首页 > 最新文献

IEEE Transactions on Mobile Computing最新文献

英文 中文
Time-Efficient Identifying Key Tag Distribution in Large-Scale RFID Systems 大规模RFID系统中关键标签分配的时效性识别
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-15 DOI: 10.1109/TMC.2025.3609967
Yanyan Wang;Jia Liu;Zhihao Qu;Shen-Huan Lyu;Bin Tang;Baoliu Ye
With the proliferation of RFID-enabled applications, large-scale RFID systems often require multiple readers to ensure full coverage of numerous tags. In such systems, we sometimes pay more attention to a subset of tags instead of all, which are called key tags. This paper studies an under-investigated problem key tag distribution identification, which aims to identify which key tags are beneath which readers. This is crucial for efficiently managing specific items of interest, which can quickly pinpoint key tags and help RFID readers covering these tags collaborate to improve the tag inventory efficiency. We propose a protocol called Kadept that identifies the key tag distribution by designing a sophisticated Cuckoo filter that teases out key tags as well as assigns each of them a singleton slot for response. With this design, a great number of trivial (non-key) tags will keep silent and free up bandwidth resources for key tags, and each key tag is sorted in a collision-free way and can be identified with only 1-bit response, which significantly improves the time efficiency. To enhance the scalability and efficiency of Kadept for high key tag proportions, we propose E-Kadept protocol, which accelerates the identification process by designing an incremental Cuckoo filter that reduces false positives and improves space efficiency. We theoretically analyze how to optimize protocol parameters of Kadept and E-Kadept, and conduct extensive simulations under different tag distribution scenarios. Compared with the state-of-the-art, E-Kadept can improve the time efficiency by a factor of 1.75×, when the ratio of key tags to all tags is 0.3.
随着支持RFID的应用程序的激增,大规模RFID系统通常需要多个读取器来确保完全覆盖众多标签。在这样的系统中,我们有时会更多地关注标签的子集,而不是所有的标签,这被称为关键标签。本文研究了一个尚未被研究的关键标签分布识别问题,该问题旨在识别哪些关键标签在哪些阅读器下。这对于有效管理感兴趣的特定物品至关重要,它可以快速确定关键标签,并帮助覆盖这些标签的RFID读取器协作以提高标签库存效率。我们提出了一个名为Kadept的协议,该协议通过设计一个复杂的Cuckoo过滤器来识别密钥标签的分布,该过滤器可以梳理出密钥标签,并为每个密钥标签分配一个单一的响应槽。通过这种设计,大量的琐碎(非关键)标签将保持沉默,为关键标签释放带宽资源,并且每个关键标签以无冲突的方式排序,只有1位响应即可识别,从而显着提高了时间效率。为了提高Kadept在高关键标签比例下的可扩展性和效率,我们提出了E-Kadept协议,该协议通过设计一个增量布谷鸟滤波器来减少误报和提高空间效率,从而加快了识别过程。我们从理论上分析了如何优化Kadept和E-Kadept的协议参数,并在不同的标签分配场景下进行了大量的仿真。与目前的技术相比,当关键标签与所有标签的比例为0.3时,E-Kadept可以将时间效率提高1.75倍。
{"title":"Time-Efficient Identifying Key Tag Distribution in Large-Scale RFID Systems","authors":"Yanyan Wang;Jia Liu;Zhihao Qu;Shen-Huan Lyu;Bin Tang;Baoliu Ye","doi":"10.1109/TMC.2025.3609967","DOIUrl":"https://doi.org/10.1109/TMC.2025.3609967","url":null,"abstract":"With the proliferation of RFID-enabled applications, large-scale RFID systems often require multiple readers to ensure full coverage of numerous tags. In such systems, we sometimes pay more attention to a subset of tags instead of all, which are called key tags. This paper studies an under-investigated problem <italic>key tag distribution identification</i>, which aims to identify which key tags are beneath which readers. This is crucial for efficiently managing specific items of interest, which can quickly pinpoint key tags and help RFID readers covering these tags collaborate to improve the tag inventory efficiency. We propose a protocol called Kadept that identifies the key tag distribution by designing a sophisticated Cuckoo filter that teases out key tags as well as assigns each of them a singleton slot for response. With this design, a great number of trivial (non-key) tags will keep silent and free up bandwidth resources for key tags, and each key tag is sorted in a collision-free way and can be identified with only 1-bit response, which significantly improves the time efficiency. To enhance the scalability and efficiency of Kadept for high key tag proportions, we propose E-Kadept protocol, which accelerates the identification process by designing an incremental Cuckoo filter that reduces false positives and improves space efficiency. We theoretically analyze how to optimize protocol parameters of Kadept and E-Kadept, and conduct extensive simulations under different tag distribution scenarios. Compared with the state-of-the-art, E-Kadept can improve the time efficiency by a factor of 1.75×, when the ratio of key tags to all tags is 0.3.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 2","pages":"2725-2742"},"PeriodicalIF":9.2,"publicationDate":"2025-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resolving Inter-Logical Channel Interference for Large-Scale LoRa Deployments 解决大规模LoRa部署中的逻辑间信道干扰
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-12 DOI: 10.1109/TMC.2025.3609316
Shiming Yu;Ziyue Zhang;Xianjin Xia;Yuanqing Zheng;Jiliang Wang
LoRaWANs are envisioned to connect billions of IoT devices through thousands of physically overlapping yet logically orthogonal channels (termed logical channels). These logical channels hold significant potential for enabling highly concurrent scalable IoT connectivity. Large-scale deployments however face strong interference between logical channels. This practical issue has been largely overlooked by existing works but becomes increasingly prominent as LoRaWAN scales up. To address this issue, we introduce Canas, an innovative gateway design that is poised to orthogonalize the logical channels by eliminating mutual interference. To this end, Canas develops a series of novel solutions to accurately extract the meta-information of individual ultra-weak LoRa signals from the received overlapping channels. The meta-information is then leveraged to accurately reconstruct and subtract the LoRa signals over thousands of logical channels iteratively. Real-world evaluations demonstrate that Canas can enhance concurrent transmissions across overlapping logical channels by 2.3× compared to the best known related works.
