首页 > 最新文献

Journal of Communications and Networks最新文献

英文 中文
Green behavior diffusion with positive and negative information in time-varying multiplex networks 时变多路网络中正负信息的绿色行为扩散
IF 2.9 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.23919/JCN.2024.000066
Xianli Sun;Linghua Zhang;Qiqing Zhai;Peng Zheng
How to comprehend the relationship between information spreading and individual behavior adoption is an essential problem in complex networks. To this end, a novel two-layer model to depict the diffusion of green behavior under the impact of positive and negative information is proposed. Positive information motivates people to adopt green behavior, while negative information reduces the adoption of green behavior. In the model, the physical contact layer describes the green behavior diffusion, and the information layer describes the positive and negative information spreading. Moreover, the social interactions of individuals in two layers change with time and are illustrated by an activity-driven model. Then, we develop the probability transition equations and derive the green behavior threshold. Next, experiments are carried out to confirm the preciseness and theoretical predictions of the new model. It reveals that the prevalence of green behavior can be promoted by restraining the negative information transmission rate and recovery rate of the green nodes while facilitating the positive information transmission rate and green behavior transmission rate. Additionally, reducing the positive information recovery rate and the recovery rate of the green nodes, and increasing the rates of forgetting negative information are beneficial for encouraging the outbreak of green behavior. Furthermore, in the physical contact layer, higher contact capacity and greater activity heterogeneity significantly facilitate green behavior spreading. In the information layer, smaller contact capacity and weaker activity heterogeneity promote diffusion when negative information dominates, whereas larger contact capacity and stronger activity heterogeneity are beneficial when positive information prevails.
如何理解信息传播与个体行为采用之间的关系是复杂网络中的一个重要问题。为此,本文提出了一种新的两层模型来描述正面和负面信息影响下的绿色行为扩散。积极信息会促使人们采取绿色行为,而消极信息会减少人们采取绿色行为。在模型中,物理接触层描述绿色行为扩散,信息层描述正负信息扩散。此外,两层个体的社会互动随时间而变化,并通过活动驱动模型来说明。然后,我们建立了概率转移方程,并推导出绿色行为阈值。接下来,通过实验验证了新模型的准确性和理论预测。研究发现,通过抑制绿色节点的负向信息传送率和恢复率,促进正向信息传送率和绿色行为传送率,可以促进绿色行为的流行。此外,降低正信息的恢复率和绿色节点的恢复率,提高负面信息的遗忘率,有利于促进绿色行为的爆发。此外,在物理接触层,更高的接触容量和更大的活动异质性显著促进了绿色行为的传播。在信息层中,当负面信息占主导地位时,较小的接触容量和较弱的活动异质性有利于扩散,而当正面信息占主导地位时,较大的接触容量和较强的活动异质性则有利于扩散。
{"title":"Green behavior diffusion with positive and negative information in time-varying multiplex networks","authors":"Xianli Sun;Linghua Zhang;Qiqing Zhai;Peng Zheng","doi":"10.23919/JCN.2024.000066","DOIUrl":"https://doi.org/10.23919/JCN.2024.000066","url":null,"abstract":"How to comprehend the relationship between information spreading and individual behavior adoption is an essential problem in complex networks. To this end, a novel two-layer model to depict the diffusion of green behavior under the impact of positive and negative information is proposed. Positive information motivates people to adopt green behavior, while negative information reduces the adoption of green behavior. In the model, the physical contact layer describes the green behavior diffusion, and the information layer describes the positive and negative information spreading. Moreover, the social interactions of individuals in two layers change with time and are illustrated by an activity-driven model. Then, we develop the probability transition equations and derive the green behavior threshold. Next, experiments are carried out to confirm the preciseness and theoretical predictions of the new model. It reveals that the prevalence of green behavior can be promoted by restraining the negative information transmission rate and recovery rate of the green nodes while facilitating the positive information transmission rate and green behavior transmission rate. Additionally, reducing the positive information recovery rate and the recovery rate of the green nodes, and increasing the rates of forgetting negative information are beneficial for encouraging the outbreak of green behavior. Furthermore, in the physical contact layer, higher contact capacity and greater activity heterogeneity significantly facilitate green behavior spreading. In the information layer, smaller contact capacity and weaker activity heterogeneity promote diffusion when negative information dominates, whereas larger contact capacity and stronger activity heterogeneity are beneficial when positive information prevails.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 6","pages":"650-665"},"PeriodicalIF":2.9,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10834484","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142937881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open access publishing agreement 开放获取出版协议
