首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
An Adaptive Spatio-Temporal Stacked Ensemble Framework for Intelligent Anomaly Detection and Security Enhancement in Vehicular Ad Hoc Networks 基于自适应时空叠加集成框架的车辆自组织网络智能异常检测与安全增强
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-14 DOI: 10.1002/ett.70294
Amnah Alshahrani, Mohammed H. Alghamdi, Samar Muslah Albladi, Wahida Mansouri, Hussain Alshahrani, Kamal M. Othman, Mohammed Alqahtani, Ibrahim Zalah

Vehicular Ad Hoc Networks (VANETs) play an essential role in intelligent transportation systems. However, the dynamic mobile nature of VANETs makes them vulnerable to a wide range of anomalous behaviors. To address these issues, we propose X-ExTEN-ID, an explainable stacked ensemble framework for adaptive and intelligent anomaly detection and vehicular security enhancement in VANET environments. The proposed framework involves spatiotemporal data analysis and multiple ensemble learning techniques combined through a stacked meta-learning architecture to identify anomalous behaviors in real-time VANET environments accurately. Instead of traditional single-model approaches, our ensemble strategy combines multiple base learners to enhance detection accuracy and ensure protection against evolving attack strategies. To validate our suggested approach, we utilized the VeReMi dataset, which provides real-world urban vehicular mobility tasks with labeled position falsification and other attack types. Experiment results demonstrated that our framework achieves notable scores in detection performance, with the highest recall rate of 98.9%, an F1-score of 99%, and a notably low False Positive Rate (FPR) of 1.3% and False Negative Rate of 0.9%, compared to existing machine learning models.

车辆自组织网络(vanet)在智能交通系统中起着至关重要的作用。然而,vanet的动态移动特性使它们容易受到各种异常行为的影响。为了解决这些问题,我们提出了x - extend - id,这是一个可解释的堆叠集成框架,用于自适应和智能异常检测,并增强VANET环境中的车辆安全性。提出的框架包括时空数据分析和多种集成学习技术,通过堆叠元学习架构相结合,以准确识别实时VANET环境中的异常行为。与传统的单模型方法不同,我们的集成策略结合了多个基础学习器来提高检测精度,并确保对不断变化的攻击策略进行保护。为了验证我们建议的方法,我们使用了VeReMi数据集,该数据集提供了具有标记位置伪造和其他攻击类型的真实城市车辆移动任务。实验结果表明,与现有的机器学习模型相比,我们的框架在检测性能上取得了显著的成绩,最高的召回率为98.9%,f1得分为99%,假阳性率(FPR)为1.3%,假阴性率为0.9%。
{"title":"An Adaptive Spatio-Temporal Stacked Ensemble Framework for Intelligent Anomaly Detection and Security Enhancement in Vehicular Ad Hoc Networks","authors":"Amnah Alshahrani,&nbsp;Mohammed H. Alghamdi,&nbsp;Samar Muslah Albladi,&nbsp;Wahida Mansouri,&nbsp;Hussain Alshahrani,&nbsp;Kamal M. Othman,&nbsp;Mohammed Alqahtani,&nbsp;Ibrahim Zalah","doi":"10.1002/ett.70294","DOIUrl":"https://doi.org/10.1002/ett.70294","url":null,"abstract":"<div>\u0000 \u0000 <p>Vehicular Ad Hoc Networks (VANETs) play an essential role in intelligent transportation systems. However, the dynamic mobile nature of VANETs makes them vulnerable to a wide range of anomalous behaviors. To address these issues, we propose X-ExTEN-ID, an explainable stacked ensemble framework for adaptive and intelligent anomaly detection and vehicular security enhancement in VANET environments. The proposed framework involves spatiotemporal data analysis and multiple ensemble learning techniques combined through a stacked meta-learning architecture to identify anomalous behaviors in real-time VANET environments accurately. Instead of traditional single-model approaches, our ensemble strategy combines multiple base learners to enhance detection accuracy and ensure protection against evolving attack strategies. To validate our suggested approach, we utilized the VeReMi dataset, which provides real-world urban vehicular mobility tasks with labeled position falsification and other attack types. Experiment results demonstrated that our framework achieves notable scores in detection performance, with the highest recall rate of 98.9%, an <i>F</i>1-score of 99%, and a notably low False Positive Rate (FPR) of 1.3% and False Negative Rate of 0.9%, compared to existing machine learning models.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145530012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transfer Learning-Based Modulation Recognition From a Data Wisdom Perspective for Disaster Case Management 基于迁移学习的调制识别:基于数据智慧的灾害案例管理
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-14 DOI: 10.1002/ett.70292
Merih Leblebici, Ali Çalhan, Murtaza Cicioğlu

Wireless networks offer significant advantages in disaster scenarios, enabling critical communication for rescue operations in emergencies like earthquakes, floods, and hurricanes. Technologies such as cognitive radios can address communication challenges in such high-stakes environments, with modulation recognition techniques enhancing reliability in disaster responses. This study focuses on deep learning for modulation recognition, a task complicated by the need to balance recognition accuracy and system complexity. A comprehensive dataset was developed, covering eight modulation schemes across varying signal-to-noise ratios (SNR) from −15 to 25 dB, represented as image data in both in-phase/quadrature (IQ) and radius-r/angle-θ () domains. Using transfer learning with convolutional neural network (CNN)-based architectures like ResNetV2 models (50, 101, and 152 layers), which are pre-trained on ImageNet, the models were adapted for this specific task. Performance metrics, including accuracy, precision, recall, and F1 scores, show that as SNR exceeds 5 dB, these models achieve over 50% accuracy, nearing perfection at 20 dB in either IQ or domains. However, in low SNR conditions, the domain transformation demonstrates superior recognition advantage, with the models achieving up to 86% accuracy gain at −5 dB. Ultimately, the transformation significantly enhances recognition performance, proving essential for reliable modulation recognition in complex communication scenarios.

