首页 > 最新文献

IEEE Transactions on Mobile Computing最新文献

英文 中文
SipDeep: Swallowing-Based Transparent Authentication via Bone-Conducted In-Ear Acoustics SipDeep:通过骨传导耳内声学进行基于吞咽的透明身份验证
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1109/TMC.2024.3450919
Awais Ahmed;Panlong Yang;Adeel Feroz Mirza;Taha Khan;Muhammad Rizwan;Ammar Hawbani;Miao Pan;Zhu Han
The growing use of smart devices requires improving privacy and security. Conventional biometrics confront false positives and unauthorized access, stressing cautious user input. We enhance security by analyzing distinctive human physiological characteristics rather than relying on conventional methods susceptible to spoof attacks. Drinking, a common physiological activity, can provide continuous authentication. SipDeep, proposed innovative system, utilizes bone-conducted liquid intake sound, incorporating unique biometrics from bone and pharyngeal characteristics. The system captures these elements in the external auditory canal, offering a novel transparent authentication applicable to a diverse user range. Our noise filtering system eliminates environmental and anatomical interferences during drinking, including subtle body movements. The study introduces a hybrid event detection technique integrating wavelet transform with start/end points detection. Next, we extract physiological features from bone structure, liquid intake sound, and liquid intake pattern. We used the physiological features to train a deep learning algorithm based on a Triplet-Siamese network to classify authentication. The proposed model has been thoroughly compared with advanced models such as DenseNet169, ResNet18, and VGG16. Following extensive experimentation involving multiple users across various environments, SipDeep demonstrates 96.5% authentication accuracy, coupled with a 98.33% resistance to spoof attacks.
随着智能设备的使用越来越广泛,隐私和安全问题也日益突出。传统的生物识别技术面临误报和未经授权的访问,强调用户输入时要谨慎。我们通过分析独特的人体生理特征来提高安全性,而不是依赖容易受到欺骗攻击的传统方法。饮酒是一种常见的生理活动,可以提供连续的身份验证。SipDeep 是一种创新系统,它利用骨骼传导的液体吸入声,结合了骨骼和咽部特征的独特生物识别技术。该系统在外耳道中捕捉这些元素,提供一种适用于不同用户的新型透明身份验证。我们的噪声过滤系统能消除饮酒过程中的环境和解剖学干扰,包括细微的身体运动。该研究引入了一种混合事件检测技术,将小波变换与起点/终点检测相结合。接着,我们从骨骼结构、液体摄入声音和液体摄入模式中提取生理特征。我们利用这些生理特征来训练基于三重暹罗网络的深度学习算法,从而对身份验证进行分类。我们将所提出的模型与 DenseNet169、ResNet18 和 VGG16 等先进模型进行了深入比较。在对不同环境中的多个用户进行广泛实验后,SipDeep 的认证准确率达到 96.5%,同时还具有 98.33% 的抗欺骗攻击能力。
{"title":"SipDeep: Swallowing-Based Transparent Authentication via Bone-Conducted In-Ear Acoustics","authors":"Awais Ahmed;Panlong Yang;Adeel Feroz Mirza;Taha Khan;Muhammad Rizwan;Ammar Hawbani;Miao Pan;Zhu Han","doi":"10.1109/TMC.2024.3450919","DOIUrl":"10.1109/TMC.2024.3450919","url":null,"abstract":"The growing use of smart devices requires improving privacy and security. Conventional biometrics confront false positives and unauthorized access, stressing cautious user input. We enhance security by analyzing distinctive human physiological characteristics rather than relying on conventional methods susceptible to spoof attacks. Drinking, a common physiological activity, can provide continuous authentication. \u0000<italic>SipDeep</i>\u0000, proposed innovative system, utilizes bone-conducted liquid intake sound, incorporating unique biometrics from bone and pharyngeal characteristics. The system captures these elements in the external auditory canal, offering a novel transparent authentication applicable to a diverse user range. Our noise filtering system eliminates environmental and anatomical interferences during drinking, including subtle body movements. The study introduces a hybrid event detection technique integrating wavelet transform with start/end points detection. Next, we extract physiological features from bone structure, liquid intake sound, and liquid intake pattern. We used the physiological features to train a deep