实验表明,YOLOv5s-CBAM模型在检测极小目标(< 16 × 16)时的平均精度(mAP)为0.55。在超载车辆检测任务中,GNN-CNN模块的准确率和召回率分别达到0.92和0.90。这种混合深度学习框架为自动交通检测提供了可靠的技术支持。提高了复杂交通场景下小目标检测和细粒度事件识别的准确性和稳定性。其模块化设计和强大的可扩展性使其具有广泛的适用性,有利于推动智能交通向更高的自动化水平发展。
{"title":"Hybrid Deep Learning and Classification Framework for Automatic Traffic Inspection Classification Based on Image Detection","authors":"Qingning Chen,&nbsp;Yong Zhao,&nbsp;Xiangsheng Luo,&nbsp;Wanjun He,&nbsp;Guanyu Shi","doi":"10.1002/ett.70325","DOIUrl":"https://doi.org/10.1002/ett.70325","url":null,"abstract":"<div>\u0000 \u0000 <p>To address the challenges of false negatives and false positives of small objects and the difficulty of fine-grained behavior recognition in complex traffic scenarios, this paper constructs a hybrid deep learning framework based on image detection to synergistically improve multi-object localization accuracy and semantic understanding capabilities. The framework first uses a combination of Gaussian and bilateral filtering for denoising, enhancing input quality and improving detection sensitivity for small objects. In the detection phase, the YOLOv5s (You Only Look Once 5s) model is used as the baseline. The Convolutional Block Attention Module (CBAM) attention mechanism is applied to enhance the representation of key features. K-means clustering is used to adaptively generate prior anchor boxes that match the scale distribution of objects in traffic scenarios. The CIoU (Complete Intersection over Union) loss function is also used to optimize bounding box regression accuracy, improving small object detection performance while maintaining model lightweight. To achieve fine-grained semantic understanding, a two-branch classification network is designed. The attribute branch uses the ConvNeXt-Tiny (Convolutional Next-Generation Tiny) structure to extract static appearance features, while the event branch utilizes the nonlocal operations module to capture dynamic contextual dependencies. Weighted fusion of these two features enables joint recognition of attributes and behaviors. A GNN-CNN (Graph Neural Network-Convolutional Neural Network) hybrid classification module is also constructed. The GNN models the spatiotemporal interactions between vehicles, while a lightweight CNN extracts local texture features. These features are adaptively fused using the Squeeze-and-Excitation (SE) attention mechanism, and a softmax classifier performs traffic behavior judgment. Experiments show that the YOLOv5s-CBAM model achieves a mean average precision (mAP) of 0.55 for detecting extremely small objects (&lt; 16 × 16). In the overloaded vehicle detection task, the GNN-CNN module achieves accuracy and recall of 0.92 and 0.90, respectively. This hybrid deep learning framework provides reliable technical support for automated traffic inspections. It improves the accuracy and stability of small object detection and fine-grained event recognition in complex traffic scenarios. Its modular design and strong scalability make it widely applicable and conducive to promoting intelligent transportation towards higher levels of automation.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146091486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Intrusion Detection in Cloud Environments Using Optimized Sparse and Contractive Autoencoders 云环境下使用优化稀疏和压缩自编码器的高效入侵检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-21 DOI: 10.1002/ett.70367
P. Sruthi Mol, N. Sathish Kumar

In recent years, cloud computing has gained enormous development in computing systems. The cloud computing environment provides diverse benefits to its cloud users via the internet including storage, applications, on-demand services, etc. Nowadays, it has been accepted and utilized by various companies for uploading their massive amounts of data to a cloud platform. As a result, various cloud computing-based IDS (CIDS) techniques are developed to prevent a cloud network from attacks and protect the data from internal and external anomalous activities. Despite that, security and privacy concerns remain a significant challenge, which demands an effective methodology to ensure user confidentiality and integrity. Thus, we proposed a Stacked Convolutional and Recurrent Contractive Sparse Autoencoder (SCRCS-AE) and Levy flight and reconstructed mathematical optimization acceleration-based Arithmetic Optimization Algorithm (LRMOA-AOA) for an efficient ID in a cloud environment. In this paper, we stack three SCRCS-AE blocks to extract their features. A single SCRCS-AE block involves a convolutional encoder and recurrent decoder to capture long-term dependencies and rebuild input in forward and reverse directions for excellent feature extraction and classification of different intrusions. The integration of sparse and contractive loss is deployed to extract high-dimensional data features to boost the SCRCS-AE model's generalizability and robustness. The LRMOA-AOA optimization algorithm integrates a Levy flight distribution and arithmetic optimization algorithm (AOA) approach that tunes the hyperparameters to enhance the efficacy of the SCRCS-AE. The proposed SCRCS-AE achieved 98.73% accuracy, 98.46% detection rate, 1.27% false alarm rate, and 98.61% precision on the UNSW-NB15 dataset and attained 97.93% accuracy, 97.74% detection rate, 2.07% false alarm rate, and 97.59% precision on the NSL-KDD dataset. These superior outcomes show that the proposed SCRCS-AE technique works well on CIDS in detecting diverse assaults with higher detection rates and lower false alarm rates to strengthen cloud network security and privacy.

