首页 > 最新文献

IEEE Transactions on Mobile Computing最新文献

英文 中文
BFI-L10 N: Learning Beamforming Feedback Information for Indoor Localization bfi - l10n:用于室内定位的波束形成反馈信息学习
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-14 DOI: 10.1109/TMC.2025.3632807
Jiayu Chen;Shuai Wang;Yunhuai Liu;Tian He;Shuai Wang;Demin Gao
The surge in location-based services has driven the demand for accurate indoor localization techniques, with WiFi-based localization emerging as a promising solution due to its extensive coverage in indoor environments. This paper presents BFI-L10 N, an indoor localization method that leverages beamforming feedback information (BFI) obtained from standard multi-user multiple-input multiple-output (MU-MIMO) WiFi operations. Unlike traditional channel state information (CSI)-based methods that require vendor-specific firmware patches or restricted device support, BFI leverages standardized MU-MIMO operations, enabling compatibility with off-the-shelf WiFi devices. BFI-L10 N processes the BFI data collected during the beamforming process through a deep learning framework and uses a BERT model for localization. Compared to CSI-based systems, BFI-L10 N offers advantages such as reduced overhead, enhanced sensitivity, compatibility with standard devices, and real-time predictions. Our experimental results in two distinct indoor environments demonstrate that BFI-L10 N achieves average localization accuracies of 10.7 cm and 15.5 cm in a research laboratory and a conference room, respectively, outperforming the state-of-the-art CSI techniques by 28%. Moreover, the BERT model can be fine-tuned after pre-training across multiple locations, which enhances the versatility of BFI-L10 N. This paper presents a novel perspective on WiFi sensing and lays the foundation for practical indoor localization using standard WiFi infrastructure.
基于位置的服务的激增推动了对精确室内定位技术的需求,基于wifi的定位由于其在室内环境中的广泛覆盖而成为一种有前途的解决方案。本文提出了一种利用标准多用户多输入多输出(MU-MIMO) WiFi操作获得的波束形成反馈信息(BFI)的室内定位方法BFI- l10n。传统的基于信道状态信息(CSI)的方法需要供应商特定的固件补丁或受限的设备支持,而BFI利用标准化的MU-MIMO操作,能够与现成的WiFi设备兼容。BFI- l10n通过深度学习框架对波束形成过程中收集的BFI数据进行处理,并使用BERT模型进行定位。与基于csi的系统相比,BFI-L10 N具有降低开销、增强灵敏度、与标准设备兼容以及实时预测等优点。我们在两种不同室内环境下的实验结果表明,BFI-L10 N在研究实验室和会议室分别实现了10.7 cm和15.5 cm的平均定位精度,比最先进的CSI技术高出28%。此外,BERT模型可以在多个位置进行预训练后进行微调,增强了BFI-L10 n的通用性。本文提出了WiFi传感的新视角,为使用标准WiFi基础设施进行实际室内定位奠定了基础。
{"title":"BFI-L10 N: Learning Beamforming Feedback Information for Indoor Localization","authors":"Jiayu Chen;Shuai Wang;Yunhuai Liu;Tian He;Shuai Wang;Demin Gao","doi":"10.1109/TMC.2025.3632807","DOIUrl":"https://doi.org/10.1109/TMC.2025.3632807","url":null,"abstract":"The surge in location-based services has driven the demand for accurate indoor localization techniques, with WiFi-based localization emerging as a promising solution due to its extensive coverage in indoor environments. This paper presents BFI-L10 N, an indoor localization method that leverages beamforming feedback information (BFI) obtained from standard multi-user multiple-input multiple-output (MU-MIMO) WiFi operations. Unlike traditional channel state information (CSI)-based methods that require vendor-specific firmware patches or restricted device support, BFI leverages standardized MU-MIMO operations, enabling compatibility with off-the-shelf WiFi devices. BFI-L10 N processes the BFI data collected during the beamforming process through a deep learning framework and uses a BERT model for localization. Compared to CSI-based systems, BFI-L10 N offers advantages such as reduced overhead, enhanced sensitivity, compatibility with standard devices, and real-time predictions. Our experimental results in two distinct indoor environments demonstrate that BFI-L10 N achieves average localization accuracies of 10.7 cm and 15.5 cm in a research laboratory and a conference room, respectively, outperforming the state-of-the-art CSI techniques by 28%. Moreover, the BERT model can be fine-tuned after pre-training across multiple locations, which enhances the versatility of BFI-L10 N. This paper presents a novel perspective on WiFi sensing and lays the foundation for practical indoor localization using standard WiFi infrastructure.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 4","pages":"5839-5854"},"PeriodicalIF":9.2,"publicationDate":"2025-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Pursuit-Evasion With Low Altitude Wireless Network: A Hierarchical Reinforcement Learning Approach 低空无线网络协同追逃:一种层次强化学习方法
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-14 DOI: 10.1109/TMC.2025.3632863
Zhengzhi Yang;Yuanhao Cui;Wenbo Du;Fanbiao Li;Yumeng Li
As an emerging countermeasure, cooperative interception by multiple UAVs offers an effective solution to neutralize rogue drones and safeguard low-altitude airspace operations. Effective coordination among counter-UAVs in encircling intruding drones remains challenging. This paper proposes a Hierarchical Cooperative Deep Reinforcement Learning (HCDRL) algorithm to enhance cooperation and efficiency among UAVs pursuing agile targets. The proposed approach decomposes the multi-agent pursuit-evasion scenario into multiple subtasks using a two-layer hierarchical decision-making framework. Specifically, the upper-layer network acts as a meta-strategy, dynamically assessing pursuit scenarios and assigning optimal subtasks. Meanwhile, the lower-layer policy networks of individual agents determine maneuver actions based on local observations and assigned subtasks. Simulation results demonstrate that the proposed algorithm significantly improves multi-agent cooperative encirclement performance, achieving an 11.18% higher success rate and a 9.94% reduction in completion time compared to state-of-the-art methods.