LoRaWANs预计将通过数千个物理上重叠但逻辑上正交的通道(称为逻辑通道)连接数十亿个物联网设备。这些逻辑通道具有实现高度并发可扩展物联网连接的巨大潜力。然而,大规模部署面临着逻辑通道之间的强烈干扰。这个实际问题在很大程度上被现有的工作所忽视,但随着LoRaWAN的规模扩大,这个问题变得越来越突出。为了解决这个问题,我们引入了Canas,这是一种创新的网关设计,可以通过消除相互干扰来使逻辑通道正交。为此,Canas开发了一系列新颖的解决方案,从接收的重叠信道中准确提取单个超弱LoRa信号的元信息。然后利用元信息在数千个逻辑通道上迭代地精确重建和减去LoRa信号。现实世界的评估表明,与最知名的相关工作相比,Canas可以将重叠逻辑信道上的并发传输提高2.3倍。
{"title":"Resolving Inter-Logical Channel Interference for Large-Scale LoRa Deployments","authors":"Shiming Yu;Ziyue Zhang;Xianjin Xia;Yuanqing Zheng;Jiliang Wang","doi":"10.1109/TMC.2025.3609316","DOIUrl":"https://doi.org/10.1109/TMC.2025.3609316","url":null,"abstract":"LoRaWANs are envisioned to connect billions of IoT devices through thousands of physically overlapping yet logically orthogonal channels (termed logical channels). These logical channels hold significant potential for enabling highly concurrent scalable IoT connectivity. Large-scale deployments however face strong interference between logical channels. This practical issue has been largely overlooked by existing works but becomes increasingly prominent as LoRaWAN scales up. To address this issue, we introduce Canas, an innovative gateway design that is poised to orthogonalize the logical channels by eliminating mutual interference. To this end, Canas develops a series of novel solutions to accurately extract the meta-information of individual ultra-weak LoRa signals from the received overlapping channels. The meta-information is then leveraged to accurately reconstruct and subtract the LoRa signals over thousands of logical channels iteratively. Real-world evaluations demonstrate that Canas can enhance concurrent transmissions across overlapping logical channels by 2.3× compared to the best known related works.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 2","pages":"2759-2773"},"PeriodicalIF":9.2,"publicationDate":"2025-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Layer Position-Pose Fusion Framework for Joint Magnetoquasistatic Field and IMU Positioning 关节准静磁场与IMU定位的多层位姿融合框架
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-12 DOI: 10.1109/TMC.2025.3608822
Bocheng Qian;Lei Huang;Xiansheng Guo;Gordon Owusu Boateng;Rui Ma;Nirwan Ansari
Magnetoquasistatic (MQS) field positioning has demonstrated significant potential for emergency rescue applications due to its strong penetration and non-reliance on pre-deployment. However, its accuracy is notably impaired by metal interference and distance attenuation. Inertial Measurement Units (IMUs) can reliably provide motion data even in environments affected by metal and electromagnetic interference, but they suffer from cumulative drift over time. Effectively, combining MQS field and IMU positioning to harness their respective advantages presents a crucial challenge. To address this, we propose a Multi-Layer Position-Pose Fusion (MP2F) framework that integrates MQS field with IMU data to enhance position and pose estimation. The MP2F framework comprises three layers: a Quaternion-based Pose Fusion Layer (QPFL), a Kalman Filter-based Position Fusion Layer (KFFL), and a Global Position-Pose Fusion Layer (GP2FL). Specifically, QPFL utilizes the Extended Kalman Filter (EKF) to effectively mitigate magnetic field distortion and IMU drift, thereby significantly enhancing pose estimation precision. Next, KFFL incorporates the fused pose estimation from QPFL into an inertial navigation motion model, and leverages MQS field observations to further improve positional accuracy. Finally, GP2FL formulates a nonlinear least squares optimization problem by marginalizing prior factors, inertial sensor factors, and Kalman fusion outputs, enabling globally optimized state estimation. Comprehensive simulation results and analyses prove that the proposed MP2F framework achieves high-precision position and pose estimation in complex emergency scenarios, with strong robustness. Experimental results in real-world environments show that the proposed MP2F achieves improvements in positioning accuracy of 61.1%, 58.7%, 48.4%, and 50.2% over EKF, iMag+, GWO-PF, and MagLoc, respectively.
