首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
An Integrated Machine Learning Framework for Power Data Security and Misbehavior Detection in Next-Generation VANETs 下一代VANETs中电力数据安全和错误行为检测的集成机器学习框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-29 DOI: 10.1002/ett.70373
Zhiqi Li, Yang Yang, Xiaolei Liu, Bo Shi

Future generation Vehicular Ad-hoc Networks (VANETs) models primarily consider continuous power-aware communication to support Intelligent Transportation Systems (ITS) in exchanging diverse sensitive vehicular information. Existing systems often struggle to capture hidden misbehaviors, particularly in power-domain parameters such as abnormal power transmission, unexpected power changes, and malicious increases in signal strength. These threats disrupt sensitive vehicular communication and real-time vehicle coordination. This study aims to develop a lightweight, power-aware malicious-detection framework capable of identifying hidden, short-term power-domain attacks in resource-constrained VANET environments. To address these challenges, this study proposes a novel integrated machine learning (IML) framework that combines the strength of Feather Layer Perceptron (FLP) for feature encoding with a Dense Tree Module (DTM) for effective decision-making and Tiny-LSTM with the Endomode Sliding Window Approach to quickly analyze short-term changes in vehicle power signals. The suggested system is a future-expected green model that can efficiently analyze multidimensional power features in low-computation mode to identify malicious power patterns. The model is simulated using two distinct datasets: Secure VANET Vehicle Dataset and “The Indoor Localization Dataset,” both adapted from a public repository, which capture vehicular communication, power-related features, and motion information under everyday and attack scenarios. It also provides additional signal-based measurements and environmental features to enhance feature diversity. To improve the simulation, we consider additional synthetic features. Experimental results demonstrate that the proposed IML model achieves 99.7% test detection accuracy on standard P-OBU power data and maintains 97.6% accuracy under noisy power-domain inputs. By leveraging these advantages, the proposed framework effectively enhances power-domain security in VANETs by accurately detecting anomalies under realistic, noisy conditions. Also, it provides a scalable solution for next-generation intelligent vehicular networks.

未来一代车辆自组织网络(VANETs)模型主要考虑持续的功率感知通信,以支持智能交通系统(ITS)交换各种敏感的车辆信息。现有系统常常难以捕捉隐藏的错误行为,特别是在功率域参数中,如异常的功率传输、意外的功率变化和信号强度的恶意增加。这些威胁破坏了敏感的车辆通信和实时车辆协调。本研究旨在开发一种轻量级、功率感知的恶意检测框架,能够在资源受限的VANET环境中识别隐藏的短期功率域攻击。为了应对这些挑战,本研究提出了一种新的集成机器学习(IML)框架,该框架将羽毛层感知器(FLP)用于特征编码的强度与用于有效决策的密集树模块(DTM)相结合,并将微型lstm与Endomode滑动窗口方法相结合,以快速分析车辆功率信号的短期变化。该系统是一种未来预期的绿色模型,可以在低计算模式下有效地分析多维功率特征以识别恶意功率模式。该模型使用两个不同的数据集进行模拟:安全VANET车辆数据集和“室内定位数据集”,这两个数据集都改编自公共存储库,用于捕获车辆通信、电源相关特征以及日常和攻击场景下的运动信息。它还提供了额外的基于信号的测量和环境特征,以增强特征多样性。为了改进仿真,我们考虑了额外的合成特征。实验结果表明,该模型在标准P-OBU功率数据上的测试检测精度达到99.7%,在噪声功率域输入下的测试检测精度保持在97.6%。利用这些优势,所提出的框架通过在真实的噪声条件下准确检测异常,有效地增强了VANETs的功率域安全性。此外,它还为下一代智能车辆网络提供了可扩展的解决方案。
{"title":"An Integrated Machine Learning Framework for Power Data Security and Misbehavior Detection in Next-Generation VANETs","authors":"Zhiqi Li,&nbsp;Yang Yang,&nbsp;Xiaolei Liu,&nbsp;Bo Shi","doi":"10.1002/ett.70373","DOIUrl":"https://doi.org/10.1002/ett.70373","url":null,"abstract":"<div>\u0000 \u0000 <p>Future generation Vehicular Ad-hoc Networks (VANETs) models primarily consider continuous power-aware communication to support Intelligent Transportation Systems (ITS) in exchanging diverse sensitive vehicular information. Existing systems often struggle to capture hidden misbehaviors, particularly in power-domain parameters such as abnormal power transmission, unexpected power changes, and malicious increases in signal strength. These threats disrupt sensitive vehicular communication and real-time vehicle coordination. This study aims to develop a lightweight, power-aware malicious-detection framework capable of identifying hidden, short-term power-domain attacks in resource-constrained VANET environments. To address these challenges, this study proposes a novel integrated machine learning (IML) framework that combines the strength of Feather Layer Perceptron (FLP) for feature encoding with a Dense Tree Module (DTM) for effective decision-making and Tiny-LSTM with the Endomode Sliding Window Approach to quickly analyze short-term changes in vehicle power signals. The suggested system is a future-expected green model that can efficiently analyze multidimensional power features in low-computation mode to identify malicious power patterns. The model is simulated using two distinct datasets: Secure VANET Vehicle Dataset and “The Indoor Localization Dataset,” both adapted from a public repository, which capture vehicular communication, power-related features, and motion information under everyday and attack scenarios. It also provides additional signal-based measurements and environmental features to enhance feature diversity. To improve the simulation, we consider additional synthetic features. Experimental results demonstrate that the proposed IML model achieves 99.7% test detection accuracy on standard P-OBU power data and maintains 97.6% accuracy under noisy power-domain inputs. By leveraging these advantages, the proposed framework effectively enhances power-domain security in VANETs by accurately detecting anomalies under realistic, noisy conditions. Also, it provides a scalable solution for next-generation intelligent vehicular networks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146199458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frequency Domain and Cross-Frame Connections for Multi-Object Tracking of Small Targets in Satellite Imagery 卫星图像中小目标多目标跟踪的频域和跨帧连接
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-29 DOI: 10.1002/ett.70355
M. V. Nageswara Rao, T. V. V. Satyanarayana, Tummala Aravinda Babu, Karna Vishnu Vardhana Reddy, D. Venkat Reddy

