首页 > 最新文献

Chinese Journal of Electronics最新文献

英文 中文
Multi-Dimensional QoS Evaluation and Optimization of Mobile Edge Computing for IoT: A Survey 物联网移动边缘计算的多维 QoS 评估与优化:调查
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-22 DOI: 10.23919/cje.2023.00.264
Jiwei Huang;Fangzheng Liu;Jianbing Zhang
With the evolvement of the Internet of things (IoT), mobile edge computing (MEC) has emerged as a promising computing paradigm to support IoT data analysis and processing. In MEC for IoT, the differentiated requirements on quality of service (QoS) have been growing rapidly, making QoS a multi-dimensional concept including several attributes, such as performance, dependability, energy efficiency, and economic factors. To guarantee the QoS of IoT applications, theories and techniques of multi-dimensional QoS evaluation and optimization have become important theoretical foundations and supporting technologies for the research and application of MEC for IoT, which have attracted significant attention from both academia and industry. This paper aims to survey the existing studies on multi-dimensional QoS evaluation and optimization of MEC for IoT, and provide insights and guidance for future research in this field. This paper summarizes the multi-dimensional and multi-attribute QoS metrics in IoT scenarios, and then several QoS evaluation methods are presented. For QoS optimization, the main research problems in this field are summarized, and optimization models as well as their corresponding solutions are elaborated. We take notice of the booming of edge intelligence in artificial intelligence-empowered IoT scenarios, and illustrate the new research topics and the state-of-the-art approaches related to QoS evaluation and optimization. We discuss the challenges and future research directions.
随着物联网(IoT)的发展,移动边缘计算(MEC)已成为支持物联网数据分析和处理的一种前景广阔的计算模式。在面向物联网的 MEC 中,对服务质量(QoS)的差异化要求迅速增长,使得 QoS 成为一个多维概念,包括多个属性,如性能、可靠性、能效和经济因素。为保证物联网应用的 QoS,多维 QoS 评估与优化理论和技术已成为物联网 MEC 研究与应用的重要理论基础和支撑技术,受到学术界和产业界的高度关注。本文旨在对物联网 MEC 多维 QoS 评估与优化的现有研究进行梳理,为该领域的未来研究提供启示和指导。本文总结了物联网场景中的多维多属性 QoS 指标,然后介绍了几种 QoS 评估方法。在 QoS 优化方面,总结了该领域的主要研究问题,并阐述了优化模型及其相应的解决方案。我们注意到人工智能赋能物联网场景中边缘智能的蓬勃发展,并阐述了与 QoS 评估和优化相关的新研究课题和最先进的方法。我们还讨论了面临的挑战和未来的研究方向。
{"title":"Multi-Dimensional QoS Evaluation and Optimization of Mobile Edge Computing for IoT: A Survey","authors":"Jiwei Huang;Fangzheng Liu;Jianbing Zhang","doi":"10.23919/cje.2023.00.264","DOIUrl":"10.23919/cje.2023.00.264","url":null,"abstract":"With the evolvement of the Internet of things (IoT), mobile edge computing (MEC) has emerged as a promising computing paradigm to support IoT data analysis and processing. In MEC for IoT, the differentiated requirements on quality of service (QoS) have been growing rapidly, making QoS a multi-dimensional concept including several attributes, such as performance, dependability, energy efficiency, and economic factors. To guarantee the QoS of IoT applications, theories and techniques of multi-dimensional QoS evaluation and optimization have become important theoretical foundations and supporting technologies for the research and application of MEC for IoT, which have attracted significant attention from both academia and industry. This paper aims to survey the existing studies on multi-dimensional QoS evaluation and optimization of MEC for IoT, and provide insights and guidance for future research in this field. This paper summarizes the multi-dimensional and multi-attribute QoS metrics in IoT scenarios, and then several QoS evaluation methods are presented. For QoS optimization, the main research problems in this field are summarized, and optimization models as well as their corresponding solutions are elaborated. We take notice of the booming of edge intelligence in artificial intelligence-empowered IoT scenarios, and illustrate the new research topics and the state-of-the-art approaches related to QoS evaluation and optimization. We discuss the challenges and future research directions.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10606193","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141841012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of GAN-Based Research on Chinese Character Font Generation 基于 GAN 的汉字字体生成研究综述
IF 1.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.402
Xuanhong Wang;Cong Li;Zengguo Sun;Luying Hui
With the rapid development of deep learning, generative adversarial network (GAN) has become a research hotspot in the field of computer vision. GAN has a wide range of applications in image generation. Inspired by GAN, a series of models of Chinese character font generation have been proposed in recent years. In this paper, the latest research progress of Chinese character font generation is analyzed and summarized. GAN and its development history are summarized. GAN-based methods for Chinese character font generation are clarified as well as their improvements, based on whether the specific elements of Chinese characters are considered. The public datasets used for font generation are summarized in detail, and various application scenarios of font generation are provided. The evaluation metrics of font generation are systematically summarized from both qualitative and quantitative aspects. This paper contributes to the in-depth research on Chinese character font generation and has a positive effect on the inheritance and development of Chinese culture with Chinese characters as its carrier.
