首页 > 最新文献

ICT Express最新文献

英文 中文
Navigating the future of wireless networks: A multidimensional survey on semantic communications 引领无线网络的未来:语义通信多维调查
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.06.001

This paper offers an in-depth exploration of semantic communications, focusing on its integral role in wireless networks. We dissect its foundational architecture and the key elements that enable seamless AI integration. Our research categorizes semantic communications into various multimedia and task types, evaluating their applicability in both single and multitasking environments. We also investigate resource allocation and goal-oriented strategies, supported by empirical case studies. The paper concludes by spotlighting emerging trends, including AI, IoT, and 5G beyond. It identifies pressing challenges such as standardization, security, and efficiency. Our work provides a holistic understanding of contemporary semantic communications paradigms.

本文深入探讨了语义通信,重点关注其在无线网络中不可或缺的作用。我们剖析了语义通信的基础架构和实现人工智能无缝集成的关键要素。我们的研究将语义通信分为各种多媒体和任务类型,评估了它们在单任务和多任务环境中的适用性。我们还研究了资源分配和目标导向策略,并辅以实证案例研究。最后,本文重点介绍了人工智能、物联网和 5G 等新兴趋势。论文指出了标准化、安全性和效率等紧迫挑战。我们的工作提供了对当代语义通信范式的整体理解。
{"title":"Navigating the future of wireless networks: A multidimensional survey on semantic communications","authors":"","doi":"10.1016/j.icte.2024.06.001","DOIUrl":"10.1016/j.icte.2024.06.001","url":null,"abstract":"<div><p>This paper offers an in-depth exploration of semantic communications, focusing on its integral role in wireless networks. We dissect its foundational architecture and the key elements that enable seamless AI integration. Our research categorizes semantic communications into various multimedia and task types, evaluating their applicability in both single and multitasking environments. We also investigate resource allocation and goal-oriented strategies, supported by empirical case studies. The paper concludes by spotlighting emerging trends, including AI, IoT, and 5G beyond. It identifies pressing challenges such as standardization, security, and efficiency. Our work provides a holistic understanding of contemporary semantic communications paradigms.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 747-773"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000663/pdfft?md5=d8180959e946c2a5050dbb213ce6b98b&pid=1-s2.0-S2405959524000663-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141414210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence, Internet of things and 6G methodologies in the context of Vehicular Ad-hoc Networks (VANETs): Survey 车载无线网络(VANET)背景下的人工智能、物联网和 6G 方法:调查
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.05.008

Recent developments in the fields of communications, smart transportation systems and computer systems have significantly expanded the potential for intelligent solutions in the domains of traffic safety, convenience and efficiency. The utilization of Artificial Intelligence (AI) is presently prevalent across diverse sectors of application due to its significant capacity to augment conventional data-driven methodologies. In the domain of Vehicular Ad hoc NETworks (VANETs), data is regularly gathered from several sources. The collected data serves multiple goals, such as facilitating efficient routing, enhancing driver awareness, forecasting mobility patterns to prevent potential risks, and ultimately enhancing passenger comfort, safety and overall road experience. Internet of thing (IoT) can be a good solution fro many issues that of VANETs. In order to make a complete system of VANETs communications are very essential like 5G and 6G. This study provides a detailed examination of AI, IoT and 5G/6G methodologies currently being investigated by multiple research endeavors in the field of VANETs. The merits and demerits of the AI-based methodologies suggested for the VANET domain have been analyzed with the using of IoT and 5G/6G. In conclusion, forthcoming research prospects in the field of VANETs are ascertained.