learning algorithm based on a Triplet-Siamese network to classify authentication. The proposed model has been thoroughly compared with advanced models such as DenseNet169, ResNet18, and VGG16. Following extensive experimentation involving multiple users across various environments, \u0000<italic>SipDeep</i>\u0000 demonstrates 96.5% authentication accuracy, coupled with a 98.33% resistance to spoof attacks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":null,"pages":null},"PeriodicalIF":7.7,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SkyOrbs: A Fast 3-D Directional Neighbor Discovery Algorithm for UAV Networks SkyOrbs:无人机网络的快速三维定向邻居发现算法
IF 7.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1109/tmc.2024.3451991
Yuchen Zhu, Min Liu, Yali Chen, Sheng Sun, Zhongcheng Li
{"title":"SkyOrbs: A Fast 3-D Directional Neighbor Discovery Algorithm for UAV Networks","authors":"Yuchen Zhu, Min Liu, Yali Chen, Sheng Sun, Zhongcheng Li","doi":"10.1109/tmc.2024.3451991","DOIUrl":"https://doi.org/10.1109/tmc.2024.3451991","url":null,"abstract":"","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PrVFL: Pruning-Aware Verifiable Federated Learning for Heterogeneous Edge Computing PrVFL:面向异构边缘计算的剪枝感知可验证联合学习
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1109/TMC.2024.3450542
Xigui Wang;Haiyang Yu;Yuwen Chen;Richard O. Sinnott;Zhen Yang
In the era emphasizing the privacy of personal data, verifiable federated learning has garnered significant attention as a machine learning approach to safeguard user privacy while simultaneously validating aggregated result. However, there are some unresolved issues when deploying verifiable federated learning in edge computing. Due to the constraint resources, edge computing demands cost saving measurements in model training such as model pruning. Unfortunately, there is currently no protocol capable of enabling users to verify pruning results. Therefore, in this paper, we introduce PrVFL, a verifiable federated learning framework that supports model pruning verification and heterogeneous edge computing. In this scheme, we innovatively utilize zero-knowledge range proof protocol to achieve pruning result verification. Additionally, we first propose a heterogeneous delayed verification scheme supporting the validation of aggregated result for pruned heterogeneous edge models. Addressing the prevalent scenario of performance-heterogeneous edge clients, our scheme empowers each edge user to autonomously choose the desired pruning ratio for each training round based on their specific performance. By employing a global residual model, we ensure that every parameter has an opportunity for training. The extensive experimental results demonstrate the practical performance of our proposed scheme.
在强调个人数据隐私的时代,可验证联合学习作为一种既能保护用户隐私又能验证汇总结果的机器学习方法备受关注。然而,在边缘计算中部署可验证的联合学习还存在一些尚未解决的问题。由于资源有限,边缘计算需要在模型训练中采取节约成本的措施,如模型剪枝。遗憾的是,目前还没有一个协议能让用户验证剪枝结果。因此,我们在本文中介绍了支持模型剪枝验证和异构边缘计算的可验证联合学习框架 PrVFL。在该方案中,我们创新性地利用零知识范围证明协议来实现剪枝结果验证。此外,我们首次提出了一种异构延迟验证方案,支持对剪枝后的异构边缘模型的聚合结果进行验证。针对性能异构边缘客户端的普遍情况,我们的方案授权每个边缘用户根据自己的具体性能自主选择每轮训练所需的剪枝比例。通过采用全局残差模型,我们确保每个参数都有机会得到训练。大量的实验结果证明了我们所提方案的实用性能。
{"title":"PrVFL: Pruning-Aware Verifiable Federated Learning for Heterogeneous Edge Computing","authors":"Xigui Wang;Haiyang Yu;Yuwen Chen;Richard O. Sinnott;Zhen Yang","doi":"10.1109/TMC.2024.3450542","DOIUrl":"10.1109/TMC.2024.3450542","url":null,"abstract":"In the era emphasizing the privacy of personal data, verifiable federated learning has garnered significant attention as a machine learning approach to safeguard user privacy while simultaneously validating aggregated result. However, there are some unresolved issues when deploying verifiable federated learning in edge computing. Due to the constraint resources, edge computing demands cost saving