Satellite-based video surveillance, sometimes known as “gazing,” is extremely useful for viewing, evaluating, and dynamically tracking developments on Earth. However, the tiny size and density of objects, overlapping targets, and unclear surroundings with variable illumination and complex backdrops make multi-object tracking in satellite movies particularly difficult. Limitations in bandwidth and computational capacity made accurate tracking and real-time processing increasingly challenging. Applications, including disaster response, traffic monitoring, defense, and security operations, depend on overcoming these obstacles. This work offers a novel framework to address these difficulties by merging sophisticated cross-frame connection techniques with frequency domain analysis using wavelet transform analysis. By separating high-frequency components and reducing noise, the wavelet transform improves the identification of small targets and makes it possible to recover fine-grained spatial and frequency data that are essential for reliable tracking. The system uses motion models and data association techniques to guarantee trajectory correctness and consistency, and it integrates cross-frame connections to create temporal continuity and preserve target identities over successive frames. The experimental results show significant increases in tracking performance, outperforming state-of-the-art methods in terms of multiple object tracking accuracy (MOTA), multiple object tracking precision (MOTP), and high tracking accuracy. These results demonstrate this proposed model's resilience and effectiveness in accurately identifying and following small targets in challenging satellite imagery settings. The accuracy achieved by the proposed method for the VISO, SATMTB, and Skysat-1 datasets is 96.82%, 95.26%, and 95.90%, respectively.

基于卫星的视频监控,有时被称为“凝视”,对于观察、评估和动态跟踪地球上的发展非常有用。然而,物体的微小尺寸和密度、目标的重叠、环境的不清晰、光照的变化和背景的复杂,使得卫星电影中的多目标跟踪尤为困难。带宽和计算能力的限制使得精确跟踪和实时处理越来越具有挑战性。包括灾难响应、交通监控、防御和安全操作在内的应用都依赖于克服这些障碍。这项工作提供了一个新的框架,通过融合复杂的跨帧连接技术和使用小波变换分析的频域分析来解决这些困难。通过分离高频成分和降低噪声,小波变换提高了对小目标的识别,使恢复可靠跟踪所必需的细粒度空间和频率数据成为可能。该系统使用运动模型和数据关联技术来保证轨迹的正确性和一致性,并集成跨帧连接来创建时间连续性,并在连续帧中保持目标身份。实验结果表明,该方法的跟踪性能显著提高,在多目标跟踪精度(MOTA)、多目标跟踪精度(MOTP)和高跟踪精度方面优于现有方法。这些结果证明了该模型在具有挑战性的卫星图像设置中准确识别和跟踪小目标的弹性和有效性。该方法在VISO、SATMTB和Skysat-1数据集上的精度分别为96.82%、95.26%和95.90%。
{"title":"Frequency Domain and Cross-Frame Connections for Multi-Object Tracking of Small Targets in Satellite Imagery","authors":"M. V. Nageswara Rao,&nbsp;T. V. V. Satyanarayana,&nbsp;Tummala Aravinda Babu,&nbsp;Karna Vishnu Vardhana Reddy,&nbsp;D. Venkat Reddy","doi":"10.1002/ett.70355","DOIUrl":"https://doi.org/10.1002/ett.70355","url":null,"abstract":"<div>\u0000 \u0000 <p>Satellite-based video surveillance, sometimes known as “gazing,” is extremely useful for viewing, evaluating, and dynamically tracking developments on Earth. However, the tiny size and density of objects, overlapping targets, and unclear surroundings with variable illumination and complex backdrops make multi-object tracking in satellite movies particularly difficult. Limitations in bandwidth and computational capacity made accurate tracking and real-time processing increasingly challenging. Applications, including disaster response, traffic monitoring, defense, and security operations, depend on overcoming these obstacles. This work offers a novel framework to address these difficulties by merging sophisticated cross-frame connection techniques with frequency domain analysis using wavelet transform analysis. By separating high-frequency components and reducing noise, the wavelet transform improves the identification of small targets and makes it possible to recover fine-grained spatial and frequency data that are essential for reliable tracking. The system uses motion models and data association techniques to guarantee trajectory correctness and consistency, and it integrates cross-frame connections to create temporal continuity and preserve target identities over successive frames. The experimental results show significant increases in tracking performance, outperforming state-of-the-art methods in terms of multiple object tracking accuracy (MOTA), multiple object tracking precision (MOTP), and high tracking accuracy. These results demonstrate this proposed model's resilience and effectiveness in accurately identifying and following small targets in challenging satellite imagery settings. The accuracy achieved by the proposed method for the VISO, SATMTB, and Skysat-1 datasets is 96.82%, 95.26%, and 95.90%, respectively.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146193685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework for Task Offloading in O-RAN Architecture for Heterogeneous Computing Applications 面向异构计算应用的O-RAN架构任务卸载框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-29 DOI: 10.1002/ett.70354
Samira Taheri, Neda Moghim, Naser Movahhedinia, Sachin Shetty

Computational offloading transfers tasks from resource-constrained devices to more capable servers or cloud platforms, improving processing speed and user experience. Open radio access networks (O-RAN's) disaggregated architecture and open interfaces make it suitable for offloading delay-sensitive tasks, enhancing real-time application performance. This study focuses on task offloading in O-RAN, a reference network architecture. Although research on O-RAN is limited, existing work lacks a comprehensive approach to offloading, including offloading layer determination, node selection, and resource allocation based on task types and their latency needs. We propose a delay-aware task offloading framework within O-RAN to support diverse delay requirements, improving offloading efficiency. To address this, we introduce COOR (Computation Offloading for O-RAN), a centralized approach that leverages network-wide data. Using Genetic Algorithms (GA), we manage computational complexity effectively. Simulation results show COOR's superior performance in reducing latency.