近年来,云计算在计算系统中获得了巨大的发展。云计算环境通过互联网为其云用户提供各种好处,包括存储、应用程序、按需服务等。如今,它已被各种公司接受并利用,用于将大量数据上传到云平台。因此,开发了各种基于云计算的IDS (CIDS)技术,以防止云网络受到攻击,并保护数据免受内部和外部异常活动的影响。尽管如此,安全和隐私问题仍然是一个重大挑战,这需要一种有效的方法来确保用户的机密性和完整性。因此,我们提出了堆叠卷积和循环收缩稀疏自编码器(SCRCS-AE)和Levy飞行,并重构了基于数学优化加速度的算法优化算法(LRMOA-AOA),以实现云环境下的高效ID。在本文中,我们将三个scscs - ae块堆叠以提取其特征。单个SCRCS-AE块包括卷积编码器和循环解码器,以捕获长期依赖关系,并在正向和反向重建输入,以实现出色的特征提取和不同入侵的分类。采用稀疏损失和收缩损失相结合的方法提取高维数据特征,提高了SCRCS-AE模型的泛化性和鲁棒性。LRMOA-AOA优化算法集成了Levy飞行分布和算术优化算法(AOA)方法,通过调整超参数来提高SCRCS-AE的有效性。本文提出的SCRCS-AE在UNSW-NB15数据集上的准确率为98.73%,检出率为98.46%,虚警率为1.27%,精密度为98.61%;在NSL-KDD数据集上的准确率为97.93%,检出率为97.74%,虚警率为2.07%,精密度为97.59%。这些优异的结果表明,本文提出的scscs - ae技术在CIDS上能够很好地检测各种攻击,具有较高的检测率和较低的虚警率,从而增强了云网络的安全性和隐私性。
{"title":"Efficient Intrusion Detection in Cloud Environments Using Optimized Sparse and Contractive Autoencoders","authors":"P. Sruthi Mol,&nbsp;N. Sathish Kumar","doi":"10.1002/ett.70367","DOIUrl":"https://doi.org/10.1002/ett.70367","url":null,"abstract":"<div>\u0000 \u0000 <p>In recent years, cloud computing has gained enormous development in computing systems. The cloud computing environment provides diverse benefits to its cloud users via the internet including storage, applications, on-demand services, etc. Nowadays, it has been accepted and utilized by various companies for uploading their massive amounts of data to a cloud platform. As a result, various cloud computing-based IDS (CIDS) techniques are developed to prevent a cloud network from attacks and protect the data from internal and external anomalous activities. Despite that, security and privacy concerns remain a significant challenge, which demands an effective methodology to ensure user confidentiality and integrity. Thus, we proposed a Stacked Convolutional and Recurrent Contractive Sparse Autoencoder (SCRCS-AE) and Levy flight and reconstructed mathematical optimization acceleration-based Arithmetic Optimization Algorithm (LRMOA-AOA) for an efficient ID in a cloud environment. In this paper, we stack three SCRCS-AE blocks to extract their features. A single SCRCS-AE block involves a convolutional encoder and recurrent decoder to capture long-term dependencies and rebuild input in forward and reverse directions for excellent feature extraction and classification of different intrusions. The integration of sparse and contractive loss is deployed to extract high-dimensional data features to boost the SCRCS-AE model's generalizability and robustness. The LRMOA-AOA optimization algorithm integrates a Levy flight distribution and arithmetic optimization algorithm (AOA) approach that tunes the hyperparameters to enhance the efficacy of the SCRCS-AE. The proposed SCRCS-AE achieved 98.73% accuracy, 98.46% detection rate, 1.27% false alarm rate, and 98.61% precision on the UNSW-NB15 dataset and attained 97.93% accuracy, 97.74% detection rate, 2.07% false alarm rate, and 97.59% precision on the NSL-KDD dataset. These superior outcomes show that the proposed SCRCS-AE technique works well on CIDS in detecting diverse assaults with higher detection rates and lower false alarm rates to strengthen cloud network security and privacy.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146091487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OSAG-Net: Toward Accurate OSA Severity Classification Through Deep Recurrent Learning and Self-Feature Controllable-Black Window Optimization OSAG-Net:通过深度循环学习和自特征可控黑窗优化实现OSA严重程度的准确分类
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-20 DOI: 10.1002/ett.70361
