首页 > 最新文献

Journal of Combinatorial Optimization最新文献

英文 中文
Algorithms for 2-balanced connected k-partition problem in graphs 图中2平衡连通k划分问题的算法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-07-03 DOI: 10.1007/s10878-025-01332-0
Junran Yu, Jing Hu, Jiaquan Gao, Donglei Du, Xiaoyan Zhang

Motivated by the result of balanced connected graph edge partition problem for trees, we investigate the 2-balanced connected graph vertex k-partition problem. This paper leverages the charity vertex method and proposes several algorithms for 2-balanced vertex-connected partitioning. Furthermore, we prove that these algorithms are polynomial-time solvable on degree-bounded graphs, thereby refining and extending the results of Caragiannis et al.

基于树的平衡连通图边缘划分问题的结果,我们研究了2平衡连通图顶点k划分问题。本文利用慈善顶点法,提出了几种2平衡顶点连通划分算法。进一步证明了这些算法在次有界图上是多项式时间可解的,从而改进和推广了Caragiannis等人的结果。
{"title":"Algorithms for 2-balanced connected k-partition problem in graphs","authors":"Junran Yu, Jing Hu, Jiaquan Gao, Donglei Du, Xiaoyan Zhang","doi":"10.1007/s10878-025-01332-0","DOIUrl":"https://doi.org/10.1007/s10878-025-01332-0","url":null,"abstract":"<p>Motivated by the result of balanced connected graph edge partition problem for trees, we investigate the 2-balanced connected graph vertex <i>k</i>-partition problem. This paper leverages the charity vertex method and proposes several algorithms for 2-balanced vertex-connected partitioning. Furthermore, we prove that these algorithms are polynomial-time solvable on degree-bounded graphs, thereby refining and extending the results of Caragiannis et al.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"103 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145003455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust static and dynamic maximum flows 稳健的静态和动态最大流量
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01298-z
Christian Biefel, Martina Kuchlbauer, Frauke Liers, Lisa Waldmüller

We study the robust maximum flow problem and the robust maximum flow over time problem where a given number of arcs (Gamma ) may fail or may be delayed. Two prominent models have been introduced for these problems: either one assigns flow to arcs fulfilling weak flow conservation in any scenario, or one assigns flow to paths where an arc failure or delay affects a whole path. We provide a unifying framework by presenting novel general models, in which we assign flow to subpaths. These models contain the known models as special cases and unify their advantages in order to obtain less conservative robust solutions.

We give a thorough analysis with respect to complexity of the general models. In particular, we show that the general models are essentially NP-hard, whereas, e.g., in the static case with (Gamma =1) an optimal solution can be computed in polynomial time. Further, we answer the open question about the complexity of the dynamic path model for (Gamma =1). We also compare the solution quality of the different models. In detail, we show that the general models have better robust optimal values than the known models and we prove bounds on these gaps.

我们研究了鲁棒最大流问题和鲁棒最大流随时间问题,其中给定数量的弧(Gamma )可能失效或可能延迟。针对这些问题,有两种重要的模型:一种是将流量分配给在任何情况下满足弱流守恒的弧线,另一种是将流量分配给弧线失效或延迟影响整个路径的路径。我们通过提出新的通用模型提供了一个统一的框架,其中我们将流分配给子路径。这些模型包含已知模型作为特例,并统一它们的优点,以获得保守性较小的鲁棒解。我们对一般模型的复杂性作了全面的分析。特别是,我们证明了一般模型本质上是np困难的,然而,例如,在(Gamma =1)的静态情况下,最优解可以在多项式时间内计算出来。此外,我们回答了关于(Gamma =1)动态路径模型复杂性的开放性问题。我们还比较了不同模型的解质量。详细地,我们证明了一般模型比已知模型具有更好的鲁棒最优值,并证明了这些间隙的界。
{"title":"Robust static and dynamic maximum flows","authors":"Christian Biefel, Martina Kuchlbauer, Frauke Liers, Lisa Waldmüller","doi":"10.1007/s10878-025-01298-z","DOIUrl":"https://doi.org/10.1007/s10878-025-01298-z","url":null,"abstract":"<p>We study the robust maximum flow problem and the robust maximum flow over time problem where a given number of arcs <span>(Gamma )</span> may fail or may be delayed. Two prominent models have been introduced for these problems: either one assigns flow to arcs fulfilling weak flow conservation in any scenario, or one assigns flow to paths where an arc failure or delay affects a whole path. We provide a unifying framework by presenting novel general models, in which we assign flow to subpaths. These models contain the known models as special cases and unify their advantages in order to obtain less conservative robust solutions.</p><p>We give a thorough analysis with respect to complexity of the general models. In particular, we show that the general models are essentially NP-hard, whereas, e.g., in the static case with <span>(Gamma =1)</span> an optimal solution can be computed in polynomial time. Further, we answer the open question about the complexity of the dynamic path model for <span>(Gamma =1)</span>. We also compare the solution quality of the different models. In detail, we show that the general models have better robust optimal values than the known models and we prove bounds on these gaps.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"23 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144133661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating the maximum weight cycle/path partition in graphs with weights one and two 在权值为1和2的图中逼近最大权循环/路径划分
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01322-2
Xinmeng Guo, Wei Yu, Zhaohui Liu