多无人机协同拦截作为一种新兴的对抗手段,为打击流氓无人机和保障低空空域作战提供了有效的解决方案。反无人机之间在包围入侵无人机方面的有效协调仍然具有挑战性。提出了一种层次协同深度强化学习(HCDRL)算法,以提高无人机对敏捷目标的协同性和效率。该方法采用双层分层决策框架,将多智能体追逃场景分解为多个子任务。具体而言,上层网络充当元策略,动态评估追捕场景并分配最优子任务。同时,单个智能体的低层策略网络根据局部观察和分配的子任务确定机动动作。仿真结果表明,该算法显著提高了多智能体协同包围性能,与现有方法相比,成功率提高了11.18%,完成时间缩短了9.94%。
{"title":"Cooperative Pursuit-Evasion With Low Altitude Wireless Network: A Hierarchical Reinforcement Learning Approach","authors":"Zhengzhi Yang;Yuanhao Cui;Wenbo Du;Fanbiao Li;Yumeng Li","doi":"10.1109/TMC.2025.3632863","DOIUrl":"https://doi.org/10.1109/TMC.2025.3632863","url":null,"abstract":"As an emerging countermeasure, cooperative interception by multiple UAVs offers an effective solution to neutralize rogue drones and safeguard low-altitude airspace operations. Effective coordination among counter-UAVs in encircling intruding drones remains challenging. This paper proposes a Hierarchical Cooperative Deep Reinforcement Learning (HCDRL) algorithm to enhance cooperation and efficiency among UAVs pursuing agile targets. The proposed approach decomposes the multi-agent pursuit-evasion scenario into multiple subtasks using a two-layer hierarchical decision-making framework. Specifically, the upper-layer network acts as a meta-strategy, dynamically assessing pursuit scenarios and assigning optimal subtasks. Meanwhile, the lower-layer policy networks of individual agents determine maneuver actions based on local observations and assigned subtasks. Simulation results demonstrate that the proposed algorithm significantly improves multi-agent cooperative encirclement performance, achieving an 11.18% higher success rate and a 9.94% reduction in completion time compared to state-of-the-art methods.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 4","pages":"5716-5729"},"PeriodicalIF":9.2,"publicationDate":"2025-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trading Continuous Queries 交易连续查询
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-24 DOI: 10.1109/TMC.2025.3625547
Jin Cheng;Ningning Ding;John C.S. Lui;Jianwei Huang
In the Big Data era, data trading significantly enhances data-driven decision-making by facilitating data sharing. Streaming data from sources such as mobile devices and social media platforms creates new opportunities and challenges for data trading. Traditional data trading methods, designed for one-time queries over static database snapshots, neglect the growing need for trading continuous queries over streaming data. If applied directly to continuous queries, existing methods often result in repeated and imprecise charges that reduce the seller's profit, as they do not consider computation sharing during continuous query execution. To address these challenges, we propose CQTrade, the first mechanism for continuous query-based data trading, which incorporates computation sharing in query execution and integrates seamlessly with existing trading mechanisms. Our contributions are threefold: (1) we provide a theoretical analysis of prevalent computation-sharing techniques, including cost modeling and closed-form computation-sharing strategy derivation; (2) we formulate a general optimization problem to maximize the seller's profit, adaptable to various computation-sharing techniques; (3) we identify that our optimization problem merges vector bin packing and multidimensional knapsack challenges, and we tackle this complexity with a tailored branch-and-price algorithm that decomposes the problem into a masterproblem and multiple sub-problems, achieving a globally optimal solution. Evaluation shows CQTrade improves trading success rate by 12.8% and increases seller profit by 28.7% compared to traditional methods.