M. Laxman Rao, K. Raja Kumar

Obstructive sleep apnea (OSA) becomes a sleep disease caused by recurrent cessation of breathing during sleep; it also leads to various health complications. Despite the availability of diagnostic methods, there are challenges in accurately identifying and classifying OSA severity. This research addresses the need of an efficient and reliable automated system for OSA detection using deep learning techniques. Existing problems include the complexity of OSA diagnosis, reliance on manual scoring, and variability in interpretation. The proposed OSA grading network (OSAG-Net) encompasses several steps: preprocessing of raw Electrocardiogram (ECG) data to extract relevant features, application of self-feature controllable-black window optimization (SFC-BWO) for feature selection to enhance classification performance, and utilization of bidirectional gated recurrent neural network (BGRNN) architecture with recurrent neural networks (RNN) and bidirectional gated recurrent units (Bi-GRU) for OSA severity classification. Preprocessing involves filtering noise and artifacts from ECG signals, followed by segmenting data into smaller windows to extract informative features. The SFC-BWO technique optimally selects the features by iteratively refining feature subsets based on classification performance, effectively reducing dimensionality and enhancing model interpretability. The RNN architecture with Bi-GRU units is employed to capture temporal dependencies of sequential data, such as ECG recordings, enabling more accurate classification of OSA severity levels. Finally, the performance of the system is validated with different metrics. Hence, the proposed OSAG-Net model achieves a high accuracy value of more than 4.77% of SVM, 3.67% compared to Grad-CAM, and 2.54% of CNN-LSTM, respectively. This results in improvement in the system proves that it rapidly and effectively diagnoses the disease and treats the patients accordingly.

阻塞性睡眠呼吸暂停(OSA)成为一种睡眠疾病,由睡眠时反复停止呼吸引起;它还会导致各种健康并发症。尽管有可用的诊断方法,但在准确识别和分类OSA严重程度方面存在挑战。本研究解决了使用深度学习技术进行OSA检测的高效可靠的自动化系统的需求。存在的问题包括OSA诊断的复杂性、依赖人工评分和解释的可变性。提出的OSA分级网络(OSAG-Net)包括以下几个步骤:对原始心电图(ECG)数据进行预处理以提取相关特征;应用自特征可控黑窗优化(SFC-BWO)进行特征选择以提高分类性能;利用双向门控递归神经网络(BGRNN)架构,结合递归神经网络(RNN)和双向门控递归单元(Bi-GRU)进行OSA严重程度分类。预处理包括从心电信号中过滤噪声和伪影,然后将数据分割成更小的窗口以提取信息特征。SFC-BWO技术基于分类性能,通过迭代细化特征子集来优选特征,有效地降低了维数,增强了模型的可解释性。采用带有Bi-GRU单元的RNN架构来捕获序列数据(如ECG记录)的时间依赖性,从而更准确地分类OSA严重程度。最后,用不同的指标对系统的性能进行了验证。因此,所提出的OSAG-Net模型的准确率分别高于SVM的4.77%、Grad-CAM的3.67%和CNN-LSTM的2.54%。结果表明,该系统能够快速有效地诊断疾病并对患者进行相应的治疗。
{"title":"OSAG-Net: Toward Accurate OSA Severity Classification Through Deep Recurrent Learning and Self-Feature Controllable-Black Window Optimization","authors":"M. Laxman Rao,&nbsp;K. Raja Kumar","doi":"10.1002/ett.70361","DOIUrl":"https://doi.org/10.1002/ett.70361","url":null,"abstract":"<p>Obstructive sleep apnea (OSA) becomes a sleep disease caused by recurrent cessation of breathing during sleep; it also leads to various health complications. Despite the availability of diagnostic methods, there are challenges in accurately identifying and classifying OSA severity. This research addresses the need of an efficient and reliable automated system for OSA detection using deep learning techniques. Existing problems include the complexity of OSA diagnosis, reliance on manual scoring, and variability in interpretation. The proposed OSA grading network (OSAG-Net) encompasses