首页 > 最新文献

Chinese Journal of Electronics最新文献

英文 中文
Variational Dropout for Differentiable Neural Architecture Search 可微神经结构搜索的变分Dropout
IF 3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-01 DOI: 10.23919/cje.2024.00.183
Yaoming Wang;Yuchen Liu;Wenrui Dai;Chenglin Li;Xiaopeng Zhang;Junni Zou;Hongkai Xiong
Differentiable neural architecture search (NAS) greatly accelerates the architecture search while re-taining enough search space. However, existing differentiable NAS is vague in distinguishing candidate operations using the relative magnitude of architectural parameters and suffers from instability and low performance. In this paper, we propose a novel probabilistic framework for differentiable NAS, named variational dropout for neural architecture search (VDNAS), that leverages variational dropout to achieve reformulated super-net sparsification for differentiable NAS. We propose a hierarchical structure to simultaneously enable operation sampling and explicit topology optimization via variational dropout. Specifically, for operation sampling, we develop semi-implicit variational dropout to enable selection of multiple operations and suppress the over-selection of skip-connect operation. We introduce embedded sigmoid relaxation to alleviate the biased gradient estimation in semi-implicit variational dropout to ensure the stability in sampling of architectures and optimization of architectural parameters. Furthermore, we design operation reparameterization to aggregate multiple sampling operations on the same edge to improve the shallow and wide architectures induced by multiple-operation sampling and enhance the transferring ability to large-scale datasets. Experimental results demonstrate that the proposed approaches achieve state-of-the-art performance with top-1 error rates of 2.45% and 15.76% on CIFAR-10/100. Remarkably, when transferred to ImageNet, the proposed approaches searched on CIFAR-10 outperform existing methods searched directly on ImageNet with only 10% of the search cost.
可微神经结构搜索(NAS)在保留足够搜索空间的同时,极大地加快了结构搜索速度。然而,现有的可微分NAS在使用体系结构参数的相对大小来区分候选操作方面是模糊的,并且存在不稳定和低性能的问题。在本文中,我们提出了一个新的可微NAS的概率框架,称为神经结构搜索的变分dropout (VDNAS),它利用变分dropout来实现可微NAS的重新制定的超级网络稀疏化。我们提出了一种分层结构,可以同时实现操作采样和通过变分dropout显式拓扑优化。具体而言,对于操作采样,我们开发了半隐式变分dropout,以实现多个操作的选择,并抑制跳过连接操作的过度选择。我们引入嵌入s型松弛来缓解半隐变分dropout中梯度估计的偏置,以保证结构采样的稳定性和结构参数的优化。此外,我们设计了操作重参数化,在同一边缘聚合多个采样操作,以改善多操作采样引起的浅和宽架构,增强对大规模数据集的传输能力。实验结果表明,该方法在CIFAR-10/100上的前1错误率分别为2.45%和15.76%,达到了最先进的性能。值得注意的是,当转移到ImageNet时,在CIFAR-10上搜索的方法仅以10%的搜索成本优于直接在ImageNet上搜索的现有方法。
{"title":"Variational Dropout for Differentiable Neural Architecture Search","authors":"Yaoming Wang;Yuchen Liu;Wenrui Dai;Chenglin Li;Xiaopeng Zhang;Junni Zou;Hongkai Xiong","doi":"10.23919/cje.2024.00.183","DOIUrl":"https://doi.org/10.23919/cje.2024.00.183","url":null,"abstract":"Differentiable neural architecture search (NAS) greatly accelerates the architecture search while re-taining enough search space. However, existing differentiable NAS is vague in distinguishing candidate operations using the relative magnitude of architectural parameters and suffers from instability and low performance. In this paper, we propose a novel probabilistic framework for differentiable NAS, named variational dropout for neural architecture search (VDNAS), that leverages variational dropout to achieve reformulated super-net sparsification for differentiable NAS. We propose a hierarchical structure to simultaneously enable operation sampling and explicit topology optimization via variational dropout. Specifically, for operation sampling, we develop semi-implicit variational dropout to enable selection of multiple operations and suppress the over-selection of skip-connect operation. We introduce embedded sigmoid relaxation to alleviate the biased gradient estimation in semi-implicit variational dropout to ensure the stability in sampling of architectures and optimization of architectural parameters. Furthermore, we design operation reparameterization to aggregate multiple sampling operations on the same edge to improve the shallow and wide architectures induced by multiple-operation sampling and enhance the transferring ability to large-scale datasets. Experimental results demonstrate that the proposed approaches achieve state-of-the-art performance with top-1 error rates of 2.45% and 15.76% on CIFAR-10/100. Remarkably, when transferred to ImageNet, the proposed approaches searched on CIFAR-10 outperform existing methods searched directly on ImageNet with only 10% of the search cost.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 4","pages":"1247-1264"},"PeriodicalIF":3.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11151177","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144990312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Parallel Multi-Demonstrations Generative Adversarial Imitation Learning Approach on UAV Target Tracking Decision 无人机目标跟踪决策的并行多演示生成对抗模仿学习方法
IF 3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-01 DOI: 10.23919/cje.2024.00.082
Haohui Zhang;Bo Li;Jingyi Huang;Chao Song;Pingkuan He;Evgeny Neretin