IF 2.9 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.23919/JCN.2024.000076
{"title":"Open access publishing agreement","authors":"","doi":"10.23919/JCN.2024.000076","DOIUrl":"https://doi.org/10.23919/JCN.2024.000076","url":null,"abstract":"","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 6","pages":"716-718"},"PeriodicalIF":2.9,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10834495","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142937982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single base station tracking approaches with hybrid TOA/AOD/AOA measurements in different propagation environments 不同传播环境下TOA/AOD/AOA混合测量的单基站跟踪方法
IF 2.9 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.23919/JCN.2024.000053
Shixun Wu;Miao Zhang;Kanapathippillai Cumanan;Kai Xu;Zhangli Lan
In this paper, mobile terminal (MT) tracking based on time of arrival (TOA), angle of departure (AOD), and angle of arrival (AOA) measurements with one base station is investigated. The main challenge is the unknown propagation environment, such as line-of-sight (LOS), non-line-of-sight (NLOS) modeled as one-bounce scattering or mixed LOS/NLOS propagations, which may result in heterogeneous measurements. For LOS scenario, a linear Kalman filter (LKF) algorithm is adopted through analyzing and deriving the estimated error of MT. For NLOS scenario, as the position of scatterer is unknown, a nonlinear range equation is formulated to measure the actual AOD/AOA measurements and the position of scatterer, and three different algorithms: The extended Kalman filter (EKF), unscented Kalman filter (UKF) and an approximated LKF are developed. For mixed LOS/NLOS scenario, the modified interacting multiple model LKF (M-IMM-LKF) and the identified LKF algorithms (I-LKF) are utilized to address the issue of the frequent transition between LOS and NLOS propagations. In comparison with EKF and UKF algorithms, the simulation results and running time comparisons show the superiority and effectiveness of the LKF algorithm in LOS and NLOS scenarios. Both M-IMM-LKF and I-LKF algorithms are capable to significantly reduce the localization errors, and better than three existing algorithms.
本文研究了单基站下基于到达时间(TOA)、出发角(AOD)和到达角(AOA)的移动终端跟踪问题。主要的挑战是未知的传播环境,例如视距(LOS),非视距(NLOS)建模为单弹跳散射或混合LOS/NLOS传播,这可能导致异构测量。对于LOS场景,通过分析和推导MT的估计误差,采用线性卡尔曼滤波(LKF)算法。对于NLOS场景,由于散射体的位置未知,建立了非线性距离方程来测量实际的AOD/AOA测量值和散射体的位置,并提出了扩展卡尔曼滤波(EKF)、无气味卡尔曼滤波(UKF)和近似LKF三种不同的算法。对于混合LOS/NLOS场景,利用改进的交互多模型LKF (M-IMM-LKF)和识别的LKF算法(I-LKF)解决LOS和NLOS传播频繁转换的问题。通过与EKF和UKF算法的比较,仿真结果和运行时间对比表明LKF算法在LOS和NLOS场景下的优越性和有效性。M-IMM-LKF和I-LKF算法均能显著降低定位误差,优于现有的三种算法。
{"title":"Single base station tracking approaches with hybrid TOA/AOD/AOA measurements in different propagation environments","authors":"Shixun Wu;Miao Zhang;Kanapathippillai Cumanan;Kai Xu;Zhangli Lan","doi":"10.23919/JCN.2024.000053","DOIUrl":"https://doi.org/10.23919/JCN.2024.000053","url":null,"abstract":"In this paper, mobile terminal (MT) tracking based on time of arrival (TOA), angle of departure (AOD), and angle of arrival (AOA) measurements with one base station is investigated. The main challenge is the unknown propagation environment, such as line-of-sight (LOS), non-line-of-sight (NLOS) modeled as one-bounce scattering or mixed LOS/NLOS propagations, which may result in heterogeneous measurements. For LOS scenario, a linear Kalman filter (LKF) algorithm is adopted through analyzing and deriving the estimated error of MT. For NLOS scenario, as the position of scatterer is unknown, a nonlinear range equation is formulated to measure the actual AOD/AOA measurements and the position of scatterer, and three different algorithms: The extended Kalman filter (EKF), unscented Kalman filter (UKF) and an approximated LKF are developed. For mixed LOS/NLOS scenario, the modified interacting multiple model LKF (M-IMM-LKF) and the identified LKF algorithms (I-LKF) are utilized to address the issue of the frequent transition between LOS and NLOS propagations. In comparison with EKF and UKF algorithms, the simulation results and running time comparisons show the superiority and effectiveness of the LKF algorithm in LOS and NLOS scenarios. Both M-IMM-LKF and I-LKF algorithms are capable to significantly reduce the localization errors, and better than three existing algorithms.