首页 > 最新文献

Tsinghua Science and Technology最新文献

英文 中文
IIN-FFD: Intra-Inter Network for Face Forgery Detection IIN-FFD:用于人脸伪造检测的内部网络
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-06-20 DOI: 10.26599/TST.2024.9010022
Qihua Zhou;Zhili Zhou;Zhipeng Bao;Weina Niu;Yuling Liu
Since different kinds of face forgeries leave similar forgery traces in videos, learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery detection. Therefore, to accurately detect known forgeries while ensuring high generalization ability of detecting unknown forgeries, we propose an intra-inter network (IIN) for face forgery detection (FFD) in videos with continual learning. The proposed IIN mainly consists of three modules, i.e., intra-module, inter-module, and forged trace masking module (FTMM). Specifically, the intra-module is trained for each kind of face forgeries by supervised learning to extract special features, while the inter-module is trained by self-supervised learning to extract the common features. As a result, the common and special features of the different forgeries are decoupled by the two feature learning modules, and then the decoupled common features can be utlized to achieve high generalization ability for FFD. Moreover, the FTMM is deployed for contrastive learning to further improve detection accuracy. The experimental results on FaceForensic++ dataset demonstrate that the proposed IIN outperforms the state-of-the-arts in FFD. Also, the generalization ability of the IIN verified on DFDC and Celeb-DF datasets demonstrates that the proposed IIN significantly improves the generalization ability for FFD.
由于不同类型的伪造人脸会在视频中留下相似的伪造痕迹,因此从不同类型的伪造人脸中学习共同特征将有望实现伪造检测的泛化能力。因此,为了准确检测已知的伪造人脸,同时确保检测未知伪造人脸的高泛化能力,我们提出了一种可持续学习的视频人脸伪造检测(FFD)内部网络(IIN)。所提出的 IIN 主要由三个模块组成,即模块内、模块间和伪造痕迹掩蔽模块(FTMM)。具体来说,模内模块通过监督学习对每种伪造人脸进行训练,以提取特殊特征;模间模块通过自监督学习对每种伪造人脸进行训练,以提取共性特征。这样,不同赝品的共性特征和特殊特征就被两个特征学习模块解耦,然后利用解耦后的共性特征实现 FFD 的高泛化能力。此外,FTMM 还可用于对比学习,进一步提高检测精度。在 FaceForensic++ 数据集上的实验结果表明,所提出的 IIN 在 FFD 方面优于同行。此外,在 DFDC 和 Celeb-DF 数据集上验证的 IIN 泛化能力也表明,所提出的 IIN 显著提高了 FFD 的泛化能力。
{"title":"IIN-FFD: Intra-Inter Network for Face Forgery Detection","authors":"Qihua Zhou;Zhili Zhou;Zhipeng Bao;Weina Niu;Yuling Liu","doi":"10.26599/TST.2024.9010022","DOIUrl":"https://doi.org/10.26599/TST.2024.9010022","url":null,"abstract":"Since different kinds of face forgeries leave similar forgery traces in videos, learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery detection. Therefore, to accurately detect known forgeries while ensuring high generalization ability of detecting unknown forgeries, we propose an intra-inter network (IIN) for face forgery detection (FFD) in videos with continual learning. The proposed IIN mainly consists of three modules, i.e., intra-module, inter-module, and forged trace masking module (FTMM). Specifically, the intra-module is trained for each kind of face forgeries by supervised learning to extract special features, while the inter-module is trained by self-supervised learning to extract the common features. As a result, the common and special features of the different forgeries are decoupled by the two feature learning modules, and then the decoupled common features can be utlized to achieve high generalization ability for FFD. Moreover, the FTMM is deployed for contrastive learning to further improve detection accuracy. The experimental results on FaceForensic++ dataset demonstrate that the proposed IIN outperforms the state-of-the-arts in FFD. Also, the generalization ability of the IIN verified on DFDC and Celeb-DF datasets demonstrates that the proposed IIN significantly improves the generalization ability for FFD.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1839-1850"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation and Heuristic Algorithms for the Priority Facility Location Problem with Outliers 有异常值的优先设施定位问题的近似和启发式算法
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-06-20 DOI: 10.26599/TST.2023.9010152
Hang Luo;Lu Han;Tianping Shuai;Fengmin Wang
In this paper, we propose the Priority Facility Location Problem with Outliers (PFLPO), which is a generalization of both the Facility Location Problem with Outliers (FLPO) and Priority Facility Location Problem (PFLP). As our main contribution, we use the technique of primal-dual to provide a 3-approximation algorithm for the PFLPO. We also give two heuristic algorithms. One of them is a greedy-based algorithm and the other is a local search algorithm. Moreover, we compare the experimental results of all the proposed algorithms in order to illustrate their performance.