计算卸载将任务从资源受限的设备转移到功能更强大的服务器或云平台,从而提高处理速度和用户体验。开放的无线接入网络(O-RAN)的分解架构和开放的接口使其适合于卸载对延迟敏感的任务,提高应用程序的实时性。本文主要研究了参考网络架构O-RAN中的任务卸载问题。尽管对O-RAN的研究有限,但现有工作缺乏一种综合的卸载方法,包括基于任务类型及其延迟需求的卸载层确定、节点选择和资源分配。我们提出了一个时延感知的O-RAN任务卸载框架,以支持不同的延迟需求,提高卸载效率。为了解决这个问题,我们引入了COOR (O-RAN计算卸载),这是一种利用网络范围数据的集中方法。利用遗传算法(GA)有效地管理计算复杂度。仿真结果表明,COOR在降低延迟方面具有优异的性能。
{"title":"Framework for Task Offloading in O-RAN Architecture for Heterogeneous Computing Applications","authors":"Samira Taheri,&nbsp;Neda Moghim,&nbsp;Naser Movahhedinia,&nbsp;Sachin Shetty","doi":"10.1002/ett.70354","DOIUrl":"https://doi.org/10.1002/ett.70354","url":null,"abstract":"<p>Computational offloading transfers tasks from resource-constrained devices to more capable servers or cloud platforms, improving processing speed and user experience. Open radio access networks (O-RAN's) disaggregated architecture and open interfaces make it suitable for offloading delay-sensitive tasks, enhancing real-time application performance. This study focuses on task offloading in O-RAN, a reference network architecture. Although research on O-RAN is limited, existing work lacks a comprehensive approach to offloading, including offloading layer determination, node selection, and resource allocation based on task types and their latency needs. We propose a delay-aware task offloading framework within O-RAN to support diverse delay requirements, improving offloading efficiency. To address this, we introduce COOR (Computation Offloading for O-RAN), a centralized approach that leverages network-wide data. Using Genetic Algorithms (GA), we manage computational complexity effectively. Simulation results show COOR's superior performance in reducing latency.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70354","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146199463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning-Driven Intrusion Detection Systems for Anomaly Detection in Vehicular Ad-Hoc Networks 车辆自组织网络异常检测的机器学习驱动入侵检测系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-28 DOI: 10.1002/ett.70363
T. Ragunthar, S. Annie Christila, B. Jyoshna, L. Meenachi, Subhranginee Das, Pramoda Patro

In Intelligent Transportation Systems, Vehicular Ad-hoc Networks (VANETs) provide real-time vehicle-infrastructure communication. VANETs may be attacked via denial-of-service, Sybil, and spoofing due to its open wireless medium and changeable topology. In dynamic vehicle contexts, signature-based intrusion detection systems (IDSs) fail to identify novel threats, while anomaly-based techniques have high false alarm rates and limited scalability. The Machine Learning-based Vehicular Intrusion Detection System (ML-VIDS) combines unsupervised clustering for zero-day anomaly detection and supervised learning for known attack categorization. The method improves detection accuracy and edge deployment efficiency via temporal traffic analysis and feature selection. On benchmark VANET datasets, ML-VIDS beats comparable IDS systems with 97.8% detection accuracy, 6% false positive rate, 15 ms latency, 65% lower computational overhead, and 30 W energy utilization. In next-generation intelligent transportation systems, ML-VIDS enables adaptive and resource-efficient intrusion detection for VANETs to provide strong performance and real-time security.

在智能交通系统中,车辆自组织网络(vanet)提供车辆与基础设施的实时通信。由于其开放的无线介质和多变的拓扑结构,vanet可能会受到拒绝服务、欺骗和欺骗等攻击。在动态车辆环境中,基于签名的入侵检测系统(ids)无法识别新的威胁,而基于异常的技术具有高误报率和有限的可扩展性。基于机器学习的车辆入侵检测系统(ML-VIDS)结合无监督聚类进行零日异常检测和监督学习进行已知攻击分类。该方法通过实时流量分析和特征选择,提高了检测精度和边缘部署效率。在基准VANET数据集上,ML-VIDS以97.8%的检测准确率、6%的误报率、15 ms的延迟、65%的计算开销和30 W的能源利用率击败了可比的IDS系统。在下一代智能交通系统中,ML-VIDS为vanet提供自适应和资源高效的入侵检测,以提供强大的性能和实时安全性。
{"title":"Machine Learning-Driven Intrusion Detection Systems for Anomaly Detection in Vehicular Ad-Hoc Networks","authors":"T. Ragunthar,&nbsp;S. Annie Christila,&nbsp;B. Jyoshna,&nbsp;L. Meenachi,&nbsp;Subhranginee Das,&nbsp;Pramoda Patro","doi":"10.1002/ett.70363","DOIUrl":"https://doi.org/10.1002/ett.70363","url":null,"abstract":"<div>\u0000 \u0000 <p>In Intelligent Transportation Systems, Vehicular Ad-hoc Networks (VANETs) provide real-time vehicle-infrastructure communication. VANETs may be attacked via denial-of-service, Sybil, and spoofing due to its open wireless medium and changeable topology. In dynamic vehicle contexts, signature-based intrusion detection systems (IDSs) fail to identify novel threats, while anomaly-based techniques have high false alarm rates and limited scalability. The Machine Learning-based Vehicular Intrusion Detection System (ML-VIDS) combines unsupervised clustering for zero-day anomaly detection and supervised learning for known attack categorization. The method improves detection accuracy and edge deployment efficiency via temporal traffic analysis and feature selection. On benchmark VANET datasets, ML-VIDS beats comparable IDS systems with 97.8% detection accuracy, 6% false positive rate, 15 ms latency, 65% lower computational overhead, and 30 W energy utilization. In next-generation intelligent transportation systems, ML-VIDS enables adaptive and resource-efficient intrusion detection for VANETs to provide strong performance and real-time security.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146193635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Three-Dimensional Autonomous Obstacle Avoidance Path Planning Methods for UAVs 无人机三维自主避障路径规划方法研究
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-28 DOI: 10.1002/ett.70366
Chong Wu, Hao Cheng, Hua Wang