随着深度学习的快速发展,生成对抗网络(GAN)已成为计算机视觉领域的研究热点。GAN 在图像生成方面有着广泛的应用。受 GAN 的启发,近年来人们提出了一系列汉字字体生成模型。本文对汉字字体生成的最新研究进展进行了分析和总结。总结了 GAN 及其发展历程。明确了基于 GAN 的汉字字库生成方法,并根据是否考虑了汉字的特定元素对其进行了改进。详细总结了用于字体生成的公共数据集,并提供了字体生成的各种应用场景。从定性和定量两个方面系统地总结了字体生成的评价指标。本文有助于汉字字库生成的深入研究,对以汉字为载体的中华文化的传承与发展具有积极作用。
{"title":"Review of GAN-Based Research on Chinese Character Font Generation","authors":"Xuanhong Wang;Cong Li;Zengguo Sun;Luying Hui","doi":"10.23919/cje.2022.00.402","DOIUrl":"https://doi.org/10.23919/cje.2022.00.402","url":null,"abstract":"With the rapid development of deep learning, generative adversarial network (GAN) has become a research hotspot in the field of computer vision. GAN has a wide range of applications in image generation. Inspired by GAN, a series of models of Chinese character font generation have been proposed in recent years. In this paper, the latest research progress of Chinese character font generation is analyzed and summarized. GAN and its development history are summarized. GAN-based methods for Chinese character font generation are clarified as well as their improvements, based on whether the specific elements of Chinese characters are considered. The public datasets used for font generation are summarized in detail, and various application scenarios of font generation are provided. The evaluation metrics of font generation are systematically summarized from both qualitative and quantitative aspects. This paper contributes to the in-depth research on Chinese character font generation and has a positive effect on the inheritance and development of Chinese culture with Chinese characters as its carrier.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543247","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Time-Scale Variational Mode Decomposition-Based Robust Fault Diagnosis of Railway Point Machines Under Multiple Noises 基于多时间尺度变分模式分解的多噪声下铁路点机械鲁棒故障诊断
IF 1.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.234
Junqi Liu;Tao Wen;Guo Xie;Yuan Cao;Clive Roberts
The fault diagnosis of railway point machines (RPMs) has attracted the attention of engineers and researchers. Seldom have studies considered diverse noises along the track. To fulfill this aspect, a multi-time-scale variational mode decomposition (MTSVMD) is proposed in this paper to realize the accurate and robust fault diagnosis of RPMs under multiple noises. MTSVMD decomposes condition monitoring signals after coarse-grained processing in varying degrees. In this manner, the information contained in the signal components at multiple time scales can construct a more abundant feature space than at a single scale. In the experimental validation, a random position, random type, random number, and random length (4R) noise-adding algorithm helps to verify the robustness of the approach. The adequate experimental results demonstrate the superiority of the proposed MTSVMD-based fault diagnosis.