在大数据时代,数据交易通过促进数据共享,显著增强了数据驱动决策。来自移动设备和社交媒体平台等来源的流数据为数据交易创造了新的机遇和挑战。传统的数据交易方法是为静态数据库快照上的一次性查询而设计的,忽略了对流数据上的连续查询进行交易的日益增长的需求。如果直接应用于连续查询,现有方法通常会导致重复和不精确的收费,从而降低卖方的利润,因为它们没有考虑在连续查询执行期间共享计算。为了应对这些挑战,我们提出了CQTrade,这是第一个基于查询的连续数据交易机制,它在查询执行中集成了计算共享,并与现有交易机制无缝集成。我们的贡献有三个方面:(1)我们对流行的计算共享技术进行了理论分析,包括成本建模和封闭形式的计算共享策略推导;(2)以卖方利润最大化为目标,提出了一个通用的优化问题,该问题适用于各种计算共享技术;(3)我们发现我们的优化问题合并了向量箱包装和多维背包挑战,并且我们使用定制的分支和价格算法来解决这种复杂性,该算法将问题分解为一个主问题和多个子问题,从而获得全局最优解。评估表明,与传统方法相比,CQTrade交易成功率提高了12.8%,卖家利润提高了28.7%。
{"title":"Trading Continuous Queries","authors":"Jin Cheng;Ningning Ding;John C.S. Lui;Jianwei Huang","doi":"10.1109/TMC.2025.3625547","DOIUrl":"https://doi.org/10.1109/TMC.2025.3625547","url":null,"abstract":"In the Big Data era, data trading significantly enhances data-driven decision-making by facilitating data sharing. Streaming data from sources such as mobile devices and social media platforms creates new opportunities and challenges for data trading. Traditional data trading methods, designed for one-time queries over static database snapshots, neglect the growing need for trading continuous queries over streaming data. If applied directly to continuous queries, existing methods often result in repeated and imprecise charges that reduce the seller's profit, as they do not consider computation sharing during continuous query execution. To address these challenges, we propose CQTrade, the first mechanism for continuous query-based data trading, which incorporates computation sharing in query execution and integrates seamlessly with existing trading mechanisms. Our contributions are threefold: (1) we provide a theoretical analysis of prevalent computation-sharing techniques, including cost modeling and closed-form computation-sharing strategy derivation; (2) we formulate a general optimization problem to maximize the seller's profit, adaptable to various computation-sharing techniques; (3) we identify that our optimization problem merges vector bin packing and multidimensional knapsack challenges, and we tackle this complexity with a tailored branch-and-price algorithm that decomposes the problem into a masterproblem and multiple sub-problems, achieving a globally optimal solution. Evaluation shows CQTrade improves trading success rate by 12.8% and increases seller profit by 28.7% compared to traditional methods.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4253-4268"},"PeriodicalIF":9.2,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Based Versatile Voice Eavesdropping Prevention for Mobile Devices 基于学习的移动设备多功能语音窃听预防
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-23 DOI: 10.1109/TMC.2025.3624756
Wenbin Huang;Ju Ren;Hangcheng Cao;Hongbo Jiang;Panlong Yang;Zhangjie Fu
Voice-enabled mobile applications (apps) are exploding in popularity as they could be manipulated with voice commands to achieve convenient man-machine interaction. These voice-enabled apps also raise security and privacy concerns about whether they would maliciously invoke microphones to realize voice eavesdropping. To explore this issue, in this work, we design baleful apps to access the microphone covertly, the results of test studies demonstrate that covert eavesdropping attacks can bypass existing device detection schemes as well as are unnoticeable to human users. To prevent the covert voice eavesdropping attack, we propose a versatile microphone icon detection (MicID) scheme inspired by the groundtruth that authorization of the voice function requires the user to touch the specific microphone icon in most of voice-based apps. Specifically, we devise a deep learning model, lightweight YOLO (L-YOLO), to locate the microphone icon on the screen quickly and accurately. By determining whether the located microphone icon is touched by the user, we can judge whether the current microphone access belongs to the app’s normal operation or illegal eavesdropping. Finally, we conduct extensive experiments by deploying the scheme on real devices and collecting dataset. The evaluation results show that the proposed MicID scheme achieves more than 99% accuracy with low computation cost.
语音移动应用程序(app)可以通过语音命令进行操作,从而实现方便的人机交互,因此受到了广泛的欢迎。这些支持语音的应用程序也引起了人们对安全和隐私的担忧,即它们是否会恶意调用麦克风来实现语音窃听。为了探索这个问题,在这项工作中,我们设计了恶意应用程序来隐蔽地访问麦克风,测试研究的结果表明,隐蔽窃听攻击可以绕过现有的设备检测方案,并且对人类用户来说是不明显的。为了防止隐蔽的语音窃听攻击,我们提出了一种通用的麦克风图标检测(MicID)方案,该方案的灵感来自于在大多数基于语音的应用程序中,语音功能的授权需要用户触摸特定的麦克风图标。具体来说,我们设计了一个深度学习模型,轻量级YOLO (L-YOLO),以快速准确地定位屏幕上的麦克风图标。通过判断所定位的麦克风图标是否被用户触摸,我们可以判断当前的麦克风访问是属于应用的正常操作还是非法窃听。最后,我们通过在实际设备上部署该方案并收集数据集进行了广泛的实验。评价结果表明,该方案的准确率达到99%以上,且计算成本低。
{"title":"Learning Based Versatile Voice Eavesdropping Prevention for Mobile Devices","authors":"Wenbin Huang;Ju Ren;Hangcheng Cao;Hongbo Jiang;Panlong Yang;Zhangjie Fu","doi":"10.1109/TMC.2025.3624756","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624756","url":null,"abstract":"Voice-enabled <italic>mobile applications</i> (apps) are exploding in popularity as they could be manipulated with voice commands to achieve convenient man-machine interaction. These voice-enabled apps also raise security and privacy concerns about whether they would maliciously invoke microphones to realize voice eavesdropping. To explore this issue, in this work, we design baleful apps to access the microphone covertly, the results of test studies demonstrate that covert eavesdropping attacks can bypass existing device detection schemes as well as are unnoticeable to human users. To prevent the covert voice eavesdropping attack, we propose a versatile <italic>microphone icon detection</i> (MicID) scheme inspired by the groundtruth that authorization of the voice function requires the user to touch the specific microphone icon in most of voice-based apps. Specifically, we devise a deep learning model, <italic>lightweight YOLO</i> (L-YOLO), to locate the microphone icon on the screen quickly and accurately. By determining whether the located microphone icon is touched by the user, we can judge whether the current microphone access belongs to the app’s normal operation or illegal eavesdropping. Finally, we conduct extensive experiments by deploying the scheme on real devices and collecting dataset. The evaluation results show that the proposed MicID scheme achieves more than 99% accuracy with low computation cost.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4393-4408"},"PeriodicalIF":9.2,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symmetric Orchestration Under Service Mesh Paradigm: Empowering Massive Online Applications in Edge Clouds 服务网格范式下的对称编排:增强边缘云中的大规模在线应用
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-23 DOI: 10.1109/TMC.2025.3624628
Kai Peng;Tongxin Liao;Mingyuan Ren;Yi Hu;Liangliang Wu;Menglan Hu;Hongbo Jiang
With the rapid advancement of edge computing, service mesh has emerged as a critical technology for improving network performance, owing to its flexibility and scalability. However, massive online applications in edge clouds pose significant challenges to microservice orchestration, including high concurrency, complex service dependencies, strict response delay requirements, and fast orchestration needs. Addressing these challenges requires efficient and fast orchestration strategies, but existing approaches often lack accurate models and effective algorithms to handle these complexities. To tackle the above challenges, this paper proposes an efficient Symmetric Microservice Deployment (SMD) algorithm for fast orchestration. First, accurate modeling is achieved with the queuing network, which analyzes intertwined requests and calculates detailed delays. Moreover, the SMD algorithm simplifies the coupling between deployment and routing by considering internal dependencies during deployment. This integrated approach eliminates the need for separate routing solutions and ensures provable optimal performance under symmetric deployment. Experimental results demonstrate that, compared to four baseline algorithms, the proposed method reduces response delay by 25.5% and execution time by 58.4%, showcasing the potential and advantages of the algorithm for optimizing microservice orchestration in edge clouds networks.