Aiming at the problems of autonomous decision-making and local convergence that occur in traditional reinforcement learning in the unmanned aerial vehicle (UAV) target tracking, this paper proposes a parallel multi-demonstrations generative adversarial imitation reinforcement learning algorithm to achieve control of UAVs and allow them quickly track the target. First, we classify different expert demonstrations according to different tasks to maximize the model to learn all expert experience. In addition, we develop a parallel multi-demonstrations training framework based on generative adversarial imitation learning, and design strategy update methods for different types of generators, which ensures the generalization ability of imitation learning while improving training efficiency. Finally, we integrate deep reinforcement learning with imitation learning. During the initial training phase, our focus lies in imitation learning while periodically transferring expert knowledge to the pool of reinforcement learning experiences. In the later stages, we increase the proportion of reinforcement learning training and achieve effective UAV target tracking through fine-tuning the weights obtained from reinforcement learning. Experimental results demonstrate that compared to existing reinforcement learning algorithms, our algorithm effectively mitigates issues such as local convergence and completes training in a shorter time frame, ensuring stable target tracking by UAVs.
针对传统强化学习在无人机目标跟踪中存在的自主决策和局部收敛问题,提出了一种并行多演示生成对抗模仿强化学习算法,以实现对无人机的控制并使其快速跟踪目标。首先,我们根据不同的任务对不同的专家演示进行分类,使模型最大限度地学习所有专家的经验。此外,我们开发了一种基于生成对抗模仿学习的并行多演示训练框架,并设计了针对不同类型生成器的策略更新方法,在保证模仿学习泛化能力的同时提高了训练效率。最后,我们将深度强化学习与模仿学习相结合。在初始训练阶段,我们的重点是模仿学习,同时定期将专家知识转移到强化学习经验库中。在后期,我们增加强化学习训练的比例,并通过微调强化学习得到的权值来实现有效的无人机目标跟踪。实验结果表明,与现有的强化学习算法相比,我们的算法有效地缓解了局部收敛等问题,并在更短的时间内完成训练,保证了无人机对目标的稳定跟踪。
{"title":"A Parallel Multi-Demonstrations Generative Adversarial Imitation Learning Approach on UAV Target Tracking Decision","authors":"Haohui Zhang;Bo Li;Jingyi Huang;Chao Song;Pingkuan He;Evgeny Neretin","doi":"10.23919/cje.2024.00.082","DOIUrl":"https://doi.org/10.23919/cje.2024.00.082","url":null,"abstract":"Aiming at the problems of autonomous decision-making and local convergence that occur in traditional reinforcement learning in the unmanned aerial vehicle (UAV) target tracking, this paper proposes a parallel multi-demonstrations generative adversarial imitation reinforcement learning algorithm to achieve control of UAVs and allow them quickly track the target. First, we classify different expert demonstrations according to different tasks to maximize the model to learn all expert experience. In addition, we develop a parallel multi-demonstrations training framework based on generative adversarial imitation learning, and design strategy update methods for different types of generators, which ensures the generalization ability of imitation learning while improving training efficiency. Finally, we integrate deep reinforcement learning with imitation learning. During the initial training phase, our focus lies in imitation learning while periodically transferring expert knowledge to the pool of reinforcement learning experiences. In the later stages, we increase the proportion of reinforcement learning training and achieve effective UAV target tracking through fine-tuning the weights obtained from reinforcement learning. Experimental results demonstrate that compared to existing reinforcement learning algorithms, our algorithm effectively mitigates issues such as local convergence and completes training in a shorter time frame, ensuring stable target tracking by UAVs.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 4","pages":"1185-1198"},"PeriodicalIF":3.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11151173","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144990198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-Decoupling and Multi-Level Feature Integration for Cross-Age Face Recognition 跨年龄人脸识别的双解耦与多层次特征集成
IF 3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-01 DOI: 10.23919/cje.2024.00.260
Wentao Duan;Min Zhi;Ping Ping;Yuening Zhang;Xuanhao Qi;Wei Hu;Zhe Lian
Efficient decoupling of rich facial features is crucial in the realm of cross-age face recognition. A novel strategy for cross-age facial recognition is proposed, focusing on the dual decoupling of multilevel features to optimize the extraction and processing of identity-related features. The method begins with multilevel feature extraction on facial images through convolutional neural networks, acquiring a series of low-dimensional and high-dimensional hybrid features, which are then effectively integrated. Subsequently, these fused features are introduced into both linear and nonlinear decomposition units. Under the supervision of multitask training, features related to individual identities are decoupled. Finally, the extracted identity features are utilized to perform cross-age facial recognition tasks. When evaluated on multiple standard cross-age facial recognition datasets and standard universal facial recognition datasets, the method demonstrates high accuracy, highlighting its significant advantages in effectiveness and generalizability.