铁路点机械(RPM)的故障诊断引起了工程师和研究人员的关注。研究很少考虑轨道沿线的各种噪声。为此,本文提出了一种多时间尺度变分模式分解(MTSVMD),以实现多噪声条件下 RPM 的精确和鲁棒故障诊断。MTSVMD 对经过粗粒度处理的状态监测信号进行不同程度的分解。这样,多个时间尺度上的信号分量所包含的信息可以构建一个比单一尺度上更丰富的特征空间。在实验验证中,随机位置、随机类型、随机数和随机长度(4R)噪声添加算法有助于验证该方法的鲁棒性。充分的实验结果证明了所提出的基于 MTSVMD 的故障诊断方法的优越性。
{"title":"Multi-Time-Scale Variational Mode Decomposition-Based Robust Fault Diagnosis of Railway Point Machines Under Multiple Noises","authors":"Junqi Liu;Tao Wen;Guo Xie;Yuan Cao;Clive Roberts","doi":"10.23919/cje.2022.00.234","DOIUrl":"https://doi.org/10.23919/cje.2022.00.234","url":null,"abstract":"The fault diagnosis of railway point machines (RPMs) has attracted the attention of engineers and researchers. Seldom have studies considered diverse noises along the track. To fulfill this aspect, a multi-time-scale variational mode decomposition (MTSVMD) is proposed in this paper to realize the accurate and robust fault diagnosis of RPMs under multiple noises. MTSVMD decomposes condition monitoring signals after coarse-grained processing in varying degrees. In this manner, the information contained in the signal components at multiple time scales can construct a more abundant feature space than at a single scale. In the experimental validation, a random position, random type, random number, and random length (4R) noise-adding algorithm helps to verify the robustness of the approach. The adequate experimental results demonstrate the superiority of the proposed MTSVMD-based fault diagnosis.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543239","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Efficient Driving Strategy for High-Speed Trains with Considering the Checkpoints 考虑检查站的高速列车节能驾驶策略
IF 1.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.174
Zixuan Zhang;Yuan Cao;Shuai Su
With rising energy prices and concerns about environmental issues, energy-efficient driving strategies (EEDS) for high-speed trains have received a substantial amount of attention. In particular, energy-saving schemes play a huge role in reducing the energy and operating costs of trains. This article studies the EEDS of high-speed trains at a given time. A well-posed model is formulated, in which the constraints of the checkpoints, in addition to the speed limits, vehicle dynamics, and discrete control throttle, are first considered. For a given control sequence, the Karush-Kuhn-Tucker (KKT) conditions are used to obtain the necessary conditions for an EEDS. According to several key equations of the necessary conditions, the checkpoint constraints are satisfied. Some case studies are conducted based on the data of the Beijing-Shanghai high-speed line to illustrate the effectiveness of the proposed approach.
随着能源价格的上涨和人们对环境问题的关注,高速列车的节能驾驶策略(EEDS)受到了广泛关注。其中,节能方案在降低列车能源和运营成本方面发挥了巨大作用。本文研究了高速列车在给定时间内的 EEDS。首先考虑了检查站的约束条件、速度限制、车辆动力学和离散控制节流阀,然后建立了一个假设良好的模型。对于给定的控制序列,利用卡鲁什-库恩-塔克(KKT)条件获得 EEDS 的必要条件。根据必要条件的几个关键方程,可以满足检查点约束条件。基于京沪高速线路的数据进行了一些案例研究,以说明所提方法的有效性。
{"title":"Energy-Efficient Driving Strategy for High-Speed Trains with Considering the Checkpoints","authors":"Zixuan Zhang;Yuan Cao;Shuai Su","doi":"10.23919/cje.2022.00.174","DOIUrl":"https://doi.org/10.23919/cje.2022.00.174","url":null,"abstract":"With rising energy prices and concerns about environmental issues, energy-efficient driving strategies (EEDS) for high-speed trains have received a substantial amount of attention. In particular, energy-saving schemes play a huge role in reducing the energy and operating costs of trains. This article studies the EEDS of high-speed trains at a given time. A well-posed model is formulated, in which the constraints of the checkpoints, in addition to the speed limits, vehicle dynamics, and discrete control throttle, are first considered. For a given control sequence, the Karush-Kuhn-Tucker (KKT) conditions are used to obtain the necessary conditions for an EEDS. According to several key equations of the necessary conditions, the checkpoint constraints are satisfied. Some case studies are conducted based on the data of the Beijing-Shanghai high-speed line to illustrate the effectiveness of the proposed approach.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543245","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps 用绕过 SPN 步骤的策略对 Grendel 进行新的代数攻击
IF 1.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-03-31 DOI: 10.23919/cje.2023.00.127
Wenxiao Qiao;Siwei Sun;Lei Hu