无线网络在灾难场景中提供了显著的优势,为地震、洪水和飓风等紧急情况下的救援行动提供了关键通信。认知无线电等技术可以解决这种高风险环境中的通信挑战,而调制识别技术可以提高灾害响应的可靠性。本研究的重点是调制识别的深度学习,这是一项由于需要平衡识别准确性和系统复杂性而变得复杂的任务。开发了一个全面的数据集,涵盖了从- 15到25 dB的不同信噪比(SNR)的八种调制方案,以同相/正交(IQ)和半径-r/角度-θ()域的图像数据表示。使用基于卷积神经网络(CNN)架构的迁移学习,如在ImageNet上预训练的ResNetV2模型(50层、101层和152层),这些模型适用于这个特定的任务。包括准确性、精度、召回率和F1分数在内的性能指标表明,当信噪比超过5 dB时,这些模型的准确率超过50%,在IQ或域的20 dB时接近完美。然而,在低信噪比条件下,域变换显示出优越的识别优势,模型在−5 dB时获得高达86%的精度增益。最终,该变换显著提高了识别性能,证明了在复杂通信场景下可靠的调制识别的必要条件。
{"title":"Transfer Learning-Based Modulation Recognition From a Data Wisdom Perspective for Disaster Case Management","authors":"Merih Leblebici,&nbsp;Ali Çalhan,&nbsp;Murtaza Cicioğlu","doi":"10.1002/ett.70292","DOIUrl":"https://doi.org/10.1002/ett.70292","url":null,"abstract":"<div>\u0000 \u0000 <p>Wireless networks offer significant advantages in disaster scenarios, enabling critical communication for rescue operations in emergencies like earthquakes, floods, and hurricanes. Technologies such as cognitive radios can address communication challenges in such high-stakes environments, with modulation recognition techniques enhancing reliability in disaster responses. This study focuses on deep learning for modulation recognition, a task complicated by the need to balance recognition accuracy and system complexity. A comprehensive dataset was developed, covering eight modulation schemes across varying signal-to-noise ratios (SNR) from −15 to 25 dB, represented as image data in both in-phase/quadrature (IQ) and radius-<i>r</i>/angle-<i>θ</i> (<span></span><math></math>) domains. Using transfer learning with convolutional neural network (CNN)-based architectures like ResNetV2 models (50, 101, and 152 layers), which are pre-trained on ImageNet, the models were adapted for this specific task. Performance metrics, including accuracy, precision, recall, and F1 scores, show that as SNR exceeds 5 dB, these models achieve over 50% accuracy, nearing perfection at 20 dB in either IQ or <span></span><math></math> domains. However, in low SNR conditions, the <span></span><math></math> domain transformation demonstrates superior recognition advantage, with the models achieving up to 86% accuracy gain at −5 dB. Ultimately, the <span></span><math></math> transformation significantly enhances recognition performance, proving essential for reliable modulation recognition in complex communication scenarios.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145530013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Enabled Privacy-Preserving Anomaly Detection and Reputation Framework for VANETs 基于区块链的VANETs隐私保护异常检测和声誉框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-11 DOI: 10.1002/ett.70290
Mungara Kiran Kumar, Yogini Dilip Borole, Shrabani Mallick, Yogesh Chaba, Sanjeev Kumar, Shakir Khan, Fatimah Alhayan, Navruzbek Shavkatov, Rupesh Gupta

To address issues in traditional vehicular network trust mechanisms such as the untrustworthiness of centralized reputation servers, threats to user privacy, and limited detection scope a blockchain-based vehicular network anomaly detection and reputation model with privacy protection is proposed. Leveraging blockchain technology, a distributed and trustworthy reputation update framework for vehicular networks is designed. The evaluation data is encrypted and computed using a multi-key fully homomorphic encryption technique, which reduces the danger of user privacy leakage. An adaptive adjustment approach is implemented for the retrospective time interval to improve anomaly detection. This strategy stops hostile cars from evading detection by exploiting reputation updates. According to the simulation results, which demonstrate accuracy with low false positive rates in identifying malicious cars, the suggested method effectively protects user privacy while attaining high anomaly detection rates. The detection rate for unusual vehicle behavior is increased by 38.56% as compared to conventional systems. This increased detection rate implies that the technique is better at differentiating between typical and anomalous processes, which improves network dependability and safety.