In this paper, we investigate the maximum weight k-cycle (k-path) partition problem (MaxWkCP/MaxWkPP for short). The input consists of an undirected complete graph (G=(V,E)) with (|V|=kn), where kn are positive integers, and a non-negative weight function on E, the objective is to determine n vertex disjoint k-cycles (k-paths), which are cycles (paths) containing exactly k vertices, covering all the vertices such that the total edge weight of these cycles (paths) is as large as possible. We propose improved approximation algorithms for the MaxWkCP/MaxWkPP in graphs with weights one and two. For the MaxWkCP in graphs with weights one and two, we obtain an approximation algorithm having an approximation ratio of (frac{37}{48}) for (k=6), which improves upon the best available (frac{91}{120})-approximation algorithm by Zhao and Xiao 2024a. When (k=4), we show that the same algorithm is a (frac{7}{8})-approximation algorithm and give a tight example. This ratio ties with the state-of-the-art result, also given by Zhao and Xiao 2024a. However, we demonstrate that our algorithm can be applied to the minimization variant of MaxWkCP in graphs with weights one and two and achieve a tight approximation ratio of (frac{5}{4}). For the MaxW5PP in graphs with weights one and two, we devise a novel (frac{19}{24})-approximation algorithm by combining two separate algorithms, each of which handles one of the two complementary scenarios of the optimal solution well. This ratio is better than the previous best ratio of (frac{3}{4}) due to Li and Yu 2023.

本文研究了最大权k-环(k-路径)划分问题(MaxWkCP/MaxWkPP)。输入由一个无向完全图(G=(V,E))和(|V|=kn)组成,其中k, n是正整数,以及E上的非负权函数,目标是确定n个顶点不相交的k个循环(k-路径),这些循环(路径)恰好包含k个顶点,覆盖所有顶点,使得这些循环(路径)的总边权尽可能大。在权值为1和2的图中,我们提出了改进的MaxWkCP/MaxWkPP近似算法。对于权值为1和2的图中的MaxWkCP,我们获得了对(k=6)的近似比为(frac{37}{48})的近似算法,该算法改进了Zhao和Xiao 2024a的最佳可用(frac{91}{120}) -近似算法。当(k=4)时,我们证明了相同的算法是一个(frac{7}{8}) -近似算法,并给出了一个紧密的例子。这一比例与赵和肖2024a给出的最新结果一致。然而,我们证明了我们的算法可以应用于权重为1和2的图中的MaxWkCP的最小化变体,并实现了(frac{5}{4})的紧密近似比。对于权重为1和2的图中的MaxW5PP,我们设计了一种新的(frac{19}{24}) -近似算法,该算法结合了两种独立的算法,每种算法都能很好地处理最优解的两个互补场景之一。由于Li和Yu 2023的原因,这个比例比之前的最佳比例(frac{3}{4})要好。
{"title":"Approximating the maximum weight cycle/path partition in graphs with weights one and two","authors":"Xinmeng Guo, Wei Yu, Zhaohui Liu","doi":"10.1007/s10878-025-01322-2","DOIUrl":"https://doi.org/10.1007/s10878-025-01322-2","url":null,"abstract":"<p>In this paper, we investigate the maximum weight <i>k</i>-cycle (<i>k</i>-path) partition problem (MaxWkCP/MaxWkPP for short). The input consists of an undirected complete graph <span>(G=(V,E))</span> with <span>(|V|=kn)</span>, where <i>k</i>, <i>n</i> are positive integers, and a non-negative weight function on <i>E</i>, the objective is to determine <i>n</i> vertex disjoint <i>k</i>-cycles (<i>k</i>-paths), which are cycles (paths) containing exactly <i>k</i> vertices, covering all the vertices such that the total edge weight of these cycles (paths) is as large as possible. We propose improved approximation algorithms for the MaxWkCP/MaxWkPP in graphs with weights one and two. For the MaxWkCP in graphs with weights one and two, we obtain an approximation algorithm having an approximation ratio of <span>(frac{37}{48})</span> for <span>(k=6)</span>, which improves upon the best available <span>(frac{91}{120})</span>-approximation algorithm by Zhao and Xiao 2024a. When <span>(k=4)</span>, we show that the same algorithm is a <span>(frac{7}{8})</span>-approximation algorithm and give a tight example. This ratio ties with the state-of-the-art result, also given by Zhao and Xiao 2024a. However, we demonstrate that our algorithm can be applied to the minimization variant of MaxWkCP in graphs with weights one and two and achieve a tight approximation ratio of <span>(frac{5}{4})</span>. For the MaxW5PP in graphs with weights one and two, we devise a novel <span>(frac{19}{24})</span>-approximation algorithm by combining two separate algorithms, each of which handles one of the two complementary scenarios of the optimal solution well. This ratio is better than the previous best ratio of <span>(frac{3}{4})</span> due to Li and Yu 2023.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"2 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On some path-critical Ramsey numbers 在一些路径关键的拉姆齐数上
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01312-4
Ye Wang, Yanyan Song

