首页 > 最新文献

2021 IEEE/CIC International Conference on Communications in China (ICCC)最新文献

英文 中文
A lightweight UAV recognition algorithm based on micro-Doppler features 一种基于微多普勒特征的轻型无人机识别算法
Pub Date : 2021-07-28 DOI: 10.1109/iccc52777.2021.9580410
Yilin Wang, Caidan Zhao, Gege Luo
The radar realizes unmanned aerial vehicle (UAV) recognition using the micro-Doppler effect caused by UAV rotors' rotation to extract micro-Doppler features of rotor echo signals. For example, principal component analysis (PCA) algorithm can extract features from the time-frequency spectrums obtained by the time-frequency analysis or its corresponding images. However, conventional frequency spectrums have a large amount of data, and PCA requires additional data dimension conversion when processing samples, prone to high covariance matrix dimensions and high computational complexity, which causes the time delay of feature extraction to increase exponentially. Therefore, in order to achieve lightweight and efficient individual recognition of small UAVs, this paper performs fast fourier transform (FFT) along the time dimension on spectrums, uses two-dimension principal component analysis (2DPCA) to reduce the data dimension to extract UAV micro-Doppler features, and send them to supervised learning classifiers to obtain the recognition results. The feature extraction algorithm takes a single sample as a calculation unit, which avoids high-dimensional data conversion, reduces computational complexity, and shortens the feature extraction time delay, with an average recognition rate of 98.44%.
该雷达利用无人机旋翼旋转产生的微多普勒效应提取旋翼回波信号的微多普勒特征,实现无人机识别。例如,主成分分析(PCA)算法可以从时频分析得到的时频频谱或其对应的图像中提取特征。然而,传统频谱数据量大,PCA在处理样本时需要额外的数据维数转换,容易出现协方差矩阵维数高、计算复杂度高的问题,导致特征提取的时间延迟呈指数级增长。因此,为了实现小型无人机轻量化高效的个体识别,本文对频谱沿时间维进行快速傅里叶变换(FFT),利用二维主成分分析(2DPCA)对数据降维提取无人机微多普勒特征,并将其发送给监督学习分类器获得识别结果。特征提取算法以单个样本为计算单元,避免了高维数据转换,降低了计算复杂度,缩短了特征提取时延,平均识别率为98.44%。
{"title":"A lightweight UAV recognition algorithm based on micro-Doppler features","authors":"Yilin Wang, Caidan Zhao, Gege Luo","doi":"10.1109/iccc52777.2021.9580410","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580410","url":null,"abstract":"The radar realizes unmanned aerial vehicle (UAV) recognition using the micro-Doppler effect caused by UAV rotors' rotation to extract micro-Doppler features of rotor echo signals. For example, principal component analysis (PCA) algorithm can extract features from the time-frequency spectrums obtained by the time-frequency analysis or its corresponding images. However, conventional frequency spectrums have a large amount of data, and PCA requires additional data dimension conversion when processing samples, prone to high covariance matrix dimensions and high computational complexity, which causes the time delay of feature extraction to increase exponentially. Therefore, in order to achieve lightweight and efficient individual recognition of small UAVs, this paper performs fast fourier transform (FFT) along the time dimension on spectrums, uses two-dimension principal component analysis (2DPCA) to reduce the data dimension to extract UAV micro-Doppler features, and send them to supervised learning classifiers to obtain the recognition results. The feature extraction algorithm takes a single sample as a calculation unit, which avoids high-dimensional data conversion, reduces computational complexity, and shortens the feature extraction time delay, with an average recognition rate of 98.44%.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":" 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132125168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-Based and Energy-Constrained Data Collection System with Trajectory, Time, and Collection Scheduling Optimization 基于无人机的能量约束数据采集系统的轨迹、时间和采集调度优化
Pub Date : 2021-07-28 DOI: 10.1109/iccc52777.2021.9580291
Kehao Wang, Zheng Tang, Pei Liu, Yirui Cong, Xiangke Wang, Dejin Kong, Yitong Li
Our paper considers a scenario where an UAV collects data from multiple ground nodes (GNs). The UAV flying energy consumption and the data transmit energy consumption of GNs are regarded as a whole constraint. Through jointly optimizing the data collection scheduling, UAV trajectory, data collection time and data transmit power of GNs, we propose an optimization problem to maximize the minimum amount of data collected from GNs, which improves the fairness of data collected from each GN and reduce data collection time corresponding to the obtained trajectory. Because the formulated problem is non-convex, we first break it down into several subproblems, and then an iterative optimization algorithm is proposed to deal with the above problems through applying successive convex approximation (SCA) technique and block coordinate descent (BCD) method. Simulations show that the optimization algorithm accomplishes the above goal vary well.
