首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
Large models based high-fidelity voice services over 6G narrowband non-terrestrial networks 大型模型基于6G窄带非地面网络的高保真语音服务
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-01 DOI: 10.1016/j.dcan.2025.07.009
Jingyuan Han , Chengxiao Yu , Gang Liu , Shijing Yuan , Zhongkai Tong
Non-Terrestrial Networks (NTN) can be used to provide emergency voice services in Sixth-Generation (6G) communication systems. However, Internet of Things (IoT) terminals, which comprise restricted bandwidth resources and weak computing power, which make ensuring high-quality voice services over NTN challenging. Recent advancements in Artificial Intelligence (AI) techniques have been increasingly applied to enhance the audio quality and reduce the bit rate. However, applying models with high computational complexity to IoT terminals is difficult. In this study, we propose a voice-services-over NTN solution including a novel 6G non-terrestrial and ground network integrated framework and a lightweight Large Models (LMs)-driven codec operating at 450 bits per second. We also designed a new voice packet header and deployed an agent on-ground gateway to reduce the bandwidth overhead. The non-standard Session Initiation Protocol header was converted to the standard format while re-encapsulating Internet Protocol and User Datagram Protocol headers, replacing the conventional implementations. Additionally, an operational NTN satellite was used to evaluate the proposed ReCodec. The experimental results demonstrate that the ReCodec decreases the computational complexity by 96.61% while increasing the voice quality by 17.55% when compared with the state-of-the-art mechanisms. Furthermore, the design of the packet header reduced the voice frame header to 50 bytes.
非地面网络(NTN)可用于在第六代(6G)通信系统中提供紧急语音服务。然而,物联网终端带宽资源有限,计算能力较弱,对NTN的高质量语音业务带来了挑战。人工智能(AI)技术的最新进展已越来越多地应用于提高音频质量和降低比特率。然而,将高计算复杂度的模型应用于物联网终端是困难的。在本研究中,我们提出了一种基于NTN的语音服务解决方案,包括一个新颖的6G非地面和地面网络集成框架和一个以每秒450比特的速度运行的轻量级大模型(LMs)驱动的编解码器。我们还设计了一个新的语音包报头,并部署了一个代理地面网关,以减少带宽开销。在重新封装互联网协议和用户数据报协议头的同时,将非标准会话发起协议头转换为标准格式,取代了传统的实现。此外,使用一颗运行的NTN卫星来评估所提出的ReCodec。实验结果表明,与现有机制相比,该机制的计算复杂度降低了96.61%,语音质量提高了17.55%。此外,分组报头的设计将语音帧报头减少到50字节。
{"title":"Large models based high-fidelity voice services over 6G narrowband non-terrestrial networks","authors":"Jingyuan Han ,&nbsp;Chengxiao Yu ,&nbsp;Gang Liu ,&nbsp;Shijing Yuan ,&nbsp;Zhongkai Tong","doi":"10.1016/j.dcan.2025.07.009","DOIUrl":"10.1016/j.dcan.2025.07.009","url":null,"abstract":"<div><div>Non-Terrestrial Networks (NTN) can be used to provide emergency voice services in Sixth-Generation (6G) communication systems. However, Internet of Things (IoT) terminals, which comprise restricted bandwidth resources and weak computing power, which make ensuring high-quality voice services over NTN challenging. Recent advancements in Artificial Intelligence (AI) techniques have been increasingly applied to enhance the audio quality and reduce the bit rate. However, applying models with high computational complexity to IoT terminals is difficult. In this study, we propose a voice-services-over NTN solution including a novel 6G non-terrestrial and ground network integrated framework and a lightweight Large Models (LMs)-driven codec operating at 450 bits per second. We also designed a new voice packet header and deployed an agent on-ground gateway to reduce the bandwidth overhead. The non-standard Session Initiation Protocol header was converted to the standard format while re-encapsulating Internet Protocol and User Datagram Protocol headers, replacing the conventional implementations. Additionally, an operational NTN satellite was used to evaluate the proposed ReCodec. The experimental results demonstrate that the ReCodec decreases the computational complexity by 96.61% while increasing the voice quality by 17.55% when compared with the state-of-the-art mechanisms. Furthermore, the design of the packet header reduced the voice frame header to 50 bytes.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 6","pages":"Pages 1864-1873"},"PeriodicalIF":7.5,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145842598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DP-Fed6G: An adaptive differential privacy-empowered federated learning framework for 6G networks DP-Fed6G:用于6G网络的自适应差分隐私授权联邦学习框架
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-01 DOI: 10.1016/j.dcan.2025.07.006
Miao Du , Peng Yang , Yinqiu Liu , Xiaoming He , Mingkai Chen
The advent of 6G networks is poised to drive a new era of intelligent, privacy-preserving distributed learning by leveraging advanced communication and AI-driven edge intelligence. Federated Learning (FL) has emerged as a promising paradigm to enable collaborative model training without exposing raw data. However, its deployment in 6G networks faces significant obstacles, including vulnerabilities to inference attacks, the complexities of heterogeneous and dynamic network environments, and the inherent trade-off between privacy protection and model performance. In response to these challenges, we introduce DP-Fed6G, a novel FL framework that integrates differential privacy (DP) to fortify data security while ensuring high-quality learning outcomes. Specifically, DP-Fed6G employs an adaptive noise injection strategy that dynamically adjusts privacy protection levels based on real-time 6G network conditions and device heterogeneity, ensuring robust data security while maximizing model performance and optimizing the trade-off between privacy and utility. Extensive experiments on three real-world healthcare datasets demonstrate that DP-Fed6G consistently outperforms existing baselines (DP-FedSGD and DP-FedAvg), achieving up to 10.3% higher test accuracy under the same privacy budget. The proposed framework thus provides a practical solution for secure and privacy-preserving AI in 6G, supporting intelligent decision-making in privacy-sensitive applications.