For graphs G and H, the Ramsey number R(GH) is the smallest r such that any red-blue edge coloring of (K_r) contains a red G or a blue H. The path-critical Ramsey number (R_{pi }(G,H)) is the largest n such that any red-blue edge coloring of (K_r setminus P_{n}) contains a red G or a blue H, where (r=R(G,H)) and (P_{n}) is a path of order n. In this note, we show a general upper bound for (R_{pi }(G,H)), and determine the exact values for some cases of (R_{pi }(G,H)).

对于图G和图H,拉姆齐数R(G, H)是最小的R,使得(K_r)的任何红蓝边着色都包含红色G或蓝色H。路径关键拉姆齐数(R_{pi }(G,H))是最大的n,使得(K_r setminus P_{n})的任何红蓝边着色都包含红色G或蓝色H,其中(r=R(G,H))和(P_{n})是n阶的路径。在本文中,我们展示了(R_{pi }(G,H))的一般上界,并确定某些情况下(R_{pi }(G,H))的确切值。
{"title":"On some path-critical Ramsey numbers","authors":"Ye Wang, Yanyan Song","doi":"10.1007/s10878-025-01312-4","DOIUrl":"https://doi.org/10.1007/s10878-025-01312-4","url":null,"abstract":"<p>For graphs <i>G</i> and <i>H</i>, the Ramsey number <i>R</i>(<i>G</i>, <i>H</i>) is the smallest <i>r</i> such that any red-blue edge coloring of <span>(K_r)</span> contains a red <i>G</i> or a blue <i>H</i>. The path-critical Ramsey number <span>(R_{pi }(G,H))</span> is the largest <i>n</i> such that any red-blue edge coloring of <span>(K_r setminus P_{n})</span> contains a red <i>G</i> or a blue <i>H</i>, where <span>(r=R(G,H))</span> and <span>(P_{n})</span> is a path of order <i>n</i>. In this note, we show a general upper bound for <span>(R_{pi }(G,H))</span>, and determine the exact values for some cases of <span>(R_{pi }(G,H))</span>.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"25 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart health system with deep kronecker network-based key generation for privacy-aware aggregate authentication and access control in IoT 基于深度kronecker网络的智能健康系统,用于物联网中隐私感知聚合认证和访问控制
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01303-5
M. Sathya, V. Mareeswari, M. Jeyaselvi, A. Solairaj

The Internet of Things (IoT) application is an application and service that incorporates both the physical and information world. Similarly, it is difficult for existing health systems to provide privacy-aware aggregate authentication and fine-grained access control. To bridge the concern, a smart health system (SHS) with Deep Kronecker Network_key generation (DKN_keyGen) for privacy-aware aggregate authentication and access control in IoT is implemented. Here, entities employed for this model such as data owner (DO), registration center (RC), data user (DU) and cloud service provider (CSP). The method follows four steps, such as system initialization, user registration, Health data outsourcing and Health data access. Initially, the RC needs to initialize the security parameters, random parameters and public keys. After that, DO and DU must be registered in RC. Moreover, the smart health care data of DO generates the secret parameter and also obtains the secret parameter from the RC. The cloud storage stores and manages health care data in the health data outsourcing step. Finally, for health data access, the user gives appropriate parameters and access to the data which is implemented in the data access phase. The model is established considering different security functionalities including Encryption, ECC, XoR and hashing function. Here, the key is generated using DKN. The proposed model obtained a minimum computation time of 6.857 s, memory usage of 30 MB, and communication cost of 20.