本文考虑了无人机从多个地面节点(gn)收集数据的场景。将无人机的飞行能耗和GNs的数据传输能耗视为一个整体约束。通过对GN的数据采集调度、无人机轨迹、数据采集时间和数据传输功率进行联合优化,提出了从GN采集数据量最小最大化的优化问题,提高了每个GN采集数据的公平性,减少了所获得轨迹对应的数据采集时间。由于所述问题为非凸问题,我们首先将其分解为若干子问题,然后利用逐次凸逼近(SCA)技术和块坐标下降(BCD)方法提出了一种迭代优化算法来处理上述问题。仿真结果表明,该优化算法较好地实现了上述目标。
{"title":"UAV-Based and Energy-Constrained Data Collection System with Trajectory, Time, and Collection Scheduling Optimization","authors":"Kehao Wang, Zheng Tang, Pei Liu, Yirui Cong, Xiangke Wang, Dejin Kong, Yitong Li","doi":"10.1109/iccc52777.2021.9580291","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580291","url":null,"abstract":"Our paper considers a scenario where an UAV collects data from multiple ground nodes (GNs). The UAV flying energy consumption and the data transmit energy consumption of GNs are regarded as a whole constraint. Through jointly optimizing the data collection scheduling, UAV trajectory, data collection time and data transmit power of GNs, we propose an optimization problem to maximize the minimum amount of data collected from GNs, which improves the fairness of data collected from each GN and reduce data collection time corresponding to the obtained trajectory. Because the formulated problem is non-convex, we first break it down into several subproblems, and then an iterative optimization algorithm is proposed to deal with the above problems through applying successive convex approximation (SCA) technique and block coordinate descent (BCD) method. Simulations show that the optimization algorithm accomplishes the above goal vary well.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Greedy Control Policy for Latency and Energy Constrained Wireless Federated Learning 延迟与能量约束无线联邦学习的贪心控制策略
Pub Date : 2021-07-28 DOI: 10.1109/iccc52777.2021.9580361
Rui Sun, M. Tao
For federated learning, each device participates in the model learning in a collaborative training manner. Due to the constraint of delay and energy consumption in actual wireless environment, resource allocation is essential for the convergence speed of federated learning. This paper analyzes the convergence bound of federated learning from a theoretical perspective, based on which, we propose a greedy control policy that combines aggregation frequency control and device scheduling together. The proposed policy minimizes the loss of model training under a given time and energy budget with a greedy strategy which eliminates the device with the worst performance gain in each step. Simulation results show that under different wireless environments, the proposed global control policy achieves higher accuracy than the commonly used federated learning algorithms and has a good robustness to non-i.i.d. data.
