首页 > 最新文献

IEEE Transactions on Network Science and Engineering最新文献

英文 中文
Constrained Dueling Bandits for Edge Intelligence
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-12-30 DOI: 10.1109/TNSE.2024.3524362
Shangshang Wang;Ziyu Shao;Yang Yang
Bandit is acknowledged as a classical analytic tool for the online decision-making problem under uncertainty, e.g., task assignment for crowdsourcing systems given the unknown reliability of workers. In the conventional setup, an agent selects from a set of arms across rounds to balance the exploitation-exploration tradeoff using quantitive reward feedback. Despite bandits' popularity, their practical implementation may run into concerns like 1) obtaining the quantitive reward is a non-trivial problem, e.g., evaluating workers' completion quality (reward) requires domain experts to set up metrics; 2) mismatch between the budgeted agent and costs for selecting arms, e.g., the crowdsourcing platform (agent) should offer payments (cost) to workers to complete tasks. To address such concerns, 1) we employ dueling bandits to learn the uncertainties via qualitative pairwise comparisons rather than quantitive rewards, e.g., whether a worker performs better on the assigned task than the other; 2) we utilize online control to guarantee a within-budget cost while selecting arms. By integrating online learning and online control, we propose a Constrained Two-Dueling Bandit (CTDB) algorithm. We prove that CTDB achieves a $O(1/V + sqrt{log T / T})$ round-averaged regret over the horizon $T$ while keeping a budgeted cost where $V$ is a constant parameter balancing the tradeoff between regret minimization and constraint satisfaction. We conduct extensive simulations with synthetic and real-world datasets to demonstrate the outperformance of CTDB over baselines.
{"title":"Constrained Dueling Bandits for Edge Intelligence","authors":"Shangshang Wang;Ziyu Shao;Yang Yang","doi":"10.1109/TNSE.2024.3524362","DOIUrl":"https://doi.org/10.1109/TNSE.2024.3524362","url":null,"abstract":"Bandit is acknowledged as a classical analytic tool for the online decision-making problem under uncertainty, e.g., task assignment for crowdsourcing systems given the unknown reliability of workers. In the conventional setup, an agent selects from a set of arms across rounds to balance the exploitation-exploration tradeoff using quantitive reward feedback. Despite bandits' popularity, their practical implementation may run into concerns like 1) obtaining the quantitive reward is a non-trivial problem, e.g., evaluating workers' completion quality (reward) requires domain experts to set up metrics; 2) mismatch between the budgeted agent and costs for selecting arms, e.g., the crowdsourcing platform (agent) should offer payments (cost) to workers to complete tasks. To address such concerns, 1) we employ dueling bandits to learn the uncertainties via qualitative pairwise comparisons rather than quantitive rewards, e.g., whether a worker performs better on the assigned task than the other; 2) we utilize online control to guarantee a within-budget cost while selecting arms. By integrating online learning and online control, we propose a <italic>Constrained Two-Dueling Bandit (CTDB)</i> algorithm. We prove that CTDB achieves a <inline-formula><tex-math>$O(1/V + sqrt{log T / T})$</tex-math></inline-formula> round-averaged regret over the horizon <inline-formula><tex-math>$T$</tex-math></inline-formula> while keeping a budgeted cost where <inline-formula><tex-math>$V$</tex-math></inline-formula> is a constant parameter balancing the tradeoff between regret minimization and constraint satisfaction. We conduct extensive simulations with synthetic and real-world datasets to demonstrate the outperformance of CTDB over baselines.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 2","pages":"1126-1136"},"PeriodicalIF":6.7,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143465699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Output Feedback-Based Continuous-Time Distributed PID Optimization Algorithms
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-12-27 DOI: 10.1109/TNSE.2024.3521587
Jiaxu Liu;Song Chen;Pengkai Wang;Shengze Cai;Chao Xu;Jian Chu
In this paper, we investigate a distributed optimization problem in multi-agent systems, where the cost function is a sum of local cost functions associated with individual agents. Inspired by the outstanding performance of proportional-integral-derivative (PID) controllers in the field of control, we propose the Distributed PID Optimization Algorithm (D-PID) based on output feedback to solve the distributed optimization problem. We aim to establish the exponential convergence of the D-PID algorithm over undirected connected graphs when the local objective functions are smooth and strongly convex. Additionally, we provide guidelines for selecting appropriate parameter values (e.g., $K_{p}, K_{i}$, and $K_{d}$) and analyze the correctness of the algorithm over time-varying interaction graphs. To further reduce unnecessary communication resource consumption, we develop the Distributed PID Optimization Algorithm with Time-Triggered Scheme (D-PID-TT). We theoretically demonstrate that D-PID-TT can converge to an optimal solution at a global exponential convergence rate under the same conditions as D-PID. We also provide guidelines for parameter selection and specify the communication period. Furthermore, we show that the D-PID has great potential for nonconvex distributed optimization. Finally, we present numerical simulations to verify the effectiveness and superiority of our proposed algorithms.