随着边缘计算的快速发展,业务网格以其灵活性和可扩展性成为提高网络性能的关键技术。然而,边缘云中的大量在线应用程序对微服务编排提出了重大挑战,包括高并发性、复杂的服务依赖关系、严格的响应延迟要求和快速编排需求。解决这些挑战需要高效和快速的编排策略,但是现有的方法通常缺乏精确的模型和有效的算法来处理这些复杂性。为了解决上述问题,本文提出了一种高效的对称微服务部署(SMD)算法,用于快速编排。首先,利用排队网络实现了精确的建模,该网络分析了相互交织的请求并计算了详细的延迟。此外,SMD算法通过考虑部署过程中的内部依赖关系,简化了部署与路由之间的耦合。这种集成方法消除了对单独路由解决方案的需求,并确保在对称部署下可证明的最佳性能。实验结果表明,与四种基准算法相比,该算法的响应延迟降低了25.5%,执行时间降低了58.4%,显示了该算法在边缘云网络中优化微服务编排的潜力和优势。
{"title":"Symmetric Orchestration Under Service Mesh Paradigm: Empowering Massive Online Applications in Edge Clouds","authors":"Kai Peng;Tongxin Liao;Mingyuan Ren;Yi Hu;Liangliang Wu;Menglan Hu;Hongbo Jiang","doi":"10.1109/TMC.2025.3624628","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624628","url":null,"abstract":"With the rapid advancement of edge computing, service mesh has emerged as a critical technology for improving network performance, owing to its flexibility and scalability. However, massive online applications in edge clouds pose significant challenges to microservice orchestration, including high concurrency, complex service dependencies, strict response delay requirements, and fast orchestration needs. Addressing these challenges requires efficient and fast orchestration strategies, but existing approaches often lack accurate models and effective algorithms to handle these complexities. To tackle the above challenges, this paper proposes an efficient Symmetric Microservice Deployment (SMD) algorithm for fast orchestration. First, accurate modeling is achieved with the queuing network, which analyzes intertwined requests and calculates detailed delays. Moreover, the SMD algorithm simplifies the coupling between deployment and routing by considering internal dependencies during deployment. This integrated approach eliminates the need for separate routing solutions and ensures provable optimal performance under symmetric deployment. Experimental results demonstrate that, compared to four baseline algorithms, the proposed method reduces response delay by 25.5% and execution time by 58.4%, showcasing the potential and advantages of the algorithm for optimizing microservice orchestration in edge clouds networks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4300-4316"},"PeriodicalIF":9.2,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BagChain: A Dual-Functional Blockchain Leveraging Bagging-Based Distributed Machine Learning 袋子链:利用基于袋子的分布式机器学习的双功能袋子
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-23 DOI: 10.1109/TMC.2025.3624804
Zixiang Cui;Xintong Ling;Xingyu Zhou;Jiaheng Wang;Zhi Ding;Xiqi Gao
Exploiting on-device data and computing power for machine learning at the network edge is challenged by constrained device resources, privacy requirements, and local data heterogeneity. To address the above gap, this work proposes a dual-functional blockchain framework named BagChain for bagging-based decentralized ML. BagChain integrates blockchain with distributed ML by replacing the computationally costly hash computing in proof-of-work with ML model training and validation, and does not rely on any trusted central servers. Individual miners in BagChain train base models by using their local computing resources and private data and further aggregate these base models, which could be very weak, into strong ensemble models. More specifically, we design a three-layer blockchain structure and associated generation and validation mechanisms to enable distributed ML among uncoordinated miners without revealing raw data. To reduce computational waste due to blockchain forking, we further propose the cross fork sharing mechanism for practical networks with lengthy delay and limited bandwidth. Extensive experiments illustrate the superiority and efficacy of BagChain when handling various ML tasks on both independently and identically distributed (IID) and non-IID datasets. BagChain remains robust and effective even when facing resource-constrained mobile devices, heterogeneous private user data, and limited network connectivity.