对于联邦学习,每个设备以协作训练的方式参与模型学习。由于实际无线环境中时延和能量消耗的限制,资源分配对联邦学习的收敛速度至关重要。本文从理论的角度分析了联邦学习的收敛界,在此基础上提出了一种将聚合频率控制和设备调度相结合的贪心控制策略。该策略采用贪婪策略,在给定的时间和能量预算下,将每一步性能增益最差的设备淘汰,从而最大限度地减少模型训练的损失。仿真结果表明,在不同的无线环境下,所提出的全局控制策略比常用的联邦学习算法具有更高的精度,并且对非pid具有良好的鲁棒性。数据。
{"title":"A Greedy Control Policy for Latency and Energy Constrained Wireless Federated Learning","authors":"Rui Sun, M. Tao","doi":"10.1109/iccc52777.2021.9580361","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580361","url":null,"abstract":"For federated learning, each device participates in the model learning in a collaborative training manner. Due to the constraint of delay and energy consumption in actual wireless environment, resource allocation is essential for the convergence speed of federated learning. This paper analyzes the convergence bound of federated learning from a theoretical perspective, based on which, we propose a greedy control policy that combines aggregation frequency control and device scheduling together. The proposed policy minimizes the loss of model training under a given time and energy budget with a greedy strategy which eliminates the device with the worst performance gain in each step. Simulation results show that under different wireless environments, the proposed global control policy achieves higher accuracy than the commonly used federated learning algorithms and has a good robustness to non-i.i.d. data.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130712746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Massive Connectivity in MIMO-OFDM Systems With Frequency Selectivity Compensation 具有频率选择性补偿的MIMO-OFDM系统的大规模连接
Pub Date : 2021-07-28 DOI: 10.1109/iccc52777.2021.9580244
Wenjung Jiang, Ming Yue, Xiaojun Yuan, Yong Zuo
This paper considers the joint design of device activity detection and channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) based grant-free non-orthogonal multiple access (NOMA) systems. In specific, we leverage the correlation of the channel frequency responses in typical narrow-band massive machine-type communication (mMTC) to establish a blockwise linear channel model. In the proposed channel model, the continuous OFDM subcarriers are divided into several subblocks. A linear function with only two variables (mean and slope) is used to approximate the frequency-selective channel in each sub-block. This significantly reduces the number of variables to be determined in channel estimation. We then formulate the joint active device detection and channel estimation as a Bayesian inference problem. By exploiting the block-sparsity of the channel matrix, an efficient turbo message passing (Turbo- MP) algorithm is developed to resolve the Bayesian inference problem with near- linear complexity. We show that Turbo-MP achieves superior performance over the state-of-the-art algorithms.
研究了基于多输入多输出(MIMO)正交频分复用(OFDM)的无授权非正交多址(NOMA)系统中设备活动检测和信道估计的联合设计。具体而言,我们利用典型窄带大规模机器类型通信(mMTC)中信道频率响应的相关性来建立块线性信道模型。在该信道模型中,连续OFDM子载波被划分为若干子块。使用只有两个变量(平均值和斜率)的线性函数来近似每个子块中的频率选择通道。这大大减少了信道估计中需要确定的变量的数量。然后,我们将联合有源设备检测和信道估计表述为贝叶斯推理问题。利用信道矩阵的块稀疏性,提出了一种高效的turbo消息传递(turbo - MP)算法来解决具有近线性复杂性的贝叶斯推理问题。我们表明Turbo-MP比最先进的算法实现了卓越的性能。
{"title":"Massive Connectivity in MIMO-OFDM Systems With Frequency Selectivity Compensation","authors":"Wenjung Jiang, Ming Yue, Xiaojun Yuan, Yong Zuo","doi":"10.1109/iccc52777.2021.9580244","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580244","url":null,"abstract":"This paper considers the joint design of device activity detection and channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) based grant-free non-orthogonal multiple access (NOMA) systems. In specific, we leverage the correlation of the channel frequency responses in typical narrow-band massive machine-type communication (mMTC) to establish a blockwise linear channel model. In the proposed channel model, the continuous OFDM subcarriers are divided into several subblocks. A linear function with only two variables (mean and slope) is used to approximate the frequency-selective channel in each sub-block. This significantly reduces the number of variables to be determined in channel estimation. We then formulate the joint active device detection and channel estimation as a Bayesian inference problem. By exploiting the block-sparsity of the channel matrix, an efficient turbo message passing (Turbo- MP) algorithm is developed to resolve the Bayesian inference problem with near- linear complexity. We show that Turbo-MP achieves superior performance over the state-of-the-art algorithms.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132906816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Communication for Multi-user Massive MIMO System With Finite Alphabet Inputs 有限字母输入多用户大规模MIMO系统的安全通信
Pub Date : 2021-07-28 DOI: 10.1109/iccc52777.2021.9580294
Xianyu Zhang, Tao Liang, K. An, Yifu Sun
This paper investigates the secure transmission for multi-user massive MIMO system with finite alphabet inputs, where a multi-antenna eavesdropper attempts to wiretap the confidential data to legitimate users. Specifically, by exploiting the null-space artificial noise (AN) generation for security enhancement, the closed-form expression of an approximated ergodic secrecy rate is derived with respect to key system parameters including the number of the antennas and users, transmit power, finite alphabet set, etc. Considering the large antenna regime, the behavior of the asymptotic ergodic secrecy rate is also analyzed. Based on the asymptotical results, a low complexity power allocation optimization problem for maximizing the achievable secrecy rate is then presented. Numerical results demonstrate the accuracy of the analytical expressions, as well as the effectiveness of the proposed power control algorithm.