物联网(IoT)应用是一种融合了物理世界和信息世界的应用和服务。同样,现有的医疗系统也很难提供隐私感知的聚合身份验证和细粒度访问控制。为了解决这一问题,实现了一个具有深度Kronecker网络密钥生成(DKN_keyGen)的智能健康系统(SHS),用于物联网中的隐私感知聚合身份验证和访问控制。这里,用于此模型的实体,如数据所有者(DO)、注册中心(RC)、数据用户(DU)和云服务提供商(CSP)。该方法分为系统初始化、用户注册、Health数据外包和Health数据访问四个步骤。首先,RC需要初始化安全参数、随机参数和公钥。之后,DO和DU必须在RC注册。此外,DO的智能医疗数据生成秘密参数,并从RC获取秘密参数。云存储在健康数据外包步骤中存储和管理医疗保健数据。最后,对于健康数据访问,用户提供适当的参数和对数据的访问,这在数据访问阶段实现。该模型考虑了不同的安全功能,包括加密、ECC、异或和哈希功能。这里,密钥是使用DKN生成的。该模型的最小计算时间为6.857 s,内存占用为30 MB,通信开销为20。
{"title":"Smart health system with deep kronecker network-based key generation for privacy-aware aggregate authentication and access control in IoT","authors":"M. Sathya, V. Mareeswari, M. Jeyaselvi, A. Solairaj","doi":"10.1007/s10878-025-01303-5","DOIUrl":"https://doi.org/10.1007/s10878-025-01303-5","url":null,"abstract":"<p>The Internet of Things (IoT) application is an application and service that incorporates both the physical and information world. Similarly, it is difficult for existing health systems to provide privacy-aware aggregate authentication and fine-grained access control. To bridge the concern, a smart health system (SHS) with Deep Kronecker Network_key generation (DKN_keyGen) for privacy-aware aggregate authentication and access control in IoT is implemented. Here, entities employed for this model such as data owner (DO), registration center (RC), data user (DU) and cloud service provider (CSP). The method follows four steps, such as system initialization, user registration, Health data outsourcing and Health data access. Initially, the RC needs to initialize the security parameters, random parameters and public keys. After that, DO and DU must be registered in RC. Moreover, the smart health care data of DO generates the secret parameter and also obtains the secret parameter from the RC. The cloud storage stores and manages health care data in the health data outsourcing step. Finally, for health data access, the user gives appropriate parameters and access to the data which is implemented in the data access phase. The model is established considering different security functionalities including Encryption, ECC, XoR and hashing function. Here, the key is generated using DKN. The proposed model obtained a minimum computation time of 6.857 s, memory usage of 30 MB, and communication cost of 20.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"48 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved approximation algorithms for multiprocessor indivisible coflow scheduling 多处理机不可分共流调度的改进逼近算法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01325-z
Mingyang Gong, Guangting Chen, Guohui Lin, Bing Su

Coflow scheduling is a challenging optimization problem that underlies many data transmission and parallel computing applications. In this paper, we study the indivisible coflow scheduling problem on parallel identical machines with the objective to minimize the makespan, i.e., the completion time of the last flow. In our problem setting, the number of the input/output ports in each machine is a fixed constant, each port has a unit capacity, and all the flows inside a coflow should be scheduled on the same machine. We present a ((2 + epsilon ))-approximation algorithm for the problem, for any (epsilon > 0), in which the number of machines can be either a fixed constant or part of the input.

协同流调度是一个具有挑战性的优化问题,是许多数据传输和并行计算应用的基础。本文研究了并行相同机器上的不可分共流调度问题,其目标是最小化最大完工时间,即最后一个流程的完成时间。在我们的问题设置中,每台机器的输入/输出端口的数量是一个固定的常数,每个端口都有一个单位容量,并且coflow中的所有流都应该安排在同一台机器上。对于任意(epsilon > 0),我们提出了一个((2 + epsilon )) -近似算法,其中机器数量可以是固定常数或输入的一部分。
{"title":"Improved approximation algorithms for multiprocessor indivisible coflow scheduling","authors":"Mingyang Gong, Guangting Chen, Guohui Lin, Bing Su","doi":"10.1007/s10878-025-01325-z","DOIUrl":"https://doi.org/10.1007/s10878-025-01325-z","url":null,"abstract":"<p>Coflow scheduling is a challenging optimization problem that underlies many data transmission and parallel computing applications. In this paper, we study the <i>indivisible</i> coflow scheduling problem on parallel identical machines with the objective to minimize the makespan, i.e., the completion time of the last flow. In our problem setting, the number of the input/output ports in each machine is a fixed constant, each port has a unit capacity, and all the flows inside a coflow should be scheduled on the same machine. We present a <span>((2 + epsilon ))</span>-approximation algorithm for the problem, for any <span>(epsilon &gt; 0)</span>, in which the number of machines can be either a fixed constant or part of the input.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"133 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZeSAI: AI vigilant malware detection in email security with zero shot-based hybrid network and threat intelligence integration ZeSAI:基于零射击混合网络和威胁情报集成的电子邮件安全AI警惕恶意软件检测
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01306-2
Venkadeshan Ramalingam, R. Gopal, Syed Ziaur Rahman, R. Senthil