本文提出了带异常值的优先设施定位问题(PFLPO),它是对带异常值的设施定位问题(FLPO)和优先设施定位问题(PFLP)的概括。作为我们的主要贡献,我们利用初等二元技术为 PFLPO 提供了一种三元近似算法。我们还给出了两种启发式算法。其中一个是基于贪婪的算法,另一个是局部搜索算法。此外,我们还比较了所有建议算法的实验结果,以说明它们的性能。
{"title":"Approximation and Heuristic Algorithms for the Priority Facility Location Problem with Outliers","authors":"Hang Luo;Lu Han;Tianping Shuai;Fengmin Wang","doi":"10.26599/TST.2023.9010152","DOIUrl":"https://doi.org/10.26599/TST.2023.9010152","url":null,"abstract":"In this paper, we propose the Priority Facility Location Problem with Outliers (PFLPO), which is a generalization of both the Facility Location Problem with Outliers (FLPO) and Priority Facility Location Problem (PFLP). As our main contribution, we use the technique of primal-dual to provide a 3-approximation algorithm for the PFLPO. We also give two heuristic algorithms. One of them is a greedy-based algorithm and the other is a local search algorithm. Moreover, we compare the experimental results of all the proposed algorithms in order to illustrate their performance.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1694-1702"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Model Compression for Steel Plate Surface Defect Detection: An Expert Knowledge and Working Condition-Based Approach 用于钢板表面缺陷检测的自适应模型压缩:基于专家知识和工作条件的方法
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-06-20 DOI: 10.26599/TST.2024.9010039
Maojie Sun;Fang Dong;Zhaowu Huang;Junzhou Luo
The steel plate is one of the main products in steel industries, and its surface quality directly affects the final product performance. How to detect surface defects of steel plates in real time during the production process is a challenging problem. The single or fixed model compression method cannot be directly applied to the detection of steel surface defects, because it is difficult to consider the diversity of production tasks, the uncertainty caused by environmental factors, such as communication networks, and the influence of process and working conditions in steel plate production. In this paper, we propose an adaptive model compression method for steel surface defect online detection based on expert knowledge and working conditions. First, we establish an expert system to give lightweight model parameters based on the correlation between defect types and manufacturing processes. Then, lightweight model parameters are adaptively adjusted according to working conditions, which improves detection accuracy while ensuring real-time performance. The experimental results show that compared with the detection method of constant lightweight parameter model, the proposed method makes the total detection time cut down by 23.1%, and the deadline satisfaction ratio increased by 36.5%, while upgrading the accuracy by 4.2% and reducing the false detection rate by 4.3%.
钢板是钢铁工业的主要产品之一,其表面质量直接影响最终产品的性能。如何在生产过程中实时检测钢板表面缺陷是一个具有挑战性的问题。由于难以考虑钢板生产过程中生产任务的多样性、通信网络等环境因素造成的不确定性以及工艺和工况的影响,单一或固定的模型压缩方法无法直接应用于钢板表面缺陷的检测。本文提出了一种基于专家知识和工况条件的钢板表面缺陷在线检测自适应模型压缩方法。首先,我们建立了一个专家系统,根据缺陷类型和生产工艺之间的相关性给出轻量级模型参数。然后,根据工况条件自适应地调整轻量级模型参数,在保证实时性的同时提高了检测精度。实验结果表明,与恒定轻量级参数模型的检测方法相比,所提出的方法使总检测时间缩短了 23.1%,截止日期满足率提高了 36.5%,同时准确率提高了 4.2%,误检率降低了 4.3%。
{"title":"Adaptive Model Compression for Steel Plate Surface Defect Detection: An Expert Knowledge and Working Condition-Based Approach","authors":"Maojie Sun;Fang Dong;Zhaowu Huang;Junzhou Luo","doi":"10.26599/TST.2024.9010039","DOIUrl":"https://doi.org/10.26599/TST.2024.9010039","url":null,"abstract":"The steel plate is one of the main products in steel industries, and its surface quality directly affects the final product performance. How to detect surface defects of steel plates in real time during the production process is a challenging problem. The single or fixed model compression method cannot be directly applied to the detection of steel surface defects, because it is difficult to consider the diversity of production tasks, the uncertainty caused by environmental factors, such as communication networks, and the influence of process and working conditions in steel plate production. In this paper, we propose an adaptive model compression method for steel surface defect online detection based on expert knowledge and working conditions. First, we establish an expert system to give lightweight model parameters based on the correlation between defect types and manufacturing processes. Then, lightweight model parameters are adaptively adjusted according to working conditions, which improves detection accuracy while ensuring real-time performance. The experimental results show that compared with the detection method of constant lightweight parameter model, the proposed method makes the total detection time cut down by 23.1%, and the deadline satisfaction ratio increased by 36.5%, while upgrading the accuracy by 4.2% and reducing the false detection rate by 4.3%.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1851-1871"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10565998","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integral Attack on the Full FUTURE Block Cipher 对全 FUTURE 区块密码的积分攻击