{"title":"Output Feedback-Based Continuous-Time Distributed PID Optimization Algorithms","authors":"Jiaxu Liu;Song Chen;Pengkai Wang;Shengze Cai;Chao Xu;Jian Chu","doi":"10.1109/TNSE.2024.3521587","DOIUrl":"https://doi.org/10.1109/TNSE.2024.3521587","url":null,"abstract":"In this paper, we investigate a distributed optimization problem in multi-agent systems, where the cost function is a sum of local cost functions associated with individual agents. Inspired by the outstanding performance of proportional-integral-derivative (PID) controllers in the field of control, we propose the Distributed PID Optimization Algorithm (D-PID) based on output feedback to solve the distributed optimization problem. We aim to establish the exponential convergence of the D-PID algorithm over undirected connected graphs when the local objective functions are smooth and strongly convex. Additionally, we provide guidelines for selecting appropriate parameter values (e.g., <inline-formula><tex-math>$K_{p}, K_{i}$</tex-math></inline-formula>, and <inline-formula><tex-math>$K_{d}$</tex-math></inline-formula>) and analyze the correctness of the algorithm over time-varying interaction graphs. To further reduce unnecessary communication resource consumption, we develop the Distributed PID Optimization Algorithm with Time-Triggered Scheme (D-PID-TT). We theoretically demonstrate that D-PID-TT can converge to an optimal solution at a global exponential convergence rate under the same conditions as D-PID. We also provide guidelines for parameter selection and specify the communication period. Furthermore, we show that the D-PID has great potential for nonconvex distributed optimization. Finally, we present numerical simulations to verify the effectiveness and superiority of our proposed algorithms.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 2","pages":"955-969"},"PeriodicalIF":6.7,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143465673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matching as You Want: A Decentralized, Flexible, and Efficient Realization for Crowdsourcing With Dual-Side Privacy
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-12-26 DOI: 10.1109/TNSE.2024.3522914
Liang Li;Haiqin Wu;Liangen He;Jucai Yang;Zhenfu Cao;Boris Düdder
As the first service procedure in crowdsourcing, task matching is crucial for users and has aroused extensive attention. However, due to the submission of sensitive information, task requesters and workers have growing concerns about matching security and privacy, as well as efficiency and flexibility for service quality. Prior privacy-aware task-matching resolutions either rely on a central semi-honest crowdsourcing platform for matching integrity, or still suffer from low efficiency, limited privacy considerations, and inflexibility even if blockchain is incorporated for decentralized matching. In this paper, we construct a decentralized, secure, and flexibly expressive crowdsourcing task-matching system robust to misbehaviors based on consortium blockchain. Particularly, to support fine-grained worker selection and worker-side task search with dual-side privacy under no central trust, we propose a multi-authority policy-hiding attribute-based encryption scheme with keyword search, enforced by smart contracts. We optimize the ciphertext and key size by designing a novel approach for policy and attribute vector generation, meanwhile immune to malicious workers submitting incorrect vectors. Such a verifiable vector generation approach exploits verifiable multiplicative homomorphic secret sharing and Viète's formulas. Formal security analysis and extensive experiments conducted over Hyperledger Fabric demonstrate the desired security properties and superior on-chain and off-chain performance.