several steps: preprocessing of raw Electrocardiogram (ECG) data to extract relevant features, application of self-feature controllable-black window optimization (SFC-BWO) for feature selection to enhance classification performance, and utilization of bidirectional gated recurrent neural network (BGRNN) architecture with recurrent neural networks (RNN) and bidirectional gated recurrent units (Bi-GRU) for OSA severity classification. Preprocessing involves filtering noise and artifacts from ECG signals, followed by segmenting data into smaller windows to extract informative features. The SFC-BWO technique optimally selects the features by iteratively refining feature subsets based on classification performance, effectively reducing dimensionality and enhancing model interpretability. The RNN architecture with Bi-GRU units is employed to capture temporal dependencies of sequential data, such as ECG recordings, enabling more accurate classification of OSA severity levels. Finally, the performance of the system is validated with different metrics. Hence, the proposed OSAG-Net model achieves a high accuracy value of more than 4.77% of SVM, 3.67% compared to Grad-CAM, and 2.54% of CNN-LSTM, respectively. This results in improvement in the system proves that it rapidly and effectively diagnoses the disease and treats the patients accordingly.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146002354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Enhanced Hierarchical Federated Learning for Efficient and Scalable Communication in the Internet of Vehicles 区块链增强的分层联邦学习在车联网中的高效和可扩展通信
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-19 DOI: 10.1002/ett.70359
Wenjie Long, Lejun Zhang, Juxia Li, Ran Guo

The Internet of Vehicles (IoV) collects real-time data on traffic, environmental conditions, and vehicle behavior through vehicle interconnection and interaction with infrastructure, providing support for the of Machine Learning (ML) in intelligent decision-making. However, centralized learning approaches suffer from issues like privacy leakage and high communication costs. Federated Learning (FL) addresses these issues by sharing local model updates, but in IoV environments, challenges such as data heterogeneity result in slow convergence, limited communication resources, and security threats like gradient leakage. To tackle these challenges, this paper proposes Adaptive Blockchain-based Hierarchical Federated Learning with Gradient Alignment (ABHFL). ABHFL groups vehicle nodes and RSUs into a hierarchical structure to perform local training, gradient alignment, and model aggregation at different levels. The proposed Adaptive Gradient Alignment (AGA) mechanism aligns the update directions of nodes towards the global optimal direction through multiple rounds of alignment after local gradient computation, accelerating model convergence and ensuring that the gradients uploaded contribute positively to global optimization. In addition, a lightweight Proof-of-Gradient-Alignment (PoGA) consensus mechanism is designed, which performs two-stage verification of the uploaded gradients and integrates reputation scores and blockchain storage to guarantee gradient reliability and protect against attacks. Extensive experiments demonstrate that ABHFL significantly improves model convergence, communication efficiency, and security reliability, providing an effective and robust solution for FL in IoV scenarios.