准静磁(MQS)现场定位由于其强大的穿透性和不依赖于预先部署,在紧急救援应用中显示出巨大的潜力。然而,其精度受到金属干扰和距离衰减的明显影响。惯性测量单元(imu)即使在受金属和电磁干扰的环境中也能可靠地提供运动数据,但它们会随着时间的推移而受到累积漂移的影响。有效地结合MQS领域和IMU定位来利用各自的优势提出了一个关键的挑战。为了解决这个问题,我们提出了一个多层位置-姿态融合(MP2F)框架,该框架将MQS场与IMU数据集成在一起,以增强位置和姿态估计。MP2F框架包括三层:基于四元数的姿态融合层(QPFL),基于卡尔曼滤波的位置融合层(KFFL)和全局位置-姿态融合层(GP2FL)。具体来说,QPFL利用扩展卡尔曼滤波器(EKF)有效地减轻了磁场畸变和IMU漂移,从而显著提高了姿态估计精度。接下来,KFFL将QPFL的融合姿态估计纳入惯性导航运动模型,并利用MQS现场观测进一步提高定位精度。最后,GP2FL通过边缘化先验因素、惯性传感器因素和卡尔曼融合输出,制定了一个非线性最小二乘优化问题,实现了全局优化状态估计。综合仿真结果和分析表明,所提出的MP2F框架在复杂紧急情况下实现了高精度的位置和姿态估计,具有较强的鲁棒性。实际环境下的实验结果表明,与EKF、iMag+、GWO-PF和MagLoc相比,MP2F的定位精度分别提高了61.1%、58.7%、48.4%和50.2%。
{"title":"A Multi-Layer Position-Pose Fusion Framework for Joint Magnetoquasistatic Field and IMU Positioning","authors":"Bocheng Qian;Lei Huang;Xiansheng Guo;Gordon Owusu Boateng;Rui Ma;Nirwan Ansari","doi":"10.1109/TMC.2025.3608822","DOIUrl":"https://doi.org/10.1109/TMC.2025.3608822","url":null,"abstract":"Magnetoquasistatic (MQS) field positioning has demonstrated significant potential for emergency rescue applications due to its strong penetration and non-reliance on pre-deployment. However, its accuracy is notably impaired by metal interference and distance attenuation. Inertial Measurement Units (IMUs) can reliably provide motion data even in environments affected by metal and electromagnetic interference, but they suffer from cumulative drift over time. Effectively, combining MQS field and IMU positioning to harness their respective advantages presents a crucial challenge. To address this, we propose a <italic>Multi-Layer Position-Pose Fusion</i> (<italic>MP2F</i>) framework that integrates MQS field with IMU data to enhance position and pose estimation. The MP2F framework comprises three layers: a <italic>Quaternion-based Pose Fusion Layer</i> (<italic>QPFL</i>), a <italic>Kalman Filter-based Position Fusion Layer</i> (<italic>KFFL</i>), and a <italic>Global Position-Pose Fusion Layer</i> (<italic>GP2FL</i>). Specifically, QPFL utilizes the Extended Kalman Filter (EKF) to effectively mitigate magnetic field distortion and IMU drift, thereby significantly enhancing pose estimation precision. Next, KFFL incorporates the fused pose estimation from QPFL into an inertial navigation motion model, and leverages MQS field observations to further improve positional accuracy. Finally, GP2FL formulates a nonlinear least squares optimization problem by marginalizing prior factors, inertial sensor factors, and Kalman fusion outputs, enabling globally optimized state estimation. Comprehensive simulation results and analyses prove that the proposed MP2F framework achieves high-precision position and pose estimation in complex emergency scenarios, with strong robustness. Experimental results in real-world environments show that the proposed MP2F achieves improvements in positioning accuracy of 61.1%, 58.7%, 48.4%, and 50.2% over EKF, iMag+, GWO-PF, and MagLoc, respectively.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 2","pages":"2843-2859"},"PeriodicalIF":9.2,"publicationDate":"2025-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Security Analysis of SDN-Based IoT-Oriented Blockchain Protected E-Voting System 基于sdn的面向物联网区块链保护电子投票系统设计与安全性分析
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-12 DOI: 10.1109/TMC.2025.3609480
Ngangbam Indrason;Kalyan Baital;Goutam Saha
The electoral system is one of the fundamental pillars of democracy, but the traditional voting system suffers from several limitations such as fraud voting, vote tampering, impersonation, and inefficiencies. To overcome these limitations, several research works have been initiated to design a blockchain-based e-voting system. These designs addressed the loopholes of the existing ones to a limited extent. Here, a novel multi-level blockchain-secured SDN-based IoT enabled e-voting system has been proposed. The proposed system consists of booth, district, state, and country level systems. Here, a voter needs to be authenticated at the booth-level and then this valid vote data can be propagated to the upper hierarchical levels and stored there after signing and encrypting it using ECDSA and ECC respectively. Man-in-the-middle attacks, DoS/DDoS, unauthorized access, and impersonation attacks are avoided using flow rules in SDN controllers and firewalls installed in the servers. Furthermore, blockchain technology provides security for voting data stored at all levels. The security strengths were tested at different levels (e.g., programming, operating system, and network level) using open-source tools (i.e., scyther, nmap, metasploit, etc.). The performance of the proposed architecture was evaluated satisfactorily in a testbed. It also performed satisfactorily under both normal and stressed conditions in a scaled-up environment.