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-06-04 DOI: 10.26599/TST.2024.9010007
Zeyu Xu;Jiamin Cui;Kai Hu;Meiqin Wang
FUTURE is a recently proposed lightweight block cipher that achieved a remarkable hardware performance due to careful design decisions. FUTURE is an Advanced Encryption Standard (AES)-like Substitution-Permutation Network (SPN) with 10 rounds, whose round function consists of four components, i.e., SubCell, MixColumn, ShiftRow, and AddRoundKey. Unlike AES, it is a 64-bit-size block cipher with a 128-bit secret key, and the state can be arranged into 16 cells. Therefore, the operations of FUTURE including its S-box is defined over $boldsymbol{F}_{2}^{4}$. The previous studies have shown that the integral properties of 4-bit S-boxes are usually weaker than larger-size S-boxes, thus the number of rounds of FUTURE, i.e., 10 rounds only, might be too aggressive to provide enough resistance against integral cryptanalysis. In this paper, we mount the integral cryptanalysis on FUTURE. With state-of-the-art detection techniques, we identify several integral distinguishers of 7 rounds of FUTURE. By extending this 7-round distinguisher by 3 forward rounds, we manage to recover all the 128 bits secret keys from the full FUTURE cipher without the full codebook for the first time. To further achieve better time complexity, we also present a key recovery attack on full FUTURE with full codebook. Both attacks have better time complexity than existing results.
FUTURE 是最近提出的一种轻量级块密码,由于精心的设计决策,它实现了卓越的硬件性能。FUTURE 是一种类似于高级加密标准(AES)的替换-置换网络(SPN),有 10 个轮次,其轮次函数由四个部分组成,即 SubCell、MixColumn、ShiftRow 和 AddRoundKey。与 AES 不同的是,它是一种 64 位大小、128 位秘钥的块密码,其状态可以被排列成 16 个单元。因此,FUTURE 的运算包括其 S-box 是在 $boldsymbol{F}_{2}^{4}$ 上定义的。以往的研究表明,4 位 S-box 的积分特性通常弱于更大容量的 S-box,因此 FUTURE 的轮数(即只有 10 轮)可能过于激进,不足以抵御积分密码分析。在本文中,我们对 FUTURE 进行了积分密码分析。利用最先进的检测技术,我们确定了 FUTURE 的 7 轮积分区分器。通过将 7 轮区分器向前扩展 3 轮,我们首次在没有完整密码本的情况下恢复了完整 FUTURE 密码的所有 128 比特密钥。为了进一步提高时间复杂度,我们还提出了一种针对全 FUTURE 和全密码本的密钥恢复攻击。这两种攻击的时间复杂度都优于现有成果。
{"title":"Integral Attack on the Full FUTURE Block Cipher","authors":"Zeyu Xu;Jiamin Cui;Kai Hu;Meiqin Wang","doi":"10.26599/TST.2024.9010007","DOIUrl":"https://doi.org/10.26599/TST.2024.9010007","url":null,"abstract":"FUTURE is a recently proposed lightweight block cipher that achieved a remarkable hardware performance due to careful design decisions. FUTURE is an Advanced Encryption Standard (AES)-like Substitution-Permutation Network (SPN) with 10 rounds, whose round function consists of four components, i.e., SubCell, MixColumn, ShiftRow, and AddRoundKey. Unlike AES, it is a 64-bit-size block cipher with a 128-bit secret key, and the state can be arranged into 16 cells. Therefore, the operations of FUTURE including its S-box is defined over \u0000<tex>$boldsymbol{F}_{2}^{4}$</tex>\u0000. The previous studies have shown that the integral properties of 4-bit S-boxes are usually weaker than larger-size S-boxes, thus the number of rounds of FUTURE, i.e., 10 rounds only, might be too aggressive to provide enough resistance against integral cryptanalysis. In this paper, we mount the integral cryptanalysis on FUTURE. With state-of-the-art detection techniques, we identify several integral distinguishers of 7 rounds of FUTURE. By extending this 7-round distinguisher by 3 forward rounds, we manage to recover all the 128 bits secret keys from the full FUTURE cipher without the full codebook for the first time. To further achieve better time complexity, we also present a key recovery attack on full FUTURE with full codebook. Both attacks have better time complexity than existing results.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 1","pages":"161-170"},"PeriodicalIF":6.6,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10547705","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-of-Use Price Resource Scheduling in Multiplex Networked Industrial Chains 多路复用网络产业链中的使用时间价格资源调度
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-04-23 DOI: 10.26599/TST.2024.9010012
Pan Li;Kai Di;Xinlei Bai;Fulin Chen;Yuanshuang Jiang;Xiping Fu;Yichuan Jiang
