首页 > 最新文献

IEEE Transactions on Network Science and Engineering最新文献

英文 中文
Geometry-Based Data-Driven Complete Stealthy Attacks Against Cyber-Physical Systems 针对网络物理系统的基于几何的数据驱动型完整隐形攻击
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-12 DOI: 10.1109/TNSE.2024.3458095
Kaiyu Wang;Dan Ye
This paper proposes a data-driven complete stealthy attack strategy against cyber-physical systems (CPSs) based on the geometric approach. The attacker aims to degrade estimation performance and maintain stealthiness by compromising partial communication links of the actuator and sensor. Different from the classic analysis methods that require accurate model parameters, we focus on how to establish the connection between geometry and data-driven approaches to represent the malicious behavior of attacks on state estimation. First of all, the existence of complete stealthy attacks is analyzed. Then, the maximal attached stealthy subspace and the set of estimation errors under complete stealthy attacks are analyzed intuitively from the geometric point of view. On this basis, the complete stealthy subspace is constructed with the subspace identification method, which is applied to generate the corresponding stealthy attack sequence through the collected system input-output data. Finally, simulation results are provided to illustrate the effectiveness of the proposed strategies.
本文基于几何方法,提出了一种针对网络物理系统(CPS)的数据驱动型完全隐身攻击策略。攻击者旨在通过破坏执行器和传感器的部分通信链路来降低估计性能并保持隐蔽性。与需要精确模型参数的经典分析方法不同,我们的重点是如何建立几何方法与数据驱动方法之间的联系,以表示状态估计攻击的恶意行为。首先,我们分析了完全隐形攻击的存在。然后,从几何角度直观地分析了最大附加隐身子空间和完全隐身攻击下的估计误差集。在此基础上,利用子空间识别方法构建了完整的隐身子空间,并通过收集到的系统输入输出数据生成相应的隐身攻击序列。最后,还提供了仿真结果,以说明所提策略的有效性。
{"title":"Geometry-Based Data-Driven Complete Stealthy Attacks Against Cyber-Physical Systems","authors":"Kaiyu Wang;Dan Ye","doi":"10.1109/TNSE.2024.3458095","DOIUrl":"10.1109/TNSE.2024.3458095","url":null,"abstract":"This paper proposes a data-driven complete stealthy attack strategy against cyber-physical systems (CPSs) based on the geometric approach. The attacker aims to degrade estimation performance and maintain stealthiness by compromising partial communication links of the actuator and sensor. Different from the classic analysis methods that require accurate model parameters, we focus on how to establish the connection between geometry and data-driven approaches to represent the malicious behavior of attacks on state estimation. First of all, the existence of complete stealthy attacks is analyzed. Then, the maximal attached stealthy subspace and the set of estimation errors under complete stealthy attacks are analyzed intuitively from the geometric point of view. On this basis, the complete stealthy subspace is constructed with the subspace identification method, which is applied to generate the corresponding stealthy attack sequence through the collected system input-output data. Finally, simulation results are provided to illustrate the effectiveness of the proposed strategies.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"5839-5849"},"PeriodicalIF":6.7,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hide and Recognize Your Privacy Image 隐藏和识别您的隐私图像
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-11 DOI: 10.1109/TNSE.2024.3456103
Zhiying Zhu;Hang Zhou;Haoqi Hu;Qingchao Jiang;Zhenxing Qian;Xinpeng Zhang
Recent studies have demonstrated that deep neural networks show excellent performance in information hiding. Considering the tremendous progress that deep learning has made in image recognition, we explore whether neural networks can recognize invisible private images hidden in cover images. In this article, we propose a method for image recognition in the covert domain using neural networks. Our target is to hide an image inside another image with minimal visual quality loss, while at the same time, the hidden image can be recognized correctly without being recovered. In the proposed system, the hiding and recognition of secret images are all performed by neural networks. The hiding network and the recognition network are designed to specifically work as a pair. We design and jointly train preparation, hiding, and recognition networks, where given a cover and a secret image, the preparation network reduces redundant information of the secret image, the hiding network produces a stego image that is visually indistinguishable from the cover image, and the PSNR and SSIM reach 38.5 dB and 0.991 on the MNIST & CIFAR-10 dataset and 41.8 dB and 0.995 on the CelebA & Scene dataset, respectively. The recognition network can correctly identify the secret image inside the stego image which reaches 98.3% recognition accuracy on MNIST dataset and 91.6% recognition accuracy on CelebA dataset in the covert domain, less than 1% recognition decrease compared with direct recognition. In summary, our approach can successfully identify the secret image without revealing its content. Across various datasets, both the classification accuracy and the invisibility of private images are consistently satisfactory.