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 6","pages":"617-631"},"PeriodicalIF":2.9,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10834482","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signal augmentation method based on mixing and adversarial training for better robustness and generalization 基于混合和对抗训练的信号增强方法具有更好的鲁棒性和泛化性
IF 2.9 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.23919/JCN.2024.000067
Li Zhang;Gang Zhou;Gangyin Sun;Chaopeng Wu
More and more deep learning methods have been applied to wireless communication systems. However, the collection of authentic signal data poses challenges. Moreover, due to the vulnerability of neural networks, adversarial attacks seriously threaten the security of communication systems based on deep learning models. Traditional signal augmentation methods expand the dataset through transformations such as rotation and flip, but these methods improve the adversarial robustness of the model little. However, common methods to improve adversarial robustness such as adversarial training not only have a high computational overhead but also potentially lead to a decrease in accuracy on clean samples. In this work, we propose a signal augmentation method called adversarial and mixed-based signal augmentation (AMSA). The method can improve the adversarial robustness of the model while expanding the dataset and does not compromise the generalization ability. It combines adversarial training with data mixing and then interpolates selected pairs of samples to form new samples in an expanded dataset consisting of original and adversarial samples thus generating more diverse data. We conduct experiments on the RML2016.10a and RML2018.01a datasets using automatic modulation recognition (AMR) models based on convolutional neural networks (CNN), long short-term memory (LSTM), convolutional long short-term deep neural networks (CLDNN), and transformer. And compare the performance in scenarios with different numbers of samples. The results show that AMSA allows the model to achieve comparable or even better adversarial robustness than using adversarial training, and reduces the degradation of the model's generalization performance on clean data.
越来越多的深度学习方法被应用到无线通信系统中。然而,真实信号数据的收集带来了挑战。此外,由于神经网络的脆弱性,对抗性攻击严重威胁到基于深度学习模型的通信系统的安全性。传统的信号增强方法通过旋转和翻转等变换来扩展数据集,但这些方法对模型的对抗鲁棒性提高甚微。然而,提高对抗鲁棒性的常用方法,如对抗训练,不仅有很高的计算开销,而且可能导致干净样本上的准确性下降。在这项工作中,我们提出了一种称为对抗和混合信号增强(AMSA)的信号增强方法。该方法可以在扩展数据集的同时提高模型的对抗鲁棒性,并且不影响模型的泛化能力。它将对抗训练与数据混合相结合,然后在由原始样本和对抗样本组成的扩展数据集中插入选定的样本对,形成新的样本,从而产生更多样化的数据。利用基于卷积神经网络(CNN)、长短期记忆(LSTM)、卷积长短期深度神经网络(CLDNN)和变压器的自动调制识别(AMR)模型,在RML2016.10a和RML2018.01a数据集上进行了实验。并比较不同样本数场景下的性能。结果表明,与使用对抗训练相比,AMSA可以使模型获得相当甚至更好的对抗鲁棒性,并且减少了模型在干净数据上泛化性能的下降。
{"title":"Signal augmentation method based on mixing and adversarial training for better robustness and generalization","authors":"Li Zhang;Gang Zhou;Gangyin Sun;Chaopeng Wu","doi":"10.23919/JCN.2024.000067","DOIUrl":"https://doi.org/10.23919/JCN.2024.000067","url":null,"abstract":"More and more deep learning methods have been applied to wireless communication systems. However, the collection of authentic signal data poses challenges. Moreover, due to the vulnerability of neural networks, adversarial attacks seriously threaten the security of communication systems based on deep learning models. Traditional signal augmentation methods expand the dataset through transformations such as rotation and flip, but these methods improve the adversarial robustness of the model little. However, common methods to improve adversarial robustness such as adversarial training not only have a high computational overhead but also potentially lead to a decrease in accuracy on clean samples. In this work, we propose a signal augmentation method called adversarial and mixed-based signal augmentation (AMSA). The method can improve the adversarial robustness of the model while expanding the dataset and does not compromise the generalization ability. It combines adversarial training with data mixing