measurements in model training such as model pruning. Unfortunately, there is currently no protocol capable of enabling users to verify pruning results. Therefore, in this paper, we introduce PrVFL, a verifiable federated learning framework that supports model pruning verification and heterogeneous edge computing. In this scheme, we innovatively utilize zero-knowledge range proof protocol to achieve pruning result verification. Additionally, we first propose a heterogeneous delayed verification scheme supporting the validation of aggregated result for pruned heterogeneous edge models. Addressing the prevalent scenario of performance-heterogeneous edge clients, our scheme empowers each edge user to autonomously choose the desired pruning ratio for each training round based on their specific performance. By employing a global residual model, we ensure that every parameter has an opportunity for training. The extensive experimental results demonstrate the practical performance of our proposed scheme.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":null,"pages":null},"PeriodicalIF":7.7,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MTPS: A Multi-Task Perceiving and Scheduling Framework Across Multiple Mobile Devices MTPS:跨多种移动设备的多任务感知和调度框架
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1109/TMC.2024.3450577
Wentong Li;Hang Li;Long Yang;Lei Qiao;Liang Shi
The prevalence of cross-device resource sharing enables users to utilize various device resources of the connected mobile devices seamlessly. Since there are often numerous connected mobile devices under the same network, cross-device tasks are often executed concurrently. However, the existing resource sharing schemes suffer from significant performance degradation for the parallel cross-device tasks due to competition for limited system resources (e.g., network and CPU). This paper first analyzes the performance penalty in parallel execution of the cross-device resource sharing tasks. Then, a novel multi-task perceiving and scheduling framework (MTPS) is proposed to guarantee the quality of service of the parallel tasks. The basic idea of MTPS is to first build a master-slave system model to reorganize mobile devices under the same network. Then, MTPS perceives the running cross-device resource sharing tasks and schedules the parallel execution of multiple tasks to avoid mutual interference. Experimental results on real devices show that MTPS can reduce the average completion time of file sharing by 63.5%, and maintain at least 24 frames per second for screen casting at optimal levels in the presence of other tasks.
跨设备资源共享的盛行使用户能够无缝利用所连接移动设备的各种设备资源。由于同一网络下往往有许多已连接的移动设备,因此跨设备任务通常会同时执行。然而,由于对有限系统资源(如网络和 CPU)的竞争,现有的资源共享方案在执行并行跨设备任务时存在明显的性能下降问题。本文首先分析了并行执行跨设备资源共享任务时的性能损失。然后,提出了一种新颖的多任务感知和调度框架(MTPS),以保证并行任务的服务质量。MTPS 的基本思想是首先建立一个主从系统模型,对同一网络下的移动设备进行重组。然后,MTPS 感知运行中的跨设备资源共享任务,并调度多个任务的并行执行,避免相互干扰。在真实设备上的实验结果表明,MTPS 能将文件共享的平均完成时间缩短 63.5%,并能在其他任务存在的情况下,将屏幕投影保持在每秒至少 24 帧的最佳水平。
{"title":"MTPS: A Multi-Task Perceiving and Scheduling Framework Across Multiple Mobile Devices","authors":"Wentong Li;Hang Li;Long Yang;Lei Qiao;Liang Shi","doi":"10.1109/TMC.2024.3450577","DOIUrl":"10.1109/TMC.2024.3450577","url":null,"abstract":"The prevalence of cross-device resource sharing enables users to utilize various device resources of the connected mobile devices seamlessly. Since there are often numerous connected mobile devices under the same network, cross-device tasks are often executed concurrently. However, the existing resource sharing schemes suffer from significant performance degradation for the parallel cross-device tasks due to competition for limited system resources (e.g., network and CPU). This paper first analyzes the performance penalty in parallel execution of the cross-device