首页 > 最新文献

IEEE Transactions on Network Science and Engineering最新文献

英文 中文
Pattern-Based Attention Recurrent Autoencoder for Anomaly Detection in Air Quality Sensor Networks 基于模式的注意力递归自动编码器用于空气质量传感器网络中的异常检测
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-06 DOI: 10.1109/TNSE.2024.3454459
Xhensilda Allka;Pau Ferrer-Cid;Jose M. Barcelo-Ordinas;Jorge Garcia-Vidal
Sensor networks play an essential role in today's air quality monitoring platforms. Nevertheless, sensors often malfunction, leading to data anomalies. In this paper, an unsupervised pattern-based attention recurrent autoencoder for anomaly detection (PARAAD) is proposed to detect and locate anomalies in a network of air quality sensors. The novelty of the proposal lies in the use of temporal patterns, i.e., blocks of data, instead of point values. By looking at temporal patterns and through an attention mechanism, the architecture captures data dependencies in the feature space and latent space, enhancing the model's ability to focus on the most relevant parts. Its performance is evaluated with two categories of anomalies, bias fault and drift anomalies, and compared with baseline models such as a feed-forward autoencoder and a transformer architecture, as well as with models not based on temporal patterns. The results show that PARAAD achieves anomalous sensor detection and localization rates higher than 80%, outperforming existing baseline models in air quality sensor networks for both bias and drift faults.
传感器网络在当今的空气质量监测平台中发挥着至关重要的作用。然而,传感器经常会出现故障,导致数据异常。本文提出了一种基于无监督模式的异常检测注意递归自动编码器(PARAAD),用于检测和定位空气质量传感器网络中的异常。该建议的新颖之处在于使用了时间模式,即数据块,而不是点值。通过观察时间模式和关注机制,该架构捕捉到了特征空间和潜在空间中的数据依赖性,增强了模型关注最相关部分的能力。通过偏差故障和漂移异常这两类异常情况对其性能进行了评估,并与前馈自动编码器和变压器架构等基准模型以及非基于时间模式的模型进行了比较。结果表明,在空气质量传感器网络中,PARAAD 的异常传感器检测率和定位率均高于 80%,在偏差故障和漂移故障方面均优于现有的基线模型。
{"title":"Pattern-Based Attention Recurrent Autoencoder for Anomaly Detection in Air Quality Sensor Networks","authors":"Xhensilda Allka;Pau Ferrer-Cid;Jose M. Barcelo-Ordinas;Jorge Garcia-Vidal","doi":"10.1109/TNSE.2024.3454459","DOIUrl":"10.1109/TNSE.2024.3454459","url":null,"abstract":"Sensor networks play an essential role in today's air quality monitoring platforms. Nevertheless, sensors often malfunction, leading to data anomalies. In this paper, an unsupervised pattern-based attention recurrent autoencoder for anomaly detection (PARAAD) is proposed to detect and locate anomalies in a network of air quality sensors. The novelty of the proposal lies in the use of temporal patterns, i.e., blocks of data, instead of point values. By looking at temporal patterns and through an attention mechanism, the architecture captures data dependencies in the feature space and latent space, enhancing the model's ability to focus on the most relevant parts. Its performance is evaluated with two categories of anomalies, bias fault and drift anomalies, and compared with baseline models such as a feed-forward autoencoder and a transformer architecture, as well as with models not based on temporal patterns. The results show that PARAAD achieves anomalous sensor detection and localization rates higher than 80%, outperforming existing baseline models in air quality sensor networks for both bias and drift faults.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6372-6381"},"PeriodicalIF":6.7,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating Age of Information in Wireless Systems With Unknown Distributions of Inter-Arrival/Service Time 在到达/服务时间分布未知的情况下估算无线系统中的信息年龄
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-03 DOI: 10.1109/TNSE.2024.3453959
Licheng Chen;Yunquan Dong
In this paper, we estimate the average age of information (AoI) of the status updating over a wireless channel with an unknown fading model. Different from most related works which take the distributions of the inter-arrival time and transmission time of updates as known information, we approximate the average AoI of the system by using their first and second-order moments. Note that these distributions are often not accessible or known with inevitable errors while their moments are much easier to obtain, e.g., by using counting and statistics. We model the communications over the fading channel with a continuous transmission model and a discrete transmission model, which use the variable-rate scheme and the fixed-rate scheme, respectively. We assume that the arrival of the continuous transmission model is a Bernoulli process and make no assumptions about the arrival process of the discrete transmission model. Based on these information, we present two pairs of tight lower and upper bounds for the AoI of the two models. We show that obtained bounds are the tightest when the inter-arrival time (or transmission time) follows the degenerate distribution and are the loosest when it follows the two-point distribution, which randomly takes value from two possible outcomes. We also show that tighter bounds can be obtained by using higher order moments.