本文研究了具有有限字母输入的多用户大规模MIMO系统的安全传输问题,其中多天线窃听者试图将机密数据窃听到合法用户。具体地说,利用零空间人工噪声(AN)的产生来增强安全性,推导了近似遍历保密率关于系统关键参数(包括天线和用户数量、发射功率、有限字母表集等)的封闭表达式。考虑到较大的天线区域,分析了渐近遍历保密率的行为。在此基础上,提出了一个低复杂度的最大可达保密率的功率分配优化问题。数值结果证明了解析表达式的准确性,以及所提功率控制算法的有效性。
{"title":"Secure Communication for Multi-user Massive MIMO System With Finite Alphabet Inputs","authors":"Xianyu Zhang, Tao Liang, K. An, Yifu Sun","doi":"10.1109/iccc52777.2021.9580294","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580294","url":null,"abstract":"This paper investigates the secure transmission for multi-user massive MIMO system with finite alphabet inputs, where a multi-antenna eavesdropper attempts to wiretap the confidential data to legitimate users. Specifically, by exploiting the null-space artificial noise (AN) generation for security enhancement, the closed-form expression of an approximated ergodic secrecy rate is derived with respect to key system parameters including the number of the antennas and users, transmit power, finite alphabet set, etc. Considering the large antenna regime, the behavior of the asymptotic ergodic secrecy rate is also analyzed. Based on the asymptotical results, a low complexity power allocation optimization problem for maximizing the achievable secrecy rate is then presented. Numerical results demonstrate the accuracy of the analytical expressions, as well as the effectiveness of the proposed power control algorithm.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133092643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Current Control for MISO-OFDM Based Through-the-Earth Communications with Magnetic Induction 基于磁感应通地通信的MISO-OFDM最优电流控制
Pub Date : 2021-07-28 DOI: 10.1109/iccc52777.2021.9580360
Jianyu Wang, Wenchi Cheng, Hailin Zhang
Magnetic induction (MI) communications are widely used to realize through-the-earth transmissions due to the advantages of high penetration efficiency, stable channel, and small antenna size. However, traditional MI communications are mainly based on single or multiple carriers with resonant frequencies, which makes the achievable rate much less than the capacity of frequency-selective MI channel. To approach the capacity of frequency-selective MI channel, we formulate the orthogonal-frequency-division-multiplexing (OFDM) based MI communication framework, where resonant frequency and nonresonant frequencies are comprehensively utilized. Also, multiple transmit coils are equipped for the aboveground user to enhance the receive power of the underground user with single coil. We propose the optimal current control scheme in closed-form, which aims at maximizing the achievable rate under the constraint of transmit power. Based on the proposed current control scheme, the approximate expression for the capacity of frequency-selective multiple-input-single-output MI (MISO-MI) channel is given. Numerical results verify our theoretical analyses and show that MISO-OFDM based MI communication system can significantly increase the achievable rate. It is also shown that the proposed current control scheme can achieve larger achievable rate as compared with other schemes.