{"title":"Matching as You Want: A Decentralized, Flexible, and Efficient Realization for Crowdsourcing With Dual-Side Privacy","authors":"Liang Li;Haiqin Wu;Liangen He;Jucai Yang;Zhenfu Cao;Boris Düdder","doi":"10.1109/TNSE.2024.3522914","DOIUrl":"https://doi.org/10.1109/TNSE.2024.3522914","url":null,"abstract":"As the first service procedure in crowdsourcing, task matching is crucial for users and has aroused extensive attention. However, due to the submission of sensitive information, task requesters and workers have growing concerns about matching security and privacy, as well as efficiency and flexibility for service quality. Prior privacy-aware task-matching resolutions either rely on a central semi-honest crowdsourcing platform for matching integrity, or still suffer from low efficiency, limited privacy considerations, and inflexibility even if blockchain is incorporated for decentralized matching. In this paper, we construct a decentralized, secure, and flexibly expressive crowdsourcing task-matching system robust to misbehaviors based on consortium blockchain. Particularly, to support fine-grained worker selection and worker-side task search with dual-side privacy under no central trust, we propose a multi-authority policy-hiding attribute-based encryption scheme with keyword search, enforced by smart contracts. We optimize the ciphertext and key size by designing a novel approach for policy and attribute vector generation, meanwhile immune to malicious workers submitting incorrect vectors. Such a verifiable vector generation approach exploits verifiable multiplicative homomorphic secret sharing and Viète's formulas. Formal security analysis and extensive experiments conducted over Hyperledger Fabric demonstrate the desired security properties and superior on-chain and off-chain performance.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 2","pages":"1026-1040"},"PeriodicalIF":6.7,"publicationDate":"2024-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143464341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient Hybrid Event-Triggered Control for Secure Synchronization of Lur'e Systems Against DoS Attacks
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-12-26 DOI: 10.1109/TNSE.2024.3522991
Yanyan Ni;Zhen Wang;Yingjie Fan;Xia Huang;Hao Shen
In this paper, a resilient hybrid event-triggered (RHET) scheme is presented to deal with the secure synchronization issue of Lur'e systems to resist denial-of-service (DoS) attacks. The causes of considering this issue are threefold: 1) networked control systems (NCSs) are always limited by the network bandwidth and are vulnerable to DoS attacks 2) the existing models cannot describe the RHET control systems under DoS attacks and 3) the existing functionals are either inappropriate or conservative for addressing the secure synchronization problem. To overcome these challenges, an RHET scheme which is integrates of the sampled-data control and the continuous event-triggered control, is firstly proposed to reduce the effect of DoS attacks as well as the number of data release. On this basis, a switched closed-loop system model for Lur'e systems under RHET control and DoS attacks is established. By fully employing the state information in the sampling interval and the attack interval, two multi-interval-dependent functionals are designed to conduct the stability analysis. Subsequently, the continuity of the constructed functionals, the convex combination technique and some estimation techniques are jointly utilized to derive the exponential synchronization results and to design a secure controller. Finally, two simulation examples, including a hyperchaotic system and a neural network, are utilized to testify the effectiveness of the presented RHET control method in achieving the secure synchronization.