在跨年龄人脸识别领域,丰富面部特征的有效解耦是至关重要的。提出了一种新的跨年龄人脸识别策略,重点关注多层次特征的双重解耦,以优化身份相关特征的提取和处理。该方法首先通过卷积神经网络对人脸图像进行多层特征提取,获取一系列低维和高维混合特征,并将其有效整合。随后,将这些融合特征引入线性和非线性分解单元。在多任务训练的监督下,与个体身份相关的特征解耦。最后,利用提取的身份特征执行跨年龄人脸识别任务。在多个标准跨年龄人脸识别数据集和标准通用人脸识别数据集上进行了评估,结果表明该方法具有较高的准确率,在有效性和可泛化性方面具有显著优势。
{"title":"Dual-Decoupling and Multi-Level Feature Integration for Cross-Age Face Recognition","authors":"Wentao Duan;Min Zhi;Ping Ping;Yuening Zhang;Xuanhao Qi;Wei Hu;Zhe Lian","doi":"10.23919/cje.2024.00.260","DOIUrl":"https://doi.org/10.23919/cje.2024.00.260","url":null,"abstract":"Efficient decoupling of rich facial features is crucial in the realm of cross-age face recognition. A novel strategy for cross-age facial recognition is proposed, focusing on the dual decoupling of multilevel features to optimize the extraction and processing of identity-related features. The method begins with multilevel feature extraction on facial images through convolutional neural networks, acquiring a series of low-dimensional and high-dimensional hybrid features, which are then effectively integrated. Subsequently, these fused features are introduced into both linear and nonlinear decomposition units. Under the supervision of multitask training, features related to individual identities are decoupled. Finally, the extracted identity features are utilized to perform cross-age facial recognition tasks. When evaluated on multiple standard cross-age facial recognition datasets and standard universal facial recognition datasets, the method demonstrates high accuracy, highlighting its significant advantages in effectiveness and generalizability.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 4","pages":"1321-1330"},"PeriodicalIF":3.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11151250","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144990279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Industrial Deterministic Computation and Networking Resource Scheduling via Deep Reinforcement Learning 基于深度强化学习的工业确定性计算和网络资源调度
IF 3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-01 DOI: 10.23919/cje.2024.00.014
Bosong Huang;Weiting Zhang;Ruibin Guo;Nian Tang;Wenhao Ye;Jian Jin
In this paper, a dueling double deep Q network (D3QN)-based resource scheduling algorithm is proposed for industrial Internet of things (IoT) to achieve the flexible adaptation of network resources. In the considered network scenario, the time-sensitive networking (TSN)-fifth generation (TSN-5G) network architecture, primarily composed of TSN switches and 5G base stations, is designed accordingly. Simulation results show that when network resources are limited, the D3QN-based resource scheduling algorithm can significantly improve the efficiency of task allocation, making it an ideal solution for reducing latency and optimizing resource utilization in industrial IoT.