最近的研究表明,深度神经网络在信息隐藏方面表现出色。考虑到深度学习在图像识别方面取得的巨大进步,我们探讨了神经网络能否识别隐藏在覆盖图像中的不可见隐私图像。在本文中,我们提出了一种利用神经网络进行隐蔽领域图像识别的方法。我们的目标是以最小的视觉质量损失将图像隐藏在另一幅图像中,同时,被隐藏的图像可以被正确识别而不被复原。在所提出的系统中,秘密图像的隐藏和识别均由神经网络完成。隐藏网络和识别网络专门设计为一对。我们设计并联合训练了准备网络、隐藏网络和识别网络,在给定一张封面图像和一张秘密图像的情况下,准备网络减少了秘密图像的冗余信息,隐藏网络生成了与封面图像在视觉上无法区分的偷窃图像,在 MNIST 和 CIFAR-10 数据集上的 PSNR 和 SSIM 分别达到了 38.5 dB 和 0.991,在 CelebA 和 Scene 数据集上的 PSNR 和 SSIM 分别达到了 41.8 dB 和 0.995。在隐蔽领域,识别网络能正确识别隐秘图像中的秘密图像,在 MNIST 数据集上的识别准确率达到 98.3%,在 CelebA 数据集上的识别准确率达到 91.6%,与直接识别相比识别率下降不到 1%。总之,我们的方法可以在不泄露图像内容的情况下成功识别秘密图像。在各种数据集上,分类准确率和隐秘图像的隐蔽性都一直令人满意。
{"title":"Hide and Recognize Your Privacy Image","authors":"Zhiying Zhu;Hang Zhou;Haoqi Hu;Qingchao Jiang;Zhenxing Qian;Xinpeng Zhang","doi":"10.1109/TNSE.2024.3456103","DOIUrl":"10.1109/TNSE.2024.3456103","url":null,"abstract":"Recent studies have demonstrated that deep neural networks show excellent performance in information hiding. Considering the tremendous progress that deep learning has made in image recognition, we explore whether neural networks can recognize invisible private images hidden in cover images. In this article, we propose a method for image recognition in the covert domain using neural networks. Our target is to hide an image inside another image with minimal visual quality loss, while at the same time, the hidden image can be recognized correctly without being recovered. In the proposed system, the hiding and recognition of secret images are all performed by neural networks. The hiding network and the recognition network are designed to specifically work as a pair. We design and jointly train preparation, hiding, and recognition networks, where given a cover and a secret image, the preparation network reduces redundant information of the secret image, the hiding network produces a stego image that is visually indistinguishable from the cover image, and the PSNR and SSIM reach 38.5 dB and 0.991 on the MNIST & CIFAR-10 dataset and 41.8 dB and 0.995 on the CelebA & Scene dataset, respectively. The recognition network can correctly identify the secret image inside the stego image which reaches 98.3% recognition accuracy on MNIST dataset and 91.6% recognition accuracy on CelebA dataset in the covert domain, less than 1% recognition decrease compared with direct recognition. In summary, our approach can successfully identify the secret image without revealing its content. Across various datasets, both the classification accuracy and the invisibility of private images are consistently satisfactory.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6130-6142"},"PeriodicalIF":6.7,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Higher-Order Rewiring Strategy for Enhancing Robustness of Multiplex Aviation Networks 增强复用航空网络鲁棒性的高阶重布线策略
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-11 DOI: 10.1109/TNSE.2024.3422471
Dongming Fan;Meng Liu;Xingshuo Hai;Yi Ren;Qiang Feng
Aviation networks consist of networks of flight services provided by numerous airlines and are represented in the form of multiplex networks composed of a set of nodes, multiple layers of links, and coupling node relationships across all layers. However, multiplex aviation networks (MANs) are vulnerable to disturbances due to potential cascading failures. Thus, the robustness of MANs must be maintained. Previous studies on the robustness of MANs have mainly focused on the pairwise interactions between two nodes, which are insufficient for characterizing the dynamic processes of actual MANs. In addition, current cascading failure models are not adequate for MANs, as flow must be redistributed within multiplex networks rather than to nearby airports. To solve these issues, this study developed a topology model of MANs and introduced a model of node congestion to simulate the cascading failure process. Given the robustness assessment of MANs under intentional attacks, numerous analyses of higher-order interactions in networks are conducted. A higher-order cycle structure rewiring strategy is proposed to enhance the dynamic interaction among the layers and further improve the robustness of the MANs. Extensive experiments on synthetic and actual EU-Air multiplex networks are presented to illustrate the superiority of the proposed approach over state-of-the-art algorithms in improving the robustness of MANs.