选举制度是民主主义的基本支柱之一,但传统的投票制度存在欺诈投票、投票篡改、冒充和效率低下等局限性。为了克服这些限制,已经启动了一些研究工作来设计基于区块链的电子投票系统。这些设计在一定程度上弥补了现有设计的漏洞。本文提出了一种新型的基于sdn的多层次区块链安全物联网电子投票系统。提议的系统包括展位、地区、州和国家层面的系统。在这里,投票人需要在展台级别进行身份验证,然后可以将有效的投票数据传播到更高的层次级别,并在分别使用ECDSA和ECC对其进行签名和加密后存储在那里。通过SDN控制器中的流规则和服务器上安装的防火墙,可以避免中间人攻击、DoS/DDoS攻击、未授权访问和模拟攻击。此外,区块链技术为存储在所有级别的投票数据提供了安全性。使用开源工具(例如scyther、nmap、metasploit等)在不同级别(例如编程、操作系统和网络级别)测试了安全强度。该体系结构的性能在测试台上得到了满意的评价。在放大的环境中,它在正常和压力条件下也表现令人满意。
{"title":"Design and Security Analysis of SDN-Based IoT-Oriented Blockchain Protected E-Voting System","authors":"Ngangbam Indrason;Kalyan Baital;Goutam Saha","doi":"10.1109/TMC.2025.3609480","DOIUrl":"https://doi.org/10.1109/TMC.2025.3609480","url":null,"abstract":"The electoral system is one of the fundamental pillars of democracy, but the traditional voting system suffers from several limitations such as fraud voting, vote tampering, impersonation, and inefficiencies. To overcome these limitations, several research works have been initiated to design a blockchain-based e-voting system. These designs addressed the loopholes of the existing ones to a limited extent. Here, a novel multi-level blockchain-secured SDN-based IoT enabled e-voting system has been proposed. The proposed system consists of booth, district, state, and country level systems. Here, a voter needs to be authenticated at the booth-level and then this valid vote data can be propagated to the upper hierarchical levels and stored there after signing and encrypting it using ECDSA and ECC respectively. Man-in-the-middle attacks, DoS/DDoS, unauthorized access, and impersonation attacks are avoided using flow rules in SDN controllers and firewalls installed in the servers. Furthermore, blockchain technology provides security for voting data stored at all levels. The security strengths were tested at different levels (e.g., programming, operating system, and network level) using open-source tools (i.e., scyther, nmap, metasploit, etc.). The performance of the proposed architecture was evaluated satisfactorily in a testbed. It also performed satisfactorily under both normal and stressed conditions in a scaled-up environment.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 2","pages":"2811-2824"},"PeriodicalIF":9.2,"publicationDate":"2025-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
freeEnv: Enabling Zero-Effort RF-Based Micro-Environment Changes Monitoring freeEnv:实现零工作量的基于射频的微环境变化监测
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-10 DOI: 10.1109/TMC.2025.3608245
Dawei Yan;Feiyu Han;Mingzhu Yang;Shanyue Wang;Panlong Yang;Yubo Yan
Currently, a major issue of WiFi-based sensing technologies is how to adapt to changes in the surrounding environment. The extreme sensitivity of Channel State Information (CSI) makes many WiFi sensing arts frustrated when applied to the complex and unknown real world. To solve this problem, in this paper, we propose freeEnv designed to automatically identify the micro-environmental changes (even tiny movements of the laptop) using WiFi devices, which can coexist with other WiFi sensing tasks with zero effort. To achieve automatic identification of micro-environmental changes, we quantify micro-environmental changes based on the physical propagation laws of WiFi signals and the main factors that affect CSI measurements. Then, we design a micro-environmental changes identification method, which determines whether the environment has changed by calculating the Earth Mover’s Distance (EMD) of the Probability Density Function (PDF) of continuous CSI, without requiring training data. To remove the influence of dynamic human behaviors, we design a human dynamic detection scheme, which is achieved by obtaining the average inter-cluster distance of performing Gaussian Mixture Model (GMM) clustering on CSI. We evaluate freeEnv in real-world scenarios with six different hardware, four different scenarios, and twenty-four ways of micro-environmental changes. The results show that our method is robust to different devices and scenarios, and can achieve the average precision of 96.1% and 93.2% for micro-environmental changes identification and human dynamic behavior detection. By testing on a case study of threshold-based human presence detection, freeEnv can effectively improve the detection performance.
目前基于wifi的传感技术面临的一个主要问题是如何适应周围环境的变化。信道状态信息(CSI)的极高灵敏度使得许多WiFi传感技术在应用于复杂未知的现实世界时受挫。为了解决这一问题,本文提出了利用WiFi设备自动识别微环境变化(甚至是笔记本电脑的微小运动)的freeEnv,它可以与其他WiFi传感任务零费力地共存。为了实现微环境变化的自动识别,我们根据WiFi信号的物理传播规律和影响CSI测量的主要因素,对微环境变化进行量化。然后,我们设计了一种微环境变化识别方法,该方法在不需要训练数据的情况下,通过计算连续CSI的概率密度函数(PDF)的土方距离(EMD)来判断环境是否发生了变化。为了消除人类动态行为的影响,我们设计了一种人类动态检测方案,该方案通过获得在CSI上执行高斯混合模型(GMM)聚类的平均簇间距离来实现。我们用六种不同的硬件、四种不同的场景和24种微环境变化方式在现实场景中评估了freeEnv。结果表明,该方法对不同设备和场景具有较强的鲁棒性,对微环境变化识别和人体动态行为检测的平均精度分别达到96.1%和93.2%。通过对基于阈值的人类存在检测的案例研究,freeEnv可以有效地提高检测性能。
{"title":"freeEnv: Enabling Zero-Effort RF-Based Micro-Environment Changes Monitoring","authors":"Dawei Yan;Feiyu Han;Mingzhu Yang;Shanyue Wang;Panlong Yang;Yubo Yan","doi":"10.1109/TMC.2025.3608245","DOIUrl":"https://doi.org/10.1109/TMC.2025.3608245","url":null,"abstract":"Currently, a major issue of WiFi-based sensing technologies is how to adapt to changes in the surrounding environment. The extreme sensitivity of <italic>Channel State Information</i> (CSI) makes many WiFi sensing arts frustrated when applied to the complex and unknown real world. To solve this problem, in this paper, we propose <italic>freeEnv</i> designed to automatically identify the micro-environmental changes (even tiny movements of the laptop) using WiFi devices, which can coexist with other WiFi sensing tasks with zero effort. To achieve automatic identification of micro-environmental changes, we quantify micro-environmental changes based on the physical propagation laws of WiFi signals and the main factors that affect CSI measurements. Then, we design a micro-environmental changes identification method, which determines whether the environment has changed by calculating the <italic>Earth Mover’s Distance</i> (EMD) of the <italic>Probability Density Function</i> (PDF) of continuous CSI, without requiring training data. To remove the influence of dynamic human behaviors, we design a human dynamic detection scheme, which is achieved by obtaining the average inter-cluster distance of performing <italic>Gaussian Mixture Model</i> (GMM) clustering on CSI. We evaluate <italic>freeEnv</i> in real-world scenarios with six different hardware, four different scenarios, and twenty-four ways of micro-environmental changes. The results show that our method is robust to different devices and scenarios, and can achieve the average precision of 96.1% and 93.2% for micro-environmental changes identification and human dynamic behavior detection. By testing on a case study of threshold-based human presence detection, <italic>freeEnv</i> can effectively improve the detection performance.