磁感应通信(MI)由于具有穿透效率高、信道稳定、天线体积小等优点,被广泛用于实现透地传输。然而,传统的MI通信主要基于谐振频率的单个或多个载波,这使得可实现的速率远远小于频率选择MI信道的容量。为了研究频率选择的MI信道容量,我们制定了基于正交频分复用(OFDM)的MI通信框架,其中综合利用了谐振频率和非谐振频率。同时,为地上用户配置多个发射线圈,以增强地下用户单线圈的接收功率。我们提出了一种闭式最优电流控制方案,其目标是在发射功率约束下使可达速率最大化。基于所提出的电流控制方案,给出了频率选择多输入单输出MI (MISO-MI)通道容量的近似表达式。数值结果验证了我们的理论分析,表明基于MISO-OFDM的MI通信系统可以显著提高可达速率。与其他方案相比,本文提出的电流控制方案可以达到更高的可达率。
{"title":"Optimal Current Control for MISO-OFDM Based Through-the-Earth Communications with Magnetic Induction","authors":"Jianyu Wang, Wenchi Cheng, Hailin Zhang","doi":"10.1109/iccc52777.2021.9580360","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580360","url":null,"abstract":"Magnetic induction (MI) communications are widely used to realize through-the-earth transmissions due to the advantages of high penetration efficiency, stable channel, and small antenna size. However, traditional MI communications are mainly based on single or multiple carriers with resonant frequencies, which makes the achievable rate much less than the capacity of frequency-selective MI channel. To approach the capacity of frequency-selective MI channel, we formulate the orthogonal-frequency-division-multiplexing (OFDM) based MI communication framework, where resonant frequency and nonresonant frequencies are comprehensively utilized. Also, multiple transmit coils are equipped for the aboveground user to enhance the receive power of the underground user with single coil. We propose the optimal current control scheme in closed-form, which aims at maximizing the achievable rate under the constraint of transmit power. Based on the proposed current control scheme, the approximate expression for the capacity of frequency-selective multiple-input-single-output MI (MISO-MI) channel is given. Numerical results verify our theoretical analyses and show that MISO-OFDM based MI communication system can significantly increase the achievable rate. It is also shown that the proposed current control scheme can achieve larger achievable rate as compared with other schemes.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124102393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison and Modeling of Multi-Frequency Wideband Channels at Sub-6 GHz Bands sub - 6ghz多频宽带信道的比较与建模
Pub Date : 2021-07-28 DOI: 10.1109/iccc52777.2021.9580440
Xinyue Chen, Zihao Zhou, Li Zhang, Chengxiang Wang, Jie Huang
Developing multi-frequency cooperation algorithms in wireless communication systems has been a topic of interest since the ever-growing complexity and network density prompt the current system to work at multiple frequencies. In this paper, firstly a wideband multiple-input and multiple-output (MIMO) channel model capable of reflecting characteristics in multi-frequency systems is presented, in which channel impulse response is given, and then large-scale and small-scale channel model parameters are investigated for their frequency dependence. In order to gain deeper insight into the behaviors of channels with different sub-6 GHz bands, a simulation setup is established, which compares multiple channel properties at widely available frequencies, namely 2.4, 3.5, and 5 GHz. Statistical properties such as time auto correlation function (ACF), and frequency correlation function (FCF) of the same frequency, spatial correlation coefficients between different frequencies, as well as instantaneous delay power spectrum density (PSD)) are among the metrics to be compared. Analysis of the comparisons offers insightful discoveries about channel characteristics. After justifying the presented multi-frequency channel model with data from measurement results, it is concluded that the model can be used to develop and evaluate multi-frequency communication protocols and systems.