航空网络由众多航空公司提供的飞行服务网络组成,以多路复用网络的形式呈现,由一组节点、多层链接和跨所有层的耦合节点关系组成。然而,多路复用航空网络(MAN)很容易因潜在的级联故障而受到干扰。因此,必须保持城域网的稳健性。以往对城域网鲁棒性的研究主要集中在两个节点之间的成对交互上,这不足以描述实际城域网的动态过程。此外,目前的级联故障模型也不适合城域网,因为流量必须在多路复用网络内重新分配,而不是分配到附近的机场。为解决这些问题,本研究建立了城域网拓扑模型,并引入节点拥塞模型来模拟级联故障过程。鉴于城域网在蓄意攻击下的鲁棒性评估,对网络中的高阶交互作用进行了大量分析。提出了一种高阶循环结构重布线策略,以增强各层之间的动态交互,进一步提高城域网的鲁棒性。在合成和实际的欧盟航空多路复用网络上进行了广泛的实验,以说明所提出的方法在提高城域网鲁棒性方面优于最先进的算法。
{"title":"Higher-Order Rewiring Strategy for Enhancing Robustness of Multiplex Aviation Networks","authors":"Dongming Fan;Meng Liu;Xingshuo Hai;Yi Ren;Qiang Feng","doi":"10.1109/TNSE.2024.3422471","DOIUrl":"10.1109/TNSE.2024.3422471","url":null,"abstract":"Aviation networks consist of networks of flight services provided by numerous airlines and are represented in the form of multiplex networks composed of a set of nodes, multiple layers of links, and coupling node relationships across all layers. However, multiplex aviation networks (MANs) are vulnerable to disturbances due to potential cascading failures. Thus, the robustness of MANs must be maintained. Previous studies on the robustness of MANs have mainly focused on the pairwise interactions between two nodes, which are insufficient for characterizing the dynamic processes of actual MANs. In addition, current cascading failure models are not adequate for MANs, as flow must be redistributed within multiplex networks rather than to nearby airports. To solve these issues, this study developed a topology model of MANs and introduced a model of node congestion to simulate the cascading failure process. Given the robustness assessment of MANs under intentional attacks, numerous analyses of higher-order interactions in networks are conducted. A higher-order cycle structure rewiring strategy is proposed to enhance the dynamic interaction among the layers and further improve the robustness of the MANs. Extensive experiments on synthetic and actual EU-Air multiplex networks are presented to illustrate the superiority of the proposed approach over state-of-the-art algorithms in improving the robustness of MANs.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6417-6430"},"PeriodicalIF":6.7,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Open-Set Intrusion Detection in VANETs: An Efficient Meta-Recognition Approach 在 VANET 中实现开放集入侵检测:一种高效的元识别方法
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-11 DOI: 10.1109/TNSE.2024.3459087
Jing Zhang;Zichen Pan;Jie Cui;Hong Zhong;Jiaxin Li;Debiao He
Vehicular intrusion detection systems (IDS) are crucial to ensure the security of vehicular ad hoc networks (VANETs). However, most current IDS for vehicles have been developed using closed datasets, resulting in a limited detection range. Furthermore, in the real world, updates to IDS often fall behind the emergence of novel and unknown attacks, rendering these systems ineffective in defending against such attacks. To overcome this limitation and protect against network attacks in open scenarios, we propose a novel vehicular intrusion detection method that uses meta-recognition. This method utilizes a new neural network to extract joint features and calibrate the predicted values of a pre-trained model via extreme value theory (EVT). In addition, to adapt to the VANETs environment, we introduce temperature scaling and tail separation sampling methods to enhance the modeling effect and increase the prediction accuracy. Comprehensive experiments indicated that the proposed method can detect known attacks at a fine-grained level, identify unknown attacks, and outperform the current state-of-the-art schemes.