The rapid development of modern cryptographic applications such as zero-knowledge, secure multi-party computation, fully homomorphic encryption has motivated the design of new so-called arithmetization-oriented symmetric primitives. As designing ciphers in this domain is relatively new and not well-understood, the security of these new ciphers remains to be completely assessed. In this paper, we revisit the security analysis of arithmetization-oriented cipher Grendel. Grendel uses the Legendre symbol as a component, which is tailored specifically for the use in zero-knowledge and efficiently-varifiable proof systems. At FSE 2022, the first preimage attack on some original full GrendelHash instances was proposed. As a countermeasure, the designer adds this attack into the security analysis and updates the formula to derive the secure number of rounds. In our work, we present new algebraic attacks on GrendelHash. For the preimage attack, we can reduce the complexity or attack one more round than previous attacks for some instances. In addition, we present the first collision attack on some round-reduced instances by solving the constrained input/constrained output problem for the underlying permutations.
零知识、安全多方计算、全同态加密等现代密码应用的快速发展,促使人们设计出新的所谓面向算术化的对称基元。由于在这一领域设计密码相对较新,而且人们对其了解不多,因此这些新密码的安全性仍有待全面评估。在本文中,我们重新审视了面向算术化的密码 Grendel 的安全性分析。Grendel 使用 Legendre 符号作为组件,专门用于零知识和高效可验证证明系统。在FSE 2022大会上,首次提出了对一些原始完整GrendelHash实例的前像攻击。作为对策,设计者将这种攻击加入了安全分析,并更新了推导安全轮数的公式。在我们的工作中,我们对 GrendelHash 提出了新的代数攻击。对于前图像攻击,我们可以降低复杂性,或者在某些情况下比以前的攻击多攻击一轮。此外,我们还通过解决底层排列的受限输入/受限输出问题,首次提出了对某些轮数减少的实例的碰撞攻击。
{"title":"New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps","authors":"Wenxiao Qiao;Siwei Sun;Lei Hu","doi":"10.23919/cje.2023.00.127","DOIUrl":"https://doi.org/10.23919/cje.2023.00.127","url":null,"abstract":"The rapid development of modern cryptographic applications such as zero-knowledge, secure multi-party computation, fully homomorphic encryption has motivated the design of new so-called arithmetization-oriented symmetric primitives. As designing ciphers in this domain is relatively new and not well-understood, the security of these new ciphers remains to be completely assessed. In this paper, we revisit the security analysis of arithmetization-oriented cipher Grendel. Grendel uses the Legendre symbol as a component, which is tailored specifically for the use in zero-knowledge and efficiently-varifiable proof systems. At FSE 2022, the first preimage attack on some original full GrendelHash instances was proposed. As a countermeasure, the designer adds this attack into the security analysis and updates the formula to derive the secure number of rounds. In our work, we present new algebraic attacks on GrendelHash. For the preimage attack, we can reduce the complexity or attack one more round than previous attacks for some instances. In addition, we present the first collision attack on some round-reduced instances by solving the constrained input/constrained output problem for the underlying permutations.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543243","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams QARF:通过在线主动学习检测不断变化的流量流的新型恶意流量检测方法
IF 1.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.360
Zequn Niu;Jingfeng Xue;Yong Wang;Tianwei Lei;Weijie Han;Xianwei Gao
In practical abnormal traffic detection scenarios, traffic often appears as drift, imbalanced and rare labeled streams, and how to effectively identify malicious traffic in such complex situations has become a challenge for malicious traffic detection. Researchers have extensive studies on malicious traffic detection with single challenge, but the detection of complex traffic has not been widely noticed. Queried adaptive random forests (QARF) is proposed to detect traffic streams with concept drift, imbalance and lack of labeled instances. QARF is an online active learning based approach which combines adaptive random forests method and adaptive margin sampling strategy. QARF achieves querying a small number of instances from unlabeled traffic streams to obtain effective training. We conduct experiments using the NSL-KDD dataset to evaluate the performance of QARF. QARF is compared with other state-of-the-art methods. The experimental results show that QARF obtains 98.20% accuracy on the NSL-KDD dataset. QARF performs better than other state-of-the-art methods in comparisons.