针对传统车联网信任机制存在的中心化信誉服务器不可信、用户隐私受到威胁、检测范围有限等问题,提出了一种基于区块链的带隐私保护的车联网异常检测和信誉模型。利用区块链技术,设计了一个分布式、可信赖的车载网络信誉更新框架。评估数据采用多密钥全同态加密技术进行加密计算,降低了用户隐私泄露的危险。采用自适应调整方法对回溯时间间隔进行调整,以提高异常检测能力。该策略阻止恶意车辆利用声誉更新来逃避检测。仿真结果表明,该方法在识别恶意汽车时具有较低的误报率,有效地保护了用户隐私,同时获得了较高的异常检测率。与传统系统相比,该系统对车辆异常行为的检测率提高了38.56%。检测率的提高意味着该技术在区分典型进程和异常进程方面做得更好,从而提高了网络的可靠性和安全性。
{"title":"Blockchain-Enabled Privacy-Preserving Anomaly Detection and Reputation Framework for VANETs","authors":"Mungara Kiran Kumar,&nbsp;Yogini Dilip Borole,&nbsp;Shrabani Mallick,&nbsp;Yogesh Chaba,&nbsp;Sanjeev Kumar,&nbsp;Shakir Khan,&nbsp;Fatimah Alhayan,&nbsp;Navruzbek Shavkatov,&nbsp;Rupesh Gupta","doi":"10.1002/ett.70290","DOIUrl":"https://doi.org/10.1002/ett.70290","url":null,"abstract":"<div>\u0000 \u0000 <p>To address issues in traditional vehicular network trust mechanisms such as the untrustworthiness of centralized reputation servers, threats to user privacy, and limited detection scope a blockchain-based vehicular network anomaly detection and reputation model with privacy protection is proposed. Leveraging blockchain technology, a distributed and trustworthy reputation update framework for vehicular networks is designed. The evaluation data is encrypted and computed using a multi-key fully homomorphic encryption technique, which reduces the danger of user privacy leakage. An adaptive adjustment approach is implemented for the retrospective time interval to improve anomaly detection. This strategy stops hostile cars from evading detection by exploiting reputation updates. According to the simulation results, which demonstrate accuracy with low false positive rates in identifying malicious cars, the suggested method effectively protects user privacy while attaining high anomaly detection rates. The detection rate for unusual vehicle behavior is increased by 38.56% as compared to conventional systems. This increased detection rate implies that the technique is better at differentiating between typical and anomalous processes, which improves network dependability and safety.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Mobility Management Support Scheme With Security Enhancement in Vehicular Ad-Hoc Networks 车载Ad-Hoc网络中安全增强的智能移动管理支持方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-11 DOI: 10.1002/ett.70291
Virender Kumar, Rachit Manchanda, Nishu Gupta, Fatima Asiri, Oumaima Saidani

Implementing IP-based networking in vehicular communication scenarios is expected to facilitate the introduction of a wide range of security-enhanced roadway applications. Mobility management is one of the most challenging research areas, playing a vital role in enabling seamless mobility services within a secure vehicular environment. Mobile Internet Protocol version 6 (MIPv6) and Hierarchical Mobile Internet Protocol version 6 (HMIPv6) are two security-based mobility management solutions or protocols designed by IETF for IPv6 wireless communication networks. Utilizing these two schemes, this article presents a security enhanced novel Intelligent Mobility Management Support (IMMS) scheme that selects better alternative out of the two already presented relay vehicle selection schemes that is, Clustering based Optimal Relay Vehicle Selection (CORV) selection scheme and Adaptive Priority and Optimum Parameters (APOP) based optimal relay vehicle selection scheme, depending upon moving vehicle's mobility and its unique characteristics. In the proposed IMMS scheme, analytical modeling has been carried out for the performance evaluation of APOP and CORV selection schemes. Due to the similarity of the network architecture proposed for APOP and CORV with MIPv6 and HMIPv6, respectively, the performance comparison is done based on the Total Cost Function, ‘’ with security enhancement. A comparison of performance in terms of ‘’ is done against some key parameters. It is then demonstrated that the proposed IMMS scheme yields the minimum cost in terms of ‘’, and Packet Delivery Cost, ‘’, compared to the CORV and APOP selection schemes.

在车载通信场景中实施基于ip的网络有望促进广泛的安全增强道路应用的引入。移动管理是最具挑战性的研究领域之一,在安全的车辆环境中实现无缝移动服务方面发挥着至关重要的作用。MIPv6 (Mobile Internet Protocol version 6)和HMIPv6 (Hierarchical Mobile Internet Protocol version 6)是IETF针对IPv6无线通信网络设计的两种基于安全的移动管理解决方案或协议。利用这两种方案,本文提出了一种安全性增强的新型智能移动管理支持(IMMS)方案,该方案根据移动车辆的机动性及其独特特性,从已有的两种中继车辆选择方案中选择更好的替代方案,即基于聚类的最优中继车辆选择方案(CORV)和基于自适应优先级和最优参数(APOP)的最优中继车辆选择方案。在提出的IMMS方案中,对APOP和CORV选择方案的性能进行了分析建模。由于APOP和CORV分别与MIPv6和HMIPv6提出的网络架构相似,因此基于总成本函数(Total Cost Function)进行性能比较,并增强了安全性。对一些关键参数进行了“”方面的性能比较。然后证明了与CORV和APOP选择方案相比,所提出的IMMS方案在“,和分组传输成本”方面产生最小的成本。
{"title":"Intelligent Mobility Management Support Scheme With Security Enhancement in Vehicular Ad-Hoc Networks","authors":"Virender Kumar,&nbsp;Rachit Manchanda,&nbsp;Nishu Gupta,&nbsp;Fatima Asiri,&nbsp;Oumaima Saidani","doi":"10.1002/ett.70291","DOIUrl":"https://doi.org/10.1002/ett.70291","url":null,"abstract":"<div>\u0000 \u0000 <p>Implementing IP-based networking in vehicular communication scenarios is expected to facilitate the introduction of a wide range of security-enhanced roadway applications. Mobility management is one of the most challenging research areas, playing a vital role in enabling seamless mobility services within a secure vehicular environment. Mobile Internet Protocol version 6 (MIPv6) and Hierarchical Mobile Internet Protocol version 6 (HMIPv6) are two security-based mobility management solutions or protocols designed by IETF for IPv6 wireless communication networks. Utilizing these two schemes, this article presents a security enhanced novel Intelligent Mobility Management Support (IMMS) scheme that selects better alternative out of the two already presented relay vehicle selection schemes that is, Clustering based Optimal Relay Vehicle Selection (CORV) selection scheme and Adaptive Priority and Optimum Parameters (APOP) based optimal relay vehicle selection scheme, depending upon moving vehicle's mobility and its unique characteristics. In the proposed IMMS scheme, analytical modeling has been carried out for the performance evaluation of APOP and CORV selection schemes. Due to the similarity of the network architecture proposed for APOP and CORV with MIPv6 and HMIPv6, respectively, the performance comparison is done based on the Total Cost Function, ‘<span></span><math></math>’ with security enhancement. A comparison of performance in terms of ‘<span></span><math></math>’ is done against some key parameters. It is then demonstrated that the proposed IMMS scheme yields the minimum cost in terms of ‘<span></span><math></math>’, and Packet Delivery Cost, ‘<span></span><math></math>’, compared to the CORV and APOP selection schemes.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAFSID: Multi-Agent Few-Shot Intrusion Detection for VANETs Through Rapid Collaborative Learning 基于快速协同学习的多智能体少次入侵检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-06 DOI: 10.1002/ett.70285
Sidra Shafiq, Hassan Moatasam Awan, Abdullah Aman Khan, Afzaal Hussain, Iram Javed