With the advancement of science and technology and the rapid development of the socio-economy, unmanned aerial vehicles (UAVs) are playing an increasingly important role in daily economic activities. In civilian applications, UAVs can perform tasks such as high-voltage power line and oil pipeline inspections, as well as logistics transportation. In the military domain, they are widely used for logistics supply and delivery, battlefield situational monitoring, and reconnaissance in complex environments. Therefore, research on three-dimensional (3D) obstacle-avoidance autonomous path planning for UAVs has significant practical engineering applications. This paper proposes a deep reinforcement learning (DRL)–improved mayfly algorithm (IMA) for UAV autonomous obstacle-avoidance path planning. Considering the limitations of the mayfly algorithm (MA), such as the high randomness in initial population generation and slow convergence speed during iteration, Halton sequences and an adaptive Gaussian–Cauchy mutation strategy are introduced to balance the global exploration and local optimization capabilities of the MA. Furthermore, recognizing that the IMA still cannot overcome inherent drawbacks of swarm intelligence algorithms, such as the random selection of mutation strategy probability distributions and the lack of individual strategy optimization due to simultaneous group strategy optimization, this paper applies the deep deterministic policy gradient (DDPG) algorithm from DRL to update the population positions in the IMA. This further enhances the algorithm's optimization performance, convergence ability, and computational efficiency, thereby achieving autonomous obstacle-avoidance path planning for UAVs. The performance of the 3D UAV paths optimized by the traditional MA, the IMA, and the DRL–IMA is compared to validate the effectiveness of the proposed algorithm. The simulation's output indicates that the introduced DRL–IMA brings down the average fitness value to 0.05022 after 600 iterations and it takes just 72 generations to converge. This shows that the new method not only converges faster but also has better stability than both the old and modern MAs.

随着科学技术的进步和社会经济的快速发展,无人机在日常经济活动中发挥着越来越重要的作用。在民用应用中,无人机可以执行高压输电线和石油管道检查以及物流运输等任务。在军事领域,它们被广泛用于复杂环境下的后勤供应和交付、战场态势监测和侦察。因此,研究无人机三维避障自主路径规划具有重要的实际工程应用价值。提出了一种用于无人机自主避障路径规划的深度强化学习(DRL)改进的蜉蝣算法(IMA)。针对蜉蝣算法初始种群生成随机性大、迭代收敛速度慢等局限性,引入Halton序列和自适应高斯-柯西突变策略,平衡了蜉蝣算法的全局搜索能力和局部寻优能力。此外,考虑到群体智能算法仍然不能克服群体智能算法固有的缺陷,如突变策略概率分布的随机选择以及群体策略同步优化导致个体策略优化不足,本文采用DRL的深度确定性策略梯度(DDPG)算法来更新群体在群体智能算法中的位置。这进一步提高了算法的优化性能、收敛能力和计算效率,从而实现了无人机自主避障路径规划。通过对传统遗传算法、遗传算法和drl -遗传算法优化的无人机路径性能进行比较,验证了算法的有效性。仿真结果表明,引入的DRL-IMA经过600次迭代后,将平均适应度值降低到0.05022,只需72代即可收敛。这表明新方法不仅收敛速度快,而且比旧的和现代的MAs都有更好的稳定性。
{"title":"Research on Three-Dimensional Autonomous Obstacle Avoidance Path Planning Methods for UAVs","authors":"Chong Wu,&nbsp;Hao Cheng,&nbsp;Hua Wang","doi":"10.1002/ett.70366","DOIUrl":"https://doi.org/10.1002/ett.70366","url":null,"abstract":"<p>With the advancement of science and technology and the rapid development of the socio-economy, unmanned aerial vehicles (UAVs) are playing an increasingly important role in daily economic activities. In civilian applications, UAVs can perform tasks such as high-voltage power line and oil pipeline inspections, as well as logistics transportation. In the military domain, they are widely used for logistics supply and delivery, battlefield situational monitoring, and reconnaissance in complex environments. Therefore, research on three-dimensional (3D) obstacle-avoidance autonomous path planning for UAVs has significant practical engineering applications. This paper proposes a deep reinforcement learning (DRL)–improved mayfly algorithm (IMA) for UAV autonomous obstacle-avoidance path planning. Considering the limitations of the mayfly algorithm (MA), such as the high randomness in initial population generation and slow convergence speed during iteration, Halton sequences and an adaptive Gaussian–Cauchy mutation strategy are introduced to balance the global exploration and local optimization capabilities of the MA. Furthermore, recognizing that the IMA still cannot overcome inherent drawbacks of swarm intelligence algorithms, such as the random selection of mutation strategy probability distributions and the lack of individual strategy optimization due to simultaneous group strategy optimization, this paper applies the deep deterministic policy gradient (DDPG) algorithm from DRL to update the population positions in the IMA. This further enhances the algorithm's optimization performance, convergence ability, and computational efficiency, thereby achieving autonomous obstacle-avoidance path planning for UAVs. The performance of the 3D UAV paths optimized by the traditional MA, the IMA, and the DRL–IMA is compared to validate the effectiveness of the proposed algorithm. The simulation's output indicates that the introduced DRL–IMA brings down the average fitness value to 0.05022 after 600 iterations and it takes just 72 generations to converge. This shows that the new method not only converges faster but also has better stability than both the old and modern MAs.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70366","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146193632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data Classification Using Hybrid Squeeze-EfficientNet With Feature Fusion in Spark Architecture 基于Spark结构特征融合的混合压缩高效网络大数据分类
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-25 DOI: 10.1002/ett.70347
A. Solairaj, M. Jeyaselvi, V. Mareeswari, M. Sathya