本文估算了在未知衰减模型的无线信道上进行状态更新的平均信息年龄(AoI)。与将更新到达时间和传输时间的分布作为已知信息的大多数相关工作不同,我们通过使用它们的一阶和二阶矩来近似计算系统的平均 AoI。需要注意的是,这些分布通常无法获得或已知时难免会有误差,而它们的矩则更容易获得,例如通过计数和统计。我们用连续传输模型和离散传输模型来模拟衰减信道上的通信,这两种模型分别使用可变速率方案和固定速率方案。我们假设连续传输模型的到达是一个伯努利过程,而对离散传输模型的到达过程不做任何假设。基于这些信息,我们提出了两种模型的 AoI 的两对严格下限和上限。我们表明,当到达间隔时间(或传输时间)遵循退化分布时,所获得的界限是最严格的;而当它遵循两点分布(随机从两种可能结果中取值)时,所获得的界限是最宽松的。我们还证明,利用高阶矩可以获得更严格的边界。
{"title":"Estimating Age of Information in Wireless Systems With Unknown Distributions of Inter-Arrival/Service Time","authors":"Licheng Chen;Yunquan Dong","doi":"10.1109/TNSE.2024.3453959","DOIUrl":"10.1109/TNSE.2024.3453959","url":null,"abstract":"In this paper, we estimate the average age of information (AoI) of the status updating over a wireless channel with an unknown fading model. Different from most related works which take the distributions of the inter-arrival time and transmission time of updates as known information, we approximate the average AoI of the system by using their first and second-order moments. Note that these distributions are often not accessible or known with inevitable errors while their moments are much easier to obtain, e.g., by using counting and statistics. We model the communications over the fading channel with a continuous transmission model and a discrete transmission model, which use the variable-rate scheme and the fixed-rate scheme, respectively. We assume that the arrival of the continuous transmission model is a Bernoulli process and make no assumptions about the arrival process of the discrete transmission model. Based on these information, we present two pairs of tight lower and upper bounds for the AoI of the two models. We show that obtained bounds are the tightest when the inter-arrival time (or transmission time) follows the degenerate distribution and are the loosest when it follows the two-point distribution, which randomly takes value from two possible outcomes. We also show that tighter bounds can be obtained by using higher order moments.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6090-6104"},"PeriodicalIF":6.7,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subnetwork Enumeration Algorithms for Multilayer Networks 多层网络的子网络枚举算法
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-02 DOI: 10.1109/TNSE.2024.3447893
Tarmo Nurmi;Mikko Kivelä
To understand the structure of a network, it can be useful to break it down into its constituent pieces. This is the approach taken in a multitude of successful network analysis methods, such as motif analysis. These methods require one to enumerate or sample small connected subgraphs of a network. Efficient algorithms exists for both enumeration and uniform sampling of subgraphs, and here we generalize the esu algorithm for a very general notion of multilayer networks. We show that multilayer network subnetwork enumeration introduces nontrivial complications to the existing algorithm, and present two different generalized algorithms that preserve the desired features of unbiased sampling and scalable, communication-free parallelization. In addition, we introduce a straightforward aggregation-disaggregation-based enumeration algorithm that leverages existing subgraph enumeration algorithms. We evaluate these algorithms in synthetic networks and with real-world data, and show that none of the algorithms is strictly more efficient but rather the choice depends on the features of the data. Having a general algorithm for finding subnetworks makes advanced multilayer network analysis possible, and enables researchers to apply a variety of methods to previously difficult-to-handle multilayer networks in a variety of domains and across many different types of multilayer networks.