The convergence of Internet of Things (IoT) technologies with Vehicular Ad-hoc Networks (VANETs) serves as a critical infrastructure for intelligent transportation systems. It enables vehicle-to-vehicle and vehicle-to-infrastructure communications. However, the dynamic and heterogeneous nature of VANETs creates significant security challenges. Particularly, in detecting novel intrusion patterns when labeled data is limited. Traditional intrusion detection systems struggle with rapid adaptation to emerging attack vectors, often requiring extensive retraining and substantial labeled datasets. We present MAFSID (Multi-Agent Few-Shot Intrusion Detection), a collaborative learning framework utilizing multiple specialized detection agents through few-shot learning paradigms. Our system employs five distinct agents, i.e., Network Traffic Analyzer, Anomaly Detector, Behavior Analyzer, Protocol Analyzer, and Threat Classifier. These agents communicate and share knowledge to collectively identify intrusions with minimal training samples. Comprehensive evaluations on public datasets such as NSL-KDD, CICIDS2017, and In-Vehicle datasets demonstrate MAFSID's superior performance. Furthermore, robustness analysis reveals high resilience against adversarial attacks, especially communication jamming, showing minimal impact on performance. Notably, the collaborative agent framework enables rapid adaptation to new attack patterns while maintaining robust performance across diverse network conditions.

物联网(IoT)技术与车辆自组织网络(VANETs)的融合是智能交通系统的关键基础设施。它可以实现车对车和车对基础设施的通信。然而,VANETs的动态性和异构性带来了重大的安全挑战。特别是在标记数据有限的情况下,检测新的入侵模式。传统的入侵检测系统难以快速适应新出现的攻击向量,通常需要大量的再训练和大量的标记数据集。我们提出了MAFSID (Multi-Agent Few-Shot Intrusion Detection),这是一个利用多个专门的检测代理通过几次学习范式进行协作学习的框架。我们的系统采用五种不同的代理,即网络流量分析器,异常检测器,行为分析器,协议分析器和威胁分类器。这些智能体通过通信和共享知识,以最小的训练样本共同识别入侵。对NSL-KDD、CICIDS2017和In-Vehicle数据集等公共数据集的综合评估表明,MAFSID具有优越的性能。此外,鲁棒性分析揭示了对对抗性攻击的高弹性,特别是通信干扰,对性能的影响最小。值得注意的是,协作代理框架能够快速适应新的攻击模式,同时在不同的网络条件下保持健壮的性能。
{"title":"MAFSID: Multi-Agent Few-Shot Intrusion Detection for VANETs Through Rapid Collaborative Learning","authors":"Sidra Shafiq,&nbsp;Hassan Moatasam Awan,&nbsp;Abdullah Aman Khan,&nbsp;Afzaal Hussain,&nbsp;Iram Javed","doi":"10.1002/ett.70285","DOIUrl":"https://doi.org/10.1002/ett.70285","url":null,"abstract":"<div>\u0000 \u0000 <p>The convergence of Internet of Things (IoT) technologies with Vehicular Ad-hoc Networks (VANETs) serves as a critical infrastructure for intelligent transportation systems. It enables vehicle-to-vehicle and vehicle-to-infrastructure communications. However, the dynamic and heterogeneous nature of VANETs creates significant security challenges. Particularly, in detecting novel intrusion patterns when labeled data is limited. Traditional intrusion detection systems struggle with rapid adaptation to emerging attack vectors, often requiring extensive retraining and substantial labeled datasets. We present MAFSID (Multi-Agent Few-Shot Intrusion Detection), a collaborative learning framework utilizing multiple specialized detection agents through few-shot learning paradigms. Our system employs five distinct agents, i.e., Network Traffic Analyzer, Anomaly Detector, Behavior Analyzer, Protocol Analyzer, and Threat Classifier. These agents communicate and share knowledge to collectively identify intrusions with minimal training samples. Comprehensive evaluations on public datasets such as NSL-KDD, CICIDS2017, and In-Vehicle datasets demonstrate MAFSID's superior performance. Furthermore, robustness analysis reveals high resilience against adversarial attacks, especially communication jamming, showing minimal impact on performance. Notably, the collaborative agent framework enables rapid adaptation to new attack patterns while maintaining robust performance across diverse network conditions.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145469930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedNCV: Optimizing Federated Learning With Networked Control Variates FedNCV:基于网络控制变量的优化联邦学习
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-04 DOI: 10.1002/ett.70287
Yaling Liu, Xu Yang, Xingyan Chen, Huaming Du, Liang Xu

Federated learning (FL), as an advanced distributed learning paradigm, faces significant challenges, particularly in terms of slow convergence and instability, which are exacerbated by heterogeneous data distributions. A critical issue in this context is data heterogeneity, which increases gradient estimation variance and drives the model toward local minima that are distant from the global optimum. Previous studies have primarily focused on using Control Variates (CVs) to reduce gradient estimate variance without introducing bias. In this work, we propose a novel distributed gradient optimization framework, FedNCV, aimed at effectively reducing gradient variance. Central to this approach is the use of the REINFORCE Leave-One-Out (RLOO), a CV-based technology, which serves as the core gradient estimator for FedNCV at both the client and server levels. We have developed an algorithm based on FedNCV and provided three theoretical results. Experimental evaluations demonstrate that the proposed method enhances performance. The dual structure of FedNCV equips it to address the challenges of data heterogeneity and scalability in federated networks, offering a promising solution for applications in heterogeneous FL environments. Additionally, the efficacy of FedNCV was validated across four diverse datasets under a Dirichlet distribution with , setting new performance benchmarks when compared to six leading methods.