In this paper, the big data classification is done using the hybrid Squeeze-EfficientNet with Feature fusion in the spark framework. At first, the partitioning of big data is executed by employing Bayesian Fuzzy Clustering (BFC). Later, big data classification is accomplished in the spark architecture. At the slave node, the subsequent process is accomplished and the partitioned data are applied to the slaves, where they are pre-processed by Quantile normalization. Further, the feature fusion is carried out based on the Deep Kronecker Network (DKN) and Matusita Distance measure. At the Master node, all the features from the slave nodes are fused and the big data are classified by employing the Hybrid Squeeze-EfficientNet. The Hybrid Squeeze-EfficientNet is generated by integrating SqueezeNet and EfficientNet. The evaluation results show that the Squeeze-EfficientNet attained an accuracy of 0.904, a sensitivity of 0.916, and a specificity of 0.925. The high performance obtained by the devised model improves the big data classification task in real-time scenarios like targeted marketing, agriculture, smart transportation, efficient resource allocation, and personalized health monitoring systems. Thus, the integration of big data classification within daily life provides more informed decisions thereby improving the life quality.

本文在spark框架下,采用挤压-高效网络和特征融合的混合方法对大数据进行分类。首先,采用贝叶斯模糊聚类(BFC)对大数据进行划分。然后在spark架构中完成大数据分类。在从属节点上,完成后续处理,将分区数据应用到从属节点,在那里通过分位数规范化对其进行预处理。进一步,基于深度Kronecker网络(Deep Kronecker Network, DKN)和Matusita距离测度进行特征融合。在主节点上,融合从节点的所有特征,采用Hybrid squeeze - effentnet对大数据进行分类。混合挤压-效率网络是通过整合SqueezeNet和EfficientNet而产生的。评价结果表明,该方法的准确率为0.904,灵敏度为0.916,特异性为0.925。所设计模型的高性能,提高了精准营销、农业、智慧交通、资源高效配置、个性化健康监测等实时场景下的大数据分类任务。因此,将大数据分类整合到日常生活中,可以提供更明智的决策,从而提高生活质量。
{"title":"Big Data Classification Using Hybrid Squeeze-EfficientNet With Feature Fusion in Spark Architecture","authors":"A. Solairaj,&nbsp;M. Jeyaselvi,&nbsp;V. Mareeswari,&nbsp;M. Sathya","doi":"10.1002/ett.70347","DOIUrl":"https://doi.org/10.1002/ett.70347","url":null,"abstract":"<div>\u0000 \u0000 <p>In this paper, the big data classification is done using the hybrid Squeeze-EfficientNet with Feature fusion in the spark framework. At first, the partitioning of big data is executed by employing Bayesian Fuzzy Clustering (BFC). Later, big data classification is accomplished in the spark architecture. At the slave node, the subsequent process is accomplished and the partitioned data are applied to the slaves, where they are pre-processed by Quantile normalization. Further, the feature fusion is carried out based on the Deep Kronecker Network (DKN) and Matusita Distance measure. At the Master node, all the features from the slave nodes are fused and the big data are classified by employing the Hybrid Squeeze-EfficientNet. The Hybrid Squeeze-EfficientNet is generated by integrating SqueezeNet and EfficientNet. The evaluation results show that the Squeeze-EfficientNet attained an accuracy of 0.904, a sensitivity of 0.916, and a specificity of 0.925. The high performance obtained by the devised model improves the big data classification task in real-time scenarios like targeted marketing, agriculture, smart transportation, efficient resource allocation, and personalized health monitoring systems. Thus, the integration of big data classification within daily life provides more informed decisions thereby improving the life quality.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146193562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Communication Using Steganography and Improved Blowfish Cryptographic Methods 使用隐写术和改进的河豚密码方法的安全通信
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-23 DOI: 10.1002/ett.70357
K. Ravindra Reddy, Vijayalakshmi P

In today's digital world, with increasing threats of cyberattacks and unauthorized data access, protecting confidential information demands more robust security mechanisms. Cryptography and steganography are two prominent techniques employed to secure data. However, conventional steganography suffers from reduced embedding capacity and the risk of image distortion. To overcome these challenges, this research proposes a novel hybrid framework to enhance data security and embedding efficiency. The approach comprises two phases including the embedding phase and the extraction phase. In the embedding phase, both the cover and secret images undergo a 3-level discrete wavelet transform (DWT) using the Daubechies wavelet. Region selection in the transformed cover image is optimized by extracting and leveraging various features, including color, shape, deep features, and local Gabor transitional pattern (LGTrP) features. These features are processed via a modified Bidirectional Long Short-Term Memory (Bi-LSTM) model, enhanced with architectural improvements, which boost feature learning. Simultaneously, the secret image undergoes transformation using a modified Arnold map integrated with a Bernoulli map allows faster execution. The modified Arnold function's outcome is subjected to an encryption process. The embedding process is done after the encryption process; the modified Blowfish algorithm is used for the decryption process. Subsequently, the inverse Bernoulli map is utilized, with the resultant output given to the inverse Arnold map. Finally, an inverse 3-level DWT reconstructs the original secret image. Comparative evaluations demonstrate the proposed framework attains lower KPA and KCA rates of 0.12 and 0.15, respectively, which underscores the innovation of integrating a steganography-cryptography model in securing sensitive data against sophisticated attacks.