6G网络的出现将通过利用先进的通信和人工智能驱动的边缘智能,推动智能、保护隐私的分布式学习的新时代。联邦学习(FL)已经成为一种很有前途的范例,可以在不暴露原始数据的情况下进行协作模型训练。然而,其在6G网络中的部署面临着重大障碍,包括易受推理攻击,异构和动态网络环境的复杂性,以及隐私保护和模型性能之间的内在权衡。为了应对这些挑战,我们引入了DP- fed6g,这是一种新颖的FL框架,它集成了差分隐私(DP),以加强数据安全,同时确保高质量的学习成果。具体而言,DP-Fed6G采用自适应噪声注入策略,根据实时6G网络条件和设备异构性动态调整隐私保护级别,在确保强大的数据安全性的同时,最大限度地提高模型性能,优化隐私与实用性之间的权衡。在三个真实医疗数据集上进行的大量实验表明,DP-Fed6G始终优于现有基线(DP-FedSGD和dp - fedag),在相同的隐私预算下,测试准确率最高可提高10.3%。因此,所提出的框架为6G中的安全和隐私保护人工智能提供了一个实用的解决方案,支持隐私敏感应用中的智能决策。
{"title":"DP-Fed6G: An adaptive differential privacy-empowered federated learning framework for 6G networks","authors":"Miao Du ,&nbsp;Peng Yang ,&nbsp;Yinqiu Liu ,&nbsp;Xiaoming He ,&nbsp;Mingkai Chen","doi":"10.1016/j.dcan.2025.07.006","DOIUrl":"10.1016/j.dcan.2025.07.006","url":null,"abstract":"<div><div>The advent of 6G networks is poised to drive a new era of intelligent, privacy-preserving distributed learning by leveraging advanced communication and AI-driven edge intelligence. Federated Learning (FL) has emerged as a promising paradigm to enable collaborative model training without exposing raw data. However, its deployment in 6G networks faces significant obstacles, including vulnerabilities to inference attacks, the complexities of heterogeneous and dynamic network environments, and the inherent trade-off between privacy protection and model performance. In response to these challenges, we introduce DP-Fed6G, a novel FL framework that integrates differential privacy (DP) to fortify data security while ensuring high-quality learning outcomes. Specifically, DP-Fed6G employs an adaptive noise injection strategy that dynamically adjusts privacy protection levels based on real-time 6G network conditions and device heterogeneity, ensuring robust data security while maximizing model performance and optimizing the trade-off between privacy and utility. Extensive experiments on three real-world healthcare datasets demonstrate that DP-Fed6G consistently outperforms existing baselines (DP-FedSGD and DP-FedAvg), achieving up to 10.3% higher test accuracy under the same privacy budget. The proposed framework thus provides a practical solution for secure and privacy-preserving AI in 6G, supporting intelligent decision-making in privacy-sensitive applications.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 6","pages":"Pages 1994-2002"},"PeriodicalIF":7.5,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145842635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VSSTPM: Verifiable simulation-secure threshold public key encryption scheme from standard module-LWE for IoT gateway-based applications VSSTPM:来自标准模块lwe的可验证仿真安全阈值公钥加密方案,用于基于物联网网关的应用
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-01 DOI: 10.1016/j.dcan.2025.06.015
Ye Bai , Debiao He , Zhichao Yang , Xiaoying Jia , Min Luo
The Internet of Things (IoT) has become an integral part of daily life, making the protection of user privacy increasingly important. In gateway-based IoT systems, user data is transmitted through gateways to platforms, pushing the data to various applications, widely used in smart cities, industrial IoT, smart farms, healthcare IoT, and other fields. Threshold Public Key Encryption (TPKE) provides a method to distribute private keys for decryption, enabling joint decryption by multiple parties, thus ensuring data security during gateway transmission, platform storage, and application access. However, existing TPKE schemes face several limitations, including vulnerability to quantum attacks, failure to meet Simulation-Security (SS) requirements, lack of verifiability, and inefficiency, which results in gateway-based IoT systems still being not secure and efficient enough. To address these challenges, we propose a Verifiable Simulation-Secure Threshold PKE scheme based on standard Module-LWE (VSSTPM). Our scheme resists quantum attacks, achieves SS, and incorporates Non-Interactive Zero-Knowledge (NIZK) proofs. Implementation and performance evaluations demonstrate that VSSTPM offers 112-bit quantum security and outperforms existing TPKE schemes in terms of efficiency. Compared to the ECC-based TPKE scheme, our scheme reduces the time cost for decryption participants by 72.66%, and the decryption verification of their scheme is 11 times slower than ours. Compared with the latest lattice-based TPKE scheme, our scheme reduces the time overhead by 90% and 48.9% in system user encryption and decryption verification, respectively, and their scheme is 13 times slower than ours in terms of decryption participants.