In this ever-evolving world of threats, e-mail security is becoming one of the biggest concerns because attackers are constantly searching for new techniques to bypass the existing security measures. Emails containing phishing, malware and other security threats have become far more common place, which is why there is a need to implement new and more efficient adaptive threat detection frameworks. Typically, email security products are outdated within these emerging threats hence the need to evolve into something more effective and smarter in the detection systems. In this regard, Zero Short learning based Artificial Intelligence (ZeSAI)-model is proposed as a new approach to improve threat identification in the context of email security. Initially, to ensure generalization and robust performance, the model uses three broad sets of input data: augmented data based on Context-Preserving Synthetic Email Generation (CPSEG) method and adversarial data, both generated from six datasets and Threat Intelligence feeds offering real-time updates. The proposed ZeSAI model enhances email threat detection through a structured workflow: eXtreme Language Network (XLNet) first generates bidirectional contextual embeddings from email content, capturing nuanced semantic relationships. The Recurrent GRU Network (RGN) then analyses temporal patterns in the email data, identifying complex relationships and variations over time. These RGN-extracted features are integrated with XLNet-generated semantic embeddings in the Cross-Modal Fusion Layer. Finally, Zero-Shot Learning (ZSL) utilizes these combined semantic descriptions and contextual insights to identify new threats based on their similarities to known threats, enabling robust and adaptive threat detection. The proposed approach yields good accuracy and other performance measures; precision, recall, and F1-score; under fivefold and tenfold cross-validation. An ablation study is also carried out to pinpoint the contribution of each module. Specifically, ZeSAI has accuracy of 98.51% in Business Email Compromise (BEC) threat detection, 96.8% in spam detection, 99.18% in phishing detection, 97.2% in malware attachment detection and 98.58% in detecting insider threats.

在这个威胁不断发展的世界里,电子邮件安全正成为最大的问题之一,因为攻击者不断寻找新的技术来绕过现有的安全措施。包含网络钓鱼、恶意软件和其他安全威胁的电子邮件已经变得越来越普遍,这就是为什么需要实施新的、更有效的自适应威胁检测框架。通常,电子邮件安全产品在这些新出现的威胁中已经过时,因此需要在检测系统中发展成更有效和更智能的东西。为此,本文提出了基于零短学习的人工智能(ZeSAI)模型,作为提高电子邮件安全背景下威胁识别的新方法。最初,为了确保泛化和鲁棒性,该模型使用三种广泛的输入数据集:基于上下文保留合成电子邮件生成(CPSEG)方法的增强数据和对抗数据,这两种数据集都是从六个数据集和提供实时更新的威胁情报馈电中生成的。提出的ZeSAI模型通过结构化工作流增强了电子邮件威胁检测:极限语言网络(XLNet)首先从电子邮件内容中生成双向上下文嵌入,捕获细微的语义关系。然后,循环GRU网络(RGN)分析电子邮件数据中的时间模式,识别复杂的关系和随时间的变化。这些rgn提取的特征与跨模态融合层中xlnet生成的语义嵌入集成在一起。最后,零射击学习(Zero-Shot Learning, ZSL)利用这些组合的语义描述和上下文洞察力,根据新威胁与已知威胁的相似性来识别新威胁,从而实现鲁棒性和自适应威胁检测。提出的方法产生了良好的准确性和其他性能指标;准确率、召回率和f1分;在五倍和十倍交叉验证下。还进行了烧蚀研究,以确定每个模块的贡献。其中,商务邮件泄露(BEC)威胁检测准确率为98.51%,垃圾邮件检测准确率为96.8%,网络钓鱼检测准确率为99.18%,恶意软件附件检测准确率为97.2%,内部威胁检测准确率为98.58%。
{"title":"ZeSAI: AI vigilant malware detection in email security with zero shot-based hybrid network and threat intelligence integration","authors":"Venkadeshan Ramalingam, R. Gopal, Syed Ziaur Rahman, R. Senthil","doi":"10.1007/s10878-025-01306-2","DOIUrl":"https://doi.org/10.1007/s10878-025-01306-2","url":null,"abstract":"<p>In this ever-evolving world of threats, e-mail security is becoming one of the biggest concerns because attackers are constantly searching for new techniques to bypass the existing security measures. Emails containing phishing, malware and other security threats have become far more common place, which is why there is a need to implement new and more efficient adaptive threat detection frameworks. Typically, email security products are outdated within these emerging threats hence the need to evolve into something more effective and smarter in the detection systems. In this regard, Zero Short learning based Artificial Intelligence (ZeSAI)-model is proposed as a new approach to improve threat identification in the context of email security. Initially, to ensure generalization and robust performance, the model uses three broad sets of input data: augmented data based on Context-Preserving Synthetic Email Generation (CPSEG) method and adversarial data, both generated from six datasets and Threat Intelligence feeds offering real-time updates. The proposed ZeSAI model enhances email threat detection through a structured workflow: eXtreme Language Network (XLNet) first generates bidirectional contextual embeddings from email content, capturing nuanced semantic relationships. The Recurrent GRU Network (RGN) then analyses temporal patterns in the email data, identifying complex relationships and variations over time. These RGN-extracted features are integrated with XLNet-generated semantic embeddings in the Cross-Modal Fusion Layer. Finally, Zero-Shot Learning (ZSL) utilizes these combined semantic descriptions and contextual insights to identify new threats based on their similarities to known threats, enabling robust and adaptive threat detection. The proposed approach yields good accuracy and other performance measures; precision, recall, and F1-score; under fivefold and tenfold cross-validation. An ablation study is also carried out to pinpoint the contribution of each module. Specifically, ZeSAI has accuracy of 98.51% in Business Email Compromise (BEC) threat detection, 96.8% in spam detection, 99.18% in phishing detection, 97.2% in malware attachment detection and 98.58% in detecting insider threats.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"47 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The influence of carbon sink trading on carbon emission reduction in agricultural supply chains 碳汇交易对农业供应链碳减排的影响
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01316-0
Tingting Meng, Yukun Cheng, Xujin Pu, Rui Li