在当今的数字世界中,随着网络攻击和未经授权的数据访问的威胁日益增加,保护机密信息需要更强大的安全机制。密码学和隐写术是用于保护数据的两种主要技术。然而,传统的隐写术存在嵌入容量降低和图像失真的风险。为了克服这些挑战,本研究提出了一种新的混合框架来提高数据安全性和嵌入效率。该方法包括两个阶段:嵌入阶段和提取阶段。在嵌入阶段,覆盖图像和秘密图像都使用Daubechies小波进行3级离散小波变换(DWT)。通过提取和利用各种特征,包括颜色、形状、深度特征和局部Gabor过渡模式(LGTrP)特征,优化变换后的封面图像的区域选择。这些特征通过改进的双向长短期记忆(Bi-LSTM)模型进行处理,并通过架构改进进行增强,从而促进特征学习。同时,秘密图像经过转换,使用修改的阿诺德地图与伯努利地图集成,从而加快执行速度。修改后的Arnold函数的结果要经过一个加密过程。在加密处理后进行嵌入处理;在解密过程中使用改进的Blowfish算法。随后,利用逆伯努利映射,将结果输出给逆阿诺德映射。最后,对原秘密图像进行逆3级小波变换重建。比较评估表明,所提议的框架分别达到了0.12和0.15的较低KPA和KCA率,这强调了集成隐写加密模型以保护敏感数据免受复杂攻击的创新。
{"title":"Secure Communication Using Steganography and Improved Blowfish Cryptographic Methods","authors":"K. Ravindra Reddy,&nbsp;Vijayalakshmi P","doi":"10.1002/ett.70357","DOIUrl":"https://doi.org/10.1002/ett.70357","url":null,"abstract":"<div>\u0000 \u0000 <p>In today's digital world, with increasing threats of cyberattacks and unauthorized data access, protecting confidential information demands more robust security mechanisms. Cryptography and steganography are two prominent techniques employed to secure data. However, conventional steganography suffers from reduced embedding capacity and the risk of image distortion. To overcome these challenges, this research proposes a novel hybrid framework to enhance data security and embedding efficiency. The approach comprises two phases including the embedding phase and the extraction phase. In the embedding phase, both the cover and secret images undergo a 3-level discrete wavelet transform (DWT) using the Daubechies wavelet. Region selection in the transformed cover image is optimized by extracting and leveraging various features, including color, shape, deep features, and local Gabor transitional pattern (LGTrP) features. These features are processed via a modified Bidirectional Long Short-Term Memory (Bi-LSTM) model, enhanced with architectural improvements, which boost feature learning. Simultaneously, the secret image undergoes transformation using a modified Arnold map integrated with a Bernoulli map allows faster execution. The modified Arnold function's outcome is subjected to an encryption process. The embedding process is done after the encryption process; the modified Blowfish algorithm is used for the decryption process. Subsequently, the inverse Bernoulli map is utilized, with the resultant output given to the inverse Arnold map. Finally, an inverse 3-level DWT reconstructs the original secret image. Comparative evaluations demonstrate the proposed framework attains lower KPA and KCA rates of 0.12 and 0.15, respectively, which underscores the innovation of integrating a steganography-cryptography model in securing sensitive data against sophisticated attacks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Transfer Active Learning With Quantized Neural Cryptography for Healthcare 用于医疗保健的量化神经密码学的联邦转移主动学习
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-22 DOI: 10.1002/ett.70362
N. Malathy, J. Grace Sophia, S. Swathi, K. VijayaSubasri

Healthcare data holds immense potential to improve diagnostics and treatment, but centralized collection risks patient privacy and suffers from limited labeled samples. Existing methods fall short in securely leveraging distributed data while reducing annotation costs. To address this, we propose FTAL-QNC—a novel Federated Transfer Active Learning framework with Quantized Neural Cryptography—that enables privacy-preserving, communication-efficient, and label-efficient collaborative model training. FTAL-QNC integrates four core components in a unified architecture: (1) Federated learning for decentralized model training without data sharing, (2) Transfer learning to handle data heterogeneity across hospitals, (3) Active learning to minimize manual labeling by prioritizing informative samples, and (4) Quantized neural cryptography to ensure secure, low-overhead exchange of encrypted model updates. Empirical evaluations on real-world datasets, including Lung CT and ChestX-ray14, demonstrate that FTAL-QNC enhances segmentation and classification accuracy to 97.3% and 97.0% recall for Lung CT, respectively, while significantly reducing annotation effort compared to standard federated learning and other sampling methods. Our contributions include a privacy-preserving and communication-efficient collaborative framework, an integrated active learning mechanism for efficient data labeling, and a secure aggregation protocol via quantized neural cryptography. These results demonstrate FTAL-QNC's potential to advance safe, collaborative medical research and improve patient outcomes.

医疗保健数据在改善诊断和治疗方面具有巨大的潜力,但集中收集会给患者隐私带来风险,并且标签样本有限。现有方法在降低注释成本的同时无法安全地利用分布式数据。为了解决这个问题,我们提出了ftal - qnc——一种具有量化神经密码学的新型联邦转移主动学习框架,它可以实现隐私保护、通信效率和标签效率的协作模型训练。FTAL-QNC在统一架构中集成了四个核心组件:(1)用于不共享数据的分散模型训练的联邦学习;(2)处理跨医院数据异构的迁移学习;(3)主动学习,通过对信息样本进行优先排序来减少人工标记;(4)量化神经加密,确保加密模型更新的安全、低开销交换。对真实数据集(包括Lung CT和ChestX-ray14)的实证评估表明,FTAL-QNC将Lung CT的分割和分类准确率分别提高到97.3%和97.0%的召回率,同时与标准联邦学习和其他采样方法相比,显著减少了注释工作量。我们的贡献包括一个隐私保护和通信高效的协作框架,一个集成的有效数据标记的主动学习机制,以及一个通过量化神经密码学的安全聚合协议。这些结果证明了FTAL-QNC在推进安全、协作的医学研究和改善患者预后方面的潜力。
{"title":"Federated Transfer Active Learning With Quantized Neural Cryptography for Healthcare","authors":"N. Malathy,&nbsp;J. Grace Sophia,&nbsp;S. Swathi,&nbsp;K. VijayaSubasri","doi":"10.1002/ett.70362","DOIUrl":"https://doi.org/10.1002/ett.70362","url":null,"abstract":"<div>\u0000 \u0000 <p>Healthcare data holds immense potential to improve diagnostics and treatment, but centralized collection risks patient privacy and suffers from limited labeled samples. Existing methods fall short in securely leveraging distributed data while reducing annotation costs. To address this, we propose FTAL-QNC—a novel Federated Transfer Active Learning framework with Quantized Neural Cryptography—that enables privacy-preserving, communication-efficient, and label-efficient collaborative model training. FTAL-QNC integrates four core components in a unified architecture: (1) Federated learning for decentralized model training without data sharing, (2) Transfer learning to handle data heterogeneity across hospitals, (3) Active learning to minimize manual labeling by prioritizing informative samples, and (4) Quantized neural cryptography to ensure secure, low-overhead exchange of encrypted model updates. Empirical evaluations on real-world datasets, including Lung CT and ChestX-ray14, demonstrate that FTAL-QNC enhances segmentation and classification accuracy to 97.3% and 97.0% recall for Lung CT, respectively, while significantly reducing annotation effort compared to standard federated learning and other sampling methods. Our contributions include a privacy-preserving and communication-efficient collaborative framework, an integrated active learning mechanism for efficient data labeling, and a secure aggregation protocol via quantized neural cryptography. These results demonstrate FTAL-QNC's potential to advance safe, collaborative medical research and improve patient outcomes.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Deep Reinforcement Learning-Based Optimized Ensemble Approaches for IoT Network Intrusion Detection 基于深度强化学习的物联网网络入侵检测优化集成新方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-22 DOI: 10.1002/ett.70360
C. H. Mahaboob Subhani Shaik, Yamarthi Narasimha Rao