车载入侵检测系统(IDS)对于确保车载特设网络(VANET)的安全至关重要。然而,目前大多数车载 IDS 都是利用封闭数据集开发的,因此检测范围有限。此外,在现实世界中,IDS 的更新往往落后于新出现的未知攻击,导致这些系统无法有效抵御此类攻击。为了克服这一局限,防范开放场景中的网络攻击,我们提出了一种使用元识别的新型车辆入侵检测方法。该方法利用新型神经网络提取联合特征,并通过极值理论(EVT)校准预训练模型的预测值。此外,为了适应 VANETs 环境,我们引入了温度缩放和尾部分离采样方法,以增强建模效果,提高预测精度。综合实验表明,所提出的方法能在细粒度水平上检测已知攻击,识别未知攻击,并优于目前最先进的方案。
{"title":"Toward Open-Set Intrusion Detection in VANETs: An Efficient Meta-Recognition Approach","authors":"Jing Zhang;Zichen Pan;Jie Cui;Hong Zhong;Jiaxin Li;Debiao He","doi":"10.1109/TNSE.2024.3459087","DOIUrl":"10.1109/TNSE.2024.3459087","url":null,"abstract":"Vehicular intrusion detection systems (IDS) are crucial to ensure the security of vehicular ad hoc networks (VANETs). However, most current IDS for vehicles have been developed using closed datasets, resulting in a limited detection range. Furthermore, in the real world, updates to IDS often fall behind the emergence of novel and unknown attacks, rendering these systems ineffective in defending against such attacks. To overcome this limitation and protect against network attacks in open scenarios, we propose a novel vehicular intrusion detection method that uses meta-recognition. This method utilizes a new neural network to extract joint features and calibrate the predicted values of a pre-trained model via extreme value theory (EVT). In addition, to adapt to the VANETs environment, we introduce temperature scaling and tail separation sampling methods to enhance the modeling effect and increase the prediction accuracy. Comprehensive experiments indicated that the proposed method can detect known attacks at a fine-grained level, identify unknown attacks, and outperform the current state-of-the-art schemes.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6589-6604"},"PeriodicalIF":6.7,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Stealthy Attacks on Stochastic Event-Based Remote Estimation Under Packet Dropouts 数据包丢失情况下基于随机事件的远程估计的混合隐形攻击
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-10 DOI: 10.1109/TNSE.2024.3457911
Zhi Lian;Peng Shi;Chee Peng Lim;Imre J. Rudas;Ramesh K. Agarwal
Security related issues of cyber-physical systems are important and interesting from the perspectives of both attackers and defenders. In this paper, we design a stochastic event-based stealthy hybrid attack scheme for remote state estimation in the event of packet dropouts. The objective of the attacker is to maximize the performance degradation while remaining stealthy. Firstly, attack stealthiness is characterized based on the probability distribution and transmission rate. With the stealthiness constraints, an innovation-based stealthy attack model is designed under the assumption that attackers can intercept and modify the measurement innovations. Then, an optimal hybrid attack technique is proposed to maximize the estimation error. With the developed attack strategy, attackers can launch hybrid attacks, including denial-of-service attacks and/or false data injection attacks, to block the network communication channel and compromise the transmitted measurements, therefore degrading and even destroying the system performance. Verification examples are given to illustrate the effectiveness of the attack design performance.
从攻击者和防御者的角度来看,网络物理系统的安全相关问题都非常重要和有趣。在本文中,我们设计了一种基于随机事件的隐身混合攻击方案,用于在丢包情况下进行远程状态估计。攻击者的目标是在保持隐蔽性的同时最大限度地降低性能。首先,根据概率分布和传输速率确定攻击的隐蔽性。在隐蔽性约束条件下,假设攻击者可以截获和修改测量创新,设计了基于创新的隐蔽攻击模型。然后,提出了一种最佳混合攻击技术,以最大限度地减小估计误差。利用所开发的攻击策略,攻击者可以发起混合攻击,包括拒绝服务攻击和/或虚假数据注入攻击,以阻断网络通信通道并破坏传输的测量结果,从而降低甚至破坏系统性能。本文给出了验证实例,以说明攻击设计性能的有效性。
{"title":"Hybrid Stealthy Attacks on Stochastic Event-Based Remote Estimation Under Packet Dropouts","authors":"Zhi Lian;Peng Shi;Chee Peng Lim;Imre J. Rudas;Ramesh K. Agarwal","doi":"10.1109/TNSE.2024.3457911","DOIUrl":"10.1109/TNSE.2024.3457911","url":null,"abstract":"Security related issues of cyber-physical systems are important and interesting from the perspectives of both attackers and defenders. In this paper, we design a stochastic event-based stealthy hybrid attack scheme for remote state estimation in the event of packet dropouts. The objective of the attacker is to maximize the performance degradation while remaining stealthy. Firstly, attack stealthiness is characterized based on the probability distribution and transmission rate. With the stealthiness constraints, an innovation-based stealthy attack model is designed under the assumption that attackers can intercept and modify the measurement innovations. Then, an optimal hybrid attack technique is proposed to maximize the estimation error. With the developed attack strategy, attackers can launch hybrid attacks, including denial-of-service attacks and/or false data injection attacks, to block the network communication channel and compromise the transmitted measurements, therefore degrading and even destroying the system performance. Verification examples are given to illustrate the effectiveness of the attack design performance.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"5829-5838"},"PeriodicalIF":6.7,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defense for Displacement Attacks on Distributed Formation Control Systems 防御对分布式编队控制系统的位移攻击
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-10 DOI: 10.1109/TNSE.2024.3457382
Yue Yang;Yang Xiao;Tieshan Li;Kezhong Liu