{"title":"Resilient Hybrid Event-Triggered Control for Secure Synchronization of Lur'e Systems Against DoS Attacks","authors":"Yanyan Ni;Zhen Wang;Yingjie Fan;Xia Huang;Hao Shen","doi":"10.1109/TNSE.2024.3522991","DOIUrl":"https://doi.org/10.1109/TNSE.2024.3522991","url":null,"abstract":"In this paper, a resilient hybrid event-triggered (RHET) scheme is presented to deal with the secure synchronization issue of Lur'e systems to resist denial-of-service (DoS) attacks. The causes of considering this issue are threefold: 1) networked control systems (NCSs) are always limited by the network bandwidth and are vulnerable to DoS attacks 2) the existing models cannot describe the RHET control systems under DoS attacks and 3) the existing functionals are either inappropriate or conservative for addressing the secure synchronization problem. To overcome these challenges, an RHET scheme which is integrates of the sampled-data control and the continuous event-triggered control, is firstly proposed to reduce the effect of DoS attacks as well as the number of data release. On this basis, a switched closed-loop system model for Lur'e systems under RHET control and DoS attacks is established. By fully employing the state information in the sampling interval and the attack interval, two multi-interval-dependent functionals are designed to conduct the stability analysis. Subsequently, the continuity of the constructed functionals, the convex combination technique and some estimation techniques are jointly utilized to derive the exponential synchronization results and to design a secure controller. Finally, two simulation examples, including a hyperchaotic system and a neural network, are utilized to testify the effectiveness of the presented RHET control method in achieving the secure synchronization.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 2","pages":"1053-1065"},"PeriodicalIF":6.7,"publicationDate":"2024-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143465582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Sliding Window Based Tensor Communication Scheduling Framework for Distributed Deep Learning
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-12-26 DOI: 10.1109/TNSE.2024.3523320
Yunqi Gao;Bing Hu;Mahdi Boloursaz Mashhadi;Wei Wang;Rahim Tafazolli;Mérouane Debbah
Simultaneous tensor communication can effectively improve the scalability of distributed deep learning on large clusters. However, a fixed number of tensor blocks communicated concurrently violates the priority-based scheduling strategy and cannot minimize communication overheads. In this paper, we propose a novel simultaneous tensor communication framework, namely D-Credit, which transmits tensor blocks based on dynamic sliding windows to minimize per-iteration time in distributed DNN training. We build the mathematical model of D-Credit in two phases: (1) the overlap of gradient communication and backward propagation, and (2) the overlap of gradient communication and forward computation. We drive the optimal window sizes for the second phase analytically, and develop a greedy algorithm to efficiently determine the dynamic window sizes for the first phase of D-Credit. We implement the D-Credit architecture on PyTorch framework. Experimental results on two different GPU clusters demonstrate that at training speed, D-Credit can achieve up to 1.26x, 1.21x, 1.48x and 1.53x speedup compared to ByteScheduler, DeAR, PyTorch-DDP and WFBP, respectively. At energy consumption, D-Credit saves up to 17.8% and 25.1% of the training energy consumption compared to ByteScheduler and WFBP, respectively.
{"title":"A Dynamic Sliding Window Based Tensor Communication Scheduling Framework for Distributed Deep Learning","authors":"Yunqi Gao;Bing Hu;Mahdi Boloursaz Mashhadi;Wei Wang;Rahim Tafazolli;Mérouane Debbah","doi":"10.1109/TNSE.2024.3523320","DOIUrl":"https://doi.org/10.1109/TNSE.2024.3523320","url":null,"abstract":"Simultaneous tensor communication can effectively improve the scalability of distributed deep learning on large clusters. However, a fixed number of tensor blocks communicated concurrently violates the priority-based scheduling strategy and cannot minimize communication overheads. In this paper, we propose a novel simultaneous tensor communication framework, namely D-Credit, which transmits tensor blocks based on dynamic sliding windows to minimize per-iteration time in distributed DNN training. We build the mathematical model of D-Credit in two phases: (1) the overlap of gradient communication and backward propagation, and (2) the overlap of gradient communication and forward computation. We drive the optimal window sizes for the second phase analytically, and develop a greedy algorithm to efficiently determine the dynamic window sizes for the first phase of D-Credit. We implement the D-Credit architecture on PyTorch framework. Experimental results on two different GPU clusters demonstrate that at training speed, D-Credit can achieve up to 1.26x, 1.21x, 1.48x and 1.53x speedup compared to ByteScheduler, DeAR, PyTorch-DDP and WFBP, respectively. At energy consumption, D-Credit saves up to 17.8% and 25.1% of the training energy consumption compared to ByteScheduler and WFBP, respectively.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 2","pages":"1080-1095"},"PeriodicalIF":6.7,"publicationDate":"2024-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143464344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Gas-Efficient Authenticated Range Query Schemes in Hybrid-Storage Blockchain
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-12-26 DOI: 10.1109/TNSE.2024.3521398
Yulong Chen;Bo Yin;Alia Asheralieva;Xuetao Wei
Blockchain is a promising technology that ensures data integrity for applications. However, the expensive cost of blockchain storage makes putting all data on-chain impossible. Hybrid-storage blockchain (HSB) can alleviate this problem by storing the data content off-chain and the data hash on-chain while using an authenticated data structure (ADS) in the smart contract to ensure the integrity of data storage and retrieval. The key challenge in HSB is minimizing the maintenance cost of ADS on-chain. In this paper, we focus on the authenticated range query in HSB and propose a new scheme named UpOnFly to efficiently maintain the root of the MB-tree as ADS for any dynamic changes without using all the data or storing internal nodes of the tree in the smart contract. Furthermore, without sacrificing much off-chain verification performance, we propose another new scheme named KeyLink that decouples the on-chain ADS and the off-chain index and only maintains the order of all data keys in the smart contract, in which the ADS maintenance cost is significantly reduced and will not increase with the dataset size. Extensive experimental results demonstrate that the UpOnFly scheme requires only $63%$ and $48%$ of the gas consumption of the state-of-the-art approach $GEM^{2*}$-tree with the dataset size of $10^6$ and $10^8$, respectively. The KeyLink scheme is even more efficient, requiring only $29%$ and $18%$ of the gas consumption of $GEM^{2*}$-tree with the dataset size of $10^6$ and $10^8$, respectively.