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 2","pages":"2743-2758"},"PeriodicalIF":9.2,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Inference Offloading and Model Caching for Small and Large Language Model Collaboration 小型和大型语言模型协作的联合推理卸载和模型缓存
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-10 DOI: 10.1109/TMC.2025.3608303
Xinyi Xu;Gang Feng;Yijing Liu;Shuang Qin;Jian Wang;Yunxiang Wang
Large Language Models (LLMs), with advanced content creation and inference capabilities, can provide immersive intelligent services to users in mobile edge networks. However, the increasing demand for real-time artificial intelligence (AI) applications aggravates the limitations of cloud-based LLMs due to the long response time. Meanwhile, Small Language Models (SLMs), which are cost-effective and locally deployable for terminal devices, can serve as an efficient supplement to LLMs for performing latency-sensitive tasks with lower generalization capability. Due to the resource constraints of edge networks and the diverse requirements of user tasks, it is critical to design an inference framework that effectively coordinates the deployment and collaboration of LLMs and SLMs. In this paper, we propose an LLM-SLM collaborative inference (LSCI) scheme under a mobile edge computing (MEC) architecture, which jointly decides where to cache models and how to offload inference tasks to balance latency, accuracy, and resource costs. To optimize inference performance subject to resource constraints, we jointly solve the inference task offloading and model caching problem in LSCI scheme. Specifically, we employ deep reinforcement learning (DRL) to select highly popular SLMs to be cached on the edge server, and distributed belief propagation technique to solve the associated inference task offloading issue. Numerical results show that the proposed LSCI scheme can achieve significant performance gain in terms of inference performance when compared with a number of baseline solutions.
大型语言模型(llm)具有先进的内容创建和推理能力,可以为移动边缘网络中的用户提供沉浸式智能服务。然而,对实时人工智能(AI)应用的需求不断增长,由于响应时间长,加剧了基于云的法学硕士的局限性。同时,小型语言模型(Small Language Models, slm)具有成本效益和可在终端设备本地部署的特点,可以作为llm的有效补充,用于执行延迟敏感型任务,但泛化能力较低。由于边缘网络的资源限制和用户任务的多样化需求,设计一个有效协调llm和slm部署和协作的推理框架至关重要。在本文中,我们提出了一种移动边缘计算(MEC)架构下的LLM-SLM协同推理(LSCI)方案,该方案共同决定在何处缓存模型以及如何卸载推理任务,以平衡延迟、准确性和资源成本。为了优化资源约束下的推理性能,我们共同解决了LSCI方案中的推理任务卸载和模型缓存问题。具体而言,我们采用深度强化学习(DRL)选择高度流行的slm缓存到边缘服务器,并采用分布式信念传播技术解决相关的推理任务卸载问题。数值结果表明,与许多基准方案相比,所提出的LSCI方案在推理性能方面取得了显著的性能提升。
{"title":"Joint Inference Offloading and Model Caching for Small and Large Language Model Collaboration","authors":"Xinyi Xu;Gang Feng;Yijing Liu;Shuang Qin;Jian Wang;Yunxiang Wang","doi":"10.1109/TMC.2025.3608303","DOIUrl":"https://doi.org/10.1109/TMC.2025.3608303","url":null,"abstract":"Large Language Models (LLMs), with advanced content creation and inference capabilities, can provide immersive intelligent services to users in mobile edge networks. However, the increasing demand for real-time artificial intelligence (AI) applications aggravates the limitations of cloud-based LLMs due to the long response time. Meanwhile, Small Language Models (SLMs), which are cost-effective and locally deployable for terminal devices, can serve as an efficient supplement to LLMs for performing latency-sensitive tasks with lower generalization capability. Due to the resource constraints of edge networks and the diverse requirements of user tasks, it is critical to design an inference framework that effectively coordinates the deployment and collaboration of LLMs and SLMs. In this paper, we propose an LLM-SLM collaborative inference (LSCI) scheme under a mobile edge computing (MEC) architecture, which jointly decides where to cache models and how to offload inference tasks to balance latency, accuracy, and resource costs. To optimize inference performance subject to resource constraints, we jointly solve the inference task offloading and model caching problem in LSCI scheme. Specifically, we employ deep reinforcement learning (DRL) to select highly popular SLMs to be cached on the edge server, and distributed belief propagation technique to solve the associated inference task offloading issue. Numerical results show that the proposed LSCI scheme can achieve significant performance gain in terms of inference performance when compared with a number of baseline solutions.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 2","pages":"2691-2706"},"PeriodicalIF":9.2,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transfer Learning Assisted Detection of Anomalous Events With Insufficient Primary Attribute Data Samples in MEC Networks 迁移学习辅助MEC网络中主属性数据样本不足的异常事件检测
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-29 DOI: 10.1109/TMC.2025.3604253
Jine Tang;Xiaotong Ma;Song Yang;Yong Xiang;Zhangbing Zhou
