首页 > 最新文献

Tsinghua Science and Technology最新文献

英文 中文
Camera, LiDAR, and IMU Based Multi-Sensor Fusion SLAM: A Survey 基于相机、激光雷达和IMU的多传感器融合SLAM:综述
IF 6.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.26599/TST.2023.9010010
Jun Zhu;Hongyi Li;Tao Zhang
In recent years, Simultaneous Localization And Mapping (SLAM) technology has prevailed in a wide range of applications, such as autonomous driving, intelligent robots, Augmented Reality (AR), and Virtual Reality (VR). Multi-sensor fusion using the most popular three types of sensors (e.g., visual sensor, LiDAR sensor, and IMU) is becoming ubiquitous in SLAM, in part because of the complementary sensing capabilities and the inevitable shortages (e.g., low precision and long-term drift) of the stand-alone sensor in challenging environments. In this article, we survey thoroughly the research efforts taken in this field and strive to provide a concise but complete review of the related work. Firstly, a brief introduction of the state estimator formation in SLAM is presented. Secondly, the state-of-the-art algorithms of different multi-sensor fusion algorithms are given. Then we analyze the deficiencies associated with the reviewed approaches and formulate some future research considerations. This paper can be considered as a brief guide to newcomers and a comprehensive reference for experienced researchers and engineers to explore new interesting orientations.
近年来,同步定位与映射(SLAM)技术在自动驾驶、智能机器人、增强现实(AR)和虚拟现实(VR)等广泛应用中占主导地位。使用最流行的三种传感器(例如,视觉传感器、激光雷达传感器和IMU)的多传感器融合在SLAM中变得普遍,部分原因是在具有挑战性的环境中,独立传感器具有互补的传感能力和不可避免的不足(例如,低精度和长期漂移)。在这篇文章中,我们深入调查了在这一领域所做的研究工作,并努力对相关工作进行简要但完整的回顾。首先,简要介绍了SLAM中状态估计器的构成。其次,给出了不同多传感器融合算法的最新算法。然后,我们分析了与所审查的方法相关的不足,并提出了一些未来的研究考虑。这篇论文可以被认为是新来者的简要指南,也是经验丰富的研究人员和工程师探索新的有趣方向的全面参考。
{"title":"Camera, LiDAR, and IMU Based Multi-Sensor Fusion SLAM: A Survey","authors":"Jun Zhu;Hongyi Li;Tao Zhang","doi":"10.26599/TST.2023.9010010","DOIUrl":"https://doi.org/10.26599/TST.2023.9010010","url":null,"abstract":"In recent years, Simultaneous Localization And Mapping (SLAM) technology has prevailed in a wide range of applications, such as autonomous driving, intelligent robots, Augmented Reality (AR), and Virtual Reality (VR). Multi-sensor fusion using the most popular three types of sensors (e.g., visual sensor, LiDAR sensor, and IMU) is becoming ubiquitous in SLAM, in part because of the complementary sensing capabilities and the inevitable shortages (e.g., low precision and long-term drift) of the stand-alone sensor in challenging environments. In this article, we survey thoroughly the research efforts taken in this field and strive to provide a concise but complete review of the related work. Firstly, a brief introduction of the state estimator formation in SLAM is presented. Secondly, the state-of-the-art algorithms of different multi-sensor fusion algorithms are given. Then we analyze the deficiencies associated with the reviewed approaches and formulate some future research considerations. This paper can be considered as a brief guide to newcomers and a comprehensive reference for experienced researchers and engineers to explore new interesting orientations.","PeriodicalId":60306,"journal":{"name":"Tsinghua Science and Technology","volume":"29 2","pages":"415-429"},"PeriodicalIF":6.6,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5971803/10258149/10258154.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68027595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolutionary Multi-Tasking Optimization for High-Efficiency Time Series Data Clustering 高效时间序列数据聚类的进化多任务优化
IF 6.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.26599/TST.2023.9010036
Rui Wang;Wenhua Li;Kaili Shen;Tao Zhang;Xiangke Liao
Time series clustering is a challenging problem due to the large-volume, high-dimensional, and warping characteristics of time series data. Traditional clustering methods often use a single criterion or distance measure, which may not capture all the features of the data. This paper proposes a novel method for time series clustering based on evolutionary multi-tasking optimization, termed i-MFEA, which uses an improved multifactorial evolutionary algorithm to optimize multiple clustering tasks simultaneously, each with a different validity index or distance measure. Therefore, i-MFEA can produce diverse and robust clustering solutions that satisfy various preferences of decision-makers. Experiments on two artificial datasets show that i-MFEA outperforms single-objective evolutionary algorithms and traditional clustering methods in terms of convergence speed and clustering quality. The paper also discusses how i-MFEA can address two long-standing issues in time series clustering: the choice of appropriate similarity measure and the number of clusters.