With the advancement of electronic information technology and the growth of the intelligent industry, the industrial sector has undergone a shift from simplex, linear, and vertical chains to complex, multi-level, and multi-dimensional networked industrial chains. In order to enhance energy efficiency in multiplex networked industrial chains under time-of-use price, a coarse time granularity task scheduling approach has been adopted. This approach adjusts the distribution of electricity supply based on task deadlines, dividing it into longer periods to facilitate batch access to task information. However, traditional simplex-network task assignment optimization methods are unable to achieve a globally optimal solution for cross-layer links in multiplex networked industrial chains. Existing solutions struggle to balance execution costs and completion efficiency in time-of-use price scenarios. Therefore, this paper presents a mixed-integer linear programming model for solving the problem scenario and two algorithms: an exact algorithm based on the branch-and-bound method and a multi-objective heuristic algorithm based on cross-layer policy propagation. These algorithms are designed to adapt to small-scale and large-scale problem scenarios under coarse time granularity. Through extensive simulation experiments and theoretical analysis, the proposed methods effectively optimize the energy and time costs associated with the task execution.
随着电子信息技术的进步和智能工业的发展,工业领域经历了从简单、线性、垂直产业链向复杂、多层次、多维度网络化产业链的转变。为了提高分时电价下多路网络产业链的能效,采用了一种粗时间粒度任务调度方法。这种方法根据任务截止日期调整电力供应分配,将其划分为较长的时间段,以方便批量获取任务信息。然而,传统的单工网络任务分配优化方法无法为多工网络产业链中的跨层链路实现全局最优解。现有的解决方案难以在使用时间价格情景下平衡执行成本和完成效率。因此,本文提出了一个混合整数线性规划模型来解决该问题,并提出了两种算法:一种是基于分支与边界法的精确算法,另一种是基于跨层策略传播的多目标启发式算法。这些算法旨在适应粗时间粒度下的小规模和大规模问题场景。通过大量的仿真实验和理论分析,所提出的方法有效地优化了与任务执行相关的能量和时间成本。
{"title":"Time-of-Use Price Resource Scheduling in Multiplex Networked Industrial Chains","authors":"Pan Li;Kai Di;Xinlei Bai;Fulin Chen;Yuanshuang Jiang;Xiping Fu;Yichuan Jiang","doi":"10.26599/TST.2024.9010012","DOIUrl":"https://doi.org/10.26599/TST.2024.9010012","url":null,"abstract":"With the advancement of electronic information technology and the growth of the intelligent industry, the industrial sector has undergone a shift from simplex, linear, and vertical chains to complex, multi-level, and multi-dimensional networked industrial chains. In order to enhance energy efficiency in multiplex networked industrial chains under time-of-use price, a coarse time granularity task scheduling approach has been adopted. This approach adjusts the distribution of electricity supply based on task deadlines, dividing it into longer periods to facilitate batch access to task information. However, traditional simplex-network task assignment optimization methods are unable to achieve a globally optimal solution for cross-layer links in multiplex networked industrial chains. Existing solutions struggle to balance execution costs and completion efficiency in time-of-use price scenarios. Therefore, this paper presents a mixed-integer linear programming model for solving the problem scenario and two algorithms: an exact algorithm based on the branch-and-bound method and a multi-objective heuristic algorithm based on cross-layer policy propagation. These algorithms are designed to adapt to small-scale and large-scale problem scenarios under coarse time granularity. Through extensive simulation experiments and theoretical analysis, the proposed methods effectively optimize the energy and time costs associated with the task execution.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 1","pages":"303-317"},"PeriodicalIF":6.6,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10507222","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud-Network-End Collaborative Security for Wireless Networks: Architecture, Mechanisms, and Applications 无线网络的云网端协作安全:架构、机制和应用
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-04-09 DOI: 10.26599/TST.2023.9010158
Xiangyu Wang;Jianfeng Ma
The core goal of network security is to protect the security of data sharing. Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security. However, with the advancement of mobile networks, cloud computing, and Internet of Things, communication-computing integration and cloud-network integration have been important technical routes. As a result, the main application requirements of wireless networks have changed from data transmission to cloud-based information services. Traditional data transmission security technology cannot overcome the security requirements of cloud-network-end collaborative services in the new era, and secure semantic communication has become an important model. To address this issue, we propose a cloud-network-end collaborative security architecture. Firstly, we clarify security mechanisms for end system security, network connection security, and cloud services security, respectively. Next, based on the above three aspects, we elaborate on the connotation of cloud-network-end collaborative security. By giving example applications, including heterogeneous network secure convergence framework, unmanned system collaborative operations security framework, and space-air-ground integrated network security framework, we demonstrate the universality of the proposed architecture. Finally, we review the current research on end system security, network connection security, and cloud services security, respectively.