在实际的异常流量检测场景中,流量往往以漂移、不平衡和罕见标签流的形式出现,如何在这种复杂情况下有效识别恶意流量成为恶意流量检测的一个难题。研究人员对单一挑战的恶意流量检测进行了大量研究,但复杂流量的检测尚未引起广泛关注。有人提出了查询自适应随机森林(QARF)来检测具有概念漂移、不平衡和缺乏标记实例的流量流。QARF 是一种基于在线主动学习的方法,它结合了自适应随机森林方法和自适应边际采样策略。QARF 可以从未标明的流量流中查询少量实例,从而获得有效的训练。我们使用 NSL-KDD 数据集进行了实验,以评估 QARF 的性能。我们将 QARF 与其他最先进的方法进行了比较。实验结果表明,QARF 在 NSL-KDD 数据集上获得了 98.20% 的准确率。在比较中,QARF 的表现优于其他先进方法。
{"title":"QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams","authors":"Zequn Niu;Jingfeng Xue;Yong Wang;Tianwei Lei;Weijie Han;Xianwei Gao","doi":"10.23919/cje.2022.00.360","DOIUrl":"https://doi.org/10.23919/cje.2022.00.360","url":null,"abstract":"In practical abnormal traffic detection scenarios, traffic often appears as drift, imbalanced and rare labeled streams, and how to effectively identify malicious traffic in such complex situations has become a challenge for malicious traffic detection. Researchers have extensive studies on malicious traffic detection with single challenge, but the detection of complex traffic has not been widely noticed. Queried adaptive random forests (QARF) is proposed to detect traffic streams with concept drift, imbalance and lack of labeled instances. QARF is an online active learning based approach which combines adaptive random forests method and adaptive margin sampling strategy. QARF achieves querying a small number of instances from unlabeled traffic streams to obtain effective training. We conduct experiments using the NSL-KDD dataset to evaluate the performance of QARF. QARF is compared with other state-of-the-art methods. The experimental results show that QARF obtains 98.20% accuracy on the NSL-KDD dataset. QARF performs better than other state-of-the-art methods in comparisons.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543240","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Regularization Design of Graph Neural Networks Against Adversarial Attacks Based on Lyapunov Theory 基于 Lyapunov 理论的图神经网络鲁棒正则化设计对抗对抗性攻击
IF 1.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.342
Wenjie Yan;Ziqi Li;Yongjun Qi
The robustness of graph neural networks (GNNs) is a critical research topic in deep learning. Many researchers have designed regularization methods to enhance the robustness of neural networks, but there is a lack of theoretical analysis on the principle of robustness. In order to tackle the weakness of current robustness designing methods, this paper gives new insights into how to guarantee the robustness of GNNs. A novel regularization strategy named Lya-Reg is designed to guarantee the robustness of GNNs by Lyapunov theory. Our results give new insights into how regularization can mitigate the various adversarial effects on different graph signals. Extensive experiments on various public datasets demonstrate that the proposed regularization method is more robust than the state-of-the-art methods such as $L_1$-norm, $L_2$-norm, $L_{21}$-norm, Pro-GNN, PA-GNN and GARNET against various types of graph adversarial attacks.