通信、智能交通系统和计算机系统领域的最新发展极大地拓展了交通安全、便利和高效领域智能解决方案的潜力。由于人工智能(AI)在增强传统数据驱动方法方面具有显著能力,因此目前在各个应用领域都得到了广泛应用。在车载 Ad hoc 网络(VANET)领域,数据定期从多个来源收集。收集到的数据可实现多种目标,如促进高效路由选择、提高驾驶员意识、预测移动模式以预防潜在风险,以及最终提高乘客舒适度、安全性和整体道路体验。物联网(IoT)可以很好地解决 VANET 的许多问题。为了建立一个完整的 VANETs 系统,通信就像 5G 和 6G 一样必不可少。本研究对人工智能、物联网和 5G/6G 方法进行了详细分析,这些方法目前正在 VANETs 领域的多个研究项目中进行研究。通过使用物联网和 5G/6G 分析了为 VANET 领域建议的基于人工智能的方法的优缺点。最后,确定了 VANET 领域未来的研究前景。
{"title":"Artificial Intelligence, Internet of things and 6G methodologies in the context of Vehicular Ad-hoc Networks (VANETs): Survey","authors":"","doi":"10.1016/j.icte.2024.05.008","DOIUrl":"10.1016/j.icte.2024.05.008","url":null,"abstract":"<div><p>Recent developments in the fields of communications, smart transportation systems and computer systems have significantly expanded the potential for intelligent solutions in the domains of traffic safety, convenience and efficiency. The utilization of Artificial Intelligence (AI) is presently prevalent across diverse sectors of application due to its significant capacity to augment conventional data-driven methodologies. In the domain of Vehicular Ad hoc NETworks (VANETs), data is regularly gathered from several sources. The collected data serves multiple goals, such as facilitating efficient routing, enhancing driver awareness, forecasting mobility patterns to prevent potential risks, and ultimately enhancing passenger comfort, safety and overall road experience. Internet of thing (IoT) can be a good solution fro many issues that of VANETs. In order to make a complete system of VANETs communications are very essential like 5G and 6G. This study provides a detailed examination of AI, IoT and 5G/6G methodologies currently being investigated by multiple research endeavors in the field of VANETs. The merits and demerits of the AI-based methodologies suggested for the VANET domain have been analyzed with the using of IoT and 5G/6G. In conclusion, forthcoming research prospects in the field of VANETs are ascertained.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 959-980"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000584/pdfft?md5=9498981f6a175f79dec6a8259f894c25&pid=1-s2.0-S2405959524000584-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141140184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects 用于数字孪生中网络安全自动化、智能化和可信性的可解释人工智能:方法、分类、挑战和前景
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.05.007

Digital twins (DTs) are an emerging digitalization technology with a huge impact on today’s innovations in both industry and research. DTs can significantly enhance our society and quality of life through the virtualization of a real-world physical system, providing greater insights about their operations and assets, as well as enhancing their resilience through real-time monitoring and proactive maintenance. DTs also pose significant security risks, as intellectual property is encoded and more accessible, as well as their continued synchronization to their physical counterparts. The rapid proliferation and dynamism of cyber threats in today’s digital environments motivate the development of automated and intelligent cyber solutions. Today’s industrial transformation relies heavily on artificial intelligence (AI), including machine learning (ML) and data-driven technologies that allow machines to perform tasks such as self-monitoring, investigation, diagnosis, future prediction, and decision-making intelligently. However, to effectively employ AI-based models in the context of cybersecurity, human-understandable explanations, and their trustworthiness, are significant factors when making decisions in real-world scenarios. This article provides an extensive study of explainable AI (XAI) based cybersecurity modeling through a taxonomy of AI and XAI methods that can assist security analysts and professionals in comprehending system functions, identifying potential threats and anomalies, and ultimately addressing them in DT environments in an intelligent manner. We discuss how these methods can play a key role in solving contemporary cybersecurity issues in various real-world applications. We conclude this paper by identifying crucial challenges and avenues for further research, as well as directions on how professionals and researchers might approach and model future-generation cybersecurity in this emerging field.