resource sharing tasks. Then, a novel multi-task perceiving and scheduling framework (MTPS) is proposed to guarantee the quality of service of the parallel tasks. The basic idea of MTPS is to first build a master-slave system model to reorganize mobile devices under the same network. Then, MTPS perceives the running cross-device resource sharing tasks and schedules the parallel execution of multiple tasks to avoid mutual interference. Experimental results on real devices show that MTPS can reduce the average completion time of file sharing by 63.5%, and maintain at least 24 frames per second for screen casting at optimal levels in the presence of other tasks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":null,"pages":null},"PeriodicalIF":7.7,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truthful Auction Mechanisms for Dependent Task Offloading in Vehicular Edge Computing 用于车载边缘计算中依赖性任务卸载的真实拍卖机制
IF 7.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1109/tmc.2024.3450504
Hualing Ren, Kai Liu, Guozhi Yan, Chunhui Liu, Yantao Li, Chuzhao Li, Weiwei Wu
{"title":"Truthful Auction Mechanisms for Dependent Task Offloading in Vehicular Edge Computing","authors":"Hualing Ren, Kai Liu, Guozhi Yan, Chunhui Liu, Yantao Li, Chuzhao Li, Weiwei Wu","doi":"10.1109/tmc.2024.3450504","DOIUrl":"https://doi.org/10.1109/tmc.2024.3450504","url":null,"abstract":"","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Age of Information Based Client Selection for Wireless Federated Learning With Diversified Learning Capabilities 基于信息时代的客户端选择,实现具有多样化学习能力的无线联合学习
IF 7.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1109/tmc.2024.3450549
Liran Dong, Yiqing Zhou, Ling Liu, Yanli Qi, Yu Zhang
{"title":"Age of Information Based Client Selection for Wireless Federated Learning With Diversified Learning Capabilities","authors":"Liran Dong, Yiqing Zhou, Ling Liu, Yanli Qi, Yu Zhang","doi":"10.1109/tmc.2024.3450549","DOIUrl":"https://doi.org/10.1109/tmc.2024.3450549","url":null,"abstract":"","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
${sf NetDPI}$NetDPI: Efficient Deep Packet Inspection via Filtering-Plus-Verification in Programmable 5G Data Plane for Multi-Access Edge Computing NetDPI:在可编程 5G 数据平面中通过过滤加验证实现高效深度包检测,用于多接入边缘计算
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1109/TMC.2024.3450691
Chengjin Zhou;Qiao Xiang;Lingjun Pu;Zheli Liu;Yuan Zhang;Xinjing Yuan;Jingdong Xu
In this paper, we advocate ${sf NetDPI}$, a novel and efficient Deep Packet Inspection (DPI) solution built-in 5G Data Plane for multi-access edge computing, leveraging the unique forwarding while computing capability of emerging programmable switches. As the cornerstone, we propose ${sf FIVE}$, the first Filtering-plus-Verification algorithm tailored to programmable switches to achieve efficient multiple pattern matching (i.e., the core of DPI). Briefly, the filtering phase introduces a multi-window parallel shift-or algorithm to rapidly screen out all the “suspicious” packet payloads. Meanwhile, the verification phase innovates a level-based state encoding scheme for the Aho–Corasick (AC) algorithm, which substantially increases the number of supported patterns and consequently figures out more “guilty” payloads. We implement the prototype of ${sf NetDPI}$ in both software and hardware programmable switches (i.e., BMv2 and Barefoot Tofino2) and make them publicly available. Extensive evaluations indicate that ${sf NetDPI}$ provides orders of magnitude improvement in throughput compared to the typical cloud-delivered DPI solutions, and besides ${sf FIVE}$ greatly reduces the memory consumption compared to the alternative in-network exact match algorithms under a variety of system settings including different DPI pattern sets and malware-packet percentages.