随着无线通信系统的复杂性和网络密度的不断增加,当前的无线通信系统需要在多频率下工作,因此开发无线通信系统中的多频协同算法一直是人们关注的一个话题。本文首先提出了一种能够反映多频系统特性的宽带多输入多输出(MIMO)信道模型,给出了该信道的脉冲响应,然后研究了大尺度和小尺度信道模型参数的频率依赖性。为了更深入地了解不同sub-6 GHz频段的信道行为,建立了仿真装置,比较了广泛可用的频率(即2.4、3.5和5 GHz)下的多信道特性。比较的指标包括同频率的时间自相关函数(ACF)和频率相关函数(FCF)、不同频率间的空间相关系数以及瞬时延迟功率谱密度(PSD)等统计特性。通过对比分析,对河道特征有了深刻的认识。在用实测数据对所提出的多频信道模型进行验证后,得出该模型可用于开发和评估多频通信协议和系统的结论。
{"title":"Comparison and Modeling of Multi-Frequency Wideband Channels at Sub-6 GHz Bands","authors":"Xinyue Chen, Zihao Zhou, Li Zhang, Chengxiang Wang, Jie Huang","doi":"10.1109/iccc52777.2021.9580440","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580440","url":null,"abstract":"Developing multi-frequency cooperation algorithms in wireless communication systems has been a topic of interest since the ever-growing complexity and network density prompt the current system to work at multiple frequencies. In this paper, firstly a wideband multiple-input and multiple-output (MIMO) channel model capable of reflecting characteristics in multi-frequency systems is presented, in which channel impulse response is given, and then large-scale and small-scale channel model parameters are investigated for their frequency dependence. In order to gain deeper insight into the behaviors of channels with different sub-6 GHz bands, a simulation setup is established, which compares multiple channel properties at widely available frequencies, namely 2.4, 3.5, and 5 GHz. Statistical properties such as time auto correlation function (ACF), and frequency correlation function (FCF) of the same frequency, spatial correlation coefficients between different frequencies, as well as instantaneous delay power spectrum density (PSD)) are among the metrics to be compared. Analysis of the comparisons offers insightful discoveries about channel characteristics. After justifying the presented multi-frequency channel model with data from measurement results, it is concluded that the model can be used to develop and evaluate multi-frequency communication protocols and systems.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114485699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reinforcement Learning Based Accurate Detection of Malicious URLs with Multi-Feature Analysis 基于多特征分析的强化学习恶意url准确检测
Pub Date : 2021-07-28 DOI: 10.1109/iccc52777.2021.9580433
Xiaoyue Wan, Pengmin Li, Yuhuan Wang, Wei Wei, Liang Xiao
Malicious URLs result in malware installation, privacy leakage and illegal funding of mobile devices and computers. However, attackers frequently change domain names of URLs to avoid static detection and the malicious URL detection has to address variance in structure of domain names, which seriously degrades the detection accuracy in fixed detection policy selection and impedes optimal policy selection with theoretical analysis. In this paper, we propose an accurate detection of malicious URLs to protect Internet users from accessing malicious URLs, which designs a multi-feature analysis architecture to exploit lexical and content-based features and applies reinforcement learning (RL) to choose the detection mode and parameter. We provide a lightweight RL-based detection with transfer learning and a deep RL-based detection to further improve the detection accuracy for the server with sufficient computation resources. Malicious URLs that have specific domain name features including long numeric string or high percentage of the numeric character or alphabetic string without syllables are considered and simulation results show that this scheme improves the detection accuracy and increases the utility compared with the benchmark scheme.