数字孪生(DT)是一种新兴的数字化技术,对当今工业和研究领域的创新都有着巨大的影响。通过虚拟化现实世界中的物理系统,数字孪生可以极大地提高我们的社会和生活质量,提供有关其运行和资产的更多信息,并通过实时监控和主动维护提高其复原能力。由于对知识产权进行了编码并使其更容易获取,以及其与物理对应物的持续同步,DTs 也带来了巨大的安全风险。当今数字环境中网络威胁的快速扩散和动态变化促使人们开发自动化和智能化的网络解决方案。当今的工业转型在很大程度上依赖于人工智能(AI),包括机器学习(ML)和数据驱动技术,使机器能够执行自我监控、调查、诊断、未来预测和智能决策等任务。然而,要在网络安全背景下有效使用基于人工智能的模型,在现实世界场景中做出决策时,人类可理解的解释及其可信度是重要因素。本文通过对人工智能和 XAI 方法进行分类,对基于可解释人工智能(XAI)的网络安全建模进行了广泛研究,这些方法可帮助安全分析师和专业人员理解系统功能、识别潜在威胁和异常情况,并最终在 DT 环境中以智能方式解决这些问题。我们将讨论这些方法如何在各种实际应用中为解决当代网络安全问题发挥关键作用。在本文的最后,我们确定了进一步研究的关键挑战和途径,以及专业人员和研究人员如何在这一新兴领域处理和模拟未来一代网络安全的方向。
{"title":"Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects","authors":"","doi":"10.1016/j.icte.2024.05.007","DOIUrl":"10.1016/j.icte.2024.05.007","url":null,"abstract":"<div><p>Digital twins (DTs) are an emerging digitalization technology with a huge impact on today’s innovations in both industry and research. DTs can significantly enhance our society and quality of life through the virtualization of a real-world physical system, providing greater insights about their operations and assets, as well as enhancing their resilience through real-time monitoring and proactive maintenance. DTs also pose significant security risks, as intellectual property is encoded and more accessible, as well as their continued synchronization to their physical counterparts. The rapid proliferation and dynamism of cyber threats in today’s digital environments motivate the development of automated and intelligent cyber solutions. Today’s industrial transformation relies heavily on artificial intelligence (AI), including machine learning (ML) and data-driven technologies that allow machines to perform tasks such as self-monitoring, investigation, diagnosis, future prediction, and decision-making intelligently. However, to effectively employ AI-based models in the context of cybersecurity, human-understandable explanations, and their trustworthiness, are significant factors when making decisions in real-world scenarios. This article provides an extensive study of explainable AI (XAI) based cybersecurity modeling through a taxonomy of AI and XAI methods that can assist security analysts and professionals in comprehending system functions, identifying potential threats and anomalies, and ultimately addressing them in DT environments in an intelligent manner. We discuss how these methods can play a key role in solving contemporary cybersecurity issues in various real-world applications. We conclude this paper by identifying crucial challenges and avenues for further research, as well as directions on how professionals and researchers might approach and model future-generation cybersecurity in this emerging field.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 935-958"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000572/pdfft?md5=0ba1659d944758ac3a820436b838f534&pid=1-s2.0-S2405959524000572-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141144273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Caching, transcoding, delivery and learning for advanced video streaming services 先进视频流媒体服务的缓存、转码、传输和学习
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.05.012
Minseok Choi, Tiange Xiang, Hyelee Lim, Yunoh Kim, Minkyun Ahn, Sunghun Oh, Hyeonsu Kim

Online video services are responsible for a large amount of global data traffic, which is why wireless video caching has become a major focus in order to deal with the increasing amount of data. While conventional caching methods have been successful in reducing file transmission latency and data traffic on the core network, there is still a lot of potential to improve wireless caching for streaming users’ satisfaction, especially as video streaming technology continues to improve. To improve caching, it is important to consider the distinct characteristics of a video file, video encoding, dynamic video streaming, and even 3D video services such as virtual reality (VR) and augmented reality (AR). This paper investigates the distinct video features that can be used to design video caching policies. Additionally, recent studies on wireless video caching and delivery are surveyed, with a focus on four key characteristics: (1) partitioning a video file, (2) encoding a video file into multiple quality versions, (3) recognizing that video file popularity is dynamic and heterogeneous, and (4) understanding that video recommendation affects a series of user requests.