要了解一个网络的结构,将其分解成各个组成部分是非常有用的。许多成功的网络分析方法(如图案分析)都采用了这种方法。这些方法需要枚举或采样网络中的小连接子图。子图的枚举和均匀采样都有高效的算法,在这里我们将 esu 算法推广到了非常普遍的多层网络概念中。我们表明,多层网络子网络枚举给现有算法带来了非同小可的复杂性,并提出了两种不同的通用算法,它们保留了无偏采样和可扩展、无通信并行化的理想特性。此外,我们还介绍了一种基于聚合-分解的直接枚举算法,该算法利用了现有的子图枚举算法。我们在合成网络和真实世界数据中对这些算法进行了评估,结果表明,严格来说,没有哪种算法更高效,选择取决于数据的特征。有了寻找子网的通用算法,高级多层网络分析就成为可能,研究人员就能在各种领域和多种不同类型的多层网络中,将各种方法应用于以前难以处理的多层网络。
{"title":"Subnetwork Enumeration Algorithms for Multilayer Networks","authors":"Tarmo Nurmi;Mikko Kivelä","doi":"10.1109/TNSE.2024.3447893","DOIUrl":"10.1109/TNSE.2024.3447893","url":null,"abstract":"To understand the structure of a network, it can be useful to break it down into its constituent pieces. This is the approach taken in a multitude of successful network analysis methods, such as motif analysis. These methods require one to enumerate or sample small connected subgraphs of a network. Efficient algorithms exists for both enumeration and uniform sampling of subgraphs, and here we generalize the \u0000<sc>esu</small>\u0000 algorithm for a very general notion of multilayer networks. We show that multilayer network subnetwork enumeration introduces nontrivial complications to the existing algorithm, and present two different generalized algorithms that preserve the desired features of unbiased sampling and scalable, communication-free parallelization. In addition, we introduce a straightforward aggregation-disaggregation-based enumeration algorithm that leverages existing subgraph enumeration algorithms. We evaluate these algorithms in synthetic networks and with real-world data, and show that none of the algorithms is strictly more efficient but rather the choice depends on the features of the data. Having a general algorithm for finding subnetworks makes advanced multilayer network analysis possible, and enables researchers to apply a variety of methods to previously difficult-to-handle multilayer networks in a variety of domains and across many different types of multilayer networks.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"5803-5817"},"PeriodicalIF":6.7,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10663535","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness Analysis of High-Speed Railway Networks Against Cascading Failures: From a Multi-Layer Network Perspective 高速铁路网对级联故障的鲁棒性分析:从多层网络的角度
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-28 DOI: 10.1109/TNSE.2024.3451118
Junfeng Ma;Shan Ma;Xiaotian Xie;Weihua Gui
In this study, we model the high-speed railway (HSR) network as a directed multi-layer network. Specifically, each node is viewed as a tuple of a train with a station it passes through. A directed edge within a layer means that a train passes through two consecutive stations in its scheduled train route, while an edge between different layers means that two trains pass through the same station sequentially. Then we assess the robustness against cascading failures of these multi-layer networks by introducing metrics such as network efficiency and the ratio of failed nodes under disturbances. Furthermore, we propose a cascading failure model based on train delay propagation to investigate the cascading dynamics within the multi-layer HSR network. To better characterize the delay propagation patterns in the network, train delays at each station are treated as the load of the corresponding node, while the time supplements and buffer time are considered as the capacities of the edges. Finally, we propose two strategies to enhance the robustness of HSR networks against cascading failures. Numerical experiments are conducted to demonstrate the effectiveness of these strategies.
在本研究中,我们将高速铁路(HSR)网络建模为有向多层网络。具体来说,每个节点都被视为列车和列车经过的车站的元组。层内的有向边表示一列列车在其预定列车路线中连续经过两个车站,而不同层之间的边表示两列列车依次经过同一车站。然后,我们通过引入网络效率和干扰下故障节点比率等指标,评估这些多层网络对级联故障的鲁棒性。此外,我们还提出了基于列车延迟传播的级联故障模型,以研究多层高铁网络内的级联动态。为了更好地描述网络中的延迟传播模式,我们将各站的列车延迟视为相应节点的负载,而将时间补充和缓冲时间视为边缘的容量。最后,我们提出了两种策略来增强高铁网络对级联故障的鲁棒性。我们通过数值实验证明了这些策略的有效性。
{"title":"Robustness Analysis of High-Speed Railway Networks Against Cascading Failures: From a Multi-Layer Network Perspective","authors":"Junfeng Ma;Shan Ma;Xiaotian Xie;Weihua Gui","doi":"10.1109/TNSE.2024.3451118","DOIUrl":"10.1109/TNSE.2024.3451118","url":null,"abstract":"In this study, we model the high-speed railway (HSR) network as a directed multi-layer network. Specifically, each node is viewed as a tuple of a train with a station it passes through. A directed edge within a layer means that a train passes through two consecutive stations in its scheduled train route, while an edge between different layers means that two trains pass through the same station sequentially. Then we assess the robustness against cascading failures of these multi-layer networks by introducing metrics such as network efficiency and the ratio of failed nodes under disturbances. Furthermore, we propose a cascading failure model based on train delay propagation to investigate the cascading dynamics within the multi-layer HSR network. To better characterize the delay propagation patterns in the network, train delays at each station are treated as the load of the corresponding node, while the time supplements and buffer time are considered as the capacities of the edges. Finally, we propose two strategies to enhance the robustness of HSR networks against cascading failures. Numerical experiments are conducted to demonstrate the effectiveness of these strategies.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6522-6534"},"PeriodicalIF":6.7,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Poisson Game-Based Incentive Mechanism for Federated Learning in Web 3.0 基于泊松游戏的 Web 3.0 联合学习激励机制