联邦学习(FL)作为一种先进的分布式学习范式,面临着巨大的挑战,特别是在缓慢的收敛和不稳定性方面,异构数据分布加剧了这些挑战。在这种情况下,一个关键问题是数据异质性,它增加了梯度估计方差,并推动模型走向远离全局最优的局部最小值。以前的研究主要集中在使用控制变量(cv)来减少梯度估计方差而不引入偏差。在这项工作中,我们提出了一个新的分布式梯度优化框架,FedNCV,旨在有效地减少梯度方差。该方法的核心是使用基于cv的强化留一(RLOO)技术,该技术在客户端和服务器层面都是FedNCV的核心梯度估计器。我们开发了一种基于FedNCV的算法,并给出了三个理论结果。实验结果表明,该方法提高了性能。FedNCV的双重结构使其能够解决联邦网络中数据异构和可扩展性的挑战,为异构FL环境中的应用提供了一个有前途的解决方案。此外,在Dirichlet分布下,在四个不同的数据集上验证了FedNCV的有效性,与六种主要方法相比,设定了新的性能基准。
{"title":"FedNCV: Optimizing Federated Learning With Networked Control Variates","authors":"Yaling Liu,&nbsp;Xu Yang,&nbsp;Xingyan Chen,&nbsp;Huaming Du,&nbsp;Liang Xu","doi":"10.1002/ett.70287","DOIUrl":"https://doi.org/10.1002/ett.70287","url":null,"abstract":"<div>\u0000 \u0000 <p>Federated learning (FL), as an advanced distributed learning paradigm, faces significant challenges, particularly in terms of slow convergence and instability, which are exacerbated by heterogeneous data distributions. A critical issue in this context is data heterogeneity, which increases gradient estimation variance and drives the model toward local minima that are distant from the global optimum. Previous studies have primarily focused on using Control Variates (CVs) to reduce gradient estimate variance without introducing bias. In this work, we propose a novel distributed gradient optimization framework, FedNCV, aimed at effectively reducing gradient variance. Central to this approach is the use of the REINFORCE Leave-One-Out (RLOO), a CV-based technology, which serves as the core gradient estimator for FedNCV at both the client and server levels. We have developed an algorithm based on FedNCV and provided three theoretical results. Experimental evaluations demonstrate that the proposed method enhances performance. The dual structure of FedNCV equips it to address the challenges of data heterogeneity and scalability in federated networks, offering a promising solution for applications in heterogeneous FL environments. Additionally, the efficacy of FedNCV was validated across four diverse datasets under a Dirichlet distribution with <span></span><math></math>, setting new performance benchmarks when compared to six leading methods.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145469404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal Hierarchical Attention Framework for Efficient Weakly Supervised Few-Shot Segmentation Under SAGIN Environment SAGIN环境下有效弱监督少镜头分割的多模态分层注意框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-28 DOI: 10.1002/ett.70286
Wenqiang Yuan, Yin Tang, Xinhao Cai, Tao Chen, Yazhou Yao

In the evolving landscape of the Space Air Ground-Integrated Network (SAGIN), addressing the challenges of limited labeled data and the need for adaptable models is crucial for effective data processing across diverse and heterogeneous sources. Weakly supervised few-shot semantic segmentation (WSFSS), aims to segment the unseen targets by solely relying on support images with class-level annotations, offering a robust solution to the complexities inherent in SAGIN environments. Existing works usually generate pseudo masks for training images, and then convert WSFSS to the plain few-shot semantic segmentation task. However, these rough pseudo masks, almost always, contain background noise due to imprecise object localization during mask generation, which thus leads to undesirable segmentation results. To mitigate the above challenge, we inject implicit text supervision into WSFSS, and propose an efficient text-guided hierarchical attention (ETHA) framework to explicitly alleviate the mask noise issue. Specifically, we first propose a cross-modal interaction attention module to capture comprehensive object guidance from text embeddings and refocus the model's attention toward the area of the focused object. In addition, we propose a lightweight dual visual cross-attention module to efficiently aggregate the contextual information among each branch and common object clues from both branches, which provides enhanced visual features to facilitate the cross-modal information interaction. Based on single-scale features, ETHA has established new state-of-the-art results on the golden WSFSS datasets, that is, PASCAL- and COCO-. These results highlight ETHA's potential for improving accessibility and efficiency for robust applications in SAGIN environment.