and then interpolates selected pairs of samples to form new samples in an expanded dataset consisting of original and adversarial samples thus generating more diverse data. We conduct experiments on the RML2016.10a and RML2018.01a datasets using automatic modulation recognition (AMR) models based on convolutional neural networks (CNN), long short-term memory (LSTM), convolutional long short-term deep neural networks (CLDNN), and transformer. And compare the performance in scenarios with different numbers of samples. The results show that AMSA allows the model to achieve comparable or even better adversarial robustness than using adversarial training, and reduces the degradation of the model's generalization performance on clean data.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 6","pages":"679-688"},"PeriodicalIF":2.9,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10834486","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance optimization of IEEE 802.11ax UL OFDMA random access IEEE 802.11ax UL OFDMA随机接入的性能优化
IF 2.9 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.23919/JCN.2024.000069
Pengxue Liu;Yitong Li;Dalong Zhang
This paper presents an extensive analysis of the IEEE 802.11ax uplink orthogonal frequency-division multiple access (OFDMA)-based random access (UORA) mechanism, addressing inherent inefficiencies in channel access under varying network loads. Specifically, a mathematical model is developed to analyze the system performance of the 802.11ax UORA protocol, enabling the characterization of steady-state operating points under both saturated and unsaturated conditions. Key performance metrics, including system efficiency and mean access delay, are derived as functions of the steady-state operating points. Optimization of these performance metrics through the appropriate selection of backoff parameters is explored, with the analysis validated by simulation results. Additionally, the effects of access parameter heterogeneity, multi-link operation (MLO) and multiple resource unit (MRU) operation capabilities on the performance of IEEE 802.11ax UORA mechanism are further discussed.
本文对IEEE 802.11ax上行正交频分多址(OFDMA)随机接入(UORA)机制进行了广泛的分析,解决了不同网络负载下信道接入固有的低效率问题。具体来说,开发了一个数学模型来分析802.11ax UORA协议的系统性能,从而能够在饱和和不饱和条件下对稳态工作点进行表征。关键性能指标,包括系统效率和平均接入延迟,导出为稳态工作点的函数。通过适当选择回退参数来优化这些性能指标,并通过仿真结果验证了分析结果。此外,还进一步讨论了接入参数异构性、多链路操作(MLO)和多资源单元(MRU)操作能力对IEEE 802.11ax UORA机制性能的影响。
{"title":"Performance optimization of IEEE 802.11ax UL OFDMA random access","authors":"Pengxue Liu;Yitong Li;Dalong Zhang","doi":"10.23919/JCN.2024.000069","DOIUrl":"https://doi.org/10.23919/JCN.2024.000069","url":null,"abstract":"This paper presents an extensive analysis of the IEEE 802.11ax uplink orthogonal frequency-division multiple access (OFDMA)-based random access (UORA) mechanism, addressing inherent inefficiencies in channel access under varying network loads. Specifically, a mathematical model is developed to analyze the system performance of the 802.11ax UORA protocol, enabling the characterization of steady-state operating points under both saturated and unsaturated conditions. Key performance metrics, including system efficiency and mean access delay, are derived as functions of the steady-state operating points. Optimization of these performance metrics through the appropriate selection of backoff parameters is explored, with the analysis validated by simulation results. Additionally, the effects of access parameter heterogeneity, multi-link operation (MLO) and multiple resource unit (MRU) operation capabilities on the performance of IEEE 802.11ax UORA mechanism are further discussed.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 6","pages":"580-592"},"PeriodicalIF":2.9,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10834483","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2024 Index journal of communications and networks, volume 26 2024通信与网络索引杂志,第26卷
IF 2.9 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.23919/JCN.2024.000074
This index covers all papers that appeared in JCN during 2024. The Author Index contains the primary entry for each item, listed under the first author's name, and cross-references from all coauthors. The Title Index contains paper titles for each Division in the alphabetical order from No. 1 to No. 6. Please refer to the primary entry in the Author Index for the exact title, coauthors, and comments / corrections.