区块链是一项前景广阔的技术,可确保应用程序的数据完整性。然而,区块链存储成本昂贵,不可能将所有数据都放在链上。混合存储区块链(HSB)可以缓解这一问题,它将数据内容存储在链外,将数据哈希值存储在链上,同时在智能合约中使用认证数据结构(ADS)来确保数据存储和检索的完整性。HSB 的关键挑战在于最大限度地降低链上 ADS 的维护成本。在本文中,我们将重点放在 HSB 中的认证范围查询上,并提出了一种名为 UpOnFly 的新方案,在不使用智能合约中的所有数据或存储树的内部节点的情况下,有效地维护 MB 树的根作为 ADS,以应对任何动态变化。此外,在不牺牲大量链外验证性能的前提下,我们提出了另一种名为 KeyLink 的新方案,该方案将链上 ADS 与链外索引解耦,只维护智能合约中所有数据密钥的顺序,其中 ADS 的维护成本大幅降低,且不会随数据集规模的增加而增加。大量实验结果表明,在数据集规模分别为10^6美元和10^8美元的情况下,UpOnFly方案的耗气量仅为最先进方法$GEM^{2*}$树的63%$和48%$。KeyLink 方案的效率更高,在数据集大小为 10^6$ 和 10^8$ 的情况下,其耗气量分别仅为 $GEM^{2*}$-tree 的 29%$ 和 18%$。
{"title":"New Gas-Efficient Authenticated Range Query Schemes in Hybrid-Storage Blockchain","authors":"Yulong Chen;Bo Yin;Alia Asheralieva;Xuetao Wei","doi":"10.1109/TNSE.2024.3521398","DOIUrl":"https://doi.org/10.1109/TNSE.2024.3521398","url":null,"abstract":"Blockchain is a promising technology that ensures data integrity for applications. However, the expensive cost of blockchain storage makes putting all data on-chain impossible. Hybrid-storage blockchain (HSB) can alleviate this problem by storing the data content off-chain and the data hash on-chain while using an authenticated data structure (ADS) in the smart contract to ensure the integrity of data storage and retrieval. The key challenge in HSB is minimizing the maintenance cost of ADS on-chain. In this paper, we focus on the authenticated range query in HSB and propose a new scheme named UpOnFly to efficiently maintain the root of the MB-tree as ADS for any dynamic changes without using all the data or storing internal nodes of the tree in the smart contract. Furthermore, without sacrificing much off-chain verification performance, we propose another new scheme named KeyLink that decouples the on-chain ADS and the off-chain index and only maintains the order of all data keys in the smart contract, in which the ADS maintenance cost is significantly reduced and will not increase with the dataset size. Extensive experimental results demonstrate that the UpOnFly scheme requires only <inline-formula><tex-math>$63%$</tex-math></inline-formula> and <inline-formula><tex-math>$48%$</tex-math></inline-formula> of the gas consumption of the state-of-the-art approach <inline-formula><tex-math>$GEM^{2*}$</tex-math></inline-formula>-tree with the dataset size of <inline-formula><tex-math>$10^6$</tex-math></inline-formula> and <inline-formula><tex-math>$10^8$</tex-math></inline-formula>, respectively. The KeyLink scheme is even more efficient, requiring only <inline-formula><tex-math>$29%$</tex-math></inline-formula> and <inline-formula><tex-math>$18%$</tex-math></inline-formula> of the gas consumption of <inline-formula><tex-math>$GEM^{2*}$</tex-math></inline-formula>-tree with the dataset size of <inline-formula><tex-math>$10^6$</tex-math></inline-formula> and <inline-formula><tex-math>$10^8$</tex-math></inline-formula>, respectively.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 2","pages":"925-942"},"PeriodicalIF":6.7,"publicationDate":"2024-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143465652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aperiodically Intermittent Dynamic Event-Triggered Control for Predefined-Time Synchronization of Stochastic Complex Networks
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-12-25 DOI: 10.1109/TNSE.2024.3521598
Lei Xue;Haoyu Zhou;Yongbao Wu;Jian Liu;Donald C. Wunsch
In this paper, the problem of practical predefined-time synchronization in mean square (PTSMS) of stochastic complex networks (SCNs) is investigated through dynamic event-triggered control (E-TC). Different from the existing literature, this paper considers the dynamic E-TC in an aperiodically intermittent control framework and employs the average control rate, which makes it easier to satisfy the conditions of the theorem. In comparison to existing finite-time and fixed-time synchronization, by introducing the time-varying function, it can be guaranteed that all states of SCNs achieve the practical PTSMS within a preset time without calculating the convergence time. Combined with stochastic analysis theory, the practical PTSMS criterion for aperiodically intermittent dynamic event-triggered control (AIDE-TC) is derived by constructing a Lyapunov function with an auxiliary function. In addition, all event generators for AIDE-TC proposed in this paper ensure a minimum inter-event interval for each sample path solution, thus excluding Zeno behavior. Finally, to demonstrate that the model in this paper can be applied to real-world networks, the theoretical results are verified by an application of the Kuramoto oscillator networks.