图神经网络(GNN)的鲁棒性是深度学习中的一个重要研究课题。许多研究者设计了正则化方法来增强神经网络的鲁棒性,但缺乏对鲁棒性原理的理论分析。针对当前鲁棒性设计方法的不足,本文对如何保证 GNN 的鲁棒性提出了新的见解。本文设计了一种名为 Lya-Reg 的新型正则化策略,通过 Lyapunov 理论来保证 GNN 的鲁棒性。我们的研究结果为正则化如何减轻不同图信号的各种对抗效应提供了新的见解。在各种公共数据集上进行的广泛实验表明,所提出的正则化方法比最先进的方法(如 $L_1$-norm、$L_2$-norm、$L_{21}$-norm、Pro-GNN、PA-GNN 和 GARNET)更具鲁棒性,可以抵御各种类型的图对抗攻击。
{"title":"Robust Regularization Design of Graph Neural Networks Against Adversarial Attacks Based on Lyapunov Theory","authors":"Wenjie Yan;Ziqi Li;Yongjun Qi","doi":"10.23919/cje.2022.00.342","DOIUrl":"https://doi.org/10.23919/cje.2022.00.342","url":null,"abstract":"The robustness of graph neural networks (GNNs) is a critical research topic in deep learning. Many researchers have designed regularization methods to enhance the robustness of neural networks, but there is a lack of theoretical analysis on the principle of robustness. In order to tackle the weakness of current robustness designing methods, this paper gives new insights into how to guarantee the robustness of GNNs. A novel regularization strategy named Lya-Reg is designed to guarantee the robustness of GNNs by Lyapunov theory. Our results give new insights into how regularization can mitigate the various adversarial effects on different graph signals. Extensive experiments on various public datasets demonstrate that the proposed regularization method is more robust than the state-of-the-art methods such as \u0000<tex>$L_1$</tex>\u0000-norm, \u0000<tex>$L_2$</tex>\u0000-norm, \u0000<tex>$L_{21}$</tex>\u0000-norm, Pro-GNN, PA-GNN and GARNET against various types of graph adversarial attacks.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543212","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android 基于 Android 的可信嵌入式计算和数据传输保护架构的方法与实践
IF 1.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.196
Yichuan Wang;Wen Gao;Xinhong Hei;Yanning Du
In recent years, the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile terminal. But with it comes the security problems brought by the mobile terminal. Especially for Android system, due to its open source nature, malicious applications continue to emerge, which greatly threatens the data security of users. Therefore, this paper proposes a method of trusted embedded static measurement and data transmission protection architecture based on Android to reduce the risk of data leakage in the process of terminal storage and transmission. We conducted detailed data and feasibility analysis of the proposed method from the aspects of time consumption, storage overhead and security. The experimental results show that this method can detect Android system layer attacks such as self-booting of the malicious module and improve the security of data encryption and transmission process effectively. Compared with the native system, the additional performance overhead is small.
近年来,互联网技术的飞速发展不断丰富着人们的日常生活,并逐渐从传统的电脑终端向移动终端转变。但随之而来的是移动终端带来的安全问题。尤其是安卓系统,由于其开源的特性,恶意应用程序不断涌现,极大地威胁着用户的数据安全。因此,本文提出了一种基于 Android 系统的可信嵌入式静态测量和数据传输保护架构方法,以降低终端存储和传输过程中的数据泄露风险。我们从耗时、存储开销和安全性等方面对所提方法进行了详细的数据和可行性分析。实验结果表明,该方法可以检测到恶意模块自启动等安卓系统层攻击,有效提高了数据加密和传输过程的安全性。与原生系统相比,额外的性能开销很小。
{"title":"Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android","authors":"Yichuan Wang;Wen Gao;Xinhong Hei;Yanning Du","doi":"10.23919/cje.2022.00.196","DOIUrl":"https://doi.org/10.23919/cje.2022.00.196","url":null,"abstract":"In recent years, the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile terminal. But with it comes the security problems brought by the mobile terminal. Especially for Android system, due to its open source nature, malicious applications continue to emerge, which greatly threatens the data security of users. Therefore, this paper proposes a method of trusted embedded static measurement and data transmission protection architecture based on Android to reduce the risk of data leakage in the process of terminal storage and transmission. We conducted detailed data and feasibility analysis of the proposed method from the aspects of time consumption, storage overhead and security. The experimental results show that this method can detect Android system layer attacks such as self-booting of the malicious module and improve the security of data encryption and transmission process effectively. Compared with the native system, the additional performance overhead is small.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543246","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Expression Complementary Disentanglement Network for Facial Expression Recognition 用于面部表情识别的表情互补解缠网络