在本文中,我们利用新兴可编程交换机独特的转发和计算能力,提出了${/sf NetDPI}$--一种内置5G数据平面的新型高效深度包检测(DPI)解决方案,用于多接入边缘计算。作为基石,我们提出了${sf FIVE}$,这是首个为可编程交换机量身定制的过滤加验证算法,以实现高效的多重模式匹配(即DPI的核心)。简而言之,过滤阶段引入了多窗口并行移位或算法,以快速筛除所有 "可疑 "数据包有效载荷。同时,验证阶段为阿霍-科拉希克(AC)算法创新了一种基于级别的状态编码方案,大大增加了支持模式的数量,从而找出了更多 "可疑 "的有效载荷。我们在软件和硬件可编程交换机(即 BMv2 和 Barefoot Tofino2)中实现了 ${sf NetDPI}$ 的原型,并将其公开发布。广泛的评估表明,与典型的云DPI解决方案相比,${/sf NetDPI}$的吞吐量提高了几个数量级,此外,在各种系统设置(包括不同的DPI模式集和恶意软件包百分比)下,与其他网内精确匹配算法相比,${/sf FIVE}$大大降低了内存消耗。
{"title":"${sf NetDPI}$NetDPI: Efficient Deep Packet Inspection via Filtering-Plus-Verification in Programmable 5G Data Plane for Multi-Access Edge Computing","authors":"Chengjin Zhou;Qiao Xiang;Lingjun Pu;Zheli Liu;Yuan Zhang;Xinjing Yuan;Jingdong Xu","doi":"10.1109/TMC.2024.3450691","DOIUrl":"10.1109/TMC.2024.3450691","url":null,"abstract":"In this paper, we advocate \u0000<inline-formula><tex-math>${sf NetDPI}$</tex-math></inline-formula>\u0000, a novel and efficient Deep Packet Inspection (DPI) solution built-in 5G Data Plane for multi-access edge computing, leveraging the unique forwarding while computing capability of emerging programmable switches. As the cornerstone, we propose \u0000<inline-formula><tex-math>${sf FIVE}$</tex-math></inline-formula>\u0000, the first \u0000<u>Fi</u>\u0000ltering-plus-\u0000<u>Ve</u>\u0000rification algorithm tailored to programmable switches to achieve efficient multiple pattern matching (i.e., the core of DPI). Briefly, the filtering phase introduces a multi-window parallel shift-or algorithm to rapidly screen out all the “suspicious” packet payloads. Meanwhile, the verification phase innovates a level-based state encoding scheme for the Aho–Corasick (AC) algorithm, which substantially increases the number of supported patterns and consequently figures out more “guilty” payloads. We implement the prototype of \u0000<inline-formula><tex-math>${sf NetDPI}$</tex-math></inline-formula>\u0000 in both software and hardware programmable switches (i.e., BMv2 and Barefoot Tofino2) and make them publicly available. Extensive evaluations indicate that \u0000<inline-formula><tex-math>${sf NetDPI}$</tex-math></inline-formula>\u0000 provides orders of magnitude improvement in throughput compared to the typical cloud-delivered DPI solutions, and besides \u0000<inline-formula><tex-math>${sf FIVE}$</tex-math></inline-formula>\u0000 greatly reduces the memory consumption compared to the alternative in-network exact match algorithms under a variety of system settings including different DPI pattern sets and malware-packet percentages.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":null,"pages":null},"PeriodicalIF":7.7,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Modal Generative Semantic Communications for Mobile AIGC: Joint Semantic Encoding and Prompt Engineering 移动 AIGC 的跨模态生成式语义通信:联合语义编码与提示工程
IF 7.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1109/tmc.2024.3449645
Yinqiu Liu, Hongyang Du, Dusit Niyato, Jiawen Kang, Zehui Xiong, Shiwen Mao, Ping Zhang, Xuemin Shen
{"title":"Cross-Modal Generative Semantic Communications for Mobile AIGC: Joint Semantic Encoding and Prompt Engineering","authors":"Yinqiu Liu, Hongyang Du, Dusit Niyato, Jiawen Kang, Zehui Xiong, Shiwen Mao, Ping Zhang, Xuemin Shen","doi":"10.1109/tmc.2024.3449645","DOIUrl":"https://doi.org/10.1109/tmc.2024.3449645","url":null,"abstract":"","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum-Inspired Robust Networking Model With Multiverse Co-Evolution for Scale-Free IoT 量子启发的鲁棒网络模型与多重宇宙共同演化,适用于无规模物联网
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1109/TMC.2024.3439511
Songwei Zhang;Xiaobo Zhou;Tie Qiu;Dapeng Oliver Wu
The robustness of scale-free Internet of Things (IoT) topology is seriously affected by malicious attacks. Improving the tolerance to node failures is critical to the stability of IoT systems. Heuristic algorithms, especially genetic algorithms, enhance the stability of network topology through the evolution of population chromosomes. However, the loss of genetic diversity makes the optimization easily fall into local optimum. Although the problem can be alleviated by adjusting population size and genetic probability, the genetic diversity is still not guaranteed in the limited number of iterations. Inspired by the quantum superposition that simultaneously operates on an exponential number of states, we propose a quantum-inspired robust networking model with multiverse co-evolution for the scale-free IoT (Q-Robust). This model designs quantum chromosomes with double-chain structures to represent the connections between all nodes. Then we present the quantum measurement method of quantum chromosomes based on the degree distribution of nodes. Furthermore, this model constructs a primary-secondary quantum multiverse co-evolution mechanism to improve the convergence efficiency of topology evolution. The experimental results show that the topology robustness optimized by Q-Robust is about 60% and 10% higher than the initial topology and the state-of-the-art topology evolution algorithm, respectively.