车联网(IoV)通过车辆互联和与基础设施的交互,收集交通、环境状况和车辆行为的实时数据,为机器学习(ML)的智能决策提供支持。然而,集中式学习方法存在隐私泄露和高通信成本等问题。联邦学习(FL)通过共享本地模型更新来解决这些问题,但在车联网环境中,数据异构等挑战会导致缓慢的收敛、有限的通信资源以及梯度泄漏等安全威胁。为了应对这些挑战,本文提出了基于自适应区块链的梯度对齐分层联邦学习(ABHFL)。ABHFL将车辆节点和rsu分组成层次结构,在不同层次上进行局部训练、梯度对齐和模型聚合。提出的自适应梯度对齐(Adaptive Gradient Alignment, AGA)机制在局部梯度计算后,通过多轮对齐,将节点的更新方向对准全局最优方向,加快模型收敛速度,保证上传的梯度对全局优化有积极的贡献。此外,设计了轻量级的PoGA (Proof-of-Gradient-Alignment)共识机制,该机制对上传的梯度进行两阶段验证,并集成了信誉评分和区块链存储,以保证梯度的可靠性并防止攻击。大量实验表明,ABHFL显著提高了模型收敛性、通信效率和安全可靠性,为车联网场景下的FL提供了有效且稳健的解决方案。
{"title":"Blockchain-Enhanced Hierarchical Federated Learning for Efficient and Scalable Communication in the Internet of Vehicles","authors":"Wenjie Long,&nbsp;Lejun Zhang,&nbsp;Juxia Li,&nbsp;Ran Guo","doi":"10.1002/ett.70359","DOIUrl":"https://doi.org/10.1002/ett.70359","url":null,"abstract":"<div>\u0000 \u0000 <p>The Internet of Vehicles (IoV) collects real-time data on traffic, environmental conditions, and vehicle behavior through vehicle interconnection and interaction with infrastructure, providing support for the of Machine Learning (ML) in intelligent decision-making. However, centralized learning approaches suffer from issues like privacy leakage and high communication costs. Federated Learning (FL) addresses these issues by sharing local model updates, but in IoV environments, challenges such as data heterogeneity result in slow convergence, limited communication resources, and security threats like gradient leakage. To tackle these challenges, this paper proposes Adaptive Blockchain-based Hierarchical Federated Learning with Gradient Alignment (ABHFL). ABHFL groups vehicle nodes and RSUs into a hierarchical structure to perform local training, gradient alignment, and model aggregation at different levels. The proposed Adaptive Gradient Alignment (AGA) mechanism aligns the update directions of nodes towards the global optimal direction through multiple rounds of alignment after local gradient computation, accelerating model convergence and ensuring that the gradients uploaded contribute positively to global optimization. In addition, a lightweight Proof-of-Gradient-Alignment (PoGA) consensus mechanism is designed, which performs two-stage verification of the uploaded gradients and integrates reputation scores and blockchain storage to guarantee gradient reliability and protect against attacks. Extensive experiments demonstrate that ABHFL significantly improves model convergence, communication efficiency, and security reliability, providing an effective and robust solution for FL in IoV scenarios.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146002285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Power and Delay Optimization Based Resource Allocation in Mu-MIMO-OFDM System Using Optimized Enhanced Elman Spiking Sparse Graph Neural Network 基于优化增强Elman尖峰稀疏图神经网络的Mu-MIMO-OFDM系统联合功率和延迟优化资源分配
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-18 DOI: 10.1002/ett.70337
Shivakumar Kagi, Kothapalli Ramesh Chandra, Sree krishnan Sreethar, Muthukumaran Dhakshnamoorthy

In general, multi-user multiple input multiple output orthogonal frequency division multiplexing (MU-MIMO-OFDM) allows multiple users to interconnect to a base station simultaneously using OFDM modulation and various antennas. However, managing resources like energy and minimizing delays is difficult, requiring smart solutions for smooth operation and better performance. Thus, a joint power and delay optimization based resource allocation using Enhanced Elman Spiking Sparse Graph Networks (EESS-Gnet) with Humboldt Squid Optimization Algorithm (HSOA) and Reuse-Based Online Joint Routing Scheduling Optimization (ROJR) (EESS-GNet-HSOA-ROJR) in MU-MIMO-OFDM system is proposed in this manuscript. The proposed mechanism is performed in two stages that are power allocation and delay optimization. The goal of the first phase is to maximize throughput by allocating network resources to user equipments (UEs) based on transmission rate and power through an EESS-Gnet. In order to reduce the loss function, HSOA is proposed to optimize the layers of EESS-Gnet. In the second stage, ROJR is proposed for optimizing delay in the MU-MIMO-OFDM system. In the ROJR approach, the delay bound value is estimated by scheduling the transmission flows in the channel. The simulations of EESS-GNet-HSOA-ROJR were conducted using MATLAB software. The suggested resource allocation algorithm's performance is assessed and contrasted with the current method of measuring different QoS metrics, including throughput, delay, fairness index, power consumption, spectrum capacity, and loss rate. Thus, the proposed approach has attained 26.46%, 23.09%, and 21.98% higher throughput, 29.78%, 26.86%, and 20.25% improved energy efficiency, 17.45%, 15.98%, and 14.02% lower processing time, and 27.89%, 34.87%, and 23.56% lower loss rate than other conventional approaches like PDO-URA, PCO-OBT, and ADNN-ALSTM-TRDA methods respectively.

