首页 > 最新文献

IET Communications最新文献

英文 中文
Automatic cinematography for body movement involved virtual communication 涉及虚拟通信的肢体运动自动摄影技术
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-20 DOI: 10.1049/cmu2.12748
Zixiao Yu, Honghong Wang, Kim Un

The emergence of novel AI technologies and increasingly portable wearable devices have introduced a wider range of more liberated avenues for communication and interaction between human and virtual environments. In this context, the expression of distinct emotions and movements by users may convey a variety of meanings. Consequently, an emerging challenge is how to automatically enhance the visual representation of such interactions. Here, a novel Generative Adversarial Network (GAN) based model, AACOGAN, is introduced to tackle this challenge effectively. AACOGAN model establishes a relationship between player interactions, object locations, and camera movements, subsequently generating camera shots that augment player immersion. Experimental results demonstrate that AACOGAN enhances the correlation between player interactions and camera trajectories by an average of 73%, and improves multi-focus scene quality up to 32.9%. Consequently, AACOGAN is established as an efficient and economical solution for generating camera shots appropriate for a wide range of interactive motions. Exemplary video footage can be found at https://youtu.be/Syrwbnpzgx8.

新型人工智能技术和便携式可穿戴设备的出现,为人类与虚拟环境之间的交流和互动提供了更广泛、更自由的途径。在这种情况下,用户所表达的不同情绪和动作可能会传达出不同的含义。因此,一个新出现的挑战是如何自动增强这种交互的视觉表现。为有效解决这一难题,本文引入了一种基于生成对抗网络(GAN)的新型模型 AACOGAN。AACOGAN 模型建立了玩家互动、物体位置和摄像机移动之间的关系,随后生成摄像机镜头,增强玩家的沉浸感。实验结果表明,AACOGAN 将玩家互动与摄像机运动轨迹之间的相关性平均提高了 73%,并将多焦点场景质量提高了 32.9%。因此,AACOGAN 是一种高效、经济的解决方案,可用于生成适合各种互动动作的摄像机镜头。示例视频片段可在 https://youtu.be/Syrwbnpzgx8 上找到。
{"title":"Automatic cinematography for body movement involved virtual communication","authors":"Zixiao Yu,&nbsp;Honghong Wang,&nbsp;Kim Un","doi":"10.1049/cmu2.12748","DOIUrl":"10.1049/cmu2.12748","url":null,"abstract":"<p>The emergence of novel AI technologies and increasingly portable wearable devices have introduced a wider range of more liberated avenues for communication and interaction between human and virtual environments. In this context, the expression of distinct emotions and movements by users may convey a variety of meanings. Consequently, an emerging challenge is how to automatically enhance the visual representation of such interactions. Here, a novel Generative Adversarial Network (GAN) based model, AACOGAN, is introduced to tackle this challenge effectively. AACOGAN model establishes a relationship between player interactions, object locations, and camera movements, subsequently generating camera shots that augment player immersion. Experimental results demonstrate that AACOGAN enhances the correlation between player interactions and camera trajectories by an average of 73%, and improves multi-focus scene quality up to 32.9%. Consequently, AACOGAN is established as an efficient and economical solution for generating camera shots appropriate for a wide range of interactive motions. Exemplary video footage can be found at https://youtu.be/Syrwbnpzgx8.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"344-352"},"PeriodicalIF":1.6,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12748","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140224080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic reconfigurable intelligent surface deployment for physical layer security enhancement in mmWave systems 动态可重构智能表面部署,增强毫米波系统物理层安全性
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-15 DOI: 10.1049/cmu2.12751
Qingqing Tu, Zheng Dong, Xianbing Zou, Ning Wei, Ya Li, Fei Xu

In next-generation wireless communications, reconfigurable intelligent surface (RIS) has emerged as a cost-effective technique for enhancing physical layer security (PLS) in millimeter-wave (mmWave) communications, especially under challenging scenarios with adversarial entities and obstructions. However, the primary studies for RIS incorporation in mmWave communication systems utilized static deployments, lacking adaptability and efficiency in complex environments. To address this problem, a dynamic RIS deployment design framework is introduced for PLS enhancement in mmWave systems against jamming and eavesdropping attacks. For the design, it is aimed to maximize the secrecy rate by jointly optimizing the RIS selection with the beamforming design. The resulting optimization problem is challenging to solve due to the coupling of the RIS control factor, joint beamforming design, and non-convex constraints. To tackle these issues, an efficient multi-RIS-aided PLS enhancement algorithm is proposed. It transforms the objective into a series of subproblems and employs the fractional programming technique and prox-linear block coordinate descent updating method to solve them alternatively and obtain the optimal solution. The simulations demonstrate the advantage of the dynamic deployment, which exhibits enhanced security performance with reduced complexity compared with benchmarks. Further examinations also provide insight into optimal RIS activation configurations, achieving optimal balance for securing mmWave communications against emerging threats while maintaining system efficiency.