在网络边缘利用设备上的数据和计算能力进行机器学习受到设备资源、隐私要求和本地数据异构性的限制。为了解决上述差距,本工作提出了一个名为BagChain的双功能区块链框架,用于基于bagging的去中心化ML。BagChain通过用ML模型训练和验证取代工作量证明中计算成本高昂的哈希计算,将区块链与分布式ML集成在一起,并且不依赖于任何可信的中央服务器。BagChain中的个体矿工通过使用他们的本地计算资源和私有数据来训练基础模型,并进一步将这些可能非常弱的基础模型聚合为强大的集成模型。更具体地说,我们设计了一个三层区块链结构和相关的生成和验证机制,以在不泄露原始数据的情况下在不协调的矿工之间实现分布式ML。为了减少区块链分叉造成的计算浪费,我们进一步提出了用于长时延和有限带宽的实际网络的交叉分叉共享机制。大量的实验证明了BagChain在处理独立和同分布(IID)和非IID数据集上的各种ML任务时的优越性和有效性。即使面对资源受限的移动设备、异构私有用户数据和有限的网络连接,BagChain仍然保持强大和有效。
{"title":"BagChain: A Dual-Functional Blockchain Leveraging Bagging-Based Distributed Machine Learning","authors":"Zixiang Cui;Xintong Ling;Xingyu Zhou;Jiaheng Wang;Zhi Ding;Xiqi Gao","doi":"10.1109/TMC.2025.3624804","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624804","url":null,"abstract":"Exploiting on-device data and computing power for machine learning at the network edge is challenged by constrained device resources, privacy requirements, and local data heterogeneity. To address the above gap, this work proposes a dual-functional blockchain framework named BagChain for bagging-based decentralized ML. BagChain integrates blockchain with distributed ML by replacing the computationally costly hash computing in proof-of-work with ML model training and validation, and does not rely on any trusted central servers. Individual miners in BagChain train base models by using their local computing resources and private data and further aggregate these base models, which could be very weak, into strong ensemble models. More specifically, we design a three-layer blockchain structure and associated generation and validation mechanisms to enable distributed ML among uncoordinated miners without revealing raw data. To reduce computational waste due to blockchain forking, we further propose the cross fork sharing mechanism for practical networks with lengthy delay and limited bandwidth. Extensive experiments illustrate the superiority and efficacy of BagChain when handling various ML tasks on both independently and identically distributed (IID) and non-IID datasets. BagChain remains robust and effective even when facing resource-constrained mobile devices, heterogeneous private user data, and limited network connectivity.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4206-4222"},"PeriodicalIF":9.2,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Movable Antenna-Enabled Micro-Mobility Replace UAV-Enabled Macro-Mobility? A Physical Layer Security Perspective 可移动天线的微机动性能取代无人机的宏观机动性吗?物理层安全透视图
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-22 DOI: 10.1109/TMC.2025.3624340
Kaixuan Li;Kan Yu;Dingyou Ma;Yujia Zhao;Xiaowu Liu;Qixun Zhang;Zhiyong Feng
This paper investigates the potential of movable antenna (MA)-enabled micro-mobility to replace UAV-enabled macro-mobility for enhancing physical layer security (PLS) in air-to-ground communications. While UAV trajectory optimization offers high flexibility and Line-of-Sight (LoS) advantages, it suffers from significant energy consumption, latency, and complex trajectory optimization. Conversely, MA technology provides fine-grained spatial reconfiguration (antenna positioning within a confined area) with ultra-low energy overhead and millisecond-scale response, enabling real-time channel manipulation and covert beam steering. To systematically compare these paradigms, we establish a dual-scale mobility framework where a UAV-mounted uniform linear array (ULA) serves as a base station transmitting confidential information to a legitimate user (Bob) in the presence of an eavesdropper (Eve). We formulate non-convex average secrecy rate (ASR) maximization problems for both schemes: 1) MA-based micro-mobility: Jointly optimizing antenna positions and beamforming (BF) vectors under positioning constraints; 2) UAV-based macro-mobility: Jointly optimizing the UAV’s trajectory and BF vectors under kinematic constraints. Extensive simulations reveal distinct operational regimes: MA micro-mobility demonstrates significant ASR advantages in low-transmit-power scenarios or under antenna constraints due to its energy-efficient spatial control. Conversely, UAV macro-mobility excels under resource-sufficient conditions (higher power, larger antenna arrays) by leveraging global mobility for optimal positioning. The findings highlight the complementary strengths of both approaches, suggesting hybrid micro-macro mobility as a promising direction for balancing security, energy efficiency, and deployment complexity in future wireless networks.