本文提出了一种基于双深Q网络(D3QN)的工业物联网资源调度算法,以实现网络资源的灵活适配。在考虑的网络场景中,设计了以TSN交换机和5G基站为主要组成部分的TSN-5G网络架构。仿真结果表明,在网络资源有限的情况下,基于d3qn的资源调度算法可以显著提高任务分配效率,是工业物联网中降低时延、优化资源利用的理想解决方案。
{"title":"Industrial Deterministic Computation and Networking Resource Scheduling via Deep Reinforcement Learning","authors":"Bosong Huang;Weiting Zhang;Ruibin Guo;Nian Tang;Wenhao Ye;Jian Jin","doi":"10.23919/cje.2024.00.014","DOIUrl":"https://doi.org/10.23919/cje.2024.00.014","url":null,"abstract":"In this paper, a dueling double deep Q network (D3QN)-based resource scheduling algorithm is proposed for industrial Internet of things (IoT) to achieve the flexible adaptation of network resources. In the considered network scenario, the time-sensitive networking (TSN)-fifth generation (TSN-5G) network architecture, primarily composed of TSN switches and 5G base stations, is designed accordingly. Simulation results show that when network resources are limited, the D3QN-based resource scheduling algorithm can significantly improve the efficiency of task allocation, making it an ideal solution for reducing latency and optimizing resource utilization in industrial IoT.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 4","pages":"1275-1283"},"PeriodicalIF":3.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11151185","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144990096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Deterministic Secure Semi-Quantum Communication Based on GHZ-State Entanglement Compression Technology 基于ghz态纠缠压缩技术的新型确定性安全半量子通信
IF 3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-01 DOI: 10.23919/cje.2024.00.256
Xiao-Xue Zhang;Ri-Gui Zhou;Wen-Shan Xu
Semi-quantum communication, serving as transitional technology between quantum communication and classical communication, bridges fully quantum-capable users with “classical” users who have limited quantum capabilities. It provides practical solution for application scenarios that struggle to bear high costs of quantum resources. This paper designs a novel deterministic secure semi-quantum communication protocol that significantly enhances communication efficiency by utilizing Greenberger-Horne-Zeilinger (GHZ) states for entanglement compression. The protocol consists of two core components: eavesdropping detection mechanism and transmission process for compressed and encrypted information sequences. During the eavesdropping detection phase, the protocol incorporates decoy photon technology to effectively expose and prevent potential eavesdropping attempts. In the secret information transmission phase, the protocol combines the advantages of a pseudo-random number generator driven by one-way hash function and GHZ-state-based entanglement compression technology to randomly rearrange and compress-encrypt the secret information, ensuring its high security and integrity during transmission. Ultimately, the receiver can accurately decrypt and restore the original secret information using a pre-agreed key. The protocol not only successfully integrates multiple advanced technologies to resist various attacks and ensure the absolute secure transmission of secret information, but also provides strong support for practical applications with its communication efficiency of up to 50% and high practicality.
半量子通信作为量子通信与经典通信之间的过渡技术,将完全具有量子能力的用户与量子能力有限的“经典”用户连接起来。它为难以承受高量子资源成本的应用场景提供了实用的解决方案。本文设计了一种新的确定性安全半量子通信协议,利用GHZ态进行纠缠压缩,显著提高了通信效率。该协议由两个核心部分组成:窃听检测机制和压缩加密信息序列的传输过程。在窃听检测阶段,该协议采用诱饵光子技术,有效地暴露和防止潜在的窃听企图。在保密信息传输阶段,该协议结合了单向哈希函数驱动的伪随机数生成器和基于ghz状态的纠缠压缩技术的优点,对保密信息进行随机重排和压缩加密,保证了保密信息在传输过程中的高安全性和完整性。最终,接收方可以使用预先商定的密钥准确地解密和恢复原始秘密信息。该协议不仅成功地集成了多种先进技术,抵御了各种攻击,保证了保密信息的绝对安全传输,而且通信效率高达50%,实用性高,为实际应用提供了强有力的支持。
{"title":"Novel Deterministic Secure Semi-Quantum Communication Based on GHZ-State Entanglement Compression Technology","authors":"Xiao-Xue Zhang;Ri-Gui Zhou;Wen-Shan Xu","doi":"10.23919/cje.2024.00.256","DOIUrl":"https://doi.org/10.23919/cje.2024.00.256","url":null,"abstract":"Semi-quantum communication, serving as transitional technology between quantum communication and classical communication, bridges fully quantum-capable users with “classical” users who have limited quantum capabilities. It provides practical solution for application scenarios that struggle to bear high costs of quantum resources. This paper designs a novel deterministic secure semi-quantum communication protocol that significantly enhances communication efficiency by utilizing Greenberger-Horne-Zeilinger (GHZ) states for entanglement compression. The protocol consists of two core components: eavesdropping detection mechanism and transmission process for compressed and encrypted information sequences. During the eavesdropping detection phase, the protocol incorporates decoy photon technology to effectively expose and prevent potential eavesdropping attempts. In the secret information transmission phase, the protocol combines the advantages of a pseudo-random number generator driven by one-way hash function and GHZ-state-based entanglement compression technology to randomly rearrange and compress-encrypt the secret information, ensuring its high security and integrity during transmission. Ultimately, the receiver can accurately decrypt and restore the original secret information using a pre-agreed key. The protocol not only successfully integrates multiple advanced technologies to resist various attacks and ensure the absolute secure transmission of secret information, but also provides strong support for practical applications with its communication efficiency of up to 50% and high practicality.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 4","pages":"1172-1184"},"PeriodicalIF":3.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11151174","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144990043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design, Realization, and Evaluation of FastDIM to Prevent Memory Corruption Attacks FastDIM防止内存损坏攻击的设计、实现和评估
IF 3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-01 DOI: 10.23919/cje.2024.00.218
Jian Huang;Yanbo Li;Hao Han
Software vulnerabilities, particularly memory corruption, are significant sources of security breaches. Traditional security measures like data-execution prevention, address space layout randomization, control-flow integrity, code-pointer integrity/separation, and data-flow integrity provide insufficient protection or lead to considerable performance degradation. This research introduces, develops, and scrutinizes FastDIM, a novel approach designed to safeguarding user applications from memory corruption threats. FastDIM encompasses an low-level virtual machine (LLVM) instrumentation mechanism and a distinct memory monitoring module. This system modifies applications in user space into a more secure variant, proactively reporting vital memory operations to a memory monitoring component within the kernel to ensure data integrity. Distinctive features of FastDIM compared to prior methodologies are twofold: FastDIM's integrated out-of-band monitoring system that secures both control-flow and non-control data within program memory, and the creation of a dedicated shared memory space to enhance monitoring efficiency. Testing a prototype of FastDIM with a broad spectrum of real-life applications and standard benchmarks indicates that FastDIM's runtime overhead is acceptable, at 4.4% for the SPEC CPU 2017 benchmarks, while providing the defense against memory corruption attacks.