As an effective multi-agent system (MAS) control method, formation control is widely used in uncrewed systems, such as uncrewed surface/underwater/aerial vehicles and spacecrafts. However, the security issues of formation control have received little attention. Compared with traditional industry systems (such as smart grids or intelligence appliances), designing countermeasure approaches for distributed formation systems under attacks has several challenges, such as limited local information, robot mobility, and a chain reaction of attacks. In this paper, based on a classical formation control law on a group of robots, we concentrate on maintaining an acceptable formation performance under Man-in-the-Middle-based (MITM-based) displacement attacks. The MITM-based displacement attacks can utilize the property of formation maintenance and hijack the whole robot group. We propose two kinds of novel countermeasure approaches. An active approach, which is named the comparison-based identification and elimination (CIE) algorithm, can identify attack messages and calculate estimate values to replace attack messages based on local information. A passive approach can tolerate attack effects by designing a task priority adjustment (TPA) controller. The TPA controller can gradually adjust the formation maintenance priority to degrade attack effects. Simulation with several nonholonomic differentially driven mobile robots is conducted, and results show that our schemes can significantly decrease the impact of constant and time-varying attacks.
作为一种有效的多代理系统(MAS)控制方法,编队控制被广泛应用于非乘员系统,如非乘员水面/水下/空中飞行器和航天器。然而,编队控制的安全问题却很少受到关注。与传统的工业系统(如智能电网或智能家电)相比,为受到攻击的分布式编队系统设计反制方法面临多种挑战,如本地信息有限、机器人移动性和攻击的连锁反应等。本文以一组机器人的经典编队控制法为基础,重点研究如何在基于中间人(MITM)的位移攻击下保持可接受的编队性能。基于 MITM 的位移攻击可以利用队形维持的特性,劫持整个机器人群。我们提出了两种新颖的应对方法。一种主动方法被命名为基于比较的识别和消除(CIE)算法,它可以识别攻击信息,并根据本地信息计算估计值来替换攻击信息。被动方法通过设计任务优先级调整(TPA)控制器来容忍攻击影响。TPA 控制器可逐步调整编队维护优先级,以降低攻击影响。我们用几个非全局性差异驱动移动机器人进行了仿真,结果表明我们的方案可以显著降低恒定攻击和时变攻击的影响。
{"title":"Defense for Displacement Attacks on Distributed Formation Control Systems","authors":"Yue Yang;Yang Xiao;Tieshan Li;Kezhong Liu","doi":"10.1109/TNSE.2024.3457382","DOIUrl":"10.1109/TNSE.2024.3457382","url":null,"abstract":"As an effective multi-agent system (MAS) control method, formation control is widely used in uncrewed systems, such as uncrewed surface/underwater/aerial vehicles and spacecrafts. However, the security issues of formation control have received little attention. Compared with traditional industry systems (such as smart grids or intelligence appliances), designing countermeasure approaches for distributed formation systems under attacks has several challenges, such as limited local information, robot mobility, and a chain reaction of attacks. In this paper, based on a classical formation control law on a group of robots, we concentrate on maintaining an acceptable formation performance under Man-in-the-Middle-based (MITM-based) displacement attacks. The MITM-based displacement attacks can utilize the property of formation maintenance and hijack the whole robot group. We propose two kinds of novel countermeasure approaches. An active approach, which is named the comparison-based identification and elimination (CIE) algorithm, can identify attack messages and calculate estimate values to replace attack messages based on local information. A passive approach can tolerate attack effects by designing a task priority adjustment (TPA) controller. The TPA controller can gradually adjust the formation maintenance priority to degrade attack effects. Simulation with several nonholonomic differentially driven mobile robots is conducted, and results show that our schemes can significantly decrease the impact of constant and time-varying attacks.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6560-6573"},"PeriodicalIF":6.7,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game-Theoretic Incentive Mechanism for Collaborative Quality Control in Blockchain-Enhanced Carbon Emissions Verification 区块链强化碳排放核查中协作质量控制的博弈论激励机制
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-09 DOI: 10.1109/TNSE.2024.3456116
Yunhua He;Zhihao Zhou;Bin Wu;Ke Xiao;Chao Wang;Xiuzhen Cheng
Given the urgency of climate change, many countries have set carbon neutrality targets and adopted cap-and-trade (C&T) systems to regulate carbon emissions. Accurate carbon emission data is crucial for the effective operation of carbon pricing and management systems. Monitoring, Reporting, and Verification (MRV) system is at the core of these systems, facing challenges such as, inefficient verification process, and low-quality carbon emissions verification. Blockchain and smart contracts offer promising solutions to some difficulties, while the quality of carbon emissions verification still needs improvement. Therefore, we propose a blockchain-enhanced carbon emissions verification model to optimize system efficiency and support compliance verification. We employ reputation as the admission criterion, screening reliable and trustworthy verification candidates. We design a game-theoretic incentive mechanism implemented through smart contracts to promote compliance and collaborative quality control among participants. Analysis shows that our scheme drives the game model towards the Nash equilibrium that achieves collaborative quality control. Through security analysis and simulation experiments, we verify the efficacy of our mechanism concerning verification quality and procedural automation, confirming its potential to mitigate malpractices and enhance consistent compliance.