网络安全的核心目标是保护数据共享的安全。传统的无线网络安全技术致力于保障端到端的数据传输安全。然而,随着移动网络、云计算和物联网的发展,通信-计算一体化和云-网络一体化已成为重要的技术路线。因此,无线网络的主要应用需求已从数据传输转变为基于云的信息服务。传统的数据传输安全技术无法克服新时代云网端协同服务的安全要求,安全语义通信成为重要模式。针对这一问题,我们提出了云网端协同安全架构。首先,我们分别阐明了终端系统安全、网络连接安全和云服务安全的安全机制。接下来,基于以上三个方面,我们阐述了云-网-端协同安全的内涵。通过举例应用,包括异构网络安全融合框架、无人系统协同运行安全框架、天-空-地一体化网络安全框架等,展示了所提架构的普适性。最后,我们分别回顾了当前在终端系统安全、网络连接安全和云服务安全方面的研究。
{"title":"Cloud-Network-End Collaborative Security for Wireless Networks: Architecture, Mechanisms, and Applications","authors":"Xiangyu Wang;Jianfeng Ma","doi":"10.26599/TST.2023.9010158","DOIUrl":"https://doi.org/10.26599/TST.2023.9010158","url":null,"abstract":"The core goal of network security is to protect the security of data sharing. Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security. However, with the advancement of mobile networks, cloud computing, and Internet of Things, communication-computing integration and cloud-network integration have been important technical routes. As a result, the main application requirements of wireless networks have changed from data transmission to cloud-based information services. Traditional data transmission security technology cannot overcome the security requirements of cloud-network-end collaborative services in the new era, and secure semantic communication has become an important model. To address this issue, we propose a cloud-network-end collaborative security architecture. Firstly, we clarify security mechanisms for end system security, network connection security, and cloud services security, respectively. Next, based on the above three aspects, we elaborate on the connotation of cloud-network-end collaborative security. By giving example applications, including heterogeneous network secure convergence framework, unmanned system collaborative operations security framework, and space-air-ground integrated network security framework, we demonstrate the universality of the proposed architecture. Finally, we review the current research on end system security, network connection security, and cloud services security, respectively.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 1","pages":"18-33"},"PeriodicalIF":6.6,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10495800","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Risk-Aware Task Migration Algorithm Among Multiplex UAV Groups Through Hybrid Attention Multi-Agent Reinforcement Learning 通过混合注意力多代理强化学习优化多路无人机群之间的风险意识任务迁移算法
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-04-01 DOI: 10.26599/TST.2024.9010013
Yuanshuang Jiang;Kai Di;Ruiyi Qian;Xingyu Wu;Fulin Chen;Pan Li;Xiping Fu;Yichuan Jiang
Recently, with the increasing complexity of multiplex Unmanned Aerial Vehicles (multi-UAVs) collaboration in dynamic task environments, multi-UAVs systems have shown new characteristics of inter-coupling among multiplex groups and intra-correlation within groups. However, previous studies often overlooked the structural impact of dynamic risks on agents among multiplex UAV groups, which is a critical issue for modern multi-UAVs communication to address. To address this problem, we integrate the influence of dynamic risks on agents among multiplex UAV group structures into a multi-UAVs task migration problem and formulate it as a partially observable Markov game. We then propose a Hybrid Attention Multi-agent Reinforcement Learning (HAMRL) algorithm, which uses attention structures to learn the dynamic characteristics of the task environment, and it integrates hybrid attention mechanisms to establish efficient intra- and inter-group communication aggregation for information extraction and group collaboration. Experimental results show that in this comprehensive and challenging model, our algorithm significantly outperforms state-of-the-art algorithms in terms of convergence speed and algorithm performance due to the rational design of communication mechanisms.