物联网(IoT)已经成为人们日常生活中不可或缺的一部分,保护用户隐私变得越来越重要。在基于网关的物联网系统中,用户数据通过网关传输到平台,将数据推送到各种应用中,广泛应用于智慧城市、工业物联网、智慧农场、医疗物联网等领域。TPKE (Threshold Public Key Encryption)提供了一种私钥分发解密的方法,可以实现多方联合解密,从而保证网关传输、平台存储和应用访问过程中的数据安全。然而,现有的TPKE方案面临着一些限制,包括易受量子攻击,无法满足模拟安全(SS)要求,缺乏可验证性和低效率,这导致基于网关的物联网系统仍然不够安全和高效。为了解决这些挑战,我们提出了一种基于标准模块lwe (VSSTPM)的可验证仿真安全阈值PKE方案。我们的方案可以抵抗量子攻击,实现SS,并结合非交互式零知识(NIZK)证明。实现和性能评估表明,VSSTPM提供112位量子安全性,并且在效率方面优于现有的TPKE方案。与基于ecc的TPKE方案相比,我们的方案将解密参与者的时间成本降低了72.66%,其方案的解密验证速度比我们的方案慢11倍。与最新的基于格子的TPKE方案相比,我们的方案在系统用户加解密验证方面的时间开销分别减少了90%和48.9%,在解密参与者方面,他们的方案比我们的方案慢13倍。
{"title":"VSSTPM: Verifiable simulation-secure threshold public key encryption scheme from standard module-LWE for IoT gateway-based applications","authors":"Ye Bai ,&nbsp;Debiao He ,&nbsp;Zhichao Yang ,&nbsp;Xiaoying Jia ,&nbsp;Min Luo","doi":"10.1016/j.dcan.2025.06.015","DOIUrl":"10.1016/j.dcan.2025.06.015","url":null,"abstract":"<div><div>The Internet of Things (IoT) has become an integral part of daily life, making the protection of user privacy increasingly important. In gateway-based IoT systems, user data is transmitted through gateways to platforms, pushing the data to various applications, widely used in smart cities, industrial IoT, smart farms, healthcare IoT, and other fields. Threshold Public Key Encryption (TPKE) provides a method to distribute private keys for decryption, enabling joint decryption by multiple parties, thus ensuring data security during gateway transmission, platform storage, and application access. However, existing TPKE schemes face several limitations, including vulnerability to quantum attacks, failure to meet Simulation-Security (SS) requirements, lack of verifiability, and inefficiency, which results in gateway-based IoT systems still being not secure and efficient enough. To address these challenges, we propose a <u>V</u>erifiable <u>S</u>imulation-<u>S</u>ecure <u>T</u>hreshold <u>P</u>KE scheme based on standard <u>M</u>odule-LWE (VSSTPM). Our scheme resists quantum attacks, achieves SS, and incorporates Non-Interactive Zero-Knowledge (NIZK) proofs. Implementation and performance evaluations demonstrate that VSSTPM offers 112-bit quantum security and outperforms existing TPKE schemes in terms of efficiency. Compared to the ECC-based TPKE scheme, our scheme reduces the time cost for decryption participants by 72.66%, and the decryption verification of their scheme is 11 times slower than ours. Compared with the latest lattice-based TPKE scheme, our scheme reduces the time overhead by 90% and 48.9% in system user encryption and decryption verification, respectively, and their scheme is 13 times slower than ours in terms of decryption participants.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 6","pages":"Pages 1783-1796"},"PeriodicalIF":7.5,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145842634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient downlink resource allocation scheme in power-limited GEO satellite systems 功率有限的地球同步轨道卫星系统中一种有效的下行链路资源分配方案
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-01 DOI: 10.1016/j.dcan.2025.05.007
Xin Tong, Nanxi Li, Jiaxiang Liu, Shuo Peng
The integration of Geostationary Earth Orbit (GEO) satellite constellations into Sixth Generation (6G) framework for cellular networks is essential to achieve global connectivity. Despite the major importance of this integration, current research often underestimates the limitations imposed by available satellite payload power, erroneously assuming a uniform maximum power density distribution across all communication beams. In this paper, we propose an Efficient Downlink Resource Allocation scheme (EDRA) that accounts for transmitting power resource limitations, variable service quality demands, and a heterogeneous number of users. Our approach relies on the thorough analysis of real-world demographic data, allowing us to optimize the allocation of downlink power and time–frequency resources in a practical and effective manner. Furthermore, we introduce an optimization model to maximize the total system revenue, using an iterative algorithm specifically designed to solve complex optimization problems. Numerical simulations demonstrated that the EDRA scheme improved the average network revenue by more than 66% relatively to standard methods, with performance gains increasingly large for an increasing diversity of service types, establishing the robustness and adaptability of the proposed EDRA scheme in the rapidly-evolving context of satellite-based communication systems.