鉴于气候变化的紧迫性,许多国家都制定了碳中和目标,并采用总量控制和交易(C&T)制度来管理碳排放。准确的碳排放数据对于碳定价和管理系统的有效运行至关重要。监测、报告和核查(MRV)系统是这些系统的核心,面临着核查流程效率低下、碳排放核查质量低等挑战。区块链和智能合约为一些难题提供了有希望的解决方案,但碳排放核查的质量仍有待提高。因此,我们提出了一种区块链增强型碳排放核查模型,以优化系统效率并支持履约核查。我们采用声誉作为准入标准,筛选可靠可信的核查候选者。我们设计了一种通过智能合约实现的博弈论激励机制,以促进参与者之间的合规性和协同质量控制。分析表明,我们的方案推动博弈模型走向纳什均衡,从而实现协同质量控制。通过安全分析和模拟实验,我们验证了我们的机制在验证质量和程序自动化方面的功效,证实了它在减少不当行为和提高一致性合规性方面的潜力。
{"title":"Game-Theoretic Incentive Mechanism for Collaborative Quality Control in Blockchain-Enhanced Carbon Emissions Verification","authors":"Yunhua He;Zhihao Zhou;Bin Wu;Ke Xiao;Chao Wang;Xiuzhen Cheng","doi":"10.1109/TNSE.2024.3456116","DOIUrl":"10.1109/TNSE.2024.3456116","url":null,"abstract":"Given the urgency of climate change, many countries have set carbon neutrality targets and adopted cap-and-trade (C&T) systems to regulate carbon emissions. Accurate carbon emission data is crucial for the effective operation of carbon pricing and management systems. Monitoring, Reporting, and Verification (MRV) system is at the core of these systems, facing challenges such as, inefficient verification process, and low-quality carbon emissions verification. Blockchain and smart contracts offer promising solutions to some difficulties, while the quality of carbon emissions verification still needs improvement. Therefore, we propose a blockchain-enhanced carbon emissions verification model to optimize system efficiency and support compliance verification. We employ reputation as the admission criterion, screening reliable and trustworthy verification candidates. We design a game-theoretic incentive mechanism implemented through smart contracts to promote compliance and collaborative quality control among participants. Analysis shows that our scheme drives the game model towards the Nash equilibrium that achieves collaborative quality control. Through security analysis and simulation experiments, we verify the efficacy of our mechanism concerning verification quality and procedural automation, confirming its potential to mitigate malpractices and enhance consistent compliance.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6535-6549"},"PeriodicalIF":6.7,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamics and Regulatory Mechanisms of Innate Immunity and CD8 T Cells Synergy in Response to Viral Infections 先天免疫与 CD8 T 细胞协同应对病毒感染的动力与调控机制
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-09 DOI: 10.1109/TNSE.2024.3456231
Conghua Wang;Yuan Zhang;Tingwen Huang;Zhichun Yang
In immune systems, the innate immune response and CD8 T cells play a crucial synergistic role in combating viral pathogens. In this paper, we develop a delayed viral infection model to investigate the dynamic mechanisms governing infection outcomes. The model categorizes viral infections into five states: clearance, mild, moderate, heavy, and recurrent. A key finding is that diminished innate immune responses create a bistable condition, enabling the initial antigen load and the length of the viral incubation period to act as toggle switches that determine whether infections will be mild or heavy. Furthermore, the viral incubation period induces a Hopf bifurcation, changing mild infections from a stable state to periodic oscillations, potentially leading to recurrent infections. Interestingly, enhancing the innate immune response not only bolsters the CD8 T cell-mediated destruction of infected cells but also delays the onset of the Hopf bifurcation and reduces the adverse effects of incubation periods. These insights suggest that strengthening the innate immune response and developing drugs to shorten the incubation period are viable strategies to combat viral infections.