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-28 DOI: 10.1109/TNSE.2024.3450932
Mingshun Luo;Yunhua He;Tingli Yuan;Bin Wu;Yongdong Wu;Ke Xiao
As the next generation of the internet, Web 3.0 is expected to revolutionize the Internet and enable users to have greater control over their data and privacy. Federated learning (FL) enables data to be usable yet invisible during its use, thereby facilitating the transfer of data ownership and value. However, the issues of data size and blockchain computing power are of paramount importance for FL in Web 3.0. Due to the openness of Web 3.0, individuals can freely join or leave training and adjust data size, creating population uncertainty and making it difficult to design incentive mechanisms. Therefore, we propose a Poisson game-based FL incentive mechanism that motivates participants to contribute more data and computing power, considering the variability of data size and computing power requirements, and provides a feasible solution to the uncertainty of the number of participants using a Poisson game model. Additionally, our proposed FL architecture in Web 3.0 integrates FL with Decentralized Autonomous Organizations (DAO), utilizing smart contracts for contribution calculation and revenue distribution. This enables an open, free, and autonomous federated learning environment. Experimental evaluation shows that our incentive mechanism is feasible in blockchain with efficiency, robustness, and low overhead.
作为下一代互联网,Web 3.0 预计将彻底改变互联网,使用户能够更好地控制自己的数据和隐私。联合学习(Federated Learning,FL)使数据在使用过程中既可使用又不可见,从而促进了数据所有权和价值的转移。然而,数据规模和区块链计算能力问题对于 Web 3.0 中的联合学习至关重要。由于 Web 3.0 的开放性,个人可以自由加入或退出培训,也可以自由调整数据规模,这就造成了群体的不确定性,使激励机制的设计变得困难。因此,我们提出了一种基于泊松博弈的 FL 激励机制,考虑到数据规模和计算能力需求的可变性,激励参与者贡献更多的数据和计算能力,并利用泊松博弈模型为参与者数量的不确定性提供了可行的解决方案。此外,我们在 Web 3.0 中提出的 FL 架构将 FL 与去中心化自治组织(DAO)相结合,利用智能合约进行贡献计算和收入分配。这就实现了一个开放、自由和自主的联合学习环境。实验评估表明,我们的激励机制在区块链中是可行的,而且高效、稳健、开销低。
{"title":"A Poisson Game-Based Incentive Mechanism for Federated Learning in Web 3.0","authors":"Mingshun Luo;Yunhua He;Tingli Yuan;Bin Wu;Yongdong Wu;Ke Xiao","doi":"10.1109/TNSE.2024.3450932","DOIUrl":"10.1109/TNSE.2024.3450932","url":null,"abstract":"As the next generation of the internet, Web 3.0 is expected to revolutionize the Internet and enable users to have greater control over their data and privacy. Federated learning (FL) enables data to be usable yet invisible during its use, thereby facilitating the transfer of data ownership and value. However, the issues of data size and blockchain computing power are of paramount importance for FL in Web 3.0. Due to the openness of Web 3.0, individuals can freely join or leave training and adjust data size, creating population uncertainty and making it difficult to design incentive mechanisms. Therefore, we propose a Poisson game-based FL incentive mechanism that motivates participants to contribute more data and computing power, considering the variability of data size and computing power requirements, and provides a feasible solution to the uncertainty of the number of participants using a Poisson game model. Additionally, our proposed FL architecture in Web 3.0 integrates FL with Decentralized Autonomous Organizations (DAO), utilizing smart contracts for contribution calculation and revenue distribution. This enables an open, free, and autonomous federated learning environment. Experimental evaluation shows that our incentive mechanism is feasible in blockchain with efficiency, robustness, and low overhead.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"5576-5588"},"PeriodicalIF":6.7,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Localization and Clock Synchronization in Cuboid Bounded Diffusive Channel With Absorbing and Reflecting Boundaries 有吸收和反射边界的立方体有界扩散通道中的联合定位和时钟同步
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-27 DOI: 10.1109/TNSE.2024.3450628
Ajit Kumar;Sudhir Kumar
This paper proposes a joint localization and synchronization method in the presence of a 3-D (cuboidal-bounded) channel. Many biologically relevant structures, such as epithelium cell membranes, tissues, and blood vessel networks (particularly capillaries), can be effectively modeled as 3-D systems. Localization and synchronization among nanomachines play an important role in the optimal transmission rate, information exchange, and collaboration among nanomachines. Clock synchronization without localization or localization without clock synchronization affects the accuracy of the system. However, the existing methods consider that nanomachines are already synchronized for localization and vice-versa. Hence, the proposed method considers a combined model for location parameters, clock offset, and clock skew. Unlike the existing method, we consider this combined model in bounded environments, which are relevant for long-range molecular communication where released molecules need to be confined within a certain range to optimize power efficiency. However, deriving an analytical channel characterization for a constrained domain is challenging. We provide an analytical equation for the probability distribution function of the propagation delay of the molecules, taking into account the presence of both single and multiple absorbing walls.