在下一代无线通信中,可重构智能表面(RIS)已成为一种具有成本效益的技术,可用于增强毫米波(mmWave)通信中的物理层安全性(PLS),尤其是在存在敌对实体和障碍物的挑战性场景下。然而,将 RIS 纳入毫米波通信系统的主要研究采用的是静态部署,缺乏在复杂环境中的适应性和效率。为解决这一问题,我们引入了一个动态 RIS 部署设计框架,用于增强毫米波系统中的 PLS,以抵御干扰和窃听攻击。设计的目的是通过联合优化 RIS 选择和波束成形设计,最大限度地提高保密率。由于 RIS 控制因子、联合波束成形设计和非凸约束的耦合,由此产生的优化问题的求解具有挑战性。为解决这些问题,我们提出了一种高效的多 RIS 辅助 PLS 增强算法。该算法将目标转化为一系列子问题,并采用分数编程技术和近线性块坐标下降更新法交替求解,从而获得最优解。模拟结果证明了动态部署的优势,与基准相比,动态部署在降低复杂度的同时提高了安全性能。进一步的研究还有助于深入了解最佳 RIS 激活配置,从而在保持系统效率的同时,实现毫米波通信安全与新兴威胁之间的最佳平衡。
{"title":"Dynamic reconfigurable intelligent surface deployment for physical layer security enhancement in mmWave systems","authors":"Qingqing Tu,&nbsp;Zheng Dong,&nbsp;Xianbing Zou,&nbsp;Ning Wei,&nbsp;Ya Li,&nbsp;Fei Xu","doi":"10.1049/cmu2.12751","DOIUrl":"10.1049/cmu2.12751","url":null,"abstract":"<p>In next-generation wireless communications, reconfigurable intelligent surface (RIS) has emerged as a cost-effective technique for enhancing physical layer security (PLS) in millimeter-wave (mmWave) communications, especially under challenging scenarios with adversarial entities and obstructions. However, the primary studies for RIS incorporation in mmWave communication systems utilized static deployments, lacking adaptability and efficiency in complex environments. To address this problem, a dynamic RIS deployment design framework is introduced for PLS enhancement in mmWave systems against jamming and eavesdropping attacks. For the design, it is aimed to maximize the secrecy rate by jointly optimizing the RIS selection with the beamforming design. The resulting optimization problem is challenging to solve due to the coupling of the RIS control factor, joint beamforming design, and non-convex constraints. To tackle these issues, an efficient multi-RIS-aided PLS enhancement algorithm is proposed. It transforms the objective into a series of subproblems and employs the fractional programming technique and prox-linear block coordinate descent updating method to solve them alternatively and obtain the optimal solution. The simulations demonstrate the advantage of the dynamic deployment, which exhibits enhanced security performance with reduced complexity compared with benchmarks. Further examinations also provide insight into optimal RIS activation configurations, achieving optimal balance for securing mmWave communications against emerging threats while maintaining system efficiency.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"365-374"},"PeriodicalIF":1.6,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12751","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140239640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved seeds scheme in K-means clustering algorithm for the UAVs control system application 无人机控制系统应用 K 均值聚类算法中的改进种子方案
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-11 DOI: 10.1049/cmu2.12746
Qian Bi, Huadong Sun, Cheng Qian, Ke Zhang

Clustering algorithm is the primary technology used in target clustering and group status analysis which are key features of the Unmanned Aerial Vehicles (UAVs) control system. Due to variable application environment, the stability of the algorithm in the UAVs control system needs to be considered. K-means clustering is a widely used method in intelligent systems. However, K-means algorithm is susceptible to the local optimum due to the influence of the initial centroid. For this problem, the predecessors have proposed various effective solutions. These algorithms perform better on real and large-scale datasets, but they are unable to achieve optimum results with unbalanced datasets. Herein, a simpler and more effective algorithm for seed initialization is proposed, it has a better accuracy rate than the alternative algorithms.Moreover, after running tests multiple times with each algorithm independently, it has the highest stability and the lowest overall volatility. With unbalanced datasets, the proposed algorithm performs significantly better than several other algorithms and therefore can solve the problems that other algorithms have with unbalanced datasets.