将地球静止轨道(GEO)卫星星座整合到蜂窝网络第六代(6G)框架中对于实现全球连通性至关重要。尽管这种整合非常重要,但目前的研究往往低估了可用卫星有效载荷功率所施加的限制,错误地假设所有通信波束的最大功率密度分布是均匀的。在本文中,我们提出了一种有效的下行链路资源分配方案(EDRA),该方案考虑了传输功率资源的限制、服务质量需求的变化以及用户数量的异构。我们的方法依赖于对真实世界人口数据的深入分析,使我们能够以实际有效的方式优化下行功率和时频资源的分配。此外,我们引入了一个优化模型,以最大限度地提高系统的总收益,使用迭代算法专门设计来解决复杂的优化问题。数值模拟结果表明,与标准方法相比,EDRA方案的平均网络收益提高了66%以上,并且随着业务类型的增加,性能的提高幅度越来越大,从而证明了EDRA方案在快速发展的星基通信系统环境下的鲁棒性和适应性。
{"title":"An efficient downlink resource allocation scheme in power-limited GEO satellite systems","authors":"Xin Tong,&nbsp;Nanxi Li,&nbsp;Jiaxiang Liu,&nbsp;Shuo Peng","doi":"10.1016/j.dcan.2025.05.007","DOIUrl":"10.1016/j.dcan.2025.05.007","url":null,"abstract":"<div><div>The integration of Geostationary Earth Orbit (GEO) satellite constellations into Sixth Generation (6G) framework for cellular networks is essential to achieve global connectivity. Despite the major importance of this integration, current research often underestimates the limitations imposed by available satellite payload power, erroneously assuming a uniform maximum power density distribution across all communication beams. In this paper, we propose an Efficient Downlink Resource Allocation scheme (EDRA) that accounts for transmitting power resource limitations, variable service quality demands, and a heterogeneous number of users. Our approach relies on the thorough analysis of real-world demographic data, allowing us to optimize the allocation of downlink power and time–frequency resources in a practical and effective manner. Furthermore, we introduce an optimization model to maximize the total system revenue, using an iterative algorithm specifically designed to solve complex optimization problems. Numerical simulations demonstrated that the EDRA scheme improved the average network revenue by more than 66% relatively to standard methods, with performance gains increasingly large for an increasing diversity of service types, establishing the robustness and adaptability of the proposed EDRA scheme in the rapidly-evolving context of satellite-based communication systems.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 6","pages":"Pages 1751-1761"},"PeriodicalIF":7.5,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145842715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EdgeAIGC: Model caching and resource allocation for edge artificial intelligence generated content EdgeAIGC:边缘人工智能生成内容的模型缓存和资源分配
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-01 DOI: 10.1016/j.dcan.2025.07.003
Wu Wen , Yibin Huang , Xinxin Zhao , Peiying Zhang , Kai Liu , Guowei Shi
With the rapid development of generative artificial intelligence technology, the traditional cloud-based centralized model training and inference face significant limitations due to high transmission latency and costs, which restrict user-side in-situ Artificial Intelligence Generated Content (AIGC) service requests. To this end, we propose the Edge Artificial Intelligence Generated Content (EdgeAIGC) framework, which can effectively address the challenges of cloud computing by implementing in-situ processing of services close to the data source through edge computing. However, AIGC models usually have a large parameter scale and complex computing requirements, which poses a huge challenge to the storage and computing resources of edge devices. This paper focuses on the edge intelligence model caching and resource allocation problems in the EdgeAIGC framework, aiming to improve the cache hit rate and resource utilization of edge devices for models by optimizing the model caching strategy and resource allocation scheme, and realize in-situ AIGC service processing. With the optimization objectives of minimizing service request response time and execution cost in resource-constrained environments, we employ the Twin Delayed Deep Deterministic Policy Gradient algorithm for optimization. Experimental results show that, compared with other methods, our model caching and resource allocation strategies can effectively improve the cache hit rate by at least 41.06% and reduce the response cost as well.