软件漏洞,特别是内存损坏,是安全漏洞的重要来源。传统的安全措施,如数据执行预防、地址空间布局随机化、控制流完整性、代码指针完整性/分离和数据流完整性,不能提供足够的保护或导致相当大的性能下降。本研究介绍、开发并详细分析了FastDIM,这是一种旨在保护用户应用程序免受内存损坏威胁的新方法。FastDIM包含一个低级虚拟机(LLVM)检测机制和一个独特的内存监视模块。该系统将用户空间中的应用程序修改为更安全的变体,主动向内核中的内存监视组件报告重要的内存操作,以确保数据完整性。与之前的方法相比,FastDIM的独特之处在于两个方面:FastDIM的集成带外监控系统,可以在程序内存中保护控制流和非控制数据,并创建专用共享内存空间,以提高监控效率。在广泛的实际应用程序和标准基准测试中测试FastDIM的原型表明,FastDIM的运行时开销是可以接受的,在SPEC CPU 2017基准测试中为4.4%,同时提供对内存损坏攻击的防御。
{"title":"Design, Realization, and Evaluation of FastDIM to Prevent Memory Corruption Attacks","authors":"Jian Huang;Yanbo Li;Hao Han","doi":"10.23919/cje.2024.00.218","DOIUrl":"https://doi.org/10.23919/cje.2024.00.218","url":null,"abstract":"Software vulnerabilities, particularly memory corruption, are significant sources of security breaches. Traditional security measures like data-execution prevention, address space layout randomization, control-flow integrity, code-pointer integrity/separation, and data-flow integrity provide insufficient protection or lead to considerable performance degradation. This research introduces, develops, and scrutinizes FastDIM, a novel approach designed to safeguarding user applications from memory corruption threats. FastDIM encompasses an low-level virtual machine (LLVM) instrumentation mechanism and a distinct memory monitoring module. This system modifies applications in user space into a more secure variant, proactively reporting vital memory operations to a memory monitoring component within the kernel to ensure data integrity. Distinctive features of FastDIM compared to prior methodologies are twofold: FastDIM's integrated out-of-band monitoring system that secures both control-flow and non-control data within program memory, and the creation of a dedicated shared memory space to enhance monitoring efficiency. Testing a prototype of FastDIM with a broad spectrum of real-life applications and standard benchmarks indicates that FastDIM's runtime overhead is acceptable, at 4.4% for the SPEC CPU 2017 benchmarks, while providing the defense against memory corruption attacks.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 4","pages":"1233-1246"},"PeriodicalIF":3.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11151235","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144990196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Beam Reconfigurable Bidirectional Reflection/Transmission Array Antenna 波束可重构双向反射/传输阵列天线
IF 3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-01 DOI: 10.23919/cje.2024.00.150
Chi Zhang;Zehua Wang;Dongyang Lu;Qian Lu;Yongji Du;Ruozhou Li;Jing Yan;Ying Yu
In this paper, we propose a 1-bit reconfigurable bidirectional transmission/reflection array (TRA) antenna. The TRA adopts a two-layer compact unit structure to achieve transmission and reflection modes simultaneously. Two PIN diodes have been applied to the unit to complement 1-bit quantification for beam scanning. Then a reconfigurable array antenna composed of 14 × 14 elements is designed, manufactured, and measured at 9.2 GHz. The peak gain of transmission and reflection reaches 17.41 dBi and 16.74 dBi, respectively, when the beam scans within the range of ±60°. The aperture efficiency of 10.57% in transmission and 9.06% in reflection have been attained. Based on this, a 1-bit reconfigurable bidirectional dual-beam TRA has been attempted with the same unit. The phase synthesis method is utilized in dual-beam TRA design. The transmission and reflection peak gains for symmetrical dual-beam of equal amplitude reach 13.64 dBi and 12.63 dBi, respectively, with a scanning angle of ±10°, and 13.86 dBi and 13.01 dBi when the scanning angle is ±20°. The results demonstrate that the above designs have potential applications in communication and multi-target radar systems.