Nowadays IoT devices in Mobile Edge Computing (MEC) networks have been deployed in large-scale quantities to guarantee sensing data collection for anomalous event detection as full as possible even if some devices are in fault. Some techniques, such as clustering and dimensionality reduction, are adopted to eliminate redundant sensing data collection in this large-scale deployment. However, they not only have high computational complexity and easily cause the loss of information on the primary sensing attributes for detection, but also bring certain errors to the detection because of their low sensitivity to data processed. In addition, insufficient collection of primary attribute data samples often results from physical or human factors, and mindless imputation of large-scale data gaps without basis may lead to greater irreparable losses. To address the above challenges, we first complete the selection of optimal primary attribute device collection and aggregation (PADCA) path based on minimum spanning tree, reducing data communication cost for redundant primary attributes collection. Then, we propose an anomalous impact correlation search strategy to quickly locate all MEC servers whose management regions have cascading anomalous event and help determine the transferable source MEC servers. Leveraging this, we use transfer learning to help detect anomalous events in the management regions of the MEC servers with insufficient primary attribute data samples, where a particle swarm optimization based back-propagation (PSO-BP) neural network model is used to infer the fusion weight of each primary attribute. Experimental results show that our method achieves higher detection performance in terms of detection time, energy consumption, accuracy, and receiver operating characteristic (ROC) curve compared to the benchmarks by at least 24%, 34%, 0.5 and 0.05.
目前,移动边缘计算(MEC)网络中的物联网设备已经大量部署,以保证即使某些设备出现故障,也能尽可能充分地收集异常事件检测的传感数据。在这种大规模部署中,采用了聚类和降维等技术来消除冗余的传感数据收集。然而,它们不仅计算量大,容易造成用于检测的主要感知属性信息的丢失,而且由于对被处理数据的灵敏度较低,给检测带来一定的误差。此外,主要属性数据样本的收集不足往往是由物理或人为因素造成的,无根据的大规模数据空白的盲目归因可能会导致更大的不可挽回的损失。针对上述挑战,首先基于最小生成树完成了最优主属性设备收集和聚合(PADCA)路径的选择,降低了冗余主属性收集的数据通信开销。然后,我们提出了一种异常影响关联搜索策略,以快速定位所有管理区域存在级联异常事件的MEC服务器,并帮助确定可转移的源MEC服务器。利用这一点,我们使用迁移学习来帮助检测主属性数据样本不足的MEC服务器管理区域中的异常事件,其中使用基于粒子群优化的反向传播(PSO-BP)神经网络模型来推断每个主属性的融合权重。实验结果表明,该方法在检测时间、能耗、准确度、受试者工作特征(ROC)曲线等方面均比基准方法提高了至少24%、34%、0.5和0.05。
{"title":"Transfer Learning Assisted Detection of Anomalous Events With Insufficient Primary Attribute Data Samples in MEC Networks","authors":"Jine Tang;Xiaotong Ma;Song Yang;Yong Xiang;Zhangbing Zhou","doi":"10.1109/TMC.2025.3604253","DOIUrl":"https://doi.org/10.1109/TMC.2025.3604253","url":null,"abstract":"Nowadays IoT devices in Mobile Edge Computing (MEC) networks have been deployed in large-scale quantities to guarantee sensing data collection for anomalous event detection as full as possible even if some devices are in fault. Some techniques, such as clustering and dimensionality reduction, are adopted to eliminate redundant sensing data collection in this large-scale deployment. However, they not only have high computational complexity and easily cause the loss of information on the primary sensing attributes for detection, but also bring certain errors to the detection because of their low sensitivity to data processed. In addition, insufficient collection of primary attribute data samples often results from physical or human factors, and mindless imputation of large-scale data gaps without basis may lead to greater irreparable losses. To address the above challenges, we first complete the selection of optimal primary attribute device collection and aggregation (PADCA) path based on minimum spanning tree, reducing data communication cost for redundant primary attributes collection. Then, we propose an anomalous impact correlation search strategy to quickly locate all MEC servers whose management regions have cascading anomalous event and help determine the transferable source MEC servers. Leveraging this, we use transfer learning to help detect anomalous events in the management regions of the MEC servers with insufficient primary attribute data samples, where a particle swarm optimization based back-propagation (PSO-BP) neural network model is used to infer the fusion weight of each primary attribute. Experimental results show that our method achieves higher detection performance in terms of detection time, energy consumption, accuracy, and receiver operating characteristic (ROC) curve compared to the benchmarks by at least 24%, 34%, 0.5 and 0.05.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1254-1269"},"PeriodicalIF":9.2,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Reliable and Anonymous Data Collection for Fog-Assisted Mobile Crowdsensing With Malicious User Detection 为雾辅助移动众测提供可靠和匿名的数据收集与恶意用户检测
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-29 DOI: 10.1109/TMC.2025.3602659
Mingyang Song;Zhongyun Hua;Yifeng Zheng;Rushi Lan;Qing Liao;Guoai Xu
The rapid developments of mobile devices and fog computing have facilitated the data collection paradigm of fog-assisted mobile crowdsensing, providing great convenience for individuals with limited resources to collect large-scale data. However, the openness of crowdsensing network and the untrusted behaviors of some task participants raise concerns regarding participants’ privacy and data reliability. Previous works mostly focus on preserving the privacy of task participants and often overlook the issue of data reliability in the presence of dishonest participants. In this paper, we propose a new data collection scheme tailored for fog-assisted mobile crowdsensing. It enables the cloud to detect invalid sensing data in the ciphertext domain, simultaneously ensuring data confidentiality and reliability. Additionally, our scheme is designed to protect the anonymity of honest task participants while guaranteeing the traceability of dishonest participant once invalid data are detected. Formal analysis is provided to prove the correctness and security of our scheme. Furthermore, we implement our scheme to evaluate its performance, and the experimental results demonstrate that it can achieve the aforementioned security properties with modest performance overhead.