无标度物联网(IoT)拓扑结构的稳健性受到恶意攻击的严重影响。提高对节点故障的容忍度对物联网系统的稳定性至关重要。启发式算法,尤其是遗传算法,可以通过群体染色体的进化提高网络拓扑结构的稳定性。然而,遗传多样性的丧失使优化很容易陷入局部最优。虽然可以通过调整种群规模和遗传概率来缓解这一问题,但在有限的迭代次数中,遗传多样性仍无法得到保证。量子叠加可同时作用于指数级数量的状态,受此启发,我们提出了一种量子启发的无标度物联网多宇宙协同进化鲁棒网络模型(Q-Robust)。该模型设计了具有双链结构的量子染色体来表示所有节点之间的连接。然后,我们提出了基于节点度分布的量子染色体量子测量方法。此外,该模型还构建了主次量子多重宇宙协同演化机制,以提高拓扑演化的收敛效率。实验结果表明,Q-Robust 优化的拓扑鲁棒性比初始拓扑和最先进的拓扑演化算法分别高出约 60% 和 10%。
{"title":"Quantum-Inspired Robust Networking Model With Multiverse Co-Evolution for Scale-Free IoT","authors":"Songwei Zhang;Xiaobo Zhou;Tie Qiu;Dapeng Oliver Wu","doi":"10.1109/TMC.2024.3439511","DOIUrl":"10.1109/TMC.2024.3439511","url":null,"abstract":"The robustness of scale-free Internet of Things (IoT) topology is seriously affected by malicious attacks. Improving the tolerance to node failures is critical to the stability of IoT systems. Heuristic algorithms, especially genetic algorithms, enhance the stability of network topology through the evolution of population chromosomes. However, the loss of genetic diversity makes the optimization easily fall into local optimum. Although the problem can be alleviated by adjusting population size and genetic probability, the genetic diversity is still not guaranteed in the limited number of iterations. Inspired by the quantum superposition that simultaneously operates on an exponential number of states, we propose a quantum-inspired robust networking model with multiverse co-evolution for the scale-free IoT (Q-Robust). This model designs quantum chromosomes with double-chain structures to represent the connections between all nodes. Then we present the quantum measurement method of quantum chromosomes based on the degree distribution of nodes. Furthermore, this model constructs a primary-secondary quantum multiverse co-evolution mechanism to improve the convergence efficiency of topology evolution. The experimental results show that the topology robustness optimized by Q-Robust is about 60% and 10% higher than the initial topology and the state-of-the-art topology evolution algorithm, respectively.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":null,"pages":null},"PeriodicalIF":7.7,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AoI-Aware Service Provisioning in Edge Computing for Digital Twin Network Slicing Requests 面向数字孪生网络切片请求的边缘计算中的 AoI 感知服务供应
IF 7.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1109/tmc.2024.3449818
Jing Li, Song Guo, Weifa Liang, Jianping Wang, Quan Chen, Zicong Hong, Zichuan Xu, Wenzheng Xu, Bin Xiao
{"title":"AoI-Aware Service Provisioning in Edge Computing for Digital Twin Network Slicing Requests","authors":"Jing Li, Song Guo, Weifa Liang, Jianping Wang, Quan Chen, Zicong Hong, Zichuan Xu, Wenzheng Xu, Bin Xiao","doi":"10.1109/tmc.2024.3449818","DOIUrl":"https://doi.org/10.1109/tmc.2024.3449818","url":null,"abstract":"","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1