近年来,随着动态任务环境下多任务无人飞行器(multiplex Unmanned Aerial Vehicle,multi-UAVs)协作的复杂性不断增加,多任务无人飞行器系统呈现出多任务群组之间相互耦合、群组内部相互关联的新特点。然而,以往的研究往往忽视了动态风险对多路无人机群组间代理的结构性影响,而这正是现代多路无人机通信需要解决的关键问题。为解决这一问题,我们将多路无人机群结构中动态风险对代理的影响整合到多路无人机任务迁移问题中,并将其表述为一个部分可观测的马尔可夫博弈。然后,我们提出了混合注意力多代理强化学习(HAMRL)算法,该算法利用注意力结构学习任务环境的动态特征,并整合混合注意力机制,建立高效的组内和组间通信聚合,以实现信息提取和小组协作。实验结果表明,在这一综合且具有挑战性的模型中,由于通信机制的合理设计,我们的算法在收敛速度和算法性能方面明显优于最先进的算法。
{"title":"Optimizing Risk-Aware Task Migration Algorithm Among Multiplex UAV Groups Through Hybrid Attention Multi-Agent Reinforcement Learning","authors":"Yuanshuang Jiang;Kai Di;Ruiyi Qian;Xingyu Wu;Fulin Chen;Pan Li;Xiping Fu;Yichuan Jiang","doi":"10.26599/TST.2024.9010013","DOIUrl":"https://doi.org/10.26599/TST.2024.9010013","url":null,"abstract":"Recently, with the increasing complexity of multiplex Unmanned Aerial Vehicles (multi-UAVs) collaboration in dynamic task environments, multi-UAVs systems have shown new characteristics of inter-coupling among multiplex groups and intra-correlation within groups. However, previous studies often overlooked the structural impact of dynamic risks on agents among multiplex UAV groups, which is a critical issue for modern multi-UAVs communication to address. To address this problem, we integrate the influence of dynamic risks on agents among multiplex UAV group structures into a multi-UAVs task migration problem and formulate it as a partially observable Markov game. We then propose a Hybrid Attention Multi-agent Reinforcement Learning (HAMRL) algorithm, which uses attention structures to learn the dynamic characteristics of the task environment, and it integrates hybrid attention mechanisms to establish efficient intra- and inter-group communication aggregation for information extraction and group collaboration. Experimental results show that in this comprehensive and challenging model, our algorithm significantly outperforms state-of-the-art algorithms in terms of convergence speed and algorithm performance due to the rational design of communication mechanisms.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 1","pages":"318-330"},"PeriodicalIF":6.6,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10488078","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Line-of-Sight Multipath Classification Method for BDS Using Convolutional Sparse Autoencoder with LSTM 使用带有 LSTM 的卷积稀疏自动编码器的 BDS 非视距多径分类方法
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-03-26 DOI: 10.26599/TST.2024.9010004
Yahang Qin;Zhenni Li;Shengli Xie;Bo Li;Ming Liu;Victor Kuzin
Multipath signal recognition is crucial to the ability to provide high-precision absolute-position services by the BeiDou Navigation Satellite System (BDS). However, most existing approaches to this issue involve supervised machine learning (ML) methods, and it is difficult to move to unsupervised multipath signal recognition because of the limitations in signal labeling. Inspired by an autoencoder with powerful unsupervised feature extraction, we propose a new deep learning (DL) model for BDS signal recognition that places a long short-term memory (LSTM) module in series with a convolutional sparse autoencoder to create a new autoencoder structure. First, we propose to capture the temporal correlations in long-duration BeiDou satellite time-series signals by using the LSTM module to mine the temporal change patterns in the time series. Second, we develop a convolutional sparse autoencoder method that learns a compressed representation of the input data, which then enables downscaled and unsupervised feature extraction from long-duration BeiDou satellite series signals. Finally, we add an l1/2 regularizer to the objective function of our DL model to remove redundant neurons from the neural network while ensuring recognition accuracy. We tested our proposed approach on a real urban canyon dataset, and the results demonstrated that our algorithm could achieve better classification performance than two ML-based methods (e.g., 11% better than a support vector machine) and two existing DL-based methods (e.g., 7.26% better than convolutional neural networks).