随着生成式人工智能技术的快速发展,传统的基于云的集中式模型训练和推理由于传输延迟和成本高而面临明显的局限性,这限制了用户端原位人工智能生成内容(AIGC)服务请求。为此,我们提出了边缘人工智能生成内容(EdgeAIGC)框架,该框架通过边缘计算实现靠近数据源的服务的原位处理,可以有效应对云计算的挑战。然而,AIGC模型通常具有较大的参数规模和复杂的计算需求,这对边缘设备的存储和计算资源提出了巨大的挑战。本文主要研究EdgeAIGC框架下的边缘智能模型缓存和资源分配问题,通过优化模型缓存策略和资源分配方案,提高模型边缘设备的缓存命中率和资源利用率,实现原位AIGC服务处理。以资源受限环境下服务请求响应时间和执行成本最小化为优化目标,采用双延迟深度确定性策略梯度算法进行优化。实验结果表明,与其他方法相比,我们的模型缓存和资源分配策略可以有效地将缓存命中率提高至少41.06%,并降低响应成本。
{"title":"EdgeAIGC: Model caching and resource allocation for edge artificial intelligence generated content","authors":"Wu Wen ,&nbsp;Yibin Huang ,&nbsp;Xinxin Zhao ,&nbsp;Peiying Zhang ,&nbsp;Kai Liu ,&nbsp;Guowei Shi","doi":"10.1016/j.dcan.2025.07.003","DOIUrl":"10.1016/j.dcan.2025.07.003","url":null,"abstract":"<div><div>With the rapid development of generative artificial intelligence technology, the traditional cloud-based centralized model training and inference face significant limitations due to high transmission latency and costs, which restrict user-side in-situ Artificial Intelligence Generated Content (AIGC) service requests. To this end, we propose the Edge Artificial Intelligence Generated Content (EdgeAIGC) framework, which can effectively address the challenges of cloud computing by implementing in-situ processing of services close to the data source through edge computing. However, AIGC models usually have a large parameter scale and complex computing requirements, which poses a huge challenge to the storage and computing resources of edge devices. This paper focuses on the edge intelligence model caching and resource allocation problems in the EdgeAIGC framework, aiming to improve the cache hit rate and resource utilization of edge devices for models by optimizing the model caching strategy and resource allocation scheme, and realize in-situ AIGC service processing. With the optimization objectives of minimizing service request response time and execution cost in resource-constrained environments, we employ the Twin Delayed Deep Deterministic Policy Gradient algorithm for optimization. Experimental results show that, compared with other methods, our model caching and resource allocation strategies can effectively improve the cache hit rate by at least 41.06% and reduce the response cost as well.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 6","pages":"Pages 1941-1950"},"PeriodicalIF":7.5,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145842716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Swarm learning anomaly detection framework for cloud data center using multi-channel BiWGAN-GTN and CEEMDAN 基于多通道BiWGAN-GTN和CEEMDAN的云数据中心群学习异常检测框架
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-01 DOI: 10.1016/j.dcan.2024.08.009
Lun Tang , Yuchen Zhao , Chengcheng Xue , Zhiwei Jiang , Wei Zou , Yanping Liang , Qianbin Chen
Anomaly detection is an important task for maintaining the performance of cloud data center. Traditional anomaly detection primarily examines individual Virtual Machine (VM) behavior, neglecting the impact of interactions among multiple VMs on Key Performance Indicator (KPI) data, e.g., memory utilization. Furthermore, the non-stationarity, high complexity, and uncertain periodicity of KPI data in VM also bring difficulties to deep learning-based anomaly detection tasks. To settle these challenges, this paper proposes MCBiWGAN-GTN, a multi-channel semi-supervised time series anomaly detection algorithm based on the Bidirectional Wasserstein Generative Adversarial Network with Graph-Time Network (BiWGAN-GTN) and the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN). (a) The BiWGAN-GTN algorithm is proposed to extract spatiotemporal information from data. (b) The loss function of BiWGAN-GTN is redesigned to solve the abnormal data intrusion problem during the training process. (c) MCBiWGAN-GTN is designed to reduce data complexity through CEEMDAN for time series decomposition and utilizes BiWGAN-GTN to train different components. (d) To adapt the proposed algorithm for the entire cloud data center, a cloud data center anomaly detection framework based on Swarm Learning (SL) is designed. The evaluation results on a real-world cloud data center dataset show that MCBiWGAN-GTN outperforms the baseline, with an F1-score of 0.96, an accuracy of 0.935, a precision of 0.954, a recall of 0.967, and an FPR of 0.203. The experiments also verify the stability of MCBiWGAN-GTN, the impact of parameter configurations, and the effectiveness of the proposed SL framework.