在本文中,我们提出了一种1位可重构双向传输/反射阵列(TRA)天线。TRA采用两层紧凑单元结构,同时实现透射和反射模式。两个PIN二极管已应用于该单元,以补充1位量化波束扫描。然后设计、制造了一个由14 × 14单元组成的可重构阵列天线,并在9.2 GHz频率下进行了测量。在±60°扫描范围内,透射和反射的峰值增益分别达到17.41 dBi和16.74 dBi。透射孔径效率为10.57%,反射孔径效率为9.06%。在此基础上,尝试了一种1位可重构双向双波束TRA。在双光束TRA设计中采用相位合成方法。等幅对称双波束在扫描角为±10°时的透射峰和反射峰增益分别为13.64 dBi和12.63 dBi,扫描角为±20°时的透射峰和反射峰增益分别为13.86 dBi和13.01 dBi。结果表明,上述设计在通信和多目标雷达系统中具有潜在的应用前景。
{"title":"A Beam Reconfigurable Bidirectional Reflection/Transmission Array Antenna","authors":"Chi Zhang;Zehua Wang;Dongyang Lu;Qian Lu;Yongji Du;Ruozhou Li;Jing Yan;Ying Yu","doi":"10.23919/cje.2024.00.150","DOIUrl":"https://doi.org/10.23919/cje.2024.00.150","url":null,"abstract":"In this paper, we propose a 1-bit reconfigurable bidirectional transmission/reflection array (TRA) antenna. The TRA adopts a two-layer compact unit structure to achieve transmission and reflection modes simultaneously. Two PIN diodes have been applied to the unit to complement 1-bit quantification for beam scanning. Then a reconfigurable array antenna composed of 14 × 14 elements is designed, manufactured, and measured at 9.2 GHz. The peak gain of transmission and reflection reaches 17.41 dBi and 16.74 dBi, respectively, when the beam scans within the range of ±60°. The aperture efficiency of 10.57% in transmission and 9.06% in reflection have been attained. Based on this, a 1-bit reconfigurable bidirectional dual-beam TRA has been attempted with the same unit. The phase synthesis method is utilized in dual-beam TRA design. The transmission and reflection peak gains for symmetrical dual-beam of equal amplitude reach 13.64 dBi and 12.63 dBi, respectively, with a scanning angle of ±10°, and 13.86 dBi and 13.01 dBi when the scanning angle is ±20°. The results demonstrate that the above designs have potential applications in communication and multi-target radar systems.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 4","pages":"1100-1110"},"PeriodicalIF":3.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11151184","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144990314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Robust Adaptive Bitrate Algorithms with Adversarial Inverse Reinforcement Learning 基于对抗逆强化学习的鲁棒自适应比特率算法
IF 3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-01 DOI: 10.23919/cje.2024.00.202
Ling Yi;Yongbin Qin
Adaptive bitrate (ABR) algorithms are crucial for video streaming services by dynamically adjusting video bitrate based on current network conditions to ensure better quality of experience (QoE). However, traditional ABR algorithms often face challenges in adapting to diverse network environments and fail to fully utilize expert knowledge. In this study, we propose a novel approach using adversarial inverse reinforcement learning (AIRL) to learn ABR algorithms. Unlike traditional methods, AIRL can effectively leverage expert demonstrations to learn robust reward functions and generate stable ABR policies. Simultaneously, the learned ABR policy adjusts based on the updated reward function, aiming to closely emulate the video bitrate decision-making behavior of experts. Moreover, by decoupling the reward function, we can develop a more robust ABR strategy that can effectively adapt video bitrates to significant fluctuations in network conditions, while also optimizing different video QoE objectives. We conducted experiments across various network conditions, demonstrating that the proposed method exhibits stable and superior performance.