The rise in network intrusions has led to significant consequences, including privacy violations, financial losses, and unauthorized data transfers. Attackers exploit vulnerabilities in network systems, compromising security and disrupting services. Traditional intrusion detection systems (IDS) often face challenges such as false positives, delayed threat identification, and poor detection of minority attack classes. To address these issues, this research proposes advanced deep reinforcement learning with deep learning-based NIDS for improved threat detection and mitigation. Data from IoT-2023, BoT-IoT, CIC-IoT 2023, and RT-IoT 2022 datasets are preprocessed through null value handling, data cleaning, one-hot encoding, and Min-Max normalization. To enhance the detection of minority attacks, the Tabular Auxiliary Classifier Generative Adversarial Network (TACGAN) is employed for synthetic data augmentation. Feature extraction is performed using the Graph Sample and Aggregate Attention Network (GSAAN), which captures basic, content, and traffic-based features. Significant features are selected using the Mountaineering Team-Based Optimization (MTBO). Attack classification is carried out using a novel ensemble of the Improved Double Deep Q-Network (IDDQN) and Deep Autoregression Feature Augmented Bidirectional LSTM (DAF-BiLSTM), which is termed the OptIDQDBiLSTM approach, ensuring robust learning of spatial and temporal dependencies. Hyperparameter tuning is optimized using the Boosted Wild Horse Optimization Algorithm (BWHOA). Experimental results show that the proposed approach outperforms existing IDS methods, achieving higher detection rates, improved accuracy, and a reduced false alarm rate while maintaining computational efficiency. While comparing with existing state of the art approaches, the proposed approach surpasses existing methods with over 99.64% accuracy, 99.34% precision, and 99.42% recall. These findings demonstrate the effectiveness of deep reinforcement learning in enhancing network security against evolving cyber threats.

网络入侵的增加导致了严重的后果,包括侵犯隐私、经济损失和未经授权的数据传输。攻击者利用网络系统中的漏洞,危及安全性并破坏服务。传统的入侵检测系统(IDS)经常面临误报、威胁识别延迟以及对少数攻击类检测不力等挑战。为了解决这些问题,本研究提出了基于深度学习的NIDS的高级深度强化学习,以改进威胁检测和缓解。对IoT-2023、BoT-IoT、CIC-IoT 2023、RT-IoT 2022数据集的数据进行空值处理、数据清洗、单热编码、Min-Max归一化等预处理。为了提高对少数攻击的检测能力,采用表格辅助分类器生成对抗网络(TACGAN)进行综合数据增强。特征提取使用图样本和聚合注意力网络(GSAAN)来执行,它捕获基本的、内容的和基于流量的特征。使用登山队优化(MTBO)选择重要特征。攻击分类使用改进的双深度q网络(IDDQN)和深度自回归特征增强双向LSTM (DAF-BiLSTM)的新集成进行,称为OptIDQDBiLSTM方法,确保对空间和时间依赖性的鲁棒学习。超参数调优使用增强野马优化算法(bwow)进行优化。实验结果表明,该方法优于现有的IDS方法,在保持计算效率的同时,实现了更高的检测率、更高的准确率和更低的虚警率。与现有方法相比,该方法的准确率超过99.64%,精密度超过99.34%,召回率超过99.42%。这些发现证明了深度强化学习在增强网络安全以应对不断变化的网络威胁方面的有效性。
{"title":"Novel Deep Reinforcement Learning-Based Optimized Ensemble Approaches for IoT Network Intrusion Detection","authors":"C. H. Mahaboob Subhani Shaik,&nbsp;Yamarthi Narasimha Rao","doi":"10.1002/ett.70360","DOIUrl":"https://doi.org/10.1002/ett.70360","url":null,"abstract":"<div>\u0000 \u0000 <p>The rise in network intrusions has led to significant consequences, including privacy violations, financial losses, and unauthorized data transfers. Attackers exploit vulnerabilities in network systems, compromising security and disrupting services. Traditional intrusion detection systems (IDS) often face challenges such as false positives, delayed threat identification, and poor detection of minority attack classes. To address these issues, this research proposes advanced deep reinforcement learning with deep learning-based NIDS for improved threat detection and mitigation. Data from IoT-2023, BoT-IoT, CIC-IoT 2023, and RT-IoT 2022 datasets are preprocessed through null value handling, data cleaning, one-hot encoding, and Min-Max normalization. To enhance the detection of minority attacks, the Tabular Auxiliary Classifier Generative Adversarial Network (TACGAN) is employed for synthetic data augmentation. Feature extraction is performed using the Graph Sample and Aggregate Attention Network (GSAAN), which captures basic, content, and traffic-based features. Significant features are selected using the Mountaineering Team-Based Optimization (MTBO). Attack classification is carried out using a novel ensemble of the Improved Double Deep Q-Network (IDDQN) and Deep Autoregression Feature Augmented Bidirectional LSTM (DAF-BiLSTM), which is termed the OptIDQDBiLSTM approach, ensuring robust learning of spatial and temporal dependencies. Hyperparameter tuning is optimized using the Boosted Wild Horse Optimization Algorithm (BWHOA). Experimental results show that the proposed approach outperforms existing IDS methods, achieving higher detection rates, improved accuracy, and a reduced false alarm rate while maintaining computational efficiency. While comparing with existing state of the art approaches, the proposed approach surpasses existing methods with over 99.64% accuracy, 99.34% precision, and 99.42% recall. These findings demonstrate the effectiveness of deep reinforcement learning in enhancing network security against evolving cyber threats.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146091520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Feature Selection-Based Cyber Attack Detection Using a Polymorphic Graph Gudermannian Neural Network With Encryption Approach 基于多态图古德曼神经网络的有效特征选择网络攻击检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-22 DOI: 10.1002/ett.70358
S. Raja Shree, Maya S. Bembde, L. Sharmila, A. Jemshia Miriam