恶意url导致恶意软件安装,隐私泄露和非法资金的移动设备和计算机。然而,攻击者经常改变URL的域名以避免静态检测,恶意URL检测需要解决域名结构的变化,这严重降低了固定检测策略选择的检测精度,阻碍了理论分析的最优策略选择。在本文中,我们提出了一种准确检测恶意url的方法,以保护互联网用户免受恶意url的访问。该方法设计了一种多特征分析架构,利用词法特征和基于内容的特征,并应用强化学习(RL)来选择检测模式和参数。我们提供了一种基于迁移学习的轻量级rl检测和一种基于深度rl的检测,以进一步提高具有足够计算资源的服务器的检测精度。仿真结果表明,与基准方案相比,该方案提高了检测精度,提高了实用性。
{"title":"Reinforcement Learning Based Accurate Detection of Malicious URLs with Multi-Feature Analysis","authors":"Xiaoyue Wan, Pengmin Li, Yuhuan Wang, Wei Wei, Liang Xiao","doi":"10.1109/iccc52777.2021.9580433","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580433","url":null,"abstract":"Malicious URLs result in malware installation, privacy leakage and illegal funding of mobile devices and computers. However, attackers frequently change domain names of URLs to avoid static detection and the malicious URL detection has to address variance in structure of domain names, which seriously degrades the detection accuracy in fixed detection policy selection and impedes optimal policy selection with theoretical analysis. In this paper, we propose an accurate detection of malicious URLs to protect Internet users from accessing malicious URLs, which designs a multi-feature analysis architecture to exploit lexical and content-based features and applies reinforcement learning (RL) to choose the detection mode and parameter. We provide a lightweight RL-based detection with transfer learning and a deep RL-based detection to further improve the detection accuracy for the server with sufficient computation resources. Malicious URLs that have specific domain name features including long numeric string or high percentage of the numeric character or alphabetic string without syllables are considered and simulation results show that this scheme improves the detection accuracy and increases the utility compared with the benchmark scheme.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114501117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phase Shift Matrix Optimization for IRS-Aided Legitimate Monitoring irs辅助合法监测的相移矩阵优化
Pub Date : 2021-07-28 DOI: 10.1109/iccc52777.2021.9580331
Meng Wang, Qinghe Du
This paper studies wireless covert monitoring technologies, where multiple legitimate monitors (LMs) make use of intelligent reflecting surface (IRS) to sustainably intercept information sent from a suspicious transmitter (ST) to a suspicious receiver (SR). In particular, we propose an IRS-aided active monitoring scheme aligning with the regular two-phase transmissions between the ST and SR. In the pilot-transmission (PT) phase, LMs adopt a pilot spoofing strategy, where LMs control an IRS to reflect pilot signals sent by the SR, leading the ST's channel estimation towards LMs' direction. In the data-transmission (DT) phase, the IRS is controlled to reflect the ST's signals in a way that the LMs' received signal-to-noise ratios (SNR) are optimized, while helping maintain the SR's received SNR beyond a certain threshold to achieve sustainable monitoring. We formulate a phase-shift-matrix optimization problem over PT and DT phases. The minorization-maximization (MM) algorithm was applied to deal with the non-convex optimization such that we can efficiently obtain the optimized phase-shift matrices. Simulation results presented demonstrate the SNR gain improvement and monitoring range expansion introduced by our proposed scheme over the traditional passive monitoring approach.
本文研究了无线隐蔽监控技术,其中多个合法监视器(lm)利用智能反射面(IRS)持续拦截从可疑发射器(ST)发送到可疑接收器(SR)的信息。特别是,我们提出了一种IRS辅助的主动监测方案,该方案与ST和SR之间的常规两相传输相一致。在导频传输(PT)阶段,lm采用导频欺骗策略,其中lm控制IRS以反映SR发送的导频信号,将ST的信道估计引向lm的方向。在数据传输(DT)阶段,IRS被控制以反映ST的信号,从而优化LMs的接收信噪比(SNR),同时帮助将SR的接收信噪比维持在一定阈值以上,以实现可持续监测。我们提出了PT和DT相的相移矩阵优化问题。采用最小-最大化(MM)算法处理非凸优化问题,可以有效地得到优化后的相移矩阵。仿真结果表明,与传统的无源监测方法相比,该方案提高了信噪比增益,扩大了监测范围。