由于时间序列数据的大容量、高维和扭曲特性,时间序列聚类是一个具有挑战性的问题。传统的聚类方法通常使用单一的标准或距离度量,这可能无法捕获数据的所有特征。本文提出了一种基于进化多任务优化的时间序列聚类新方法,称为i-MFEA,该方法使用改进的多因素进化算法同时优化多个聚类任务,每个任务具有不同的有效性指数或距离测度。因此,i-MFEA可以产生多样化和稳健的聚类解决方案,满足决策者的各种偏好。在两个人工数据集上的实验表明,i-MFEA在收敛速度和聚类质量方面优于单目标进化算法和传统聚类方法。本文还讨论了i-MFEA如何解决时间序列聚类中两个长期存在的问题:适当的相似性度量的选择和聚类的数量。
{"title":"Evolutionary Multi-Tasking Optimization for High-Efficiency Time Series Data Clustering","authors":"Rui Wang;Wenhua Li;Kaili Shen;Tao Zhang;Xiangke Liao","doi":"10.26599/TST.2023.9010036","DOIUrl":"https://doi.org/10.26599/TST.2023.9010036","url":null,"abstract":"Time series clustering is a challenging problem due to the large-volume, high-dimensional, and warping characteristics of time series data. Traditional clustering methods often use a single criterion or distance measure, which may not capture all the features of the data. This paper proposes a novel method for time series clustering based on evolutionary multi-tasking optimization, termed i-MFEA, which uses an improved multifactorial evolutionary algorithm to optimize multiple clustering tasks simultaneously, each with a different validity index or distance measure. Therefore, i-MFEA can produce diverse and robust clustering solutions that satisfy various preferences of decision-makers. Experiments on two artificial datasets show that i-MFEA outperforms single-objective evolutionary algorithms and traditional clustering methods in terms of convergence speed and clustering quality. The paper also discusses how i-MFEA can address two long-standing issues in time series clustering: the choice of appropriate similarity measure and the number of clusters.","PeriodicalId":60306,"journal":{"name":"Tsinghua Science and Technology","volume":"29 2","pages":"343-355"},"PeriodicalIF":6.6,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5971803/10258149/10258256.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68027602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Analysis on AES: A Property-Based Verification Perspective AES的故障分析:基于属性的验证视角
IF 6.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.26599/TST.2023.9010035
Xiaojie Dai;Xingxin Wang;Xue Qu;Baolei Mao;Wei Hu
Fault analysis is a frequently used side-channel attack for cryptanalysis. However, existing fault attack methods usually involve complex fault fusion analysis or computation-intensive statistical analysis of massive fault traces. In this work, we take a property-based formal verification approach to fault analysis. We derive fine-grained formal models for automatic fault propagation and fusion, which establish a mathematical foundation for precise measurement and formal reasoning of fault effects. We extract the correlations in fault effects in order to create properties for fault verification. We further propose a method for key recovery, by formally checking when the extracted properties can be satisfied with partial keys as the search variables. Experimental results using both unprotected and masked advanced encryption standard (AES) implementations show that our method has a key search complexity of 216, which only requires two correct and faulty ciphertext pairs to determine the secret key, and does not assume knowledge about fault location or pattern.