The rapid expansion of digitalization has intensified cybersecurity risks, exposing critical network vulnerabilities despite significant advances in encryption and intrusion detection systems (IDS). Many existing deep learning–based IDS still struggle with high false-positive rates, misclassification, and limited adaptability, reducing their effectiveness in real-time defense scenarios. To address these limitations, this study proposes a Polymorphic Graph Gudermannian Neural Network integrated with Adaptive Chaotic Satin Bowerbird Optimization (PG-GNN-AC-SBO), complemented by a lightweight encryption mechanism. The framework incorporates a Fuzzy K-Top Matching Value (FKTMV) module for robust preprocessing and normalization, along with a Hybrid Cat Hunting Sea-Horse Optimizer (H-CHO-SHO) for efficient and interpretable feature selection. The PG-GNN classifier employs graph-based learning and a Gudermannian nonlinear activation function to effectively capture complex traffic behavior, while AC-SBO dynamically tunes hyperparameters to enhance stability and classification accuracy. To ensure data confidentiality, a Synchronously Scrambled Diffuse Encryption (SSDE) scheme is applied, delivering strong security with low computational overhead. Experimental evaluations on the NSL-KDD and CICIDS2017 datasets demonstrate the superiority of the proposed approach, achieving up to 99.82% accuracy and outperforming state-of-the-art methods. The encryption and decryption times of 3.50 and 3.55 ms further confirm the model's lightweight design. Overall, the proposed system provides high throughput with minimal latency, demonstrating strong potential for real-time and large-scale cybersecurity deployments.

尽管在加密和入侵检测系统(IDS)方面取得了重大进展,但数字化的快速发展加剧了网络安全风险,暴露了关键的网络漏洞。许多现有的基于深度学习的IDS仍然存在高假阳性率、错误分类和有限的适应性,降低了它们在实时防御场景中的有效性。为了解决这些限制,本研究提出了一种集成了自适应混沌缎面园丁鸟优化(PG-GNN-AC-SBO)的多态图古德曼神经网络,并辅以轻量级加密机制。该框架结合了一个模糊K-Top匹配值(FKTMV)模块,用于鲁棒预处理和规范化,以及一个混合猫狩猎海马优化器(H-CHO-SHO),用于高效和可解释的特征选择。PG-GNN分类器采用基于图的学习和古德曼非线性激活函数来有效捕获复杂的交通行为,AC-SBO动态调整超参数来提高稳定性和分类精度。为了保证数据的机密性,采用了同步打乱漫射加密(SSDE)方案,具有较强的安全性和较低的计算开销。在NSL-KDD和CICIDS2017数据集上的实验评估证明了该方法的优越性,准确率高达99.82%,优于目前最先进的方法。加密和解密时间分别为3.50和3.55 ms,进一步证实了该型号的轻量化设计。总体而言,所提出的系统提供了高吞吐量和最小延迟,显示出实时和大规模网络安全部署的强大潜力。
{"title":"An Effective Feature Selection-Based Cyber Attack Detection Using a Polymorphic Graph Gudermannian Neural Network With Encryption Approach","authors":"S. Raja Shree,&nbsp;Maya S. Bembde,&nbsp;L. Sharmila,&nbsp;A. Jemshia Miriam","doi":"10.1002/ett.70358","DOIUrl":"https://doi.org/10.1002/ett.70358","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid expansion of digitalization has intensified cybersecurity risks, exposing critical network vulnerabilities despite significant advances in encryption and intrusion detection systems (IDS). Many existing deep learning–based IDS still struggle with high false-positive rates, misclassification, and limited adaptability, reducing their effectiveness in real-time defense scenarios. To address these limitations, this study proposes a Polymorphic Graph Gudermannian Neural Network integrated with Adaptive Chaotic Satin Bowerbird Optimization (PG-GNN-AC-SBO), complemented by a lightweight encryption mechanism. The framework incorporates a Fuzzy K-Top Matching Value (FKTMV) module for robust preprocessing and normalization, along with a Hybrid Cat Hunting Sea-Horse Optimizer (H-CHO-SHO) for efficient and interpretable feature selection. The PG-GNN classifier employs graph-based learning and a Gudermannian nonlinear activation function to effectively capture complex traffic behavior, while AC-SBO dynamically tunes hyperparameters to enhance stability and classification accuracy. To ensure data confidentiality, a Synchronously Scrambled Diffuse Encryption (SSDE) scheme is applied, delivering strong security with low computational overhead. Experimental evaluations on the NSL-KDD and CICIDS2017 datasets demonstrate the superiority of the proposed approach, achieving up to 99.82% accuracy and outperforming state-of-the-art methods. The encryption and decryption times of 3.50 and 3.55 ms further confirm the model's lightweight design. Overall, the proposed system provides high throughput with minimal latency, demonstrating strong potential for real-time and large-scale cybersecurity deployments.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"37 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146091523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1