{"title":"Phase Shift Matrix Optimization for IRS-Aided Legitimate Monitoring","authors":"Meng Wang, Qinghe Du","doi":"10.1109/iccc52777.2021.9580331","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580331","url":null,"abstract":"This paper studies wireless covert monitoring technologies, where multiple legitimate monitors (LMs) make use of intelligent reflecting surface (IRS) to sustainably intercept information sent from a suspicious transmitter (ST) to a suspicious receiver (SR). In particular, we propose an IRS-aided active monitoring scheme aligning with the regular two-phase transmissions between the ST and SR. In the pilot-transmission (PT) phase, LMs adopt a pilot spoofing strategy, where LMs control an IRS to reflect pilot signals sent by the SR, leading the ST's channel estimation towards LMs' direction. In the data-transmission (DT) phase, the IRS is controlled to reflect the ST's signals in a way that the LMs' received signal-to-noise ratios (SNR) are optimized, while helping maintain the SR's received SNR beyond a certain threshold to achieve sustainable monitoring. We formulate a phase-shift-matrix optimization problem over PT and DT phases. The minorization-maximization (MM) algorithm was applied to deal with the non-convex optimization such that we can efficiently obtain the optimized phase-shift matrices. Simulation results presented demonstrate the SNR gain improvement and monitoring range expansion introduced by our proposed scheme over the traditional passive monitoring approach.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129882496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure network slicing deployment in edge computing 边缘计算中的安全网络切片部署
Pub Date : 2021-07-28 DOI: 10.1109/iccc52777.2021.9580199
Yun Li, Xuefei Zhang, Xiaodong Xu, Xiaofeng Tao
As a key technology of 5G, network slicing can meet the different needs of different users and realize customized services. In some uRLLC application scenarios, network slicing can be combined with edge computing technology to better realize low latency service and ensure that data will not be uploaded to the core network. It can realize local storage and computing of data, to better protect the privacy of user data. Therefore, network slicing combined with edge computing is meaningful. To achieve this, we firstly propose a network slicing architecture in edge computing and realize the user access authentication to prove the advantage of the architecture. Secondly security constraints are described by trust degree, to meet the security requirements. Lastly we formulate the model as a mixed-integer linear program (MILP) and then evaluate our solution against a typical solution. Simulation results show that our scheme can provide a secure and efficient resource allocation solution. In short, this paper can be referred to when deploying secure network slicing in edge computing.
网络切片作为5G的一项关键技术,可以满足不同用户的不同需求,实现定制化服务。在一些uRLLC应用场景中,网络切片可以与边缘计算技术相结合,更好地实现低时延服务,保证数据不上传到核心网。它可以实现数据的本地存储和计算,更好地保护用户数据的隐私。因此,将网络切片与边缘计算相结合是很有意义的。为了实现这一点,我们首先提出了边缘计算中的网络切片架构,并实现了用户访问认证,以证明该架构的优势。其次,用信任程度来描述安全约束,以满足安全需求。最后,我们将模型表述为一个混合整数线性规划(MILP),然后根据一个典型解对我们的解进行评估。仿真结果表明,该方案能够提供一种安全、高效的资源分配方案。总之,本文可以在边缘计算中部署安全网络切片时参考。
{"title":"Secure network slicing deployment in edge computing","authors":"Yun Li, Xuefei Zhang, Xiaodong Xu, Xiaofeng Tao","doi":"10.1109/iccc52777.2021.9580199","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580199","url":null,"abstract":"As a key technology of 5G, network slicing can meet the different needs of different users and realize customized services. In some uRLLC application scenarios, network slicing can be combined with edge computing technology to better realize low latency service and ensure that data will not be uploaded to the core network. It can realize local storage and computing of data, to better protect the privacy of user data. Therefore, network slicing combined with edge computing is meaningful. To achieve this, we firstly propose a network slicing architecture in edge computing and realize the user access authentication to prove the advantage of the architecture. Secondly security constraints are described by trust degree, to meet the security requirements. Lastly we formulate the model as a mixed-integer linear program (MILP) and then evaluate our solution against a typical solution. Simulation results show that our scheme can provide a secure and efficient resource allocation solution. In short, this paper can be referred to when deploying secure network slicing in edge computing.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131981399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE/CIC International Conference on Communications in China (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1