多径信号识别对于北斗卫星导航系统(BDS)提供高精度绝对定位服务的能力至关重要。然而,解决这一问题的现有方法大多涉及有监督的机器学习(ML)方法,由于信号标记的局限性,很难转向无监督的多径信号识别。受具有强大无监督特征提取功能的自动编码器的启发,我们为 BDS 信号识别提出了一种新的深度学习(DL)模型,该模型将长短期记忆(LSTM)模块与卷积稀疏自动编码器串联起来,创建了一种新的自动编码器结构。首先,我们建议利用 LSTM 模块挖掘时间序列中的时间变化规律,从而捕捉长时间北斗卫星时间序列信号中的时间相关性。其次,我们开发了一种卷积稀疏自动编码器方法,该方法可学习输入数据的压缩表示,从而实现对长时间北斗卫星系列信号的降维和无监督特征提取。最后,我们在 DL 模型的目标函数中添加了 l1/2 正则器,以去除神经网络中的冗余神经元,同时确保识别准确性。我们在一个真实的城市峡谷数据集上测试了我们提出的方法,结果表明,与两种基于 ML 的方法(如比支持向量机好 11%)和两种现有的基于 DL 的方法(如比卷积神经网络好 7.26%)相比,我们的算法可以获得更好的分类性能。
{"title":"Non-Line-of-Sight Multipath Classification Method for BDS Using Convolutional Sparse Autoencoder with LSTM","authors":"Yahang Qin;Zhenni Li;Shengli Xie;Bo Li;Ming Liu;Victor Kuzin","doi":"10.26599/TST.2024.9010004","DOIUrl":"https://doi.org/10.26599/TST.2024.9010004","url":null,"abstract":"Multipath signal recognition is crucial to the ability to provide high-precision absolute-position services by the BeiDou Navigation Satellite System (BDS). However, most existing approaches to this issue involve supervised machine learning (ML) methods, and it is difficult to move to unsupervised multipath signal recognition because of the limitations in signal labeling. Inspired by an autoencoder with powerful unsupervised feature extraction, we propose a new deep learning (DL) model for BDS signal recognition that places a long short-term memory (LSTM) module in series with a convolutional sparse autoencoder to create a new autoencoder structure. First, we propose to capture the temporal correlations in long-duration BeiDou satellite time-series signals by using the LSTM module to mine the temporal change patterns in the time series. Second, we develop a convolutional sparse autoencoder method that learns a compressed representation of the input data, which then enables downscaled and unsupervised feature extraction from long-duration BeiDou satellite series signals. Finally, we add an l\u0000<inf>1/2</inf>\u0000 regularizer to the objective function of our DL model to remove redundant neurons from the neural network while ensuring recognition accuracy. We tested our proposed approach on a real urban canyon dataset, and the results demonstrated that our algorithm could achieve better classification performance than two ML-based methods (e.g., 11% better than a support vector machine) and two existing DL-based methods (e.g., 7.26% better than convolutional neural networks).","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 1","pages":"68-86"},"PeriodicalIF":6.6,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10480322","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sparse Bayesian Learning Based Off-Grid Estimation of OTFS Channels with Doppler Squint 基于稀疏贝叶斯学习的多普勒斜视 OTFS 信道离网估计
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-03-19 DOI: 10.26599/TST.2023.9010093
Xuehan Wang;Xu Shi;Jintao Wang
Orthogonal Time Frequency Space (OTFS) modulation has exhibited significant potential to further promote the performance of future wireless communication networks especially in high-mobility scenarios. In practical OTFS systems, the subcarrier-dependent Doppler shift which is referred to as the Doppler Squint Effect (DSE) plays an important role due to the assistance of time-frequency modulation. Unfortunately, most existing works on OTFS channel estimation ignore DSE, which leads to severe performance degradation. In this letter, OTFS systems taking DSE into consideration are investigated. Inspired by the input-output analysis with DSE and the embedded pilot pattern, the sparse Bayesian learning based parameter estimation scheme is adopted to recover the delay-Doppler channel. Simulation results verify the excellent performance of the proposed off-grid estimation approach considering DSE.