本文提出了一种存在三维(立方体边界)通道时的联合定位和同步方法。许多生物相关结构,如上皮细胞膜、组织和血管网络(尤其是毛细血管),都可以有效地模拟为三维系统。纳米机械之间的定位和同步对纳米机械之间的最佳传输速率、信息交换和协作起着重要作用。没有定位的时钟同步或没有时钟同步的定位都会影响系统的精度。然而,现有的方法认为纳米机器在定位时已经同步,反之亦然。因此,建议的方法考虑了定位参数、时钟偏移和时钟偏斜的组合模型。与现有方法不同的是,我们考虑的是有界环境中的组合模型,这与远距离分子通信有关,因为释放的分子需要限制在一定范围内,以优化功率效率。然而,为受限领域推导分析性信道特征具有挑战性。我们为分子传播延迟的概率分布函数提供了一个分析方程,同时考虑了单个和多个吸收壁的存在。
{"title":"Joint Localization and Clock Synchronization in Cuboid Bounded Diffusive Channel With Absorbing and Reflecting Boundaries","authors":"Ajit Kumar;Sudhir Kumar","doi":"10.1109/TNSE.2024.3450628","DOIUrl":"10.1109/TNSE.2024.3450628","url":null,"abstract":"This paper proposes a joint localization and synchronization method in the presence of a 3-D (cuboidal-bounded) channel. Many biologically relevant structures, such as epithelium cell membranes, tissues, and blood vessel networks (particularly capillaries), can be effectively modeled as 3-D systems. Localization and synchronization among nanomachines play an important role in the optimal transmission rate, information exchange, and collaboration among nanomachines. Clock synchronization without localization or localization without clock synchronization affects the accuracy of the system. However, the existing methods consider that nanomachines are already synchronized for localization and vice-versa. Hence, the proposed method considers a combined model for location parameters, clock offset, and clock skew. Unlike the existing method, we consider this combined model in bounded environments, which are relevant for long-range molecular communication where released molecules need to be confined within a certain range to optimize power efficiency. However, deriving an analytical channel characterization for a constrained domain is challenging. We provide an analytical equation for the probability distribution function of the propagation delay of the molecules, taking into account the presence of both single and multiple absorbing walls.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6511-6521"},"PeriodicalIF":6.7,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedHelo: Hierarchical Federated Learning With Loss-Based-Heterogeneity in Wireless Networks FedHelo:无线网络中基于损失的异质性分层联合学习
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-26 DOI: 10.1109/TNSE.2024.3447904
Yuchuan Ye;Youjia Chen;Junnan Yang;Ming Ding;Peng Cheng;Haifeng Zheng
Hierarchical federated learning (HFL) in wireless networks significantly saves communication resources due to edge aggregation conducted in edge mobile computing (MEC) servers. Taking into account the spatially correlated characteristics of data in wireless networks, in this paper, we analyze the performance of HFL with hybrid data distributions, i.e. intra-MEC independent and identically distributed (IID) and inter-MEC non-IID data samples. We derive the upper bound of the difference between the achieved loss and the minimum one, which reveals the impacts of data heterogeneity and global aggregation frequency on the performance of HFL. On this basis, we propose an algorithm named FedHelo which optimizes the aggregation weights and edge/global aggregation frequencies under the constraints of training delay and clients' energy consumption. Our experiments i) verify the obtained theoretical results; ii) demonstrate the performance improvement achieved by FedHelo with the optimal aggregation weights and training/aggregation frequencies, especially in the scenario with high data heterogeneity; and iii) show the preference for edge aggregation in the scenario with a tight delay or client's energy constraint.