聚类算法是用于目标聚类和群体状态分析的主要技术,而目标聚类和群体状态分析是无人机(UAVs)控制系统的关键特征。由于应用环境多变,需要考虑算法在无人机控制系统中的稳定性。K-means 聚类是智能系统中广泛使用的一种方法。然而,由于初始中心点的影响,K-means 算法容易出现局部最优。针对这一问题,前人提出了各种有效的解决方案。这些算法在真实的大规模数据集上表现较好,但在不平衡数据集上却无法达到最佳效果。在此,我们提出了一种更简单、更有效的种子初始化算法,与其他算法相比,它具有更好的准确率,而且在对每种算法进行多次独立测试后,它具有最高的稳定性和最低的整体波动性。在不平衡数据集上,所提出的算法的性能明显优于其他几种算法,因此可以解决其他算法在不平衡数据集上遇到的问题。
{"title":"An improved seeds scheme in K-means clustering algorithm for the UAVs control system application","authors":"Qian Bi,&nbsp;Huadong Sun,&nbsp;Cheng Qian,&nbsp;Ke Zhang","doi":"10.1049/cmu2.12746","DOIUrl":"10.1049/cmu2.12746","url":null,"abstract":"<p>Clustering algorithm is the primary technology used in target clustering and group status analysis which are key features of the Unmanned Aerial Vehicles (UAVs) control system. Due to variable application environment, the stability of the algorithm in the UAVs control system needs to be considered. K-means clustering is a widely used method in intelligent systems. However, K-means algorithm is susceptible to the local optimum due to the influence of the initial centroid. For this problem, the predecessors have proposed various effective solutions. These algorithms perform better on real and large-scale datasets, but they are unable to achieve optimum results with unbalanced datasets. Herein, a simpler and more effective algorithm for seed initialization is proposed, it has a better accuracy rate than the alternative algorithms.Moreover, after running tests multiple times with each algorithm independently, it has the highest stability and the lowest overall volatility. With unbalanced datasets, the proposed algorithm performs significantly better than several other algorithms and therefore can solve the problems that other algorithms have with unbalanced datasets.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 7","pages":"437-449"},"PeriodicalIF":1.6,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12746","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140251480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved reputation evaluation for reliable federated learning on blockchain 改进声誉评估,促进区块链上的可靠联合学习
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-08 DOI: 10.1049/cmu2.12743
Jiacheng Sui, Yi Li, Hai Huang

Worker selection is critical to the success of federated learning, but issues such as inadequate incentives and poor-quality data can negatively impact the process. The existing studies have used the multi-weight subjective logic model, but it is vulnerable to malicious evaluation and unfair to newly added nodes. In this paper, the authors propose an improved reputation evaluation algorithm that allows evaluations from different sources to influence each other and reduce the impact of malicious comments. The authors’ approach effectively distinguishes between malicious and honest users and improves worker selection and collaboration in federated learning.

工人的选择对联合学习的成功至关重要,但激励不足和数据质量差等问题会对这一过程产生负面影响。现有研究采用了多权重主观逻辑模型,但这种模型容易受到恶意评价的影响,而且对新加入的节点不公平。在本文中,作者提出了一种改进的声誉评价算法,允许不同来源的评价相互影响,减少恶意评论的影响。作者的方法能有效区分恶意用户和诚实用户,改善联合学习中的工作者选择和协作。
{"title":"Improved reputation evaluation for reliable federated learning on blockchain","authors":"Jiacheng Sui,&nbsp;Yi Li,&nbsp;Hai Huang","doi":"10.1049/cmu2.12743","DOIUrl":"https://doi.org/10.1049/cmu2.12743","url":null,"abstract":"<p>Worker selection is critical to the success of federated learning, but issues such as inadequate incentives and poor-quality data can negatively impact the process. The existing studies have used the multi-weight subjective logic model, but it is vulnerable to malicious evaluation and unfair to newly added nodes. In this paper, the authors propose an improved reputation evaluation algorithm that allows evaluations from different sources to influence each other and reduce the impact of malicious comments. The authors’ approach effectively distinguishes between malicious and honest users and improves worker selection and collaboration in federated learning.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"421-428"},"PeriodicalIF":1.6,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12743","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140546757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing 基于雾计算和边缘计算的工业机器人系统中的隐私保护数据整合方案
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-07 DOI: 10.1049/cmu2.12749
Song Han, Hui Ma, Amir Taherkordi, Dapeng Lan, Yange Chen