As global climate change intensifies, the agricultural sector, responsible for over 30% of global greenhouse gas emissions, faces an urgent imperative to mitigate emissions and align with international climate commitments. Carbon sink trading, a market-based mechanism that incentivizes emission reductions through sequestration credits, has emerged as an important tool for accelerating carbon peaking and neutrality goals. This study investigates the influence of carbon sink trading on the strategic interactions between farmers and retailers in agricultural supply chains. Employing differential game theory, we construct three cooperative models: decentralized, Stackelberg leader-follower, and centralized, and derive equilibrium strategies for each using the Hamilton-Jacobi-Bellman framework. Through numerical simulations, we evaluate the influence of carbon sink trading on the emission reduction efforts of farmers and retailers, the extent of emission reductions in the supply chain, and the overall profits. Comparative analysis against baseline scenarios without carbon trading reveals that the integration of carbon sink markets enhances profit margins across all models and improves the level of emission reduction in the agricultural supply chain. In addition, our results show that the centralized model outperforms other configurations, followed by the Stackelberg model, with the decentralized model exhibiting the least effectiveness. These findings provide actionable insights for policymakers and supply chain managers to design carbon trading frameworks that harmonize economic incentives with ecological sustainability.

随着全球气候变化加剧,占全球温室气体排放量30%以上的农业部门迫切需要减少排放,并与国际气候承诺保持一致。碳汇交易是一种以市场为基础的机制,通过封存信用额度激励减排,已成为加速实现碳峰值和中和目标的重要工具。本研究探讨碳汇交易对农业供应链中农户与零售商战略互动的影响。运用微分博弈论,构建了分散、Stackelberg领导-追随者和集中式三种合作模型,并利用Hamilton-Jacobi-Bellman框架推导了每种合作模型的均衡策略。通过数值模拟,我们评估了碳汇交易对农民和零售商减排努力、供应链减排程度和整体利润的影响。与没有碳交易的基线情景的比较分析表明,碳汇市场的整合提高了所有模式的利润率,并提高了农业供应链的减排水平。此外,我们的研究结果表明,集中式模型优于其他配置,其次是Stackelberg模型,分散模型的有效性最低。这些发现为决策者和供应链管理者设计协调经济激励与生态可持续性的碳交易框架提供了可行的见解。
{"title":"The influence of carbon sink trading on carbon emission reduction in agricultural supply chains","authors":"Tingting Meng, Yukun Cheng, Xujin Pu, Rui Li","doi":"10.1007/s10878-025-01316-0","DOIUrl":"https://doi.org/10.1007/s10878-025-01316-0","url":null,"abstract":"<p>As global climate change intensifies, the agricultural sector, responsible for over 30% of global greenhouse gas emissions, faces an urgent imperative to mitigate emissions and align with international climate commitments. Carbon sink trading, a market-based mechanism that incentivizes emission reductions through sequestration credits, has emerged as an important tool for accelerating carbon peaking and neutrality goals. This study investigates the influence of carbon sink trading on the strategic interactions between farmers and retailers in agricultural supply chains. Employing differential game theory, we construct three cooperative models: decentralized, Stackelberg leader-follower, and centralized, and derive equilibrium strategies for each using the Hamilton-Jacobi-Bellman framework. Through numerical simulations, we evaluate the influence of carbon sink trading on the emission reduction efforts of farmers and retailers, the extent of emission reductions in the supply chain, and the overall profits. Comparative analysis against baseline scenarios without carbon trading reveals that the integration of carbon sink markets enhances profit margins across all models and improves the level of emission reduction in the agricultural supply chain. In addition, our results show that the centralized model outperforms other configurations, followed by the Stackelberg model, with the decentralized model exhibiting the least effectiveness. These findings provide actionable insights for policymakers and supply chain managers to design carbon trading frameworks that harmonize economic incentives with ecological sustainability.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"40 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An exponential cone integer programming and piece-wise linear approximation approach for 0-1 fractional programming 0-1分式规划的指数锥整数规划及分段线性逼近方法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01318-y
Hoang Giang Pham, Thuy Anh Ta, Tien Mai