异常检测是维护云数据中心性能的一项重要任务。传统的异常检测主要检查单个虚拟机(VM)的行为,而忽略了多个虚拟机之间的交互对关键性能指标(KPI)数据的影响,例如内存利用率。此外,VM中KPI数据的非平稳性、高复杂性和不确定的周期性也给基于深度学习的异常检测任务带来了困难。为了解决这些问题,本文提出了一种基于双向Wasserstein生成对抗网络(BiWGAN-GTN)和带自适应噪声的完全集成经验模态分解(CEEMDAN)的多通道半监督时间序列异常检测算法MCBiWGAN-GTN。(a)提出BiWGAN-GTN算法从数据中提取时空信息。(b)重新设计BiWGAN-GTN的损失函数,解决训练过程中的异常数据入侵问题。(c) MCBiWGAN-GTN旨在通过CEEMDAN进行时间序列分解,降低数据复杂度,并利用BiWGAN-GTN训练不同分量。(d)为使所提算法适用于整个云数据中心,设计了基于Swarm Learning (SL)的云数据中心异常检测框架。在真实云数据中心数据集上的评价结果表明,MCBiWGAN-GTN优于基线,f1得分为0.96,准确度为0.935,精密度为0.954,召回率为0.967,FPR为0.203。实验还验证了MCBiWGAN-GTN的稳定性、参数配置的影响以及所提出的SL框架的有效性。
{"title":"Swarm learning anomaly detection framework for cloud data center using multi-channel BiWGAN-GTN and CEEMDAN","authors":"Lun Tang ,&nbsp;Yuchen Zhao ,&nbsp;Chengcheng Xue ,&nbsp;Zhiwei Jiang ,&nbsp;Wei Zou ,&nbsp;Yanping Liang ,&nbsp;Qianbin Chen","doi":"10.1016/j.dcan.2024.08.009","DOIUrl":"10.1016/j.dcan.2024.08.009","url":null,"abstract":"<div><div>Anomaly detection is an important task for maintaining the performance of cloud data center. Traditional anomaly detection primarily examines individual Virtual Machine (VM) behavior, neglecting the impact of interactions among multiple VMs on Key Performance Indicator (KPI) data, e.g., memory utilization. Furthermore, the non-stationarity, high complexity, and uncertain periodicity of KPI data in VM also bring difficulties to deep learning-based anomaly detection tasks. To settle these challenges, this paper proposes MCBiWGAN-GTN, a multi-channel semi-supervised time series anomaly detection algorithm based on the Bidirectional Wasserstein Generative Adversarial Network with Graph-Time Network (BiWGAN-GTN) and the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN). (a) The BiWGAN-GTN algorithm is proposed to extract spatiotemporal information from data. (b) The loss function of BiWGAN-GTN is redesigned to solve the abnormal data intrusion problem during the training process. (c) MCBiWGAN-GTN is designed to reduce data complexity through CEEMDAN for time series decomposition and utilizes BiWGAN-GTN to train different components. (d) To adapt the proposed algorithm for the entire cloud data center, a cloud data center anomaly detection framework based on Swarm Learning (SL) is designed. The evaluation results on a real-world cloud data center dataset show that MCBiWGAN-GTN outperforms the baseline, with an F1-score of 0.96, an accuracy of 0.935, a precision of 0.954, a recall of 0.967, and an FPR of 0.203. The experiments also verify the stability of MCBiWGAN-GTN, the impact of parameter configurations, and the effectiveness of the proposed SL framework.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 6","pages":"Pages 1883-1896"},"PeriodicalIF":7.5,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145842599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balancing sustainability and security: A review of 5G and IoT in smart cities 平衡可持续性和安全性:智慧城市中的5G和物联网回顾
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-01 DOI: 10.1016/j.dcan.2025.06.007
Ghadah Aldehim , Sunawar khan , Tariq Shahzad , Muhammad Amir Khan , Yazeed Yasin Ghadi , Weiwei Jiang , Tehseen Mazhar , Habib Hamam
This century's rapid urbanization has disrupted urban governance, sustainability, and resource management. The Internet of Things (IoT) and 5G have the potential to transform smart cities through real-time data processing, enhanced connectivity, and sustainable urban design. This study investigates the potential of 5G connectivity with the IoT's hierarchical framework to enhance public service provision, mitigate environmental effects, and optimize urban resource management. The article asserts that these technologies can enhance urban operations by tackling scalability, interoperability, and security issues. The research employs case studies from Singapore and Barcelona. The document moreover analyzes AI-driven security systems, 6G networks, and the contributions of IoT and 5G to the advancement of a circular economy. The essay asserts that the growth of smart cities necessitates robust policy frameworks to guarantee equitable access, data protection, and ethical considerations. This study integrates prior research with practical experiences to tackle data-informed municipal governance and urban innovation. The importance of policy in fostering inclusive and sustainable urban futures is emphasized.