在免疫系统中,先天免疫反应和 CD8 T 细胞在抗击病毒病原体方面发挥着至关重要的协同作用。在本文中,我们建立了一个延迟病毒感染模型,以研究支配感染结果的动态机制。该模型将病毒感染分为五种状态:清除、轻度、中度、重度和复发。一个重要发现是,先天免疫反应的减弱造成了一种双稳态状态,使初始抗原负荷和病毒潜伏期的长短成为决定感染是轻度还是重度的切换开关。此外,病毒潜伏期会诱发霍普夫分岔,使轻度感染从稳定状态转变为周期性振荡,从而可能导致反复感染。有趣的是,增强先天性免疫反应不仅能促进 CD8 T 细胞介导的对感染细胞的破坏,还能延缓霍普夫分岔的发生,减少潜伏期的不利影响。这些见解表明,加强先天免疫反应和开发缩短潜伏期的药物是对抗病毒感染的可行策略。
{"title":"Dynamics and Regulatory Mechanisms of Innate Immunity and CD8 T Cells Synergy in Response to Viral Infections","authors":"Conghua Wang;Yuan Zhang;Tingwen Huang;Zhichun Yang","doi":"10.1109/TNSE.2024.3456231","DOIUrl":"10.1109/TNSE.2024.3456231","url":null,"abstract":"In immune systems, the innate immune response and CD8 T cells play a crucial synergistic role in combating viral pathogens. In this paper, we develop a delayed viral infection model to investigate the dynamic mechanisms governing infection outcomes. The model categorizes viral infections into five states: clearance, mild, moderate, heavy, and recurrent. A key finding is that diminished innate immune responses create a bistable condition, enabling the initial antigen load and the length of the viral incubation period to act as toggle switches that determine whether infections will be mild or heavy. Furthermore, the viral incubation period induces a Hopf bifurcation, changing mild infections from a stable state to periodic oscillations, potentially leading to recurrent infections. Interestingly, enhancing the innate immune response not only bolsters the CD8 T cell-mediated destruction of infected cells but also delays the onset of the Hopf bifurcation and reduces the adverse effects of incubation periods. These insights suggest that strengthening the innate immune response and developing drugs to shorten the incubation period are viable strategies to combat viral infections.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6550-6559"},"PeriodicalIF":6.7,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Unique Framework of Heterogeneous Augmentation Graph Contrastive Learning for Both Node and Graph Classification 用于节点和图分类的独特异构增强图对比学习框架
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-09 DOI: 10.1109/TNSE.2024.3454993
Qi Shao;Duxin Chen;Wenwu Yu
Graph contrastive learning has gained significant attention for its effectiveness in leveraging unlabeled data and achieving superior performance. However, prevalent graph contrastive learning methods often resort to graph augmentation, typically involving the removal of anchor graph structures. This strategy may compromise the essential graph information, constraining the adaptability of contrastive learning approaches across diverse tasks. To overcome this limitation, we introduce a novel augmentation technique for graph contrastive learning: heterogeneous augmentation. Through the application of heterogeneous augmentation to homogeneous anchor graphs, our method obviates the need for modifying edges and nodes, preserving the structural integrity of the anchor graph to the fullest extent. The proposed method could become a significant technique in graph augmentation, potentially influencing further research and development in this area. Our work provides a valuable contribution to the advancement of graph contrastive learning methodologies.