{"title":"Aperiodically Intermittent Dynamic Event-Triggered Control for Predefined-Time Synchronization of Stochastic Complex Networks","authors":"Lei Xue;Haoyu Zhou;Yongbao Wu;Jian Liu;Donald C. Wunsch","doi":"10.1109/TNSE.2024.3521598","DOIUrl":"https://doi.org/10.1109/TNSE.2024.3521598","url":null,"abstract":"In this paper, the problem of practical predefined-time synchronization in mean square (PTSMS) of stochastic complex networks (SCNs) is investigated through dynamic event-triggered control (E-TC). Different from the existing literature, this paper considers the dynamic E-TC in an aperiodically intermittent control framework and employs the average control rate, which makes it easier to satisfy the conditions of the theorem. In comparison to existing finite-time and fixed-time synchronization, by introducing the time-varying function, it can be guaranteed that all states of SCNs achieve the practical PTSMS within a preset time without calculating the convergence time. Combined with stochastic analysis theory, the practical PTSMS criterion for aperiodically intermittent dynamic event-triggered control (AIDE-TC) is derived by constructing a Lyapunov function with an auxiliary function. In addition, all event generators for AIDE-TC proposed in this paper ensure a minimum inter-event interval for each sample path solution, thus excluding Zeno behavior. Finally, to demonstrate that the model in this paper can be applied to real-world networks, the theoretical results are verified by an application of the Kuramoto oscillator networks.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 2","pages":"970-981"},"PeriodicalIF":6.7,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143465711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
maxREE: Maximizing Flow by Replacing Exhausted Edges in Lightning Network
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-12-25 DOI: 10.1109/TNSE.2024.3522198
Neeraj Sharma;Kalpesh Kapoor
Blockchain-based cryptocurrencies have grown rapidly over the past decade, but issues with scalability are limiting their wider adoption. Payment Channel Network, a layer two solution, is an alternative for enhancing the scalability of a blockchain network. Two users can engage in some off-chain transactions via payment channels in the network they build in order to avoid the time and expense of on-chain settlement. The number of nodes in the Bitcoin payment channel network has nearly doubled over the last two years, and this network size is proliferating. The number of transactions on the network will increase along with its growth. However, the existing distributed routing algorithms cannot effectively schedule several concurrent transactions due to their static nature. We propose the maxREE algorithm, which efficiently handles concurrent transactions with negligible overhead. Our algorithm considers substituting the necessary edges with superior alternatives to prevent the saturation of a channel's directional capacity while maintaining the height of the underlying routing tree. The transaction flow was enhanced by our proposed algorithm's self-rebalancing and link load sharing. Without compromising network privacy, the unused links are dynamically substituted for the congested ones. We have also developed a simulator, called DRLNsim, to compare our algorithm with existing techniques. On the simulator, the routing approaches are examined using multiple custom network sizes. The proposed method enabled concurrent transactions 58% more effectively on average than existing techniques. The simulation's outcomes mirror the patterns found through theoretical study.