移动设备和雾计算的快速发展促进了雾辅助移动众测的数据收集范式,为资源有限的个人收集大规模数据提供了极大的便利。然而,众筹网络的开放性和部分任务参与者的不可信行为引发了对参与者隐私和数据可靠性的担忧。以往的研究大多侧重于保护任务参与者的隐私,而往往忽略了在不诚实参与者存在的情况下数据可靠性的问题。在本文中,我们提出了一种针对雾辅助移动众测的新数据收集方案。使云能够检测出密文域中无效的感知数据,同时保证数据的保密性和可靠性。此外,我们的方案旨在保护诚实任务参与者的匿名性,同时保证一旦检测到无效数据时不诚实参与者的可追溯性。通过形式化分析证明了该方案的正确性和安全性。实验结果表明,该方案可以在适度的性能开销下实现上述安全特性。
{"title":"Enabling Reliable and Anonymous Data Collection for Fog-Assisted Mobile Crowdsensing With Malicious User Detection","authors":"Mingyang Song;Zhongyun Hua;Yifeng Zheng;Rushi Lan;Qing Liao;Guoai Xu","doi":"10.1109/TMC.2025.3602659","DOIUrl":"https://doi.org/10.1109/TMC.2025.3602659","url":null,"abstract":"The rapid developments of mobile devices and fog computing have facilitated the data collection paradigm of fog-assisted mobile crowdsensing, providing great convenience for individuals with limited resources to collect large-scale data. However, the openness of crowdsensing network and the untrusted behaviors of some task participants raise concerns regarding participants’ privacy and data reliability. Previous works mostly focus on preserving the privacy of task participants and often overlook the issue of data reliability in the presence of dishonest participants. In this paper, we propose a new data collection scheme tailored for fog-assisted mobile crowdsensing. It enables the cloud to detect invalid sensing data in the ciphertext domain, simultaneously ensuring data confidentiality and reliability. Additionally, our scheme is designed to protect the anonymity of honest task participants while guaranteeing the traceability of dishonest participant once invalid data are detected. Formal analysis is provided to prove the correctness and security of our scheme. Furthermore, we implement our scheme to evaluate its performance, and the experimental results demonstrate that it can achieve the aforementioned security properties with modest performance overhead.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1414-1430"},"PeriodicalIF":9.2,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uplink and Downlink Subband Resource Allocation for Subband Full-Duplex Enabled Industrial Intelligent Manufacturing 面向子带全双工的工业智能制造上下行子带资源分配
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-26 DOI: 10.1109/TMC.2025.3602872
Zheng Jiang;Dingyou Ma;Bowen Wang;Ningyan Guo;Kan Yu;Qixun Zhang
The evolution of industrial intelligent manufacturing necessitates wireless communication systems capable of replacing conventional wired infrastructures, offering superior flexibility, scalability, and reduced maintenance overhead. While 5G New Radio (NR) Ultra-Reliable Low-Latency Communication (uRLLC) standards (Release 15-17) have shown promise for mission-critical applications, current implementations remain constrained by their unidirectional optimization paradigm, unable to simultaneously satisfy the dual imperatives of sub-millisecond latency ($< 1$ ms) and 99.9999% reliability demanded by industrial control systems. To address these challenges, we present a transformative subband full-duplex (SBFD) network architecture that ensures persistent time-domain spectral availability for concurrent uplink/downlink operations, thereby eliminating direction-switching latency. Our solution introduces three key innovations: (1) an interference-aware SBFD resource allocation framework that strategically isolates UL/DL subbands to minimize cross-link interference (CLI), (2) a dual-optimization algorithm that jointly maximizes spectral efficiency while guaranteeing channel-adaptive reliability thresholds, and (3) a practical implementation scheme compatible with existing 5G NR physical layer specifications. Extensive simulations under realistic factory channel models demonstrate 58.3% reduction in aggregate CLI and 41.2% improvement in control command decoding accuracy compared to legacy half-duplex systems. This research establishes a new paradigm for wireless industrial networks, effectively closing the performance gap between 5G URLLC specifications and the exacting demands of Industry 4.0 applications.