在空间-空气-地面综合网络(SAGIN)不断发展的环境中,解决有限标记数据的挑战和对适应性模型的需求对于跨不同和异构来源的有效数据处理至关重要。弱监督少镜头语义分割(WSFSS)旨在通过仅依赖带有类级注释的支持图像来分割未见目标,为SAGIN环境中固有的复杂性提供了一个健壮的解决方案。现有的工作通常是对训练图像生成伪掩码,然后将WSFSS转换为简单的少镜头语义分割任务。然而,这些粗糙的伪掩码在生成掩码时,由于目标定位不精确,几乎总是含有背景噪声,从而导致不理想的分割结果。为了缓解上述挑战,我们将隐式文本监督注入WSFSS,并提出了一个有效的文本引导分层注意(ETHA)框架来显式缓解掩模噪声问题。具体来说,我们首先提出了一个跨模态交互关注模块,以从文本嵌入中获取全面的对象指导,并将模型的注意力重新聚焦到被聚焦对象的区域。此外,我们提出了一个轻量级的双视觉交叉注意模块,以有效地聚合每个分支之间的上下文信息和两个分支的共同对象线索,为跨模态信息交互提供了增强的视觉特征。基于单尺度特征,ETHA在黄金WSFSS数据集PASCAL-和COCO-上建立了新的最先进的结果。这些结果突出了ETHA在提高SAGIN环境中健壮应用程序的可访问性和效率方面的潜力。
{"title":"Multimodal Hierarchical Attention Framework for Efficient Weakly Supervised Few-Shot Segmentation Under SAGIN Environment","authors":"Wenqiang Yuan,&nbsp;Yin Tang,&nbsp;Xinhao Cai,&nbsp;Tao Chen,&nbsp;Yazhou Yao","doi":"10.1002/ett.70286","DOIUrl":"https://doi.org/10.1002/ett.70286","url":null,"abstract":"<div>\u0000 \u0000 <p>In the evolving landscape of the Space Air Ground-Integrated Network (SAGIN), addressing the challenges of limited labeled data and the need for adaptable models is crucial for effective data processing across diverse and heterogeneous sources. Weakly supervised few-shot semantic segmentation (WSFSS), aims to segment the unseen targets by solely relying on support images with class-level annotations, offering a robust solution to the complexities inherent in SAGIN environments. Existing works usually generate pseudo masks for training images, and then convert WSFSS to the plain few-shot semantic segmentation task. However, these rough pseudo masks, almost always, contain background noise due to imprecise object localization during mask generation, which thus leads to undesirable segmentation results. To mitigate the above challenge, we inject implicit text supervision into WSFSS, and propose an efficient text-guided hierarchical attention (ETHA) framework to explicitly alleviate the mask noise issue. Specifically, we first propose a cross-modal interaction attention module to capture comprehensive object guidance from text embeddings and refocus the model's attention toward the area of the focused object. In addition, we propose a lightweight dual visual cross-attention module to efficiently aggregate the contextual information among each branch and common object clues from both branches, which provides enhanced visual features to facilitate the cross-modal information interaction. Based on single-scale features, ETHA has established new state-of-the-art results on the golden WSFSS datasets, that is, PASCAL-<span></span><math></math> and COCO-<span></span><math></math>. These results highlight ETHA's potential for improving accessibility and efficiency for robust applications in SAGIN environment.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145406517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variable Grid-Based Path-Planning Approach for UAVs in Air-Ground Integrated Network 地空一体化网络中无人机基于变网格的路径规划方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-24 DOI: 10.1002/ett.70276
Yilong Ren, Ya Gao, Wenxiang Xu, Chien-Ming Chen, Mohammed Amoon

The operation of Unmanned Aerial Vehicles (UAVs) in low-altitude airspace is a key component in the Space-Air-Ground Integrated Network (SAGIN). Efficient and rational path planning is essential for UAV operations. Existing path-planning algorithms typically rely on uniform-grid models based on Cartesian coordinate systems, which seldom account for the unique characteristics of UAV terminal airspaces. UAV terminal airspaces are often defined as cylindrical volumes where multiple UAVs converge at vertiports, allowing for higher operational densities compared to en-route airspaces. While a fine-grained grid model is essential for UAV terminal airspace, it is inefficient for en-route airspace due to excessive computational costs. This paper presents a path-planning approach based on a variable grid model to find the optimal path while effectively utilizing airspace resources and minimizing computational overhead. Specifically, for the UAV terminal airspace, we propose the Grid-Optimized A* Path-Planning (GO-APP) algorithm, which establishes a sector-grid model based on a cylindrical coordinate system to find the optimal path. Extending to the en-route airspace, the Variable-Grid A* Path-Planning (VG-APP) algorithm integrates the GO-APP and A* algorithms to search the optimal path by stages. Simulations indicate that as the obstacle density in terminal airspace increases from 10% to 40%, GO-APP demonstrates a path length improvement ranging from 0.78% to 24.46% relative to A*. In generating a path from en-route airspace to terminal airspace, VG-APP significantly outperforms A*, reducing path length by up to 15.39% along with improving computational efficiency by 30.54%. Additionally, experiments in the real-world city of Hangzhou validate the effectiveness of the proposed approach.