We study a class of binary fractional programs commonly encountered in important application domains such as assortment optimization and facility location. These problems are known to be NP-hard to approximate within any constant factor, and existing solution approaches typically rely on mixed-integer linear programming or second-order cone programming reformulations. These methods often utilize linearization techniques (e.g., big-M or McCormick inequalities), which can result in weak continuous relaxations. In this work, we propose a novel approach based on an exponential cone reformulation combined with piecewise linear approximation. This allows the problem to be solved efficiently using standard cutting-plane or branch-and-cut procedures. We further provide a theoretical analysis of the approximation quality yielded by our reformulation and discuss strategies for optimizing the problem size of the exponential cone formulation. Experiments on instances of various sizes demonstrate that our approach delivers competitive performance on small and medium instances while offering superior performance on large instances compared to state-of-the-art baselines.

本文研究了一类在分类优化和设备定位等重要应用领域中经常遇到的二元分数型程序。众所周知,这些问题在任何常数因子内都是np困难的,现有的解决方法通常依赖于混合整数线性规划或二阶锥规划的重新表述。这些方法通常利用线性化技术(例如,大m或麦考密克不等式),这可能导致弱连续松弛。在这项工作中,我们提出了一种基于指数锥重构与分段线性近似相结合的新方法。这允许使用标准切割平面或分支切割程序有效地解决问题。我们进一步从理论上分析了我们的重构所产生的近似质量,并讨论了优化指数锥公式的问题大小的策略。在各种规模的实例上进行的实验表明,我们的方法在中小型实例上提供了具有竞争力的性能,同时在大型实例上提供了优于最先进基线的性能。
{"title":"An exponential cone integer programming and piece-wise linear approximation approach for 0-1 fractional programming","authors":"Hoang Giang Pham, Thuy Anh Ta, Tien Mai","doi":"10.1007/s10878-025-01318-y","DOIUrl":"https://doi.org/10.1007/s10878-025-01318-y","url":null,"abstract":"<p>We study a class of binary fractional programs commonly encountered in important application domains such as assortment optimization and facility location. These problems are known to be NP-hard to approximate within any constant factor, and existing solution approaches typically rely on mixed-integer linear programming or second-order cone programming reformulations. These methods often utilize linearization techniques (e.g., big-M or McCormick inequalities), which can result in weak continuous relaxations. In this work, we propose a novel approach based on an exponential cone reformulation combined with piecewise linear approximation. This allows the problem to be solved efficiently using standard cutting-plane or branch-and-cut procedures. We further provide a theoretical analysis of the approximation quality yielded by our reformulation and discuss strategies for optimizing the problem size of the exponential cone formulation. Experiments on instances of various sizes demonstrate that our approach delivers competitive performance on small and medium instances while offering superior performance on large instances compared to state-of-the-art baselines.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"19 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation algorithms for the partition set cover problem with penalties 带惩罚的分区集覆盖问题的近似算法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-21 DOI: 10.1007/s10878-025-01317-z
Qi Wang, Bo Hou, Gengsheng Zhang, Yisheng Zhou, Wen Liu