正交时频空间(OTFS)调制在进一步提高未来无线通信网络的性能(尤其是在高移动性场景中)方面具有巨大潜力。在实际的 OTFS 系统中,由于时频调制的帮助,与子载波相关的多普勒频移(被称为多普勒斜视效应(DSE))发挥了重要作用。遗憾的是,大多数现有的 OTFS 信道估计工作都忽略了 DSE,导致性能严重下降。本文研究了考虑 DSE 的 OTFS 系统。受带有 DSE 和嵌入式先导模式的输入输出分析的启发,采用了基于稀疏贝叶斯学习的参数估计方案来恢复延迟-多普勒信道。仿真结果验证了所提出的考虑 DSE 的离网估计方法的卓越性能。
{"title":"Sparse Bayesian Learning Based Off-Grid Estimation of OTFS Channels with Doppler Squint","authors":"Xuehan Wang;Xu Shi;Jintao Wang","doi":"10.26599/TST.2023.9010093","DOIUrl":"https://doi.org/10.26599/TST.2023.9010093","url":null,"abstract":"Orthogonal Time Frequency Space (OTFS) modulation has exhibited significant potential to further promote the performance of future wireless communication networks especially in high-mobility scenarios. In practical OTFS systems, the subcarrier-dependent Doppler shift which is referred to as the Doppler Squint Effect (DSE) plays an important role due to the assistance of time-frequency modulation. Unfortunately, most existing works on OTFS channel estimation ignore DSE, which leads to severe performance degradation. In this letter, OTFS systems taking DSE into consideration are investigated. Inspired by the input-output analysis with DSE and the embedded pilot pattern, the sparse Bayesian learning based parameter estimation scheme is adopted to recover the delay-Doppler channel. Simulation results verify the excellent performance of the proposed off-grid estimation approach considering DSE.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1821-1828"},"PeriodicalIF":6.6,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10475894","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offline Reinforcement Learning with Constrained Hybrid Action Implicit Representation Towards Wargaming Decision-Making 离线强化学习与受限混合行动隐含表征用于战争游戏决策制定
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-03-05 DOI: 10.26599/TST.2023.9010100
Liwei Dong;Ni Li;Guanghong Gong;Xin Lin
Reinforcement Learning (RL) has emerged as a promising data-driven solution for wargaming decision-making. However, two domain challenges still exist: (1) dealing with discrete-continuous hybrid wargaming control and (2) accelerating RL deployment with rich offline data. Existing RL methods fail to handle these two issues simultaneously, thereby we propose a novel offline RL method targeting hybrid action space. A new constrained action representation technique is developed to build a bidirectional mapping between the original hybrid action space and a latent space in a semantically consistent way. This allows learning a continuous latent policy with offline RL with better exploration feasibility and scalability and reconstructing it back to a needed hybrid policy. Critically, a novel offline RL optimization objective with adaptively adjusted constraints is designed to balance the alleviation and generalization of out-of-distribution actions. Our method demonstrates superior performance and generality across different tasks, particularly in typical realistic wargaming scenarios.
强化学习(RL)已成为一种很有前途的数据驱动型战争游戏决策解决方案。然而,目前仍存在两个领域的挑战:(1) 处理离散-连续混合战争博弈控制;(2) 利用丰富的离线数据加速 RL 部署。现有的 RL 方法无法同时处理这两个问题,因此我们提出了一种针对混合行动空间的新型离线 RL 方法。我们开发了一种新的受限行动表示技术,以语义一致的方式在原始混合行动空间和潜空间之间建立双向映射。这使得离线 RL 学习连续的潜在策略具有更好的探索可行性和可扩展性,并能将其重构为所需的混合策略。重要的是,我们设计了一种带有自适应调整约束的新型离线 RL 优化目标,以在减少和泛化分布外行动之间取得平衡。我们的方法在不同的任务中,尤其是在典型的现实战争游戏场景中,表现出了卓越的性能和通用性。
{"title":"Offline Reinforcement Learning with Constrained Hybrid Action Implicit Representation Towards Wargaming Decision-Making","authors":"Liwei Dong;Ni Li;Guanghong Gong;Xin Lin","doi":"10.26599/TST.2023.9010100","DOIUrl":"https://doi.org/10.26599/TST.2023.9010100","url":null,"abstract":"Reinforcement Learning (RL) has emerged as a promising data-driven solution for wargaming decision-making. However, two domain challenges still exist: (1) dealing with discrete-continuous hybrid wargaming control and (2) accelerating RL deployment with rich offline data. Existing RL methods fail to handle these two issues simultaneously, thereby we propose a novel offline RL method targeting hybrid action space. A new constrained action representation technique is developed to build a bidirectional mapping between the original hybrid action space and a latent space in a semantically consistent way. This allows learning a continuous latent policy with offline RL with better exploration feasibility and scalability and reconstructing it back to a needed hybrid policy. Critically, a novel offline RL optimization objective with adaptively adjusted constraints is designed to balance the alleviation and generalization of out-of-distribution actions. Our method demonstrates superior performance and generality across different tasks, particularly in typical realistic wargaming scenarios.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 5","pages":"1422-1440"},"PeriodicalIF":6.6,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10460410","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140820229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Tsinghua Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1