无线网络中的分层联合学习(HFL)通过在边缘移动计算(MEC)服务器中进行边缘聚合,大大节省了通信资源。考虑到无线网络中数据的空间相关特性,本文分析了混合数据分布(即 MEC 内独立且同分布(IID)和 MEC 间非 IID 数据样本)下的 HFL 性能。我们得出了所实现的损失与最小损失之间的差值上限,揭示了数据异构性和全局聚合频率对 HFL 性能的影响。在此基础上,我们提出了一种名为 FedHelo 的算法,它可以在训练延迟和客户端能耗的约束下优化聚合权重和边缘/全局聚合频率。我们的实验 i) 验证了所获得的理论结果;ii) 证明了 FedHelo 通过优化聚合权重和训练/聚合频率所实现的性能提升,尤其是在数据异质性较高的情况下;iii) 显示了在延迟或客户端能耗限制较紧的情况下边缘聚合的优先选择。
{"title":"FedHelo: Hierarchical Federated Learning With Loss-Based-Heterogeneity in Wireless Networks","authors":"Yuchuan Ye;Youjia Chen;Junnan Yang;Ming Ding;Peng Cheng;Haifeng Zheng","doi":"10.1109/TNSE.2024.3447904","DOIUrl":"10.1109/TNSE.2024.3447904","url":null,"abstract":"Hierarchical federated learning (HFL) in wireless networks significantly saves communication resources due to edge aggregation conducted in edge mobile computing (MEC) servers. Taking into account the spatially correlated characteristics of data in wireless networks, in this paper, we analyze the performance of HFL with hybrid data distributions, i.e. intra-MEC independent and identically distributed (IID) and inter-MEC non-IID data samples. We derive the upper bound of the difference between the achieved loss and the minimum one, which reveals the impacts of data heterogeneity and global aggregation frequency on the performance of HFL. On this basis, we propose an algorithm named FedHelo which optimizes the aggregation weights and edge/global aggregation frequencies under the constraints of training delay and clients' energy consumption. Our experiments \u0000<italic>i)</i>\u0000 verify the obtained theoretical results; \u0000<italic>ii)</i>\u0000 demonstrate the performance improvement achieved by FedHelo with the optimal aggregation weights and training/aggregation frequencies, especially in the scenario with high data heterogeneity; and \u0000<italic>iii)</i>\u0000 show the preference for edge aggregation in the scenario with a tight delay or client's energy constraint.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6066-6079"},"PeriodicalIF":6.7,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Hybrid Reliable User Selection Scheme for Task Allocation in Mobile Crowd Sensing 基于区块链的移动人群感知任务分配混合可靠用户选择方案
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-26 DOI: 10.1109/TNSE.2024.3449146
Shiwen Zhang;Zhixue Li;Wei Liang;Kuan-Ching Li;Zakirul Alam Bhuiyan
Mobile Crowd Sensing (MCS) has emerged as a new sensing paradigm due to its cost efficiency, mobility, and expandability. However, user selection for task allocation is a significant challenge in MCS. Most previous studies concentrate on two selection modes, opportunistic and participatory selection. Recent research has proposed a hybrid user selection mode that combines both advantages. However, existing hybrid user selection systems all rely on a centralized architecture, which is vulnerable to malicious attacks, and they do not consider the reliability of users and data availability. Moreover, they cannot ensure the individual rationality of users. To overcome these shortcomings, we propose a blockchain-based hybrid reliable user selection scheme for task allocation in MCS. Specifically, we replace the traditional central server with the blockchain and handle various sensing task operations using smart contracts on the blockchain to ensure system reliability and security. In addition, we design a user reputation calculation algorithm based on semi-Markov and a sensing data anomaly detection algorithm based on Long Short-Term Memory (LSTM) to ensure user reliability and data availability, and also a novel hybrid user selection algorithm, especially in the participatory user selection stage, where we use a user selection algorithm based on reverse auction to ensure the individual rationality of each user. Experimental results demonstrate the effectiveness of the proposed scheme through simulation experiments on GeoLife and sound-sensing public datasets.