图对比学习能有效利用无标记数据,并取得优异的性能,因此备受关注。然而,目前流行的图对比学习方法通常采用图增强方法,通常涉及移除锚图结构。这种策略可能会损害基本的图信息,限制对比学习方法在不同任务中的适应性。为了克服这一局限,我们为图对比学习引入了一种新的增强技术:异构增强。通过将异构增强应用于同构锚图,我们的方法无需修改边和节点,最大程度地保留了锚图的结构完整性。所提出的方法可能成为图增强领域的一项重要技术,并有可能影响该领域的进一步研究和发展。我们的工作为推动图对比学习方法的发展做出了宝贵贡献。
{"title":"A Unique Framework of Heterogeneous Augmentation Graph Contrastive Learning for Both Node and Graph Classification","authors":"Qi Shao;Duxin Chen;Wenwu Yu","doi":"10.1109/TNSE.2024.3454993","DOIUrl":"10.1109/TNSE.2024.3454993","url":null,"abstract":"Graph contrastive learning has gained significant attention for its effectiveness in leveraging unlabeled data and achieving superior performance. However, prevalent graph contrastive learning methods often resort to graph augmentation, typically involving the removal of anchor graph structures. This strategy may compromise the essential graph information, constraining the adaptability of contrastive learning approaches across diverse tasks. To overcome this limitation, we introduce a novel augmentation technique for graph contrastive learning: \u0000<italic>heterogeneous augmentation</i>\u0000. Through the application of heterogeneous augmentation to homogeneous anchor graphs, our method obviates the need for modifying edges and nodes, preserving the structural integrity of the anchor graph to the fullest extent. The proposed method could become a significant technique in graph augmentation, potentially influencing further research and development in this area. Our work provides a valuable contribution to the advancement of graph contrastive learning methodologies.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"5818-5828"},"PeriodicalIF":6.7,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge-Side Cellular Network Traffic Prediction Based on Trend Graph Characterization Network 基于趋势图特征网络的边缘蜂窝网络流量预测
IF 6.7 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-09-09 DOI: 10.1109/TNSE.2024.3455784
Mingxiang Hao;Xiaochuan Sun;Yingqi Li;Haijun Zhang
Predicting edge-side cellular network traffic stands as a pivotal facilitator for network automation in next-generation communication systems. However, the traffic data at the edge exhibits significant heterogeneity, inhomogeneity, and volatility due to geographic location, human activities, and demand diversification, thus making accurate network traffic prediction a rigorous challenge. To solve this problem, this paper proposes a novel cellular network traffic prediction model in the edge-managed multi-base station (BS) scenarios, named trend graph characterization network (TGCN). Structurally, TGCN has three key components of trend feature extractor, temporal feature extractor and predictor. Firstly, the high-dimensional trend feature of traffic can be captured by the combination of ordinal pattern transition network (OPTN) and graph attention network (GAT). Furthermore, in the temporal feature extractor neural circuit policy (NCP) is introduced for multi-scale time-varying dependent features. Finally, a fully-connected layer serves as the approximator of BS traffic. On real-world datasets, we verify the superiority of our proposal via statistical analysis, prediction accuracy and ablation experiments.
边缘蜂窝网络流量预测是下一代通信系统网络自动化的关键促进因素。然而,由于地理位置、人类活动和需求多样化等原因,边缘的流量数据表现出明显的异质性、非均衡性和不稳定性,因此准确的网络流量预测是一项严峻的挑战。为解决这一问题,本文提出了一种边缘管理多基站(BS)场景下的新型蜂窝网络流量预测模型,命名为趋势图特征网络(TGCN)。从结构上看,TGCN 包括趋势特征提取器、时序特征提取器和预测器三个关键部分。首先,可通过序数模式转换网络(OPTN)和图注意网络(GAT)的组合来捕捉交通的高维趋势特征。此外,在时间特征提取器中,还引入了神经回路策略(NCP)来处理多尺度时变依赖特征。最后,全连接层作为 BS 流量的近似层。在真实世界的数据集上,我们通过统计分析、预测准确性和消融实验验证了我们建议的优越性。
{"title":"Edge-Side Cellular Network Traffic Prediction Based on Trend Graph Characterization Network","authors":"Mingxiang Hao;Xiaochuan Sun;Yingqi Li;Haijun Zhang","doi":"10.1109/TNSE.2024.3455784","DOIUrl":"10.1109/TNSE.2024.3455784","url":null,"abstract":"Predicting edge-side cellular network traffic stands as a pivotal facilitator for network automation in next-generation communication systems. However, the traffic data at the edge exhibits significant heterogeneity, inhomogeneity, and volatility due to geographic location, human activities, and demand diversification, thus making accurate network traffic prediction a rigorous challenge. To solve this problem, this paper proposes a novel cellular network traffic prediction model in the edge-managed multi-base station (BS) scenarios, named trend graph characterization network (TGCN). Structurally, TGCN has three key components of trend feature extractor, temporal feature extractor and predictor. Firstly, the high-dimensional trend feature of traffic can be captured by the combination of ordinal pattern transition network (OPTN) and graph attention network (GAT). Furthermore, in the temporal feature extractor neural circuit policy (NCP) is introduced for multi-scale time-varying dependent features. Finally, a fully-connected layer serves as the approximator of BS traffic. On real-world datasets, we verify the superiority of our proposal via statistical analysis, prediction accuracy and ablation experiments.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"6118-6129"},"PeriodicalIF":6.7,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1