自适应比特率(ABR)算法是视频流媒体服务的关键,它可以根据当前网络条件动态调整视频比特率,以确保更好的体验质量(QoE)。然而,传统的ABR算法在适应多样化的网络环境时往往面临挑战,不能充分利用专家知识。在这项研究中,我们提出了一种使用对抗逆强化学习(AIRL)来学习ABR算法的新方法。与传统方法不同,AIRL可以有效地利用专家演示来学习鲁棒奖励函数并生成稳定的ABR策略。同时,学习到的ABR策略根据更新的奖励函数进行调整,旨在密切模仿专家的视频比特率决策行为。此外,通过解耦奖励函数,我们可以开发出更稳健的ABR策略,该策略可以有效地使视频比特率适应网络条件下的显著波动,同时还可以优化不同的视频QoE目标。我们在各种网络条件下进行了实验,证明了所提出的方法具有稳定和优越的性能。
{"title":"Learning Robust Adaptive Bitrate Algorithms with Adversarial Inverse Reinforcement Learning","authors":"Ling Yi;Yongbin Qin","doi":"10.23919/cje.2024.00.202","DOIUrl":"https://doi.org/10.23919/cje.2024.00.202","url":null,"abstract":"Adaptive bitrate (ABR) algorithms are crucial for video streaming services by dynamically adjusting video bitrate based on current network conditions to ensure better quality of experience (QoE). However, traditional ABR algorithms often face challenges in adapting to diverse network environments and fail to fully utilize expert knowledge. In this study, we propose a novel approach using adversarial inverse reinforcement learning (AIRL) to learn ABR algorithms. Unlike traditional methods, AIRL can effectively leverage expert demonstrations to learn robust reward functions and generate stable ABR policies. Simultaneously, the learned ABR policy adjusts based on the updated reward function, aiming to closely emulate the video bitrate decision-making behavior of experts. Moreover, by decoupling the reward function, we can develop a more robust ABR strategy that can effectively adapt video bitrates to significant fluctuations in network conditions, while also optimizing different video QoE objectives. We conducted experiments across various network conditions, demonstrating that the proposed method exhibits stable and superior performance.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 4","pages":"1309-1320"},"PeriodicalIF":3.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11151225","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144990280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GPU-Accelerated MEDO Algorithm with Differential Grouping (DG-GMEDO) for High-Dimensional Electromagnetic Optimization Problems 求解高维电磁优化问题的gpu加速差分分组MEDO算法(DG-GMEDO
IF 3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-01 DOI: 10.23919/cje.2024.00.228
Xin Zhang;Haoyang Zhang;Ruizhe Yang;Lilin Li;Donglin Su
High-dimensional electromagnetic optimization problems, such as array antenna design, pose significant challenges due to their complexity and high dimensionality. The Maxwell's equations derived optimization (MEDO) algorithm, a novel optimization method with strong performance in electromagnetics, experiences a decline in efficiency as the problem dimensionality increases. To address these challenges, graphics processing unit (GPU)-accelerated MEDO algorithm with differential grouping (DG-GMEDO) is proposed in this paper, which builds on the MEDO algorithm through the integration of an enhanced differential grouping strategy and GPU-based parallel acceleration. This approach allows for more effective management of variable interactions while leveraging high computational speeds. Comparative evaluations with traditional algorithms like particle swarm optimization and genetic algorithm, as well as state-of-the-art methods such as MAES2-EDG, GTDE, RCI-PSO, and CCFR2-IRRG, highlight its competitive performance in terms of both accuracy and efficiency. Furthermore, DG-GMEDO demonstrates significant runtime acceleration and achieves promising results in high-dimensional settings, as validated through its application in array antenna radiation patterns optimization.