无人机在低空空域的操作是天空地一体化网络(SAGIN)的关键组成部分。高效、合理的路径规划是无人机作战的关键。现有的路径规划算法通常依赖于基于笛卡尔坐标系的均匀网格模型,很少考虑无人机终端空域的独特性。无人机终端空域通常被定义为圆柱形体,其中多架无人机在垂直端口汇聚,与航线空域相比,允许更高的操作密度。对于无人机终端空域,细粒度网格模型是必不可少的,但对于航路空域,由于计算成本过高,其效率低下。本文提出了一种基于可变网格模型的路径规划方法,在有效利用空域资源和最小化计算开销的前提下找到最优路径。具体而言,针对无人机终端空域,提出了网格优化A*路径规划(GO-APP)算法,该算法基于柱坐标系建立扇形网格模型,寻找最优路径。变网格A*路径规划(VG-APP)算法扩展到航路空域,将GO-APP和A*算法相结合,分阶段搜索最优路径。仿真结果表明,当终端空域障碍物密度从10%增加到40%时,GO-APP相对于a *的路径长度改善幅度为0.78% ~ 24.46%。在生成从航路空域到终端空域的路径时,vag - app显著优于a *,路径长度最多减少15.39%,计算效率提高30.54%。此外,在现实城市杭州的实验验证了该方法的有效性。
{"title":"Variable Grid-Based Path-Planning Approach for UAVs in Air-Ground Integrated Network","authors":"Yilong Ren,&nbsp;Ya Gao,&nbsp;Wenxiang Xu,&nbsp;Chien-Ming Chen,&nbsp;Mohammed Amoon","doi":"10.1002/ett.70276","DOIUrl":"https://doi.org/10.1002/ett.70276","url":null,"abstract":"<div>\u0000 \u0000 <p>The operation of Unmanned Aerial Vehicles (UAVs) in low-altitude airspace is a key component in the Space-Air-Ground Integrated Network (SAGIN). Efficient and rational path planning is essential for UAV operations. Existing path-planning algorithms typically rely on uniform-grid models based on Cartesian coordinate systems, which seldom account for the unique characteristics of UAV terminal airspaces. UAV terminal airspaces are often defined as cylindrical volumes where multiple UAVs converge at vertiports, allowing for higher operational densities compared to en-route airspaces. While a fine-grained grid model is essential for UAV terminal airspace, it is inefficient for en-route airspace due to excessive computational costs. This paper presents a path-planning approach based on a variable grid model to find the optimal path while effectively utilizing airspace resources and minimizing computational overhead. Specifically, for the UAV terminal airspace, we propose the Grid-Optimized A* Path-Planning (GO-APP) algorithm, which establishes a sector-grid model based on a cylindrical coordinate system to find the optimal path. Extending to the en-route airspace, the Variable-Grid A* Path-Planning (VG-APP) algorithm integrates the GO-APP and A* algorithms to search the optimal path by stages. Simulations indicate that as the obstacle density in terminal airspace increases from 10% to 40%, GO-APP demonstrates a path length improvement ranging from 0.78% to 24.46% relative to A*. In generating a path from en-route airspace to terminal airspace, VG-APP significantly outperforms A*, reducing path length by up to 15.39% along with improving computational efficiency by 30.54%. Additionally, experiments in the real-world city of Hangzhou validate the effectiveness of the proposed approach.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145341516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing 5G-Enabled CPS and IoT With VANET: Key Agreement Methods for Enhanced Identification 使用VANET保护支持5g的CPS和IoT:增强识别的密钥协议方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-17 DOI: 10.1002/ett.70259
P. B. Smitha, P. Kavipriya

Despite presenting significant safety concerns, the proliferation of Cyber-Physical Systems (CPS) in industries such as electricity distribution and medicine has spurred innovative applications. The integration of 5G technology, Software-Defined Networking (SDN), and Vehicular Ad Hoc Networks (VANET) within Industrial CPS (ICPS) enables dynamic, real-time interactions but also exposes these systems to vulnerabilities and potential malicious activities. Addressing these risks requires robust security strategies that safeguard both the physical and digital components of CPS. In this context, the Strengthening the Safety of 5G-Enabled CPS using Key Agreement Method (SSKAM) framework is proposed. It incorporates a triple-element user identification technique leveraging user passwords, mobile devices, and unique biometrics. This approach ensures two-way authentication and facilitates the establishment of secure session keys for encrypted communication between registered users, CPS smart devices, and VANETs. The study also explores advanced key agreement methods tailored for 5G-enabled CPS, focusing on enhancing identification protocols while maintaining a balance between computational efficiency, communication overhead, and resilience to emerging threats. By integrating SDN, the framework enforces dynamic security measures at the network level, ensuring real-time adaptability to potential threats. Comprehensive evaluations demonstrate the efficacy of the proposed SSKAM framework in mitigating risks such as replay attacks, impersonation, and man-in-the-middle assaults. The results highlight its viability in safeguarding the integrity and confidentiality of CPS, offering a scalable, efficient, and practical solution to address the evolving security challenges in 5G-enabled CPS integrated with IoT ecosystems and VANETs.