To solve the security problems of the moving robot system in the fog network of the Industrial Internet of Things (IIoT), this paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a k-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network data. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. Finally, experiments and simulations are conducted on the robot system of fog computing in the IIoT. The results demonstrate that the proposed scheme can improve the security and efficiency of the said robot system.

为解决工业物联网(IIoT)雾网中移动机器人系统的安全问题,本文提出了一种移动机器人系统中的隐私保护数据集成方案。首先,提出了一种新颖的数据采集增强算法来增强图像效果,并在安全数据采集阶段设计了基于Ad hoc网络的k-匿名位置和数据隐私保护协议(基于Ad hoc的KLDPP协议)来保护位置和网络数据的隐私。其次,引入了可验证密钥共享的安全多方计算,以实现机器人系统中的有效计算,防止共享作弊。第三,在安全数据存储过程中考虑了神经网络中的密文分类方法,以实现特殊应用。最后,在物联网中的雾计算机器人系统上进行了实验和仿真。结果表明,所提出的方案可以提高上述机器人系统的安全性和效率。
{"title":"Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing","authors":"Song Han,&nbsp;Hui Ma,&nbsp;Amir Taherkordi,&nbsp;Dapeng Lan,&nbsp;Yange Chen","doi":"10.1049/cmu2.12749","DOIUrl":"10.1049/cmu2.12749","url":null,"abstract":"<p>To solve the security problems of the moving robot system in the fog network of the Industrial Internet of Things (IIoT), this paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a <i>k</i>-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network data. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. Finally, experiments and simulations are conducted on the robot system of fog computing in the IIoT. The results demonstrate that the proposed scheme can improve the security and efficiency of the said robot system.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 7","pages":"461-476"},"PeriodicalIF":1.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12749","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140077533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory optimization for maximization of energy efficiency with dynamic cluster and wireless power for UAV-assisted maritime communication 针对无人机辅助海上通信的动态集群和无线功率,优化轨迹以实现能源效率最大化
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-07 DOI: 10.1049/cmu2.12742
Xiaoxuan Wang, Hengyuan Jiao, Qinghe Gao, Yue Wu, Tao Jing, Jin Qian

Nowadays, the digital development of marine ranching requires a communication system with wide coverage, high transmission rate and stable communication links. It is known that fixed-wing unmanned aerial vehicles (UAVs) have great advantages in long-range applications. They have the potential to serve as low-altitude communication platforms for maritime communication. In this study, with a developmental perspective, considering the intense growth of marine terminals in the future, a new clustering algorithm applied to cluster nonorthogonal multiple access (C-NOMA) is proposed and its advantages are investigated. In addition, considering the limited energy of marine terminals, combining the wireless power communication (WPC) technology for the UAV to charge terminals, the charging and communication time are optimized with the Lagrange multiplier method and the bisection search method. After completing the above optimization content of charging and communication, combined with the optimization results, it is found the trajectory that maximizes the energy efficiency of the UAV with the convex optimization technique. Experimental results show that the proposed clustering algorithm has good throughput performance, better fairness and lower algorithm complexity, and the proposed trajectory optimization scheme has better energy efficiency.