移动人群传感(MCS)因其成本效益、移动性和可扩展性而成为一种新的传感模式。然而,任务分配的用户选择是 MCS 面临的一大挑战。以往的研究大多集中在两种选择模式上,即机会选择和参与选择。最近的研究提出了一种结合两种优势的混合用户选择模式。然而,现有的混合用户选择系统都依赖于集中式架构,容易受到恶意攻击,而且没有考虑用户的可靠性和数据的可用性。此外,它们也无法确保用户的个体理性。为了克服这些缺点,我们提出了一种基于区块链的混合可靠用户选择方案,用于 MCS 中的任务分配。具体来说,我们用区块链取代了传统的中心服务器,并使用区块链上的智能合约处理各种传感任务操作,以确保系统的可靠性和安全性。此外,我们还设计了基于半马尔科夫的用户声誉计算算法和基于长短期记忆(LSTM)的感知数据异常检测算法,以确保用户可靠性和数据可用性;还设计了一种新颖的混合用户选择算法,尤其是在参与式用户选择阶段,我们采用了基于反向拍卖的用户选择算法,以确保每个用户的个体理性。实验结果通过对地理生命和声音感应公共数据集的模拟实验证明了所提方案的有效性。
{"title":"Blockchain-Based Hybrid Reliable User Selection Scheme for Task Allocation in Mobile Crowd Sensing","authors":"Shiwen Zhang;Zhixue Li;Wei Liang;Kuan-Ching Li;Zakirul Alam Bhuiyan","doi":"10.1109/TNSE.2024.3449146","DOIUrl":"10.1109/TNSE.2024.3449146","url":null,"abstract":"Mobile Crowd Sensing (MCS) has emerged as a new sensing paradigm due to its cost efficiency, mobility, and expandability. However, user selection for task allocation is a significant challenge in MCS. Most previous studies concentrate on two selection modes, opportunistic and participatory selection. Recent research has proposed a hybrid user selection mode that combines both advantages. However, existing hybrid user selection systems all rely on a centralized architecture, which is vulnerable to malicious attacks, and they do not consider the reliability of users and data availability. Moreover, they cannot ensure the individual rationality of users. To overcome these shortcomings, we propose a blockchain-based hybrid reliable user selection scheme for task allocation in MCS. Specifically, we replace the traditional central server with the blockchain and handle various sensing task operations using smart contracts on the blockchain to ensure system reliability and security. In addition, we design a user reputation calculation algorithm based on semi-Markov and a sensing data anomaly detection algorithm based on Long Short-Term Memory (LSTM) to ensure user reliability and data availability, and also a novel hybrid user selection algorithm, especially in the participatory user selection stage, where we use a user selection algorithm based on reverse auction to ensure the individual rationality of each user. Experimental results demonstrate the effectiveness of the proposed scheme through simulation experiments on GeoLife and sound-sensing public datasets.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6494-6510"},"PeriodicalIF":6.7,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Category-Guided Graph Convolution Network for Semantic Segmentation 用于语义分割的类别引导图卷积网络
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-23 DOI: 10.1109/TNSE.2024.3448609
Zeyuan Xu;Zhe Yang;Danwei Wang;Zhe Wu
Contextual information has been widely used to improve results of semantic segmentation. However, most approaches investigate contextual dependencies through self-attention and lack guidance on which pixels should have strong (or weak) relationships. In this paper, a category-guided graph convolution network (CGGCN) is proposed to reveal the relationships among pixels. First, we train a coarse segmentation map under the supervision of the ground truth and use it to construct an adjacency matrix among pixels. It turns out that the pixels belonging to the same category have strong connections, and those belonging to different categories have weak connections. Second, a GCN is exploited to enhance the representation of pixels by aggregating contextual information among pixels. The feature of each pixel is represented by node, and the relationship among pixels is denoted by edge. Subsequently, we design four different kinds of network structures by leveraging the CGGCN module and determine the most accurate segmentation result by comparing them. Finally, we reimplement the CGGCN module to refine the final prediction from coarse to fine. The results of extensive evaluations demonstrate that the proposed approach is superior to the existing semantic segmentation approaches and has better convergence.