高维电磁优化问题,如阵列天线的设计,由于其复杂性和高维性,提出了巨大的挑战。麦克斯韦方程组导出优化算法(MEDO)是一种新型的优化方法,在电磁学中具有较强的性能,但随着问题维数的增加,效率会下降。为了解决这些挑战,本文提出了图形处理单元(GPU)加速的差分分组MEDO算法(DG-GMEDO),该算法在MEDO算法的基础上,通过集成增强的差分分组策略和基于GPU的并行加速。这种方法允许在利用高计算速度的同时更有效地管理可变交互。通过与粒子群优化、遗传算法等传统算法以及MAES2-EDG、GTDE、RCI-PSO、CCFR2-IRRG等先进算法的对比评估,突出了其在准确性和效率方面的竞争力。此外,DG-GMEDO在高维环境下表现出显著的运行时加速效果,并通过其在阵列天线辐射方向图优化中的应用得到了验证。
{"title":"GPU-Accelerated MEDO Algorithm with Differential Grouping (DG-GMEDO) for High-Dimensional Electromagnetic Optimization Problems","authors":"Xin Zhang;Haoyang Zhang;Ruizhe Yang;Lilin Li;Donglin Su","doi":"10.23919/cje.2024.00.228","DOIUrl":"https://doi.org/10.23919/cje.2024.00.228","url":null,"abstract":"High-dimensional electromagnetic optimization problems, such as array antenna design, pose significant challenges due to their complexity and high dimensionality. The Maxwell's equations derived optimization (MEDO) algorithm, a novel optimization method with strong performance in electromagnetics, experiences a decline in efficiency as the problem dimensionality increases. To address these challenges, graphics processing unit (GPU)-accelerated MEDO algorithm with differential grouping (DG-GMEDO) is proposed in this paper, which builds on the MEDO algorithm through the integration of an enhanced differential grouping strategy and GPU-based parallel acceleration. This approach allows for more effective management of variable interactions while leveraging high computational speeds. Comparative evaluations with traditional algorithms like particle swarm optimization and genetic algorithm, as well as state-of-the-art methods such as MAES2-EDG, GTDE, RCI-PSO, and CCFR2-IRRG, highlight its competitive performance in terms of both accuracy and efficiency. Furthermore, DG-GMEDO demonstrates significant runtime acceleration and achieves promising results in high-dimensional settings, as validated through its application in array antenna radiation patterns optimization.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 4","pages":"1052-1063"},"PeriodicalIF":3.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11151224","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144989944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Representative OSD with Local Constraints of CA-Polar Codes 具有CA-Polar码局部约束的代表性OSD
IF 3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-01 DOI: 10.23919/cje.2024.00.220
Yiwen Wang;Qianfan Wang;Jifan Liang;Xiao Ma
In this paper, we propose an algorithm to transform a generator matrix of a linear block code into a minimum weight staircase generator matrix (MWSGM). This allows us to apply the representative ordered statistics decoding with local constraints (LC-ROSD) algorithm to cyclic redundancy check (CRC) aided polar (CA-polar) codes. Distinguished from the conventional ordered statistics decoding (OSD), the LC-ROSD implements parallel Gaussian elimination (GE) for MWSGM instead of serial GE for a general matrix, potentially reducing the decoding latency. Numerical results show that the performance of 5G CA-polar codes under LC-ROSD is better than that of CRC aided successive cancellation list (CA-SCL) decoding and can approach the corresponding maximum likelihood (ML) lower bounds at different code rates. The numerical results also show that the LC-ROSD with MWSGM has lower decoding complexity than the CA-SCL decoding in the high signal-to-noise ratio (SNR) region.
本文提出了一种将线性分组码的生成矩阵转换为最小权重阶梯生成矩阵(MWSGM)的算法。这允许我们将具有局部约束的代表性有序统计解码(LC-ROSD)算法应用于循环冗余校验(CRC)辅助极化(CA-polar)代码。与传统的有序统计解码(OSD)不同,LC-ROSD对MWSGM实现并行高斯消去(GE),而不是对一般矩阵进行串行高斯消去,潜在地降低了解码延迟。数值结果表明,在LC-ROSD下,5G ca极码的译码性能优于CRC辅助连续取消列表(CA-SCL)译码,并且在不同码率下都能接近相应的最大似然下界。数值结果还表明,在高信噪比区域,采用MWSGM的LC-ROSD解码比CA-SCL解码具有更低的解码复杂度。
{"title":"Representative OSD with Local Constraints of CA-Polar Codes","authors":"Yiwen Wang;Qianfan Wang;Jifan Liang;Xiao Ma","doi":"10.23919/cje.2024.00.220","DOIUrl":"https://doi.org/10.23919/cje.2024.00.220","url":null,"abstract":"In this paper, we propose an algorithm to transform a generator matrix of a linear block code into a minimum weight staircase generator matrix (MWSGM). This allows us to apply the representative ordered statistics decoding with local constraints (LC-ROSD) algorithm to cyclic redundancy check (CRC) aided polar (CA-polar) codes. Distinguished from the conventional ordered statistics decoding (OSD), the LC-ROSD implements parallel Gaussian elimination (GE) for MWSGM instead of serial GE for a general matrix, potentially reducing the decoding latency. Numerical results show that the performance of 5G CA-polar codes under LC-ROSD is better than that of CRC aided successive cancellation list (CA-SCL) decoding and can approach the corresponding maximum likelihood (ML) lower bounds at different code rates. The numerical results also show that the LC-ROSD with MWSGM has lower decoding complexity than the CA-SCL decoding in the high signal-to-noise ratio (SNR) region.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 4","pages":"1111-1119"},"PeriodicalIF":3.0,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11151187","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144990059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Chinese Journal of Electronics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1