在线视频服务占全球数据流量的很大一部分,因此无线视频缓存已成为应对日益增长的数据量的主要焦点。虽然传统的缓存方法在减少文件传输延迟和核心网络的数据流量方面取得了成功,但为了让流媒体用户满意,无线缓存仍有很大的改进潜力,尤其是随着视频流技术的不断改进。要改进缓存,必须考虑视频文件、视频编码、动态视频流,甚至虚拟现实(VR)和增强现实(AR)等三维视频服务的不同特点。本文研究了可用于设计视频缓存策略的独特视频特征。此外,本文还调查了近期有关无线视频缓存和传输的研究,重点关注四个关键特征:(1) 对视频文件进行分区;(2) 将视频文件编码为多个质量版本;(3) 认识到视频文件的流行程度是动态和异构的;(4) 理解视频推荐会影响一系列用户请求。
{"title":"Caching, transcoding, delivery and learning for advanced video streaming services","authors":"Minseok Choi,&nbsp;Tiange Xiang,&nbsp;Hyelee Lim,&nbsp;Yunoh Kim,&nbsp;Minkyun Ahn,&nbsp;Sunghun Oh,&nbsp;Hyeonsu Kim","doi":"10.1016/j.icte.2024.05.012","DOIUrl":"10.1016/j.icte.2024.05.012","url":null,"abstract":"<div><p>Online video services are responsible for a large amount of global data traffic, which is why wireless video caching has become a major focus in order to deal with the increasing amount of data. While conventional caching methods have been successful in reducing file transmission latency and data traffic on the core network, there is still a lot of potential to improve wireless caching for streaming users’ satisfaction, especially as video streaming technology continues to improve. To improve caching, it is important to consider the distinct characteristics of a video file, video encoding, dynamic video streaming, and even 3D video services such as virtual reality (VR) and augmented reality (AR). This paper investigates the distinct video features that can be used to design video caching policies. Additionally, recent studies on wireless video caching and delivery are surveyed, with a focus on four key characteristics: (1) partitioning a video file, (2) encoding a video file into multiple quality versions, (3) recognizing that video file popularity is dynamic and heterogeneous, and (4) understanding that video recommendation affects a series of user requests.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 774-785"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000626/pdfft?md5=aa79da443d8dcc961380ae6917912748&pid=1-s2.0-S2405959524000626-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142020435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed DQN-based network-wide energy efficiency maximization for 5G NR-U and Wi-Fi coexistence environments 为 5G NR-U 和 Wi-Fi 共存环境实现基于分布式 DQN 的全网能效最大化
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.05.010
Junseung Lee , Seung-Chan Lim , Hyungsub Kim , JeeHyeon Na , Howon Lee

To effectively manage the escalating traffic, attention is drawn to the coexistence mechanism of cellular and Wi-Fi networks which offload the cellular traffic from the licensed band to the unlicensed band. For the coexistence of 5G new radio-unlicensed and Wi-Fi, we tackle the energy efficiency maximization problem by sequentially determining the duty cycle and transmit power through the use of distributed deep Q-network (DQN) techniques. When utilizing the existing unlicensed band, the proposed method minimizes the impact on Wi-Fi networks while achieving optimal energy efficiency. Simulations validate the superior energy efficiency of the proposed coexistence mechanism over various benchmark methods.