上下文信息已被广泛用于改善语义分割的结果。然而,大多数方法都是通过自我关注来研究上下文依赖关系,缺乏对哪些像素应具有强(或弱)关系的指导。本文提出了一种类别引导图卷积网络(CGGCN)来揭示像素之间的关系。首先,我们在地面实况的监督下训练一个粗略的分割图,并用它来构建像素间的邻接矩阵。结果发现,属于同一类别的像素具有强连接,而属于不同类别的像素具有弱连接。其次,通过聚合像素间的上下文信息,利用 GCN 增强像素的表示。每个像素的特征用节点表示,像素之间的关系用边表示。随后,我们利用 CGGCN 模块设计了四种不同的网络结构,并通过比较确定了最准确的分割结果。最后,我们重新实现 CGGCN 模块,从粗到细完善最终预测结果。广泛的评估结果表明,所提出的方法优于现有的语义分割方法,并具有更好的收敛性。
{"title":"Category-Guided Graph Convolution Network for Semantic Segmentation","authors":"Zeyuan Xu;Zhe Yang;Danwei Wang;Zhe Wu","doi":"10.1109/TNSE.2024.3448609","DOIUrl":"10.1109/TNSE.2024.3448609","url":null,"abstract":"Contextual information has been widely used to improve results of semantic segmentation. However, most approaches investigate contextual dependencies through self-attention and lack guidance on which pixels should have strong (or weak) relationships. In this paper, a category-guided graph convolution network (CGGCN) is proposed to reveal the relationships among pixels. First, we train a coarse segmentation map under the supervision of the ground truth and use it to construct an adjacency matrix among pixels. It turns out that the pixels belonging to the same category have strong connections, and those belonging to different categories have weak connections. Second, a GCN is exploited to enhance the representation of pixels by aggregating contextual information among pixels. The feature of each pixel is represented by node, and the relationship among pixels is denoted by edge. Subsequently, we design four different kinds of network structures by leveraging the CGGCN module and determine the most accurate segmentation result by comparing them. Finally, we reimplement the CGGCN module to refine the final prediction from coarse to fine. The results of extensive evaluations demonstrate that the proposed approach is superior to the existing semantic segmentation approaches and has better convergence.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6080-6089"},"PeriodicalIF":6.7,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data 通过外包加密数据授权的多客户端可验证加密关键字搜索方案
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-21 DOI: 10.1109/TNSE.2024.3445343
Xu Yang;Qiuhao Wang;Saiyu Qi;Ke Li;Jianfeng Wang;Wenjia Zhao;Yong Qi
Data outsourcing is a key service of cloud computing. While data encryption ensures confidentiality, it limits the ability to search encrypted data. Recently, ciphertext-policy attribute-based keyword search (CP-ABKS) schemes, which combine symmetric searchable encryption (SSE) and ciphertext-policy attribute-based encryption (CP-ABE), have gained attention. However, most CP-ABKS schemes depend on an independent key management server (KMS) for key distribution, risking key leakage if the KMS is compromised. Additionally, these schemes lack secure update operations and efficient search result verification. To address these issues, we propose VKSA, a verifiable encrypted keyword search scheme with authorization for cloud-based multi-client environments. VKSA features a novel policy-hidden index for proxy-free authorized searches, a state-based secure update strategy for forward and backward security, and a delegated search result verification mechanism to ensure efficient and privacy-preserving verification. We further optimize VKSA for improved computational and enclave-storage efficiency. Security analysis and experiments confirm the security and efficiency of our schemes.
数据外包是云计算的一项关键服务。数据加密在确保保密性的同时,也限制了搜索加密数据的能力。最近,结合了对称可搜索加密(SSE)和基于密文策略属性的加密(CP-ABE)的基于密文策略属性的关键字搜索(CP-ABKS)方案受到了关注。然而,大多数 CP-ABKS 方案都依赖于独立的密钥管理服务器(KMS)来分发密钥,一旦 KMS 遭到破坏,密钥就有泄漏的风险。此外,这些方案缺乏安全的更新操作和高效的搜索结果验证。为了解决这些问题,我们提出了 VKSA,这是一种可验证的加密关键词搜索方案,具有授权功能,适用于基于云的多客户端环境。VKSA 的特点包括:用于免代理授权搜索的新型策略隐藏索引、用于前向和后向安全性的基于状态的安全更新策略,以及用于确保高效和隐私保护验证的委托搜索结果验证机制。我们进一步优化了 VKSA,以提高计算和飞地存储效率。安全分析和实验证实了我们方案的安全性和效率。
{"title":"Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data","authors":"Xu Yang;Qiuhao Wang;Saiyu Qi;Ke Li;Jianfeng Wang;Wenjia Zhao;Yong Qi","doi":"10.1109/TNSE.2024.3445343","DOIUrl":"10.1109/TNSE.2024.3445343","url":null,"abstract":"Data outsourcing is a key service of cloud computing. While data encryption ensures confidentiality, it limits the ability to search encrypted data. Recently, ciphertext-policy attribute-based keyword search (CP-ABKS) schemes, which combine symmetric searchable encryption (SSE) and ciphertext-policy attribute-based encryption (CP-ABE), have gained attention. However, most CP-ABKS schemes depend on an independent key management server (KMS) for key distribution, risking key leakage if the KMS is compromised. Additionally, these schemes lack secure update operations and efficient search result verification. To address these issues, we propose VKSA, a verifiable encrypted keyword search scheme with authorization for cloud-based multi-client environments. VKSA features a novel policy-hidden index for proxy-free authorized searches, a state-based secure update strategy for forward and backward security, and a delegated search result verification mechanism to ensure efficient and privacy-preserving verification. We further optimize VKSA for improved computational and enclave-storage efficiency. Security analysis and experiments confirm the security and efficiency of our schemes.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6356-6371"},"PeriodicalIF":6.7,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1