In this paper, we consider the partition set cover problem with penalties. In this problem, we have a universe U, a partition (mathscr {P}={P_{1},ldots ,P_{r}}) of U, and a collection (mathscr {S}={S_{1},ldots ,S_{m}}) of nonempty subsets of U satisfying (bigcup _{S_iin mathscr {S}} S_i=U). In addition, each (P_t) ((tin [r])) is associated with a covering requirement (k_t) as well as a penalty (pi _t), and each (S_i) ((iin [m])) is associated with a cost. A class (P_t) attains its covering requirement by a subcollection (mathscr {A}) of (mathscr {S}) if at least (k_t) elements in (P_t) are contained in (bigcup _{S_iin mathscr {A}} S_i). Each (P_t) is either attaining its covering requirement or paid with its penalty. The objective is to find a subcollection (mathscr {A}) of (mathscr {S}) such that the sum of the cost of (mathscr {A}) and the penalties of classes not attaining covering requirements by (mathscr {A}) is minimized. We present two approximation algorithms for this problem. The first is based on the LP-rounding technique with approximation ratio (K+O(beta +ln r)), where (K=max _{tin [r]}k_t), and (beta ) denotes the approximation guarantee for a related set cover instance obtained by rounding the standard LP. The second is based on the primal-dual method with approximation ratio lf, where (f=max _{ein U}|{S_iin mathscr {S}mid ein S_i}|) and (l=max _{tin [r]}|P_t|).

本文考虑带有惩罚的划分集覆盖问题。在这个问题中,我们有一个全域U, U的一个分区(mathscr {P}={P_{1},ldots ,P_{r}}),以及U满足(bigcup _{S_iin mathscr {S}} S_i=U)的非空子集的集合(mathscr {S}={S_{1},ldots ,S_{m}})。此外,每个(P_t)((tin [r]))都与覆盖要求(k_t)和处罚(pi _t)相关联,每个(S_i)((iin [m]))都与成本相关联。如果(P_t)中的至少(k_t)个元素包含在(bigcup _{S_iin mathscr {A}} S_i)中,则类(P_t)通过(mathscr {S})的子集合(mathscr {A})实现其覆盖要求。每个(P_t)要么达到其覆盖要求,要么支付罚款。我们的目标是找到(mathscr {S})的子集合(mathscr {A}),使(mathscr {A})的成本和到(mathscr {A})时未满足要求的类的惩罚的总和最小化。针对这一问题,我们提出了两种近似算法。第一种是基于近似比为(K+O(beta +ln r))的LP舍入技术,其中(K=max _{tin [r]}k_t), (beta )表示通过对标准LP进行舍入得到的相关集覆盖实例的近似保证。第二种是基于近似比为lf的原对偶方法,其中(f=max _{ein U}|{S_iin mathscr {S}mid ein S_i}|)和(l=max _{tin [r]}|P_t|)。
{"title":"Approximation algorithms for the partition set cover problem with penalties","authors":"Qi Wang, Bo Hou, Gengsheng Zhang, Yisheng Zhou, Wen Liu","doi":"10.1007/s10878-025-01317-z","DOIUrl":"https://doi.org/10.1007/s10878-025-01317-z","url":null,"abstract":"<p>In this paper, we consider the partition set cover problem with penalties. In this problem, we have a universe <i>U</i>, a partition <span>(mathscr {P}={P_{1},ldots ,P_{r}})</span> of <i>U</i>, and a collection <span>(mathscr {S}={S_{1},ldots ,S_{m}})</span> of nonempty subsets of <i>U</i> satisfying <span>(bigcup _{S_iin mathscr {S}} S_i=U)</span>. In addition, each <span>(P_t)</span> <span>((tin [r]))</span> is associated with a covering requirement <span>(k_t)</span> as well as a penalty <span>(pi _t)</span>, and each <span>(S_i)</span> <span>((iin [m]))</span> is associated with a cost. A class <span>(P_t)</span> attains its covering requirement by a subcollection <span>(mathscr {A})</span> of <span>(mathscr {S})</span> if at least <span>(k_t)</span> elements in <span>(P_t)</span> are contained in <span>(bigcup _{S_iin mathscr {A}} S_i)</span>. Each <span>(P_t)</span> is either attaining its covering requirement or paid with its penalty. The objective is to find a subcollection <span>(mathscr {A})</span> of <span>(mathscr {S})</span> such that the sum of the cost of <span>(mathscr {A})</span> and the penalties of classes not attaining covering requirements by <span>(mathscr {A})</span> is minimized. We present two approximation algorithms for this problem. The first is based on the LP-rounding technique with approximation ratio <span>(K+O(beta +ln r))</span>, where <span>(K=max _{tin [r]}k_t)</span>, and <span>(beta )</span> denotes the approximation guarantee for a related set cover instance obtained by rounding the standard LP. The second is based on the primal-dual method with approximation ratio <i>lf</i>, where <span>(f=max _{ein U}|{S_iin mathscr {S}mid ein S_i}|)</span> and <span>(l=max _{tin [r]}|P_t|)</span>.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"32 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Combinatorial Optimization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1