如今,海洋牧场的数字化发展需要一个覆盖范围广、传输速率高、通信链路稳定的通信系统。众所周知,固定翼无人机(UAV)在远距离应用方面具有很大优势。它们有可能成为海上通信的低空通信平台。本研究以发展的眼光,考虑到未来海洋终端的快速增长,提出了一种应用于集群非正交多址(C-NOMA)的新型聚类算法,并研究了其优势。此外,考虑到海洋终端的能量有限,结合无人机为终端充电的无线供电通信(WPC)技术,利用拉格朗日乘法和分段搜索法对充电和通信时间进行了优化。完成上述充电和通信优化内容后,结合优化结果,利用凸优化技术找到无人机能效最大化的轨迹。实验结果表明,所提出的聚类算法具有良好的吞吐性能、较好的公平性和较低的算法复杂度,所提出的轨迹优化方案具有较好的能量效率。
{"title":"Trajectory optimization for maximization of energy efficiency with dynamic cluster and wireless power for UAV-assisted maritime communication","authors":"Xiaoxuan Wang,&nbsp;Hengyuan Jiao,&nbsp;Qinghe Gao,&nbsp;Yue Wu,&nbsp;Tao Jing,&nbsp;Jin Qian","doi":"10.1049/cmu2.12742","DOIUrl":"10.1049/cmu2.12742","url":null,"abstract":"<p>Nowadays, the digital development of marine ranching requires a communication system with wide coverage, high transmission rate and stable communication links. It is known that fixed-wing unmanned aerial vehicles (UAVs) have great advantages in long-range applications. They have the potential to serve as low-altitude communication platforms for maritime communication. In this study, with a developmental perspective, considering the intense growth of marine terminals in the future, a new clustering algorithm applied to cluster nonorthogonal multiple access (C-NOMA) is proposed and its advantages are investigated. In addition, considering the limited energy of marine terminals, combining the wireless power communication (WPC) technology for the UAV to charge terminals, the charging and communication time are optimized with the Lagrange multiplier method and the bisection search method. After completing the above optimization content of charging and communication, combined with the optimization results, it is found the trajectory that maximizes the energy efficiency of the UAV with the convex optimization technique. Experimental results show that the proposed clustering algorithm has good throughput performance, better fairness and lower algorithm complexity, and the proposed trajectory optimization scheme has better energy efficiency.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"409-420"},"PeriodicalIF":1.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12742","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140258493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious domain detection based on semi-supervised learning and parameter optimization 基于半监督学习和参数优化的恶意域检测
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-05 DOI: 10.1049/cmu2.12739
Renjie Liao, Shuo Wang

Malicious domains provide malware with covert communication channels which poses a severe threat to cybersecurity. Despite the continuous progress in detecting malicious domains with various machine learning algorithms, maintaining up-to-date various samples with fine-labeled data for training is difficult. To handle these issues and improve the detection accuracy, a novel malicious domain detection method named MDND-SS-PO is proposed that combines semi-supervised learning and parameter optimization. The contributions of the study are as follows. First, the method extracts the statistical features of the IP address, TTL value, the NXDomain record, and the domain name query characteristics to discriminate Domain-Flux and Fast-Flux domain names simultaneously. Second, an improved DBSCAN based on the neighborhood division is designed to cluster labeled data and unlabeled data with low time consumption. Then, based on the clustering hypothesis, unlabeled data is tagged with pseudo-label according to the cluster results, which aims to train a supervised classifier effectively. Finally, Gaussian process regression is used to optimize parameter settings of the algorithm. And the Silhouette index and F1 score are introduced to evaluate the optimization results. Experimental results show that the proposed method achieved a precise detection performance of 0.885 when the ratio of labeled data is 5%.