IF 1.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.351
Shanmin Wang;Hui Shuai;Lei Zhu;Qingshan Liu
Disentangling facial expressions from other disturbing facial attributes in face images is an essential topic for facial expression recognition. Previous methods only care about facial expression disentanglement (FED) itself, ignoring the negative effects of other facial attributes. Due to the annotations on limited facial attributes, it is difficult for existing FED solutions to disentangle all disturbance from the input face. To solve this issue, we propose an expression complementary disentanglement network (ECDNet). ECDNet proposes to finish the FED task during a face reconstruction process, so as to address all facial attributes during disentanglement. Different from traditional re-construction models, ECDNet reconstructs face images by progressively generating and combining facial appearance and matching geometry. It designs the expression incentive (EIE) and expression inhibition (EIN) mechanisms, inducing the model to characterize the disentangled expression and complementary parts precisely. Facial geometry and appearance, generated in the reconstructed process, are dealt with to represent facial expressions and complementary parts, respectively. The combination of distinctive reconstruction model, EIE, and EIN mechanisms ensures the completeness and exactness of the FED task. Experimental results on RAF-DB, AffectNet, and CAER-S datasets have proven the effectiveness and superiority of ECDNet.
将人脸图像中的面部表情从其他干扰面部属性中分离出来是面部表情识别的一个重要课题。以往的方法只关注面部表情分离(FED)本身,而忽略了其他面部属性的负面影响。由于注释的面部属性有限,现有的 FED 解决方案很难将所有干扰从输入面部中分离出来。为了解决这个问题,我们提出了一种表情互补纠错网络(ECDNet)。ECDNet 提议在人脸重建过程中完成 FED 任务,以便在解缠过程中处理所有面部属性。与传统的重建模型不同,ECDNet 通过逐步生成和组合面部外观和匹配几何图形来重建人脸图像。它设计了表情激励(EIE)和表情抑制(EIN)机制,诱导模型精确表征分解后的表情和互补部分。在重建过程中产生的面部几何和外观分别用来表示面部表情和互补部分。独特的重建模型、EIE 和 EIN 机制的结合确保了 FED 任务的完整性和精确性。在 RAF-DB、AffectNet 和 CAER-S 数据集上的实验结果证明了 ECDNet 的有效性和优越性。
{"title":"Expression Complementary Disentanglement Network for Facial Expression Recognition","authors":"Shanmin Wang;Hui Shuai;Lei Zhu;Qingshan Liu","doi":"10.23919/cje.2022.00.351","DOIUrl":"https://doi.org/10.23919/cje.2022.00.351","url":null,"abstract":"Disentangling facial expressions from other disturbing facial attributes in face images is an essential topic for facial expression recognition. Previous methods only care about facial expression disentanglement (FED) itself, ignoring the negative effects of other facial attributes. Due to the annotations on limited facial attributes, it is difficult for existing FED solutions to disentangle all disturbance from the input face. To solve this issue, we propose an expression complementary disentanglement network (ECDNet). ECDNet proposes to finish the FED task during a face reconstruction process, so as to address all facial attributes during disentanglement. Different from traditional re-construction models, ECDNet reconstructs face images by progressively generating and combining facial appearance and matching geometry. It designs the expression incentive (EIE) and expression inhibition (EIN) mechanisms, inducing the model to characterize the disentangled expression and complementary parts precisely. Facial geometry and appearance, generated in the reconstructed process, are dealt with to represent facial expressions and complementary parts, respectively. The combination of distinctive reconstruction model, EIE, and EIN mechanisms ensures the completeness and exactness of the FED task. Experimental results on RAF-DB, AffectNet, and CAER-S datasets have proven the effectiveness and superiority of ECDNet.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543219","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Communicating While Jamming Approach for End-to-End Multi-Hop Wireless Communication Network 端到端多跳无线通信网络的安全通信干扰方法