本世纪的快速城市化对城市治理、可持续性和资源管理造成了干扰。物联网(IoT)和5G有可能通过实时数据处理、增强连接和可持续城市设计来改变智慧城市。本研究探讨了5G连接与物联网分层框架在增强公共服务提供、减轻环境影响和优化城市资源管理方面的潜力。本文断言,这些技术可以通过解决可伸缩性、互操作性和安全性问题来增强城市运营。该研究采用了新加坡和巴塞罗那的案例研究。该文件还分析了人工智能驱动的安全系统、6G网络以及物联网和5G对推进循环经济的贡献。这篇文章断言,智慧城市的发展需要强有力的政策框架来保证公平获取、数据保护和道德考虑。本研究将前人的研究与实践经验相结合,以解决基于数据的城市治理和城市创新问题。强调政策在促进包容和可持续城市未来方面的重要性。
{"title":"Balancing sustainability and security: A review of 5G and IoT in smart cities","authors":"Ghadah Aldehim ,&nbsp;Sunawar khan ,&nbsp;Tariq Shahzad ,&nbsp;Muhammad Amir Khan ,&nbsp;Yazeed Yasin Ghadi ,&nbsp;Weiwei Jiang ,&nbsp;Tehseen Mazhar ,&nbsp;Habib Hamam","doi":"10.1016/j.dcan.2025.06.007","DOIUrl":"10.1016/j.dcan.2025.06.007","url":null,"abstract":"<div><div>This century's rapid urbanization has disrupted urban governance, sustainability, and resource management. The Internet of Things (IoT) and 5G have the potential to transform smart cities through real-time data processing, enhanced connectivity, and sustainable urban design. This study investigates the potential of 5G connectivity with the IoT's hierarchical framework to enhance public service provision, mitigate environmental effects, and optimize urban resource management. The article asserts that these technologies can enhance urban operations by tackling scalability, interoperability, and security issues. The research employs case studies from Singapore and Barcelona. The document moreover analyzes AI-driven security systems, 6G networks, and the contributions of IoT and 5G to the advancement of a circular economy. The essay asserts that the growth of smart cities necessitates robust policy frameworks to guarantee equitable access, data protection, and ethical considerations. This study integrates prior research with practical experiences to tackle data-informed municipal governance and urban innovation. The importance of policy in fostering inclusive and sustainable urban futures is emphasized.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 6","pages":"Pages 1722-1737"},"PeriodicalIF":7.5,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145842712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pre-filters design for weighted sum rate maximization in multiuser time reversal downlink systems 多用户时间反转下行系统中加权和速率最大化的预滤波器设计
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-01 DOI: 10.1016/j.dcan.2024.08.011
Mingyue Wang , Fangwei Li , Yingsong Li , Shengyuan Luo
In high-speed multiuser Time Reversal (TR) downlink systems, the transmission rate is degraded due to the presence of severe inter-user and inter-symbol interference. Moreover, maximizing the weighted sum rate in such systems is a critical objective, since the weighting factors represent the priority of different users in different applications. However, it faces significant challenges as it is an NP-hard and non-convex problem. In order to suppress these interferences and maximize the weighted sum rate, in this paper we present a novel approach for the joint design of the pre-filters. The proposed method applies successive convex approximation to transform the original problem into a Second-Order Cone Programming (SOCP) problem. Then, a low-complexity iterative algorithm is provided to effectively solve the resulting SOCP problem. According to the simulation results, the proposed method reaches a local optimum within a few iterations and demonstrates superior performance in terms of weighted sum rate compared to the current algorithm.