恶意域为恶意软件提供了隐蔽的通信渠道,对网络安全构成了严重威胁。尽管各种机器学习算法在检测恶意域方面不断取得进展,但保持最新的各种样本和用于训练的精细标记数据却十分困难。为了解决这些问题并提高检测精度,我们提出了一种名为 MDND-SS-PO 的新型恶意域检测方法,该方法结合了半监督学习和参数优化。该研究的贡献如下。首先,该方法提取了 IP 地址、TTL 值、NXDomain 记录和域名查询特征的统计特征,从而同时区分出 Domain-Flux 和 Fast-Flux 域名。其次,设计了一种基于邻域划分的改进型 DBSCAN,以较低的时间消耗对已标记数据和未标记数据进行聚类。然后,基于聚类假设,根据聚类结果对未标记数据进行伪标记,从而有效地训练监督分类器。最后,利用高斯过程回归优化算法参数设置。并引入剪影指数和 F1 分数来评价优化结果。实验结果表明,当标记数据比例为 5%时,所提出的方法达到了 0.885 的精确检测性能。
{"title":"Malicious domain detection based on semi-supervised learning and parameter optimization","authors":"Renjie Liao,&nbsp;Shuo Wang","doi":"10.1049/cmu2.12739","DOIUrl":"10.1049/cmu2.12739","url":null,"abstract":"<p>Malicious domains provide malware with covert communication channels which poses a severe threat to cybersecurity. Despite the continuous progress in detecting malicious domains with various machine learning algorithms, maintaining up-to-date various samples with fine-labeled data for training is difficult. To handle these issues and improve the detection accuracy, a novel malicious domain detection method named MDND-SS-PO is proposed that combines semi-supervised learning and parameter optimization. The contributions of the study are as follows. First, the method extracts the statistical features of the IP address, TTL value, the NXDomain record, and the domain name query characteristics to discriminate Domain-Flux and Fast-Flux domain names simultaneously. Second, an improved DBSCAN based on the neighborhood division is designed to cluster labeled data and unlabeled data with low time consumption. Then, based on the clustering hypothesis, unlabeled data is tagged with pseudo-label according to the cluster results, which aims to train a supervised classifier effectively. Finally, Gaussian process regression is used to optimize parameter settings of the algorithm. And the Silhouette index and F1 score are introduced to evaluate the optimization results. Experimental results show that the proposed method achieved a precise detection performance of 0.885 when the ratio of labeled data is 5%.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"386-397"},"PeriodicalIF":1.6,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12739","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-step attribute reduction for AIoT networks 针对人工智能物联网网络的两步属性缩减法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-05 DOI: 10.1049/cmu2.12747
Chao Ren, Gaoxin Lyu, Xianmei Wang, Yao Huang, Wei Li, Lei Sun

The evolution of Artificial Intelligence of Things (AIoT) pushes connectivity from human-to-things and things-to-things, to AI-to-things, has resulted in more complex physical networks and logical associations. This has driven the demand for Internet of Things (IoT) devices with powerful edge data processing capabilities, leading to exponential growth in device quantity and data generation. However, conventional data preprocessing methods, such as data compression and encoding, often require edge devices to allocate computational resources for decoding. Additionally, some lossy compression methods, like JPEG, may result in the loss of important information, which has negative impact on the AI training. To address these challenges, this paper proposes a two-step attribute reduction approach, targeting devices and dimensions, to reduce the massive amount of data in the AIoT network while avoiding unnecessary utilization of edge device resources for decoding. The device-oriented and dimension-oriented attribute reductions identify important devices and dimensions, respectively, to mitigate the multimodal interference caused by the large-scale devices in the AIoT network and the curse of dimensionality associated with high-dimensional AIoT data. Numerical results and analysis show that this approach effectively eliminates redundant devices and numerous dimensions in the AIoT network while maintaining the basic data correlation.

人工智能物联网(AIoT)的发展推动了从人到物、物到物到人工智能物联网的连接,从而产生了更加复杂的物理网络和逻辑关联。这推动了对具有强大边缘数据处理能力的物联网(IoT)设备的需求,导致设备数量和数据生成呈指数级增长。然而,传统的数据预处理方法,如数据压缩和编码,往往需要边缘设备为解码分配计算资源。此外,一些有损压缩方法(如 JPEG)可能会导致重要信息丢失,从而对人工智能训练产生负面影响。为了应对这些挑战,本文提出了一种针对设备和维度的两步属性缩减方法,以减少 AIoT 网络中的海量数据,同时避免不必要地利用边缘设备资源进行解码。面向设备和面向维度的属性缩减分别确定了重要的设备和维度,以减轻 AIoT 网络中大规模设备造成的多模态干扰以及与高维 AIoT 数据相关的维度诅咒。数值结果和分析表明,这种方法在保持基本数据相关性的同时,有效消除了 AIoT 网络中的冗余设备和众多维度。
{"title":"Two-step attribute reduction for AIoT networks","authors":"Chao Ren,&nbsp;Gaoxin Lyu,&nbsp;Xianmei Wang,&nbsp;Yao Huang,&nbsp;Wei Li,&nbsp;Lei Sun","doi":"10.1049/cmu2.12747","DOIUrl":"10.1049/cmu2.12747","url":null,"abstract":"<p>The evolution of Artificial Intelligence of Things (AIoT) pushes connectivity from human-to-things and things-to-things, to AI-to-things, has resulted in more complex physical networks and logical associations. This has driven the demand for Internet of Things (IoT) devices with powerful edge data processing capabilities, leading to exponential growth in device quantity and data generation. However, conventional data preprocessing methods, such as data compression and encoding, often require edge devices to allocate computational resources for decoding. Additionally, some lossy compression methods, like JPEG, may result in the loss of important information, which has negative impact on the AI training. To address these challenges, this paper proposes a two-step attribute reduction approach, targeting devices and dimensions, to reduce the massive amount of data in the AIoT network while avoiding unnecessary utilization of edge device resources for decoding. The device-oriented and dimension-oriented attribute reductions identify important devices and dimensions, respectively, to mitigate the multimodal interference caused by the large-scale devices in the AIoT network and the curse of dimensionality associated with high-dimensional AIoT data. Numerical results and analysis show that this approach effectively eliminates redundant devices and numerous dimensions in the AIoT network while maintaining the basic data correlation.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 7","pages":"450-460"},"PeriodicalIF":1.6,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12747","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140079545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis one-bit DAC for MU massive MIMO downlink via efficient autoencoder based deep learning 通过基于深度学习的高效自动编码器分析用于 MU 大规模 MIMO 下行链路的一位 DAC
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-04 DOI: 10.1049/cmu2.12750
Ahlem Arfaoui, Maha Cherif, Ridha Bouallegue