IF 1.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.448
Xiao Ma;Dan Li;Liang Wang;Weijia Han;Nan Zhao
With the rapid development of wireless communications, cellular communication and distributed wireless network are fragile to eavesdropping due to distributed users and transparent communication. However, to adopt bigger transmit power at a given area to interfere potential eavesdroppers not only incurs huge energy waste but also may suppresses regular communication in this area. To this end, we focus on secure communication in multi-hop wireless communication network, and propose two communicating while jamming schemes for secure communication in presence of potential eavesdroppers for the narrow band and broad band point-to-point (P2P) systems respectively with the aid of artificial noise transmitted by a chosen cooperative interferer. Furthermore, to achieve the end-to-end (E2E) multi-hop secure communication, we devise the secure network topology discovering scheme via constructing a proper network topology with at least one proper node as the cooperative interferer in each hop, and then propose the secure transmission path planning scheme to find an E2E secure transmission route from source to destination, respectively. Experiments on the wireless open-access research platform demonstrate the feasibility of the proposed schemes. Besides, simulations results validate that the proposed schemes can achieve better performance compared with existing methods in both the P2P communication case and E2E multi-hop communication network scenario.
随着无线通信的飞速发展,蜂窝通信和分布式无线网络由于用户分布广、通信透明,很容易受到窃听。然而,在特定区域采用较大的发射功率来干扰潜在的窃听者,不仅会造成巨大的能源浪费,还可能会抑制该区域的正常通信。为此,我们重点研究了多跳无线通信网络中的安全通信问题,并分别针对窄带和宽带点对点(P2P)系统,提出了两种在存在潜在窃听者的情况下,借助所选合作干扰者发射的人工噪声进行安全通信的通信干扰方案。此外,为了实现端到端 (E2E) 多跳安全通信,我们设计了安全网络拓扑发现方案,通过构建一个适当的网络拓扑,在每一跳中至少有一个适当的节点作为合作干扰器,然后提出安全传输路径规划方案,分别找到从源到目的地的 E2E 安全传输路由。在无线开放存取研究平台上进行的实验证明了所提方案的可行性。此外,仿真结果验证了在 P2P 通信和 E2E 多跳通信网络场景中,与现有方法相比,所提出的方案都能获得更好的性能。
{"title":"A Secure Communicating While Jamming Approach for End-to-End Multi-Hop Wireless Communication Network","authors":"Xiao Ma;Dan Li;Liang Wang;Weijia Han;Nan Zhao","doi":"10.23919/cje.2022.00.448","DOIUrl":"https://doi.org/10.23919/cje.2022.00.448","url":null,"abstract":"With the rapid development of wireless communications, cellular communication and distributed wireless network are fragile to eavesdropping due to distributed users and transparent communication. However, to adopt bigger transmit power at a given area to interfere potential eavesdroppers not only incurs huge energy waste but also may suppresses regular communication in this area. To this end, we focus on secure communication in multi-hop wireless communication network, and propose two communicating while jamming schemes for secure communication in presence of potential eavesdroppers for the narrow band and broad band point-to-point (P2P) systems respectively with the aid of artificial noise transmitted by a chosen cooperative interferer. Furthermore, to achieve the end-to-end (E2E) multi-hop secure communication, we devise the secure network topology discovering scheme via constructing a proper network topology with at least one proper node as the cooperative interferer in each hop, and then propose the secure transmission path planning scheme to find an E2E secure transmission route from source to destination, respectively. Experiments on the wireless open-access research platform demonstrate the feasibility of the proposed schemes. Besides, simulations results validate that the proposed schemes can achieve better performance compared with existing methods in both the P2P communication case and E2E multi-hop communication network scenario.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543235","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Chinese Journal of Electronics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1