该索引涵盖了JCN在2024年期间发表的所有论文。作者索引包含每个项目的主要条目,列在第一作者的名字下,以及所有共同作者的交叉引用。标题索引包含每个部门的论文标题,按字母顺序从1号到6号。请参考作者索引中的主要条目,了解确切的标题、合著者和评论/更正。
{"title":"2024 Index journal of communications and networks, volume 26","authors":"","doi":"10.23919/JCN.2024.000074","DOIUrl":"https://doi.org/10.23919/JCN.2024.000074","url":null,"abstract":"This index covers all papers that appeared in JCN during 2024. The Author Index contains the primary entry for each item, listed under the first author's name, and cross-references from all coauthors. The Title Index contains paper titles for each Division in the alphabetical order from No. 1 to No. 6. Please refer to the primary entry in the Author Index for the exact title, coauthors, and comments / corrections.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 6","pages":"1-5"},"PeriodicalIF":2.9,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10834494","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information for authors 作者信息
IF 2.9 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.23919/JCN.2024.000075
{"title":"Information for authors","authors":"","doi":"10.23919/JCN.2024.000075","DOIUrl":"https://doi.org/10.23919/JCN.2024.000075","url":null,"abstract":"","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 6","pages":"711-715"},"PeriodicalIF":2.9,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10834485","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142937981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust direction-of-arrival estimation and signal separation method for integrated sensing and communication 融合传感与通信的鲁棒到达方向估计与信号分离方法
IF 2.9 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.23919/JCN.2024.000068
Ming Chen;Liang Jin;Zheng Wan;Zheyuan Deng;Bo Zhang;Yajun Chen;Kaizhi Huang
In this study, we designed a single-channel direction-of-arrival (DOA) estimation and signal separation algorithm based on a grouping scheme for the time-varying metasurfaces (TVMs) for integrated sensing and communication systems. In this scheme, the harmonic effect of the TVM was used to transform the received single-channel signal into a multichannel signal through an orthogonal Fourier coefficient matrix. After achieving multi-channel DOA estimation, the corresponding weighted beam pointing was designed for signal separation. By applying a periodic modulation function on the TVM to modulate the incident signal, the signal was mapped to a multi-dimensional received space to recover the multi-channel received signal. Thus, conventional multi-channel algorithms could be used on the single-channel signal for DOA estimation. Next, we designed a sub-surface weighted beam pointing to maximize the received signal signal-to-interference-plus-noise ratio. Simulation results revealed that the proposed scheme of DOA estimation can exhibit performances comparable to that of the conventional multichannel antenna array. Moreover, the signal separation scheme designed based on this method was robust and could maintain good signal separation ability under a low signal-to-noise ratio.
在这项研究中,我们设计了一种基于分组方案的单通道到达方向(DOA)估计和信号分离算法,用于集成传感和通信系统的时变元表面(tvm)。该方案利用TVM的谐波效应,通过正交傅立叶系数矩阵将接收到的单通道信号转换成多通道信号。在完成多通道DOA估计后,设计相应的加权波束指向进行信号分离。通过在TVM上施加周期调制函数对入射信号进行调制,将信号映射到多维接收空间,从而恢复多通道接收信号。因此,传统的多通道算法可以用于单通道信号的DOA估计。其次,我们设计了一个亚表面加权波束指向,以最大限度地提高接收信号的信噪比。仿真结果表明,所提出的DOA估计方案具有与传统多通道天线阵列相当的性能。此外,基于该方法设计的信号分离方案具有鲁棒性,在低信噪比下仍能保持良好的信号分离能力。
{"title":"Robust direction-of-arrival estimation and signal separation method for integrated sensing and communication","authors":"Ming Chen;Liang Jin;Zheng Wan;Zheyuan Deng;Bo Zhang;Yajun Chen;Kaizhi Huang","doi":"10.23919/JCN.2024.000068","DOIUrl":"https://doi.org/10.23919/JCN.2024.000068","url":null,"abstract":"In this study, we designed a single-channel direction-of-arrival (DOA) estimation and signal separation algorithm based on a grouping scheme for the time-varying metasurfaces (TVMs) for integrated sensing and communication systems. In this scheme, the harmonic effect of the TVM was used to transform the received single-channel signal into a multichannel signal through an orthogonal Fourier coefficient matrix. After achieving multi-channel DOA estimation, the corresponding weighted beam pointing was designed for signal separation. By applying a periodic modulation function on the TVM to modulate the incident signal, the signal was mapped to a multi-dimensional received space to recover the multi-channel received signal. Thus, conventional multi-channel algorithms could be used on the single-channel signal for DOA estimation. Next, we designed a sub-surface weighted beam pointing to maximize the received signal signal-to-interference-plus-noise ratio. Simulation results revealed that the proposed scheme of DOA estimation can exhibit performances comparable to that of the conventional multichannel antenna array. Moreover, the signal separation scheme designed based on this method was robust and could maintain good signal separation ability under a low signal-to-noise ratio.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 6","pages":"689-698"},"PeriodicalIF":2.9,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10834481","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reviewer list for 2024 2024年评审名单