Multi-user (MU) massive multiple input multiple output (mMIMO) is considered a potential technology for fifth generation (5G) and sixth-generation (6G) wireless systems. The presence of the antenna arrays at the base station level to communicate with the users or to serve tens of single antenna users leads to excessively high system costs and power consumption. The deployment 1-bit digital-to-analogue converters (DACs) in the base station can solve these problems. This paper starts by presenting an analytical study centered on the effects of 1-bit DACs on the system envisaged for a Rayleigh-type fading channel. Compact-form expressions are derived for the symbol error rate. Afterwards, an efficient end-to-end deep learning technique to compensate for the joint effect of 1-bit DAC and imperfect channel state information in downlink mMIMO systems. Moreover, to improve the performance of the considered system, a DAC mixed architecture is proposed, where a number of antennas use 1 bit DACs while the others do not. The simulations results showed the improvement in transmission quality of the downlink of the MU-mMIMO system in the presence of hardware imperfections using the considered end-to-end compensation technique.

多用户(MU)大规模多输入多输出(mMIMO)被认为是第五代(5G)和第六代(6G)无线系统的潜在技术。基站级天线阵列用于与用户通信或为数十个单天线用户提供服务,导致系统成本和功耗过高。在基站中部署 1 位数模转换器 (DAC) 可以解决这些问题。本文首先介绍了 1 位数模转换器对雷利型衰落信道系统影响的分析研究。本文得出了符号错误率的紧凑表达式。随后,介绍了一种高效的端到端深度学习技术,用于补偿下行 mMIMO 系统中 1 位 DAC 和不完善信道状态信息的共同影响。此外,为了提高所考虑系统的性能,还提出了一种 DAC 混合架构,其中一些天线使用 1 位 DAC,而其他天线则不使用。仿真结果表明,采用所考虑的端到端补偿技术,在存在硬件缺陷的情况下,MU-mMIMO 系统下行链路的传输质量得到了改善。
{"title":"Analysis one-bit DAC for MU massive MIMO downlink via efficient autoencoder based deep learning","authors":"Ahlem Arfaoui,&nbsp;Maha Cherif,&nbsp;Ridha Bouallegue","doi":"10.1049/cmu2.12750","DOIUrl":"10.1049/cmu2.12750","url":null,"abstract":"<p>Multi-user (MU) massive multiple input multiple output (mMIMO) is considered a potential technology for fifth generation (5G) and sixth-generation (6G) wireless systems. The presence of the antenna arrays at the base station level to communicate with the users or to serve tens of single antenna users leads to excessively high system costs and power consumption. The deployment 1-bit digital-to-analogue converters (DACs) in the base station can solve these problems. This paper starts by presenting an analytical study centered on the effects of 1-bit DACs on the system envisaged for a Rayleigh-type fading channel. Compact-form expressions are derived for the symbol error rate. Afterwards, an efficient end-to-end deep learning technique to compensate for the joint effect of 1-bit DAC and imperfect channel state information in downlink mMIMO systems. Moreover, to improve the performance of the considered system, a DAC mixed architecture is proposed, where a number of antennas use 1 bit DACs while the others do not. The simulations results showed the improvement in transmission quality of the downlink of the MU-mMIMO system in the presence of hardware imperfections using the considered end-to-end compensation technique.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"353-364"},"PeriodicalIF":1.6,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12750","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved resource allocation method for mapping service function chains based on A3C 基于 A3C 的用于映射服务功能链的改进型资源分配方法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-04 DOI: 10.1049/cmu2.12740
Wanwei Huang, Haobin Tian, Xiaohui Zhang, Min Huang, Song Li, Yuhua Li