为了有效管理不断增长的流量,蜂窝网络和 Wi-Fi 网络的共存机制引起了人们的关注,这种机制将蜂窝流量从许可频段卸载到非许可频段。针对 5G 新无线电--非授权和 Wi-Fi 的共存,我们通过使用分布式深度 Q 网络(DQN)技术,依次确定占空比和发射功率,从而解决能效最大化问题。在利用现有的非授权频段时,所提出的方法能最大限度地减少对 Wi-Fi 网络的影响,同时实现最佳能效。仿真验证了与各种基准方法相比,所提出的共存机制具有更高的能效。
{"title":"Distributed DQN-based network-wide energy efficiency maximization for 5G NR-U and Wi-Fi coexistence environments","authors":"Junseung Lee ,&nbsp;Seung-Chan Lim ,&nbsp;Hyungsub Kim ,&nbsp;JeeHyeon Na ,&nbsp;Howon Lee","doi":"10.1016/j.icte.2024.05.010","DOIUrl":"10.1016/j.icte.2024.05.010","url":null,"abstract":"<div><p>To effectively manage the escalating traffic, attention is drawn to the coexistence mechanism of cellular and Wi-Fi networks which offload the cellular traffic from the licensed band to the unlicensed band. For the coexistence of 5G new radio-unlicensed and Wi-Fi, we tackle the energy efficiency maximization problem by sequentially determining the duty cycle and transmit power through the use of distributed deep Q-network (DQN) techniques. When utilizing the existing unlicensed band, the proposed method minimizes the impact on Wi-Fi networks while achieving optimal energy efficiency. Simulations validate the superior energy efficiency of the proposed coexistence mechanism over various benchmark methods.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 845-850"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000602/pdfft?md5=e3791833fc223e43684bde66963942f4&pid=1-s2.0-S2405959524000602-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRL-empowered joint batch size and weighted aggregation adjustment mechanism for federated learning on non-IID data DRL 驱动的联合批量大小和加权聚合调整机制,用于非 IID 数据的联合学习
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.04.011
Juneseok Bang , Sungpil Woo , Joohyung Lee

To address the accuracy degradation as well as prolonged convergence time due to the inherent data heterogeneity among end-devices in federated learning (FL), we introduce the joint batch size and weighted aggregation adjustment problem, which is non-convex problem. To adjust optimal hyperparameters, we develop deep reinforcement learning (DRL) to empower a mechanism known as Batch size and Weighted aggregation Adjustment (BWA). Experimental evaluation demonstrates that BWA not only outperforms methods optimized solely from either a local training or server perspective but also achieves higher accuracy, with an increase of up to 5.53% compared to FedAvg, and additionally accelerates convergence speeds.

为了解决联合学习(FL)中终端设备之间固有的数据异质性所导致的精度下降和收敛时间延长的问题,我们引入了联合批量大小和加权聚合调整问题,这是一个非凸问题。为了调整最优超参数,我们开发了深度强化学习(DRL),以增强一种称为 "批量大小和加权聚合调整"(BWA)的机制。实验评估表明,BWA 不仅优于仅从本地训练或服务器角度进行优化的方法,还能获得更高的准确性,与 FedAvg 相比最多可提高 5.53%,此外还能加快收敛速度。
{"title":"DRL-empowered joint batch size and weighted aggregation adjustment mechanism for federated learning on non-IID data","authors":"Juneseok Bang ,&nbsp;Sungpil Woo ,&nbsp;Joohyung Lee","doi":"10.1016/j.icte.2024.04.011","DOIUrl":"10.1016/j.icte.2024.04.011","url":null,"abstract":"<div><p>To address the accuracy degradation as well as prolonged convergence time due to the inherent data heterogeneity among end-devices in federated learning (FL), we introduce the joint batch size and weighted aggregation adjustment problem, which is non-convex problem. To adjust optimal hyperparameters, we develop deep reinforcement learning (DRL) to empower a mechanism known as Batch size and Weighted aggregation Adjustment (BWA). Experimental evaluation demonstrates that BWA not only outperforms methods optimized solely from either a local training or server perspective but also achieves higher accuracy, with an increase of up to 5.53% compared to FedAvg, and additionally accelerates convergence speeds.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 863-870"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000481/pdfft?md5=cbc73fea8316b49de9d580f917417c6c&pid=1-s2.0-S2405959524000481-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New private information retrieval codes for imperfect privacy 针对不完全隐私的新私人信息检索代码
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.05.003

In this paper, we introduce new codes for the private information retrieval (PIR). The conventional Tian-Sun-Chen (TSC) scheme achieves PIR capacity under the perfect privacy conditions with the minimum message length. Based on the TSC scheme, weakly PIR (WPIR) schemes have been developed to benefit download costs by relaxing privacy. We show that the proposed scheme has lower download cost than the TSC scheme in the weak privacy setting. While our scheme is not capacity-achieving under perfect privacy, it has smaller message sizes compared with the TSC scheme.