一般来说,多用户多输入多输出正交频分复用(MU-MIMO-OFDM)允许多个用户使用OFDM调制和各种天线同时互连到基站。然而,管理能源和最小化延迟等资源是困难的,需要智能解决方案来实现平稳运行和更好的性能。因此,本文提出了一种基于功率和延迟联合优化的MU-MIMO-OFDM系统资源分配方法,该方法采用基于Humboldt Squid优化算法(HSOA)的增强型Elman峰值稀疏图网络(EESS-Gnet)和基于重用的在线联合路由调度优化(ROJR) (EESS-Gnet -HSOA-ROJR)。该机制分为功率分配和时延优化两个阶段。第一阶段的目标是通过EESS-Gnet根据传输速率和功率将网络资源分配给用户设备(ue),从而实现吞吐量最大化。为了减小损失函数,提出了对EESS-Gnet层进行优化的HSOA。在第二阶段,提出了用于优化MU-MIMO-OFDM系统延迟的ROJR。在ROJR方法中,通过调度信道中的传输流来估计延迟边界值。利用MATLAB软件对EESS-GNet-HSOA-ROJR进行了仿真。对所建议的资源分配算法的性能进行了评估,并与当前测量不同QoS指标(包括吞吐量、延迟、公平指数、功耗、频谱容量和损失率)的方法进行了对比。与PDO-URA、PCO-OBT和ADNN-ALSTM-TRDA方法相比,该方法的吞吐量分别提高了26.46%、23.09%和21.98%,能效分别提高了29.78%、26.86%和20.25%,处理时间分别降低了17.45%、15.98%和14.02%,损失率分别降低了27.89%、34.87%和23.56%。
{"title":"Joint Power and Delay Optimization Based Resource Allocation in Mu-MIMO-OFDM System Using Optimized Enhanced Elman Spiking Sparse Graph Neural Network","authors":"Shivakumar Kagi,&nbsp;Kothapalli Ramesh Chandra,&nbsp;Sree krishnan Sreethar,&nbsp;Muthukumaran Dhakshnamoorthy","doi":"10.1002/ett.70337","DOIUrl":"https://doi.org/10.1002/ett.70337","url":null,"abstract":"<div>\u0000 \u0000 <p>In general, multi-user multiple input multiple output orthogonal frequency division multiplexing (MU-MIMO-OFDM) allows multiple users to interconnect to a base station simultaneously using OFDM modulation and various antennas. However, managing resources like energy and minimizing delays is difficult, requiring smart solutions for smooth operation and better performance. Thus, a joint power and delay optimization based resource allocation using Enhanced Elman Spiking Sparse Graph Networks (EESS-Gnet) with Humboldt Squid Optimization Algorithm (HSOA) and Reuse-Based Online Joint Routing Scheduling Optimization (ROJR) (EESS-GNet-HSOA-ROJR) in MU-MIMO-OFDM system is proposed in this manuscript. The proposed mechanism is performed in two stages that are power allocation and delay optimization. The goal of the first phase is to maximize throughput by allocating network resources to user equipments (UEs) based on transmission rate and power through an EESS-Gnet. In order to reduce the loss function, HSOA is proposed to optimize the layers of EESS-Gnet. In the second stage, ROJR is proposed for optimizing delay in the MU-MIMO-OFDM system. In the ROJR approach, the delay bound value is estimated by scheduling the transmission flows in the channel. The simulations of EESS-GNet-HSOA-ROJR were conducted using MATLAB software. The suggested resource allocation algorithm's performance is assessed and contrasted with the current method of measuring different QoS metrics, including throughput, delay, fairness index, power consumption, spectrum capacity, and loss rate. Thus, the proposed approach has attained 26.46%, 23.09%, and 21.98% higher throughput, 29.78%, 26.86%, and 20.25% improved energy efficiency, 17.45%, 15.98%, and 14.02% lower processing time, and 27.89%, 34.87%, and 23.56% lower loss rate than other conventional approaches like PDO-URA, PCO-OBT, and ADNN-ALSTM-TRDA methods respectively.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146002412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1