Network function virtualization (NFV) technology deploys network functions as software functions on a generalised hardware platform and provides customised network services in the form of service function chain (SFC), which improves the flexibility and scalability of network services and reduces network service costs. However, irrational resource allocation during service function chain mapping will cause problems such as low resource utilisation, long service request processing time and low mapping rate. To address the unreasonable problem of service mapping resource allocation, an improved service function chain mapping resource allocation method (SA3C) based on the Asynchronous advantageous action evaluation algorithm (A3C) is proposed. This study proposes an SFC mapping model and a mathematical model for joint allocation, which modeled the minimization of processing time as a Markov process. The main network was trained and multiple sub-networks were generated in parallel using the ternary and deep reinforcement learning algorithm A3C, with the goal of identifying the optimal resource allocation strategy. The experimental simulation results show that compared with the Actor-Critic (AC) and Policy Gradient (PG) methods, SA3C algorithm can improve the resource utilisation by 9.85%, reduce the total processing time by 10.72%, and improve the mapping rate by 6.72%, by reasonably allocating node computational resources and link bandwidth communication resources.

网络功能虚拟化(NFV)技术将网络功能作为软件功能部署在通用硬件平台上,以服务功能链(SFC)的形式提供定制化网络服务,提高了网络服务的灵活性和可扩展性,降低了网络服务成本。然而,在服务功能链映射过程中,资源分配不合理会造成资源利用率低、服务请求处理时间长、映射速率低等问题。针对服务映射资源分配不合理的问题,提出了一种基于异步优势行动评估算法(A3C)的改进型服务功能链映射资源分配方法(SA3C)。本研究提出了 SFC 映射模型和联合分配数学模型,将处理时间最小化建模为马尔可夫过程。利用三元深度强化学习算法 A3C 训练了主网络,并并行生成了多个子网络,目的是确定最优资源分配策略。实验仿真结果表明,与行为批判法(AC)和策略梯度法(PG)相比,SA3C 算法通过合理分配节点计算资源和链路带宽通信资源,可提高资源利用率 9.85%,减少总处理时间 10.72%,提高映射率 6.72%。
{"title":"An improved resource allocation method for mapping service function chains based on A3C","authors":"Wanwei Huang,&nbsp;Haobin Tian,&nbsp;Xiaohui Zhang,&nbsp;Min Huang,&nbsp;Song Li,&nbsp;Yuhua Li","doi":"10.1049/cmu2.12740","DOIUrl":"10.1049/cmu2.12740","url":null,"abstract":"<p>Network function virtualization (NFV) technology deploys network functions as software functions on a generalised hardware platform and provides customised network services in the form of service function chain (SFC), which improves the flexibility and scalability of network services and reduces network service costs. However, irrational resource allocation during service function chain mapping will cause problems such as low resource utilisation, long service request processing time and low mapping rate. To address the unreasonable problem of service mapping resource allocation, an improved service function chain mapping resource allocation method (SA3C) based on the Asynchronous advantageous action evaluation algorithm (A3C) is proposed. This study proposes an SFC mapping model and a mathematical model for joint allocation, which modeled the minimization of processing time as a Markov process. The main network was trained and multiple sub-networks were generated in parallel using the ternary and deep reinforcement learning algorithm A3C, with the goal of identifying the optimal resource allocation strategy. The experimental simulation results show that compared with the Actor-Critic (AC) and Policy Gradient (PG) methods, SA3C algorithm can improve the resource utilisation by 9.85%, reduce the total processing time by 10.72%, and improve the mapping rate by 6.72%, by reasonably allocating node computational resources and link bandwidth communication resources.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"333-343"},"PeriodicalIF":1.6,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12740","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1