本文介绍了用于私人信息检索(PIR)的新编码。传统的田舜臣(TSC)方案在完美隐私条件下以最小的信息长度实现了 PIR 容量。在 TSC 方案的基础上,开发了弱 PIR(WPIR)方案,通过放宽隐私条件来降低下载成本。我们的研究表明,在弱隐私设置下,我们提出的方案比 TSC 方案的下载成本更低。虽然我们的方案在完美隐私条件下无法实现容量,但与 TSC 方案相比,它的信息量更小。
{"title":"New private information retrieval codes for imperfect privacy","authors":"","doi":"10.1016/j.icte.2024.05.003","DOIUrl":"10.1016/j.icte.2024.05.003","url":null,"abstract":"<div><p>In this paper, we introduce new codes for the private information retrieval (PIR). The conventional Tian-Sun-Chen (TSC) scheme achieves PIR capacity under the perfect privacy conditions with the minimum message length. Based on the TSC scheme, weakly PIR (WPIR) schemes have been developed to benefit download costs by relaxing privacy. We show that the proposed scheme has lower download cost than the TSC scheme in the weak privacy setting. While our scheme is not capacity-achieving under perfect privacy, it has smaller message sizes compared with the TSC scheme.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 891-894"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000535/pdfft?md5=0e9729459e20853996a14bd00c099286&pid=1-s2.0-S2405959524000535-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141057335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open-set learning context recognizing in mobile learning: Problem and methodology 移动学习中的开放式学习情境识别:问题与方法
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.04.006

Mobile learning allows for an interactive way of learning through devices like smartphones. However, current methods usually rely on pre-set situations and struggle to recognize new contexts when they come up during testing. To solve this, we suggest the Open-set Learning Context Recognition Model (OLCRM). This model uses data extracted from smartphone sensors to identify whether a learning context is known or unknown. It also uses a Dual Discriminator Generative Adversarial Network (DDGAN) to create high-quality fake examples, which helps improve the accuracy of recognizing contexts. Experimental results demonstrate the effectiveness of OLCRM in open-set learning context recognition problems.

移动学习可以通过智能手机等设备实现互动学习。然而,目前的方法通常依赖于预先设置的情境,在测试过程中出现新情境时难以识别。为了解决这个问题,我们提出了开放式学习情境识别模型(OLCRM)。该模型使用从智能手机传感器中提取的数据来识别学习情境是已知还是未知。它还使用双判别器生成对抗网络(DDGAN)来创建高质量的虚假示例,这有助于提高上下文识别的准确性。实验结果证明了 OLCRM 在开放集学习情境识别问题中的有效性。
{"title":"Open-set learning context recognizing in mobile learning: Problem and methodology","authors":"","doi":"10.1016/j.icte.2024.04.006","DOIUrl":"10.1016/j.icte.2024.04.006","url":null,"abstract":"<div><p>Mobile learning allows for an interactive way of learning through devices like smartphones. However, current methods usually rely on pre-set situations and struggle to recognize new contexts when they come up during testing. To solve this, we suggest the Open-set Learning Context Recognition Model (OLCRM). This model uses data extracted from smartphone sensors to identify whether a learning context is known or unknown. It also uses a Dual Discriminator Generative Adversarial Network (DDGAN) to create high-quality fake examples, which helps improve the accuracy of recognizing contexts. Experimental results demonstrate the effectiveness of OLCRM in open-set learning context recognition problems.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 909-915"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000432/pdfft?md5=eeb8e163c28d0144789f643d5b84cbd8&pid=1-s2.0-S2405959524000432-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140770935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-link interference in the 5G cell search procedure: Observation and field experiments for mitigation 5G 小区搜索过程中的交叉链路干扰:观察和现场实验以减轻干扰
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.06.002

This paper presents field experiment results that illustrate the impact of cross-link interference on the cell search procedure in a 5G time division duplex system. We initially show how cross-link interference affects to the cell search procedure from an analytic aspect. An example of an experimental result provided in this paper shows how the user equipment wrongly estimates the symbol timing offset due to cross-link interference. Furthermore, we propose a modified cell search algorithm which is robust against the strong influence of cross-link interference. The proposed modification efficiently suppresses the effects of cross-link interference by applying selective energy normalization to the correlation process. The experimental results show that the modified algorithm can accurately estimate the symbol timing offset with a negligible increment in computation time.