工业智能制造的发展需要能够取代传统有线基础设施的无线通信系统,提供卓越的灵活性、可扩展性和更少的维护开销。虽然5G新无线电(NR)超可靠低延迟通信(uRLLC)标准(第15-17版)已经显示出关键任务应用的前景,但目前的实施仍然受到单向优化范例的限制,无法同时满足工业控制系统要求的亚毫秒延迟($< 1$ ms)和99.9999%可靠性的双重要求。为了解决这些挑战,我们提出了一种变革性的子带全双工(SBFD)网络架构,该架构可确保并发上行/下行操作的持久时域频谱可用性,从而消除方向切换延迟。我们的解决方案引入了三个关键创新:(1)干扰感知的SBFD资源分配框架,该框架战略性地隔离UL/DL子带,以最大限度地减少交联干扰(CLI);(2)双重优化算法,在保证信道自适应可靠性阈值的同时最大限度地提高频谱效率;(3)与现有5G NR物理层规范兼容的实用实现方案。在真实工厂通道模型下进行的大量仿真表明,与传统的半双工系统相比,聚合CLI降低了58.3%,控制命令解码精度提高了41.2%。本研究建立了无线工业网络的新范式,有效缩小了5G URLLC规范与工业4.0应用的严格要求之间的性能差距。
{"title":"Uplink and Downlink Subband Resource Allocation for Subband Full-Duplex Enabled Industrial Intelligent Manufacturing","authors":"Zheng Jiang;Dingyou Ma;Bowen Wang;Ningyan Guo;Kan Yu;Qixun Zhang","doi":"10.1109/TMC.2025.3602872","DOIUrl":"https://doi.org/10.1109/TMC.2025.3602872","url":null,"abstract":"The evolution of industrial intelligent manufacturing necessitates wireless communication systems capable of replacing conventional wired infrastructures, offering superior flexibility, scalability, and reduced maintenance overhead. While 5G New Radio (NR) Ultra-Reliable Low-Latency Communication (uRLLC) standards (Release 15-17) have shown promise for mission-critical applications, current implementations remain constrained by their unidirectional optimization paradigm, unable to simultaneously satisfy the dual imperatives of sub-millisecond latency (<inline-formula><tex-math>$&lt; 1$</tex-math></inline-formula> ms) and 99.9999% reliability demanded by industrial control systems. To address these challenges, we present a transformative subband full-duplex (SBFD) network architecture that ensures persistent time-domain spectral availability for concurrent uplink/downlink operations, thereby eliminating direction-switching latency. Our solution introduces three key innovations: (1) an interference-aware SBFD resource allocation framework that strategically isolates UL/DL subbands to minimize cross-link interference (CLI), (2) a dual-optimization algorithm that jointly maximizes spectral efficiency while guaranteeing channel-adaptive reliability thresholds, and (3) a practical implementation scheme compatible with existing 5G NR physical layer specifications. Extensive simulations under realistic factory channel models demonstrate 58.3% reduction in aggregate CLI and 41.2% improvement in control command decoding accuracy compared to legacy half-duplex systems. This research establishes a new paradigm for wireless industrial networks, effectively closing the performance gap between 5G URLLC specifications and the exacting demands of Industry 4.0 applications.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1431-1444"},"PeriodicalIF":9.2,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Multi-Class Novelty Detection in Structural Vibrations With Modified Contrastive Loss 基于修正对比损失的结构振动深度多类新颖性检测
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-26 DOI: 10.1109/TMC.2025.3603092
Mainak Chakraborty;Chandan;Bodhibrata Mukhopadhyay;Subrat Kar
In this paper, we introduce a framework for multi-class novelty detection using structural vibration signals. Structural vibration-based person identification is a promising soft-biometric approach with potential applications in elderly care and access control. However, current research faces two key challenges. The first challenge is the lack of large-scale datasets necessary for thorough evaluation in structural vibration gait recognition. To address this, we created a new dataset with recordings from fifty individuals. The second challenge lies in the limited exploration of deep learning methods for large-scale multi-class novelty detection in structural vibration data. To fill this gap, we propose the energy-shifted contrastive loss function, specifically designed for this task. Our results demonstrate that the proposed framework achieves 96.57% accuracy in multi-class classification. For novelty detection, it achieves an Receiver Operating Characteristic—Area Under the Curve (ROC-AUC) score of 89.15% for single footsteps, which improves to 93.83% with five consecutive footsteps.
本文介绍了一种利用结构振动信号进行多类新颖性检测的框架。基于结构振动的人识别是一种很有前途的软生物识别方法,在老年人护理和门禁控制方面具有潜在的应用前景。然而,目前的研究面临两个关键挑战。第一个挑战是缺乏对结构振动步态识别进行全面评估所需的大规模数据集。为了解决这个问题,我们创建了一个包含50个人录音的新数据集。第二个挑战是深度学习方法在结构振动数据中大规模多类新颖性检测方面的探索有限。为了填补这一空白,我们提出了能量转移对比损失函数,专门为这项任务设计。结果表明,该框架在多类分类中准确率达到96.57%。在新颖性检测方面,单步行走的ROC-AUC (Receiver Operating Characteristic-Area Under the Curve)得分为89.15%,连续5步行走的ROC-AUC得分为93.83%。
{"title":"Deep Multi-Class Novelty Detection in Structural Vibrations With Modified Contrastive Loss","authors":"Mainak Chakraborty;Chandan;Bodhibrata Mukhopadhyay;Subrat Kar","doi":"10.1109/TMC.2025.3603092","DOIUrl":"https://doi.org/10.1109/TMC.2025.3603092","url":null,"abstract":"In this paper, we introduce a framework for multi-class novelty detection using structural vibration signals. Structural vibration-based person identification is a promising soft-biometric approach with potential applications in elderly care and access control. However, current research faces two key challenges. The first challenge is the lack of large-scale datasets necessary for thorough evaluation in structural vibration gait recognition. To address this, we created a new dataset with recordings from fifty individuals. The second challenge lies in the limited exploration of deep learning methods for large-scale multi-class novelty detection in structural vibration data. To fill this gap, we propose the energy-shifted contrastive loss function, specifically designed for this task. Our results demonstrate that the proposed framework achieves 96.57% accuracy in multi-class classification. For novelty detection, it achieves an Receiver Operating Characteristic—Area Under the Curve (ROC-AUC) score of 89.15% for single footsteps, which improves to 93.83% with five consecutive footsteps.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1457-1468"},"PeriodicalIF":9.2,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1