{"title":"maxREE: Maximizing Flow by Replacing Exhausted Edges in Lightning Network","authors":"Neeraj Sharma;Kalpesh Kapoor","doi":"10.1109/TNSE.2024.3522198","DOIUrl":"https://doi.org/10.1109/TNSE.2024.3522198","url":null,"abstract":"Blockchain-based cryptocurrencies have grown rapidly over the past decade, but issues with scalability are limiting their wider adoption. Payment Channel Network, a layer two solution, is an alternative for enhancing the scalability of a blockchain network. Two users can engage in some off-chain transactions via payment channels in the network they build in order to avoid the time and expense of on-chain settlement. The number of nodes in the Bitcoin payment channel network has nearly doubled over the last two years, and this network size is proliferating. The number of transactions on the network will increase along with its growth. However, the existing distributed routing algorithms cannot effectively schedule several concurrent transactions due to their static nature. We propose the <italic>maxREE</i> algorithm, which efficiently handles concurrent transactions with negligible overhead. Our algorithm considers substituting the necessary edges with superior alternatives to prevent the saturation of a channel's directional capacity while maintaining the height of the underlying routing tree. The transaction flow was enhanced by our proposed algorithm's self-rebalancing and link load sharing. Without compromising network privacy, the unused links are dynamically substituted for the congested ones. We have also developed a simulator, called <italic>DRLNsim</i>, to compare our algorithm with existing techniques. On the simulator, the routing approaches are examined using multiple custom network sizes. The proposed method enabled concurrent transactions 58% more effectively on average than existing techniques. The simulation's outcomes mirror the patterns found through theoretical study.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 2","pages":"1011-1025"},"PeriodicalIF":6.7,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143465696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Liking Group in Networks With Multi-Class Nodes
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-12-25 DOI: 10.1109/TNSE.2024.3520967
Fan Wang;Alex Smolyak;Gaogao Dong;Lixin Tian;Shlomo Havlin;Alon Sela
Nodes in complex networks are generally allocated into groups using community detection methods. These communities are based on the interactions between nodes (links). Conversely, in machine learning, clustering methods group data points into classes based on their attribute's similarities regardless of their interactions. Although both communities and clustering methods classify data points into groups, they are fundamentally different. Clustering relies on attribute similarity, while communities focus on interaction patterns. The present study bridges these two distinct approaches by introducing a new concept - Self-Liking Groups (SLG). Based on entropy considerations, SLG quantifies the preference of node classes to interact with similar ones based on their communication patterns, thus combining both the community and the clustering methods. We demonstrate SLG in three case studies: (i) A career network of 2.5 million companies, linked by 8 million job switches. Here, SLG reveals the openness of different industrial sectors to workers in other sectors. For example, the Healthcare sector shows the highest SLG, i.e., it is the least open to accepting workers from other sectors, while the Energy sector has a high SLG, but only for educated workers. Also, managers' shift between different sectors is more limited due to higher SLG. (ii) A scientific co-authorship network where SLG measures the openness of collaboration between different countries. China, India and Japan, have stronger SLG and are thus more likely to collaborate with scientists in their own country compared to the USA, Canada, and most EU countries. (iii) In the medical scientific research space, SLG reveals that Japan, a country known for its longevity, is extremely close compared to China or India. We also find that SLG is a stable measure across various community detection methods and initial parameter spaces. This implies that SLG captures a fundamental property of networks with heterogeneous nodes and is useful in analyzing real complex network scenarios.