本文介绍了实地实验结果,说明了 5G 时分双工系统中交叉链路干扰对小区搜索程序的影响。我们首先从分析方面说明了交叉链路干扰对小区搜索程序的影响。本文提供的一个实验结果实例显示了用户设备如何由于交链干扰而错误估计符号时序偏移。此外,我们还提出了一种改进的小区搜索算法,该算法对交叉链路干扰的强烈影响具有鲁棒性。所提出的修改通过对相关过程进行选择性能量归一化,有效地抑制了交叉链路干扰的影响。实验结果表明,修改后的算法可以准确估计符号时序偏移,而计算时间的增加可以忽略不计。
{"title":"Cross-link interference in the 5G cell search procedure: Observation and field experiments for mitigation","authors":"","doi":"10.1016/j.icte.2024.06.002","DOIUrl":"10.1016/j.icte.2024.06.002","url":null,"abstract":"<div><p>This paper presents field experiment results that illustrate the impact of cross-link interference on the cell search procedure in a 5G time division duplex system. We initially show how cross-link interference affects to the cell search procedure from an analytic aspect. An example of an experimental result provided in this paper shows how the user equipment wrongly estimates the symbol timing offset due to cross-link interference. Furthermore, we propose a modified cell search algorithm which is robust against the strong influence of cross-link interference. The proposed modification efficiently suppresses the effects of cross-link interference by applying selective energy normalization to the correlation process. The experimental results show that the modified algorithm can accurately estimate the symbol timing offset with a negligible increment in computation time.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 810-816"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000675/pdfft?md5=781bb14e0a8863a44606f0b4af10514f&pid=1-s2.0-S2405959524000675-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141402835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and efficient communications with fine-grained access control in underwater wireless sensor networks 水下无线传感器网络中带有细粒度访问控制的安全高效通信
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.04.009
Donghyun Yu , Sinwoong Yun , Jemin Lee

As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and high propagation latency. However, existing works are either specialized for one-to-one communication or cannot satisfy low latency constraints. Therefore, this work proposes a secure communication protocol with fine-grained access control for UWSN that support secure and efficient one-to-many communication and considers potential internal attackers for high security level. Specifically, we adopt lightweight ABE to achieve fine-grained access control at low cost, and introduce outsourced decryption to further alleviate the computational load of underwater sensors.

随着 UWSN 受到关注,人们开始需要一种高效、安全的通信协议来克服设备性能低、节点故障和传播延迟高等问题。然而,现有的工作要么专门用于一对一通信,要么无法满足低延迟约束。因此,本研究为 UWSN 提出了一种具有细粒度访问控制的安全通信协议,它支持安全高效的一对多通信,并考虑了潜在的内部攻击者,以达到较高的安全级别。具体来说,我们采用轻量级 ABE 以低成本实现细粒度访问控制,并引入外包解密以进一步减轻水下传感器的计算负荷。
{"title":"Secure and efficient communications with fine-grained access control in underwater wireless sensor networks","authors":"Donghyun Yu ,&nbsp;Sinwoong Yun ,&nbsp;Jemin Lee","doi":"10.1016/j.icte.2024.04.009","DOIUrl":"10.1016/j.icte.2024.04.009","url":null,"abstract":"<div><p>As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and high propagation latency. However, existing works are either specialized for one-to-one communication or cannot satisfy low latency constraints. Therefore, this work proposes a secure communication protocol with fine-grained access control for UWSN that support secure and efficient one-to-many communication and considers potential internal attackers for high security level. Specifically, we adopt lightweight ABE to achieve fine-grained access control at low cost, and introduce outsourced decryption to further alleviate the computational load of underwater sensors.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 851-856"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000468/pdfft?md5=c8e9226fb46ab40851b0785438cbd4a0&pid=1-s2.0-S2405959524000468-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICT Express
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1