本文研究了可移动天线(MA)支持的微移动性取代无人机支持的宏观移动性的潜力,以增强空对地通信中的物理层安全性(PLS)。当UAV轨迹优化提供高灵活性和视距(LoS)优势时,它遭受显著的能量消耗、延迟和复杂的轨迹优化。相反,MA技术提供了细粒度的空间重构(在受限区域内的天线定位),具有超低的能量开销和毫秒级的响应,可以实现实时通道操纵和隐蔽波束转向。为了系统地比较这些范例,我们建立了一个双尺度移动框架,其中无人机安装的均匀线性阵列(ULA)作为基站,在窃听者(Eve)存在的情况下向合法用户(Bob)传输机密信息。提出了两种方案的非凸平均保密率(ASR)最大化问题:1)基于ma的微移动性:在定位约束下联合优化天线位置和波束成形(BF)矢量;2)基于无人机的宏观机动性:在运动学约束下,联合优化无人机的轨迹和BF向量。大量的模拟揭示了不同的运行机制:由于其节能的空间控制,MA微移动性在低发射功率场景或天线约束下显示出显著的ASR优势。相反,无人机的宏观机动性在资源充足的条件下(更高的功率,更大的天线阵列)通过利用全局机动性来实现最佳定位。研究结果强调了这两种方法的互补优势,表明混合微宏观移动性是未来无线网络平衡安全性、能源效率和部署复杂性的一个有前途的方向。
{"title":"Can Movable Antenna-Enabled Micro-Mobility Replace UAV-Enabled Macro-Mobility? A Physical Layer Security Perspective","authors":"Kaixuan Li;Kan Yu;Dingyou Ma;Yujia Zhao;Xiaowu Liu;Qixun Zhang;Zhiyong Feng","doi":"10.1109/TMC.2025.3624340","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624340","url":null,"abstract":"This paper investigates the potential of movable antenna (MA)-enabled micro-mobility to replace UAV-enabled macro-mobility for enhancing physical layer security (PLS) in air-to-ground communications. While UAV trajectory optimization offers high flexibility and Line-of-Sight (LoS) advantages, it suffers from significant energy consumption, latency, and complex trajectory optimization. Conversely, MA technology provides fine-grained spatial reconfiguration (antenna positioning within a confined area) with ultra-low energy overhead and millisecond-scale response, enabling real-time channel manipulation and covert beam steering. To systematically compare these paradigms, we establish a dual-scale mobility framework where a UAV-mounted uniform linear array (ULA) serves as a base station transmitting confidential information to a legitimate user (Bob) in the presence of an eavesdropper (Eve). We formulate non-convex average secrecy rate (ASR) maximization problems for both schemes: 1) MA-based micro-mobility: Jointly optimizing antenna positions and beamforming (BF) vectors under positioning constraints; 2) UAV-based macro-mobility: Jointly optimizing the UAV’s trajectory and BF vectors under kinematic constraints. Extensive simulations reveal distinct operational regimes: MA micro-mobility demonstrates significant ASR advantages in low-transmit-power scenarios or under antenna constraints due to its energy-efficient spatial control. Conversely, UAV macro-mobility excels under resource-sufficient conditions (higher power, larger antenna arrays) by leveraging global mobility for optimal positioning. The findings highlight the complementary strengths of both approaches, suggesting hybrid micro-macro mobility as a promising direction for balancing security, energy efficiency, and deployment complexity in future wireless networks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4317-4330"},"PeriodicalIF":9.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Multi-Authority Accurate Matchmaking Encryption Scheme for Mobile Social Networks 移动社交网络的分散多权威精确配对加密方案
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-22 DOI: 10.1109/TMC.2025.3623732
Jiayun Yan;Jie Chen;Haifeng Qian;Jianting Ning;Debiao He
Mobile social networks (MSNs) are integral to the digital era, but the current architectures raise fundamental challenges to user privacy and security. First, these systems rely on a trusted authority, which causes the single point of failure and raises concerns about data leakage. Second, there is a lack of cryptographic mechanisms to enforce bilateral access control, which ensures mutual consent communication by both senders and receivers. Therefore, it’s necessary to design a system to eliminate single-point trust and accurate consent-based matchmaking access control between users. To address these issues, we propose a decentralized multi-authority identity-based matchmaking encryption (DMA-IBME) scheme, including its formal syntax and security definitions. This primitive enables bilateral access control, which ensures both data privacy and user authenticity. Moreover, we formally prove the security of our scheme in the random oracle model under the standard bilinear Diffie-Hellman ($mathsf {BDH}$) assumption. Performance evaluation demonstrates the efficiency of our scheme. Compared to existing works, our construction reduces the setup time by approximately 50% and the encryption key generation time by 30%. Furthermore, the storage costs for public parameters, encryption keys, and ciphertexts are reduced by approximately 30%, 30%, and 88%, respectively.
移动社交网络(msn)是数字时代不可或缺的一部分,但目前的架构对用户隐私和安全提出了根本性的挑战。首先,这些系统依赖于可信的权威机构,这会导致单点故障,并引起对数据泄漏的担忧。其次,缺乏加密机制来执行双边访问控制,从而确保发送方和接收方之间的相互同意通信。因此,有必要设计一个系统来消除用户之间的单点信任和精确的基于同意的配对访问控制。为了解决这些问题,我们提出了一个分散的多权威基于身份的配对加密(DMA-IBME)方案,包括其正式语法和安全定义。该原语支持双边访问控制,从而确保数据隐私和用户真实性。此外,在标准双线性Diffie-Hellman ($mathsf {BDH}$)假设下,我们正式证明了该方案在随机oracle模型中的安全性。性能评估表明了该方案的有效性。与现有的工作相比,我们的构建减少了大约50%的设置时间和30%的加密密钥生成时间。此外,公共参数、加密密钥和密文的存储成本分别降低了大约30%、30%和88%。