IF 2.9 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.23919/JCN.2024.000073
{"title":"Reviewer list for 2024","authors":"","doi":"10.23919/JCN.2024.000073","DOIUrl":"https://doi.org/10.23919/JCN.2024.000073","url":null,"abstract":"","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 6","pages":"700-705"},"PeriodicalIF":2.9,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10834489","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight privacy-preserving federated deep intrusion detection for industrial cyber-physical system 面向工业网络物理系统的轻量级隐私保护联合深度入侵检测
IF 2.9 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.23919/JCN.2024.000054
Imtiaz Ali Soomro;Hamood ur Rehman Khan;Syed Jawad Hussain;Zeeshan Ashraf;Mrim M. Alnfiai;Nouf Nawar Alotaibi
The emergence of Industry 4.0 entails extensive reliance on industrial cyber-physical systems (ICPS). ICPS promises to revolutionize industries by fusing physical systems with computational functionality. However, this potential increase in ICPS makes them prone to cyber threats, necessitating effective intrusion detection systems (IDS) systems. Privacy provision, system complexity, and system scalability are major challenges in IDS research. We present FedSecureIDS, a novel lightweight federated deep intrusion detection system that combines CNNs, LSTMs, MLPs, and federated learning (FL) to overcome these challenges. FedSecureIDS solves major security issues, namely eavesdropping and man-in-the-middle attacks, by employing a simple protocol for symmetric session key exchange and mutual authentication. Our Experimental results demonstrate that the proposed method is effective with an accuracy of 98.68%, precision of 98.78%, recall of 98.64%, and an F1-score of 99.05% with different edge devices. The model is similarly performed in conventional centralized IDS models. We also carry out formal security evaluations to confirm the resistance of the proposed framework to known attacks and provisioning of high data privacy and security.
工业4.0的出现需要广泛依赖工业网络物理系统(ICPS)。ICPS承诺通过融合物理系统和计算功能来彻底改变行业。然而,这种潜在的ICPS增加使它们容易受到网络威胁,需要有效的入侵检测系统(IDS)系统。隐私提供、系统复杂性和系统可伸缩性是IDS研究中的主要挑战。我们提出了FedSecureIDS,一种新型的轻量级联邦深度入侵检测系统,它结合了cnn、lstm、mlp和联邦学习(FL)来克服这些挑战。FedSecureIDS通过一个简单的对称会话密钥交换和相互认证协议,解决了窃听和中间人攻击等主要安全问题。实验结果表明,该方法在不同边缘设备下的准确率为98.68%,精密度为98.78%,召回率为98.64%,f1分数为99.05%。该模型在传统的集中式IDS模型中执行类似。我们还进行了正式的安全评估,以确认所提出的框架对已知攻击的抵抗力,并提供高数据隐私和安全性。
{"title":"Lightweight privacy-preserving federated deep intrusion detection for industrial cyber-physical system","authors":"Imtiaz Ali Soomro;Hamood ur Rehman Khan;Syed Jawad Hussain;Zeeshan Ashraf;Mrim M. Alnfiai;Nouf Nawar Alotaibi","doi":"10.23919/JCN.2024.000054","DOIUrl":"https://doi.org/10.23919/JCN.2024.000054","url":null,"abstract":"The emergence of Industry 4.0 entails extensive reliance on industrial cyber-physical systems (ICPS). ICPS promises to revolutionize industries by fusing physical systems with computational functionality. However, this potential increase in ICPS makes them prone to cyber threats, necessitating effective intrusion detection systems (IDS) systems. Privacy provision, system complexity, and system scalability are major challenges in IDS research. We present FedSecureIDS, a novel lightweight federated deep intrusion detection system that combines CNNs, LSTMs, MLPs, and federated learning (FL) to overcome these challenges. FedSecureIDS solves major security issues, namely eavesdropping and man-in-the-middle attacks, by employing a simple protocol for symmetric session key exchange and mutual authentication. Our Experimental results demonstrate that the proposed method is effective with an accuracy of 98.68%, precision of 98.78%, recall of 98.64%, and an F1-score of 99.05% with different edge devices. The model is similarly performed in conventional centralized IDS models. We also carry out formal security evaluations to confirm the resistance of the proposed framework to known attacks and provisioning of high data privacy and security.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 6","pages":"632-649"},"PeriodicalIF":2.9,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10834496","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1