{"title":"Self-Liking Group in Networks With Multi-Class Nodes","authors":"Fan Wang;Alex Smolyak;Gaogao Dong;Lixin Tian;Shlomo Havlin;Alon Sela","doi":"10.1109/TNSE.2024.3520967","DOIUrl":"https://doi.org/10.1109/TNSE.2024.3520967","url":null,"abstract":"Nodes in complex networks are generally allocated into groups using community detection methods. These communities are based on the interactions between nodes (links). Conversely, in machine learning, <italic>clustering methods</i> group data points into classes based on their attribute's similarities regardless of their interactions. Although both communities and clustering methods classify data points into groups, they are fundamentally different. Clustering relies on attribute similarity, while communities focus on interaction patterns. The present study bridges these two distinct approaches by introducing a new concept - Self-Liking Groups (SLG). Based on entropy considerations, SLG quantifies the preference of node classes to interact with similar ones based on their communication patterns, thus combining both the community and the clustering methods. We demonstrate SLG in three case studies: (i) A career network of 2.5 million companies, linked by 8 million job switches. Here, SLG reveals the openness of different industrial sectors to workers in other sectors. For example, the Healthcare sector shows the highest SLG, i.e., it is the least open to accepting workers from other sectors, while the Energy sector has a high SLG, but only for educated workers. Also, managers' shift between different sectors is more limited due to higher SLG. (ii) A scientific co-authorship network where SLG measures the openness of collaboration between different countries. China, India and Japan, have stronger SLG and are thus more likely to collaborate with scientists in their own country compared to the USA, Canada, and most EU countries. (iii) In the medical scientific research space, SLG reveals that Japan, a country known for its longevity, is extremely close compared to China or India. We also find that SLG is a stable measure across various community detection methods and initial parameter spaces. This implies that SLG captures a fundamental property of networks with heterogeneous nodes and is useful in analyzing real complex network scenarios.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 2","pages":"888-899"},"PeriodicalIF":6.7,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143465753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FlexRout: Dynamic Routing in Blockchain Networks
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-12-25 DOI: 10.1109/TNSE.2024.3519802
Souradeep Das;Riya Tapwal;Sudip Misra
Blockchain is highly dependent on network topology and routing paths for efficient operation. The speed and effectiveness of mining are impacted by network topology, as a well-defined routing path improves the speed of mining by the faster exchange of data for verification. However, high traffic on the path, caused by the exchange of messages among the miners leads to delays in the routing path and lengthens the time needed for mining data. Moreover, the dynamic addition and termination of miners from the network affect the topology, further contributing to delays in the mining process and transactions. To address these challenges, we present a novel system called FlexRout that dynamically predicts the optimal routing path to increase the speed of the mining process. It firstly predicts miners (nodes) who can leave mining by checking their resource availability. Simultaneously, it also grants a reward or a penalty depending upon the right or wrong prediction made respectively. Experimental results demonstrate that FlexRout can significantly reduce traffic by almost 49% and latency by 50%.
{"title":"FlexRout: Dynamic Routing in Blockchain Networks","authors":"Souradeep Das;Riya Tapwal;Sudip Misra","doi":"10.1109/TNSE.2024.3519802","DOIUrl":"https://doi.org/10.1109/TNSE.2024.3519802","url":null,"abstract":"Blockchain is highly dependent on network topology and routing paths for efficient operation. The speed and effectiveness of mining are impacted by network topology, as a well-defined routing path improves the speed of mining by the faster exchange of data for verification. However, high traffic on the path, caused by the exchange of messages among the miners leads to delays in the routing path and lengthens the time needed for mining data. Moreover, the dynamic addition and termination of miners from the network affect the topology, further contributing to delays in the mining process and transactions. To address these challenges, we present a novel system called <italic>FlexRout</i> that dynamically predicts the optimal routing path to increase the speed of the mining process. It firstly predicts miners (nodes) who can leave mining by checking their resource availability. Simultaneously, it also grants a reward or a penalty depending upon the right or wrong prediction made respectively. Experimental results demonstrate that <italic>FlexRout</i> can significantly reduce traffic by almost 49% and latency by 50%.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 2","pages":"838-847"},"PeriodicalIF":6.7,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143465773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1