在高速多用户时间反转(TR)下行链路系统中,由于存在严重的用户间和符号间干扰,传输速率会降低。此外,在这样的系统中,最大化加权和率是一个关键的目标,因为加权因子代表了不同应用中不同用户的优先级。然而,由于它是一个NP-hard和非凸问题,它面临着重大的挑战。为了抑制这些干扰并使加权和率最大化,本文提出了一种联合设计预滤波器的新方法。该方法利用逐次凸逼近将原问题转化为二阶锥规划问题。在此基础上,提出了一种低复杂度的迭代算法,有效地解决了由此产生的SOCP问题。仿真结果表明,该方法在几次迭代内达到局部最优,在加权和速率方面优于现有算法。
{"title":"Pre-filters design for weighted sum rate maximization in multiuser time reversal downlink systems","authors":"Mingyue Wang ,&nbsp;Fangwei Li ,&nbsp;Yingsong Li ,&nbsp;Shengyuan Luo","doi":"10.1016/j.dcan.2024.08.011","DOIUrl":"10.1016/j.dcan.2024.08.011","url":null,"abstract":"<div><div>In high-speed multiuser Time Reversal (TR) downlink systems, the transmission rate is degraded due to the presence of severe inter-user and inter-symbol interference. Moreover, maximizing the weighted sum rate in such systems is a critical objective, since the weighting factors represent the priority of different users in different applications. However, it faces significant challenges as it is an NP-hard and non-convex problem. In order to suppress these interferences and maximize the weighted sum rate, in this paper we present a novel approach for the joint design of the pre-filters. The proposed method applies successive convex approximation to transform the original problem into a Second-Order Cone Programming (SOCP) problem. Then, a low-complexity iterative algorithm is provided to effectively solve the resulting SOCP problem. According to the simulation results, the proposed method reaches a local optimum within a few iterations and demonstrates superior performance in terms of weighted sum rate compared to the current algorithm.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 6","pages":"Pages 1908-1916"},"PeriodicalIF":7.5,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145842596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving computation meets quantum computing: A scoping review 隐私保护计算与量子计算:范围回顾
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-01 DOI: 10.1016/j.dcan.2025.05.010
Aitor Gómez-Goiri, Iñaki Seco-Aguirre, Oscar Lage, Alejandra Ruiz
Privacy-Preserving Computation (PPC) comprises the techniques, schemes and protocols which ensure privacy and confidentiality in the context of secure computation and data analysis. Most of the current PPC techniques rely on the complexity of cryptographic operations, which are expected to be efficiently solved by quantum computers soon. This review explores how PPC can be built on top of quantum computing itself to alleviate these future threats. We analyze quantum proposals for Secure Multi-party Computation, Oblivious Transfer and Homomorphic Encryption from the last decade focusing on their maturity and the challenges they currently face. Our findings show a strong focus on purely theoretical works, but a rise on the experimental consideration of these techniques in the last 5 years. The applicability of these techniques to actual use cases is an underexplored aspect which could lead to the practical assessment of these techniques.
隐私保护计算(PPC)包括在安全计算和数据分析的背景下确保隐私和机密性的技术、方案和协议。目前大多数PPC技术依赖于密码操作的复杂性,预计量子计算机将很快有效地解决这一问题。本文探讨了如何在量子计算本身的基础上构建PPC,以减轻这些未来的威胁。我们分析了近十年来安全多方计算、遗忘传输和同态加密的量子建议,重点分析了它们的成熟度和当前面临的挑战。我们的研究结果显示了对纯理论工作的强烈关注,但在过去5年中,对这些技术的实验考虑有所增加。这些技术对实际用例的适用性是一个未被充分探索的方面,这可能导致对这些技术的实际评估。
{"title":"Privacy-preserving computation meets quantum computing: A scoping review","authors":"Aitor Gómez-Goiri,&nbsp;Iñaki Seco-Aguirre,&nbsp;Oscar Lage,&nbsp;Alejandra Ruiz","doi":"10.1016/j.dcan.2025.05.010","DOIUrl":"10.1016/j.dcan.2025.05.010","url":null,"abstract":"<div><div>Privacy-Preserving Computation (PPC) comprises the techniques, schemes and protocols which ensure privacy and confidentiality in the context of secure computation and data analysis. Most of the current PPC techniques rely on the complexity of cryptographic operations, which are expected to be efficiently solved by quantum computers soon. This review explores how PPC can be built on top of quantum computing itself to alleviate these future threats. We analyze quantum proposals for Secure Multi-party Computation, Oblivious Transfer and Homomorphic Encryption from the last decade focusing on their maturity and the challenges they currently face. Our findings show a strong focus on purely theoretical works, but a rise on the experimental consideration of these techniques in the last 5 years. The applicability of these techniques to actual use cases is an underexplored aspect which could lead to the practical assessment of these techniques.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 6","pages":"Pages 1707-1721"},"PeriodicalIF":7.5,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145842713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “DRL-based federated self-supervised learning for task offloading and resource allocation in ISAC-enabled vehicle edge computing” [Digit. Commun. Networks 11 (2025) 1614–1627] “基于drl的联邦自监督学习,用于isac支持的车辆边缘计算中的任务卸载和资源分配”的勘误表[数字]。Commun。网络11 (2025)1614-1627]
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-01 DOI: 10.1016/j.dcan.2025.11.005
Xueying Gu , Qiong Wu , Pingyi Fan , Nan Cheng , Wen Chen , Khaled B. Letaief
{"title":"Corrigendum to “DRL-based federated self-supervised learning for task offloading and resource allocation in ISAC-enabled vehicle edge computing” [Digit. Commun. Networks 11 (2025) 1614–1627]","authors":"Xueying Gu ,&nbsp;Qiong Wu ,&nbsp;Pingyi Fan ,&nbsp;Nan Cheng ,&nbsp;Wen Chen ,&nbsp;Khaled B. Letaief","doi":"10.1016/j.dcan.2025.11.005","DOIUrl":"10.1016/j.dcan.2025.11.005","url":null,"abstract":"","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 6","pages":"Page 2030"},"PeriodicalIF":7.5,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145842798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1