{"title":"Decentralized Multi-Authority Accurate Matchmaking Encryption Scheme for Mobile Social Networks","authors":"Jiayun Yan;Jie Chen;Haifeng Qian;Jianting Ning;Debiao He","doi":"10.1109/TMC.2025.3623732","DOIUrl":"https://doi.org/10.1109/TMC.2025.3623732","url":null,"abstract":"Mobile social networks (MSNs) are integral to the digital era, but the current architectures raise fundamental challenges to user privacy and security. First, these systems rely on a trusted authority, which causes the single point of failure and raises concerns about data leakage. Second, there is a lack of cryptographic mechanisms to enforce bilateral access control, which ensures mutual consent communication by both senders and receivers. Therefore, it’s necessary to design a system to eliminate single-point trust and accurate consent-based matchmaking access control between users. To address these issues, we propose a decentralized multi-authority identity-based matchmaking encryption (DMA-IBME) scheme, including its formal syntax and security definitions. This primitive enables bilateral access control, which ensures both data privacy and user authenticity. Moreover, we formally prove the security of our scheme in the random oracle model under the standard bilinear Diffie-Hellman (<inline-formula><tex-math>$mathsf {BDH}$</tex-math></inline-formula>) assumption. Performance evaluation demonstrates the efficiency of our scheme. Compared to existing works, our construction reduces the setup time by approximately 50% and the encryption key generation time by 30%. Furthermore, the storage costs for public parameters, encryption keys, and ciphertexts are reduced by approximately 30%, 30%, and 88%, respectively.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4381-4392"},"PeriodicalIF":9.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Twin-Assisted Space-Air-Ground Integrated Multi-Access Edge Computing for Low-Altitude Economy: An Online Decentralized Optimization Approach 面向低空经济的数字双辅助空-空-地集成多址边缘计算:一种在线分散优化方法
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-22 DOI: 10.1109/TMC.2025.3623636
Long He;Geng Sun;Zemin Sun;Jiacheng Wang;Hongyang Du;Dusit Niyato;Jiangchuan Liu;Victor C. M. Leung
The emergence of space-air-ground integrated multi-access edge computing (SAGIMEC) networks opens a significant opportunity for the rapidly growing low altitude economy (LAE), facilitating the development of various applications by offering efficient communication and computing services. However, the heterogeneous nature of SAGIMEC networks, coupled with the stringent computational and communication requirements of diverse applications in the LAE, introduces considerable challenges in integrating SAGIMEC into the LAE. In this work, we first present a digital twin-assisted SAGIMEC paradigm for LAE, where digital twin enables reliable network monitoring and management, while SAGIMEC provides efficient computing offloading services for Internet of Things sensor devices (ISDs). Then, a joint satellite selection, computation offloading, communication resource allocation, computation resource allocation and uncrewed aerial vehicle (UAV) trajectory control optimization problem ($text{JSC}^{4}text{OP}$) is formulated to maximize the quality of service (QoS) of ISDs. Given the complexity of $text{JSC}^{4}text{OP}$, we propose an online decentralized optimization approach (ODOA) to address the problem. Specifically, $text{JSC}^{4}text{OP}$ is first transformed into a real-time decision-making optimization problem (RDOP) by leveraging Lyapunov optimization. Then, to solve the RDOP, we introduce an online learning-based latency prediction method to predict the uncertain system environment and a game theoretic decision-making method to make real-time decisions. Finally, theoretical analysis confirms the effectiveness of the ODOA. Simulation results show that the proposed ODOA outperforms various benchmark approaches and improves the QoS of ISDs by at least 14.5% compared to deep reinforcement learning (DRL)-based approaches, thereby validating the superiority of the proposed approach.
空间-空地综合多接入边缘计算(SAGIMEC)网络的出现为快速增长的低空经济(LAE)打开了一个重要的机会,通过提供高效的通信和计算服务,促进了各种应用的发展。然而,SAGIMEC网络的异构特性,加上LAE中各种应用的严格计算和通信要求,为将SAGIMEC集成到LAE中带来了相当大的挑战。在这项工作中,我们首先提出了一种用于LAE的数字孪生辅助SAGIMEC范式,其中数字孪生实现了可靠的网络监控和管理,而SAGIMEC为物联网传感器设备(isd)提供了高效的计算卸载服务。然后,为实现isd服务质量(QoS)的最大化,制定了联合卫星选择、计算卸载、通信资源分配、计算资源分配和无人机(UAV)轨迹控制优化问题($text{JSC}^{4}text{OP}$)。鉴于$text{JSC}^{4}text{OP}$的复杂性,我们提出了一种在线分散优化方法(ODOA)来解决这个问题。具体来说,$text{JSC}^{4}text{OP}$首先通过利用Lyapunov优化将其转化为实时决策优化问题(RDOP)。然后,为了解决RDOP问题,我们引入了一种基于在线学习的延迟预测方法来预测不确定的系统环境,并引入了一种博弈论决策方法来进行实时决策。最后,通过理论分析验证了ODOA的有效性。仿真结果表明,与基于深度强化学习(DRL)的方法相比,所提出的ODOA优于各种基准方法,并将isd的QoS提高了至少14.5%,从而验证了所提出方法的优越性。
{"title":"Digital Twin-Assisted Space-Air-Ground Integrated Multi-Access Edge Computing for Low-Altitude Economy: An Online Decentralized Optimization Approach","authors":"Long He;Geng Sun;Zemin Sun;Jiacheng Wang;Hongyang Du;Dusit Niyato;Jiangchuan Liu;Victor C. M. Leung","doi":"10.1109/TMC.2025.3623636","DOIUrl":"https://doi.org/10.1109/TMC.2025.3623636","url":null,"abstract":"The emergence of space-air-ground integrated multi-access edge computing (SAGIMEC) networks opens a significant opportunity for the rapidly growing low altitude economy (LAE), facilitating the development of various applications by offering efficient communication and computing services. However, the heterogeneous nature of SAGIMEC networks, coupled with the stringent computational and communication requirements of diverse applications in the LAE, introduces considerable challenges in integrating SAGIMEC into the LAE. In this work, we first present a digital twin-assisted SAGIMEC paradigm for LAE, where digital twin enables reliable network monitoring and management, while SAGIMEC provides efficient computing offloading services for Internet of Things sensor devices (ISDs). Then, a <u><b>j</b></u>oint <u><b>s</b></u>atellite selection, <u><b>c</b></u>omputation offloading, <u><b>c</b></u>ommunication resource allocation, <u><b>c</b></u>omputation resource allocation and uncrewed aerial vehicle (UAV) trajectory <u><b>c</b></u>ontrol optimization problem (<inline-formula><tex-math>$text{JSC}^{4}text{OP}$</tex-math></inline-formula>) is formulated to maximize the quality of service (QoS) of ISDs. Given the complexity of <inline-formula><tex-math>$text{JSC}^{4}text{OP}$</tex-math></inline-formula>, we propose an online decentralized optimization approach (ODOA) to address the problem. Specifically, <inline-formula><tex-math>$text{JSC}^{4}text{OP}$</tex-math></inline-formula> is first transformed into a real-time decision-making optimization problem (RDOP) by leveraging Lyapunov optimization. Then, to solve the RDOP, we introduce an online learning-based latency prediction method to predict the uncertain system environment and a game theoretic decision-making method to make real-time decisions. Finally, theoretical analysis confirms the effectiveness of the ODOA. Simulation results show that the proposed ODOA outperforms various benchmark approaches and improves the QoS of ISDs by at least 14.5% compared to deep reinforcement learning (DRL)-based approaches, thereby validating the superiority of the proposed approach.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4363-4380"},"PeriodicalIF":9.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAIR: Model Agnostic Instance Reweighing for Heterogeneous Federated Learning maair:异构联邦学习的模型不可知实例重加权
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-22 DOI: 10.1109/TMC.2025.3624064
Dongping Liao;Xitong Gao;Chengzhong Xu
Federated learning (FL) enables collaborative training on decentralized data while preserving the data owners’ privacy, under the orchestration of a central server. FL has seen tremendous growth and advancements in recent years. Despite its progress, FL faces a significant challenge raised by data heterogeneity, leading to a slower convergence rate and a larger performance gap compared to centralized training. In this work, we empirically reveal that direct applying empirical risk minimizing (ERM) on skewed client training data causes the client model suffers from biased predictions towards majority classes. To address this problem, we propose a model agnostic instance reweighing method (MAIR). At a coarse-grained level, MAIR adjusts the logits predictions for each class to counteract the data heterogeneity. At a fine-grained level, it dynamically reweighs the importance of individual training samples with a predictive meta network. As a results, MAIR prevents client models from over-fitting on heterogeneous data and therefore substantially reduces client drift. Theoretically, we justify its non-convex convergence property. Extensive experiments demonstrate that MAIR reliably speeds up convergence and improves the quality of global models, outperforming its best competitor by a clear margin. It notably delivers $8.3%$ improvements on ImageNet subset and achieves $67.6%$ energy footprint reduction on CIFAR-100 over the FedAvg baseline. Our findings also suggest that improving the performance of FL-trained models necessitates rethinking clients’ local optimization objectives, and ERM should thus no longer be viewed as a de facto standard in FL under data heterogeneity.
联邦学习(FL)支持在分散数据上进行协作训练,同时在中央服务器的编排下保护数据所有者的隐私。近年来,FL取得了巨大的发展和进步。尽管取得了进展,但与集中式训练相比,FL面临着数据异质性带来的重大挑战,导致其收敛速度较慢,性能差距较大。在这项工作中,我们实证地揭示了在倾斜的客户培训数据上直接应用经验风险最小化(ERM)会导致客户模型对大多数类别的预测存在偏见。为了解决这一问题,我们提出了一种与模型无关的实例重加权方法(MAIR)。在粗粒度级别上,MAIR调整每个类的logits预测以抵消数据异构性。在细粒度层面上,它动态地用一个预测元网络重新加权单个训练样本的重要性。因此,MAIR可以防止客户端模型过度拟合异构数据,从而大大减少客户端漂移。从理论上证明了它的非凸收敛性。大量的实验表明,MAIR可靠地加快了收敛速度,提高了全局模型的质量,明显优于其最佳竞争对手。它显著地在ImageNet子集上提供了8.3%的改进,并在fedag基线上实现了CIFAR-100上67.6%的能源足迹减少。我们的研究结果还表明,提高FL训练模型的性能需要重新考虑客户的局部优化目标,因此,在数据异构的情况下,ERM不应再被视为FL的事实上的标准。
{"title":"MAIR: Model Agnostic Instance Reweighing for Heterogeneous Federated Learning","authors":"Dongping Liao;Xitong Gao;Chengzhong Xu","doi":"10.1109/TMC.2025.3624064","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624064","url":null,"abstract":"Federated learning (FL) enables collaborative training on decentralized data while preserving the data owners’ privacy, under the orchestration of a central server. FL has seen tremendous growth and advancements in recent years. Despite its progress, FL faces a significant challenge raised by data heterogeneity, leading to a slower convergence rate and a larger performance gap compared to centralized training. In this work, we empirically reveal that direct applying empirical risk minimizing (ERM) on skewed client training data causes the client model suffers from biased predictions towards majority classes. To address this problem, we propose a model agnostic instance reweighing method (MAIR). At a coarse-grained level, MAIR adjusts the logits predictions for each class to counteract the data heterogeneity. At a fine-grained level, it dynamically reweighs the importance of individual training samples with a predictive meta network. As a results, MAIR prevents client models from over-fitting on heterogeneous data and therefore substantially reduces client drift. Theoretically, we justify its non-convex convergence property. Extensive experiments demonstrate that MAIR reliably speeds up convergence and improves the quality of global models, outperforming its best competitor by a clear margin. It notably delivers <inline-formula><tex-math>$8.3%$</tex-math></inline-formula> improvements on ImageNet subset and achieves <inline-formula><tex-math>$67.6%$</tex-math></inline-formula> energy footprint reduction on CIFAR-100 over the FedAvg baseline. Our findings also suggest that improving the performance of FL-trained models necessitates rethinking clients’ local optimization objectives, and ERM should thus no longer be viewed as a de facto standard in FL under data heterogeneity.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4241-4252"},"PeriodicalIF":9.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1