尽管存在严重的安全问题,但网络物理系统(CPS)在电力分配和医疗等行业的激增刺激了创新应用。5G技术、软件定义网络(SDN)和车载自组织网络(VANET)在工业CPS (ICPS)中的集成实现了动态、实时的交互,但也使这些系统暴露于漏洞和潜在的恶意活动中。解决这些风险需要强大的安全策略来保护CPS的物理和数字组件。在此背景下,提出了使用密钥协议方法(SSKAM)框架加强5g支持的CPS的安全性。它结合了一种利用用户密码、移动设备和独特生物识别技术的三元素用户识别技术。这种方式既保证了认证的双向性,又便于建立安全会话密钥,用于注册用户、CPS智能设备和vanet之间的加密通信。该研究还探讨了为支持5g的CPS量身定制的高级关键协议方法,重点是增强识别协议,同时保持计算效率、通信开销和应对新威胁的弹性之间的平衡。该框架通过集成SDN,在网络层面实施动态安全措施,确保对潜在威胁的实时适应能力。综合评估证明了所提出的SSKAM框架在减轻诸如重放攻击、冒充和中间人攻击等风险方面的有效性。结果突出了其在保护CPS完整性和保密性方面的可行性,提供了可扩展、高效和实用的解决方案,以应对与物联网生态系统和vanet集成的5g CPS中不断变化的安全挑战。
{"title":"Securing 5G-Enabled CPS and IoT With VANET: Key Agreement Methods for Enhanced Identification","authors":"P. B. Smitha,&nbsp;P. Kavipriya","doi":"10.1002/ett.70259","DOIUrl":"https://doi.org/10.1002/ett.70259","url":null,"abstract":"<div>\u0000 \u0000 <p>Despite presenting significant safety concerns, the proliferation of Cyber-Physical Systems (CPS) in industries such as electricity distribution and medicine has spurred innovative applications. The integration of 5G technology, Software-Defined Networking (SDN), and Vehicular Ad Hoc Networks (VANET) within Industrial CPS (ICPS) enables dynamic, real-time interactions but also exposes these systems to vulnerabilities and potential malicious activities. Addressing these risks requires robust security strategies that safeguard both the physical and digital components of CPS. In this context, the Strengthening the Safety of 5G-Enabled CPS using Key Agreement Method (SSKAM) framework is proposed. It incorporates a triple-element user identification technique leveraging user passwords, mobile devices, and unique biometrics. This approach ensures two-way authentication and facilitates the establishment of secure session keys for encrypted communication between registered users, CPS smart devices, and VANETs. The study also explores advanced key agreement methods tailored for 5G-enabled CPS, focusing on enhancing identification protocols while maintaining a balance between computational efficiency, communication overhead, and resilience to emerging threats. By integrating SDN, the framework enforces dynamic security measures at the network level, ensuring real-time adaptability to potential threats. Comprehensive evaluations demonstrate the efficacy of the proposed SSKAM framework in mitigating risks such as replay attacks, impersonation, and man-in-the-middle assaults. The results highlight its viability in safeguarding the integrity and confidentiality of CPS, offering a scalable, efficient, and practical solution to address the evolving security challenges in 5G-enabled CPS integrated with IoT ecosystems and VANETs.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Dynamic Window Approach for UAV Local Path Planning in Multi-Dynamic Obstacles Environments Using Sparrow Search Algorithm 基于麻雀搜索算法的多动态障碍物环境下无人机局部路径规划改进动态窗口法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-17 DOI: 10.1002/ett.70284
Lin Zhang, Yan Li, Yang Yu, Yao Zhao, Wei Song, Gunther Retscher

The traditional Dynamic Window Approach (DWA) for local path planning of unmanned aerial vehicles (UAVs) exhibits limitations in flexibility and robustness. Specifically, its fixed evaluation function weights, velocity sampling resolution, and dynamic window ranges fail to adapt to changing environmental conditions, resulting in reduced adaptability of the velocity search space. To address this issue, this study proposes an improved DWA based on the Sparrow Search Algorithm (SSA). First, the proposed algorithm adaptively adjusts dynamic window parameters according to the complexity of the obstacle environment, thereby optimizing the UAV's velocity search space. Second, a velocity sampling resolution strategy is introduced to achieve an effective trade-off between the quality and quantity of predicted trajectories based on the density of dynamic obstacles. Third, by leveraging the strong global search capability and rapid convergence properties of the SSA, the weights of the evaluation function are adaptively optimized to enhance global optimality. Experimental results show that, compared with DWA in a dense multiple dynamic-static obstacles scenario, the proposed algorithm achieves improvements of 8.8%, 66.7%, and 18% in path length, safety distance, and number of iterations, respectively. These enhancements contribute to improved planning efficiency, safety, and overall optimality in UAV operations.

传统的动态窗口法(DWA)用于无人机局部路径规划,在灵活性和鲁棒性方面存在局限性。具体而言,其固定的评价函数权值、速度采样分辨率和动态窗口范围不能适应不断变化的环境条件,导致速度搜索空间的适应性降低。针对这一问题,本文提出了一种基于麻雀搜索算法(SSA)的改进DWA算法。首先,该算法根据障碍物环境的复杂性自适应调整动态窗口参数,从而优化无人机的速度搜索空间;其次,引入了速度采样分辨率策略,实现了基于动态障碍物密度的预测轨迹质量和数量之间的有效权衡。第三,利用SSA强大的全局搜索能力和快速收敛的特性,自适应优化评价函数的权重,增强全局最优性。实验结果表明,与密集多动-静态障碍物场景下的DWA相比,本文算法在路径长度、安全距离和迭代次数方面分别提高了8.8%、66.7%和18%。这些增强有助于改进无人机操作的规划效率、安全性和整体最优性。
{"title":"Improved Dynamic Window Approach for UAV Local Path Planning in Multi-Dynamic Obstacles Environments Using Sparrow Search Algorithm","authors":"Lin Zhang,&nbsp;Yan Li,&nbsp;Yang Yu,&nbsp;Yao Zhao,&nbsp;Wei Song,&nbsp;Gunther Retscher","doi":"10.1002/ett.70284","DOIUrl":"https://doi.org/10.1002/ett.70284","url":null,"abstract":"<div>\u0000 <p>The traditional Dynamic Window Approach (DWA) for local path planning of unmanned aerial vehicles (UAVs) exhibits limitations in flexibility and robustness. Specifically, its fixed evaluation function weights, velocity sampling resolution, and dynamic window ranges fail to adapt to changing environmental conditions, resulting in reduced adaptability of the velocity search space. To address this issue, this study proposes an improved DWA based on the Sparrow Search Algorithm (SSA). First, the proposed algorithm adaptively adjusts dynamic window parameters according to the complexity of the obstacle environment, thereby optimizing the UAV's velocity search space. Second, a velocity sampling resolution strategy is introduced to achieve an effective trade-off between the quality and quantity of predicted trajectories based on the density of dynamic obstacles. Third, by leveraging the strong global search capability and rapid convergence properties of the SSA, the weights of the evaluation function are adaptively optimized to enhance global optimality. Experimental results show that, compared with DWA in a dense multiple dynamic-static obstacles scenario, the proposed algorithm achieves improvements of 8.8%, 66.7%, and 18% in path length, safety distance, and number of iterations, respectively. These enhancements contribute to improved planning efficiency, safety, and overall optimality in UAV operations.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1