故障分析是密码分析中经常使用的侧信道攻击。然而,现有的故障攻击方法通常涉及复杂的故障融合分析或大规模故障痕迹的计算密集型统计分析。在这项工作中,我们采用了一种基于属性的形式化验证方法来进行故障分析。我们推导了用于自动故障传播和融合的细粒度形式化模型,为故障影响的精确测量和形式化推理奠定了数学基础。我们提取故障效应中的相关性,以便创建用于故障验证的属性。我们进一步提出了一种密钥恢复方法,通过形式化检查何时可以用部分密钥作为搜索变量来满足提取的属性。使用未保护和屏蔽的高级加密标准(AES)实现的实验结果表明,我们的方法具有216的密钥搜索复杂度,只需要两个正确和错误的密文对来确定密钥,并且不假设知道故障位置或模式。
{"title":"Fault Analysis on AES: A Property-Based Verification Perspective","authors":"Xiaojie Dai;Xingxin Wang;Xue Qu;Baolei Mao;Wei Hu","doi":"10.26599/TST.2023.9010035","DOIUrl":"https://doi.org/10.26599/TST.2023.9010035","url":null,"abstract":"Fault analysis is a frequently used side-channel attack for cryptanalysis. However, existing fault attack methods usually involve complex fault fusion analysis or computation-intensive statistical analysis of massive fault traces. In this work, we take a property-based formal verification approach to fault analysis. We derive fine-grained formal models for automatic fault propagation and fusion, which establish a mathematical foundation for precise measurement and formal reasoning of fault effects. We extract the correlations in fault effects in order to create properties for fault verification. We further propose a method for key recovery, by formally checking when the extracted properties can be satisfied with partial keys as the search variables. Experimental results using both unprotected and masked advanced encryption standard (AES) implementations show that our method has a key search complexity of 2\u0000<sup>16</sup>\u0000, which only requires two correct and faulty ciphertext pairs to determine the secret key, and does not assume knowledge about fault location or pattern.","PeriodicalId":60306,"journal":{"name":"Tsinghua Science and Technology","volume":"29 2","pages":"576-588"},"PeriodicalIF":6.6,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5971803/10258149/10258165.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68027658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Data-Driving Multi-View Evaluation Framework for Scratch 面向数据驱动的Scratch多视图评估框架
IF 6.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.26599/TST.2023.9010016
Xiaolin Chai;Yan Sun;Yan Gao
As one of the most popular visual programming languages, Scratch has a lot of evaluation around it. Reasonable evaluation can help programmers understand their projects better. At the same time, it can also provide a reference for them to browse other projects in the online community. Most of the existing evaluations on Scratch are carried from three perspectives: Computational Thinking (CT) ability, visual presentation aesthetics, and code quality. Among them, the assessment of CT and code quality is mainly carried out from the program script, while the evaluation of visual aesthetics is analyzed from the perspective of image sequences generated by project execution. The single-view evaluation focuses on the performance of a program in a certain aspect and is one-sided. In this paper, we propose a multi-view evaluation framework to integrate various evaluations using different policies. We quantitatively analyze the assessment of different views driven by data. Combined with overall evaluations that represent human opinions, we analyze their differences and connections. Through experiments, we determine the weights of different integration policies, the proposed multi-view evaluation method can generate evaluation results similar to human opinions.
Scratch作为最流行的可视化编程语言之一,有很多关于它的评价。合理的评价可以帮助程序员更好地理解他们的项目。同时,也可以为他们在网上社区浏览其他项目提供参考。现有对Scratch的评估大多从三个角度进行:计算思维能力、视觉呈现美学和代码质量。其中,CT和代码质量的评估主要从程序脚本进行,而视觉美学的评估则从项目执行产生的图像序列的角度进行分析。单一视角的评价侧重于节目在某一方面的表现,具有片面性。在本文中,我们提出了一个多视角的评估框架,以整合使用不同政策的各种评估。我们定量分析了由数据驱动的对不同观点的评估。结合代表人类观点的整体评估,我们分析了它们的差异和联系。通过实验,我们确定了不同整合策略的权重,所提出的多视角评估方法可以产生与人类意见相似的评估结果。
{"title":"Towards Data-Driving Multi-View Evaluation Framework for Scratch","authors":"Xiaolin Chai;Yan Sun;Yan Gao","doi":"10.26599/TST.2023.9010016","DOIUrl":"https://doi.org/10.26599/TST.2023.9010016","url":null,"abstract":"As one of the most popular visual programming languages, Scratch has a lot of evaluation around it. Reasonable evaluation can help programmers understand their projects better. At the same time, it can also provide a reference for them to browse other projects in the online community. Most of the existing evaluations on Scratch are carried from three perspectives: Computational Thinking (CT) ability, visual presentation aesthetics, and code quality. Among them, the assessment of CT and code quality is mainly carried out from the program script, while the evaluation of visual aesthetics is analyzed from the perspective of image sequences generated by project execution. The single-view evaluation focuses on the performance of a program in a certain aspect and is one-sided. In this paper, we propose a multi-view evaluation framework to integrate various evaluations using different policies. We quantitatively analyze the assessment of different views driven by data. Combined with overall evaluations that represent human opinions, we analyze their differences and connections. Through experiments, we determine the weights of different integration policies, the proposed multi-view evaluation method can generate evaluation results similar to human opinions.","PeriodicalId":60306,"journal":{"name":"Tsinghua Science and Technology","volume":"29 2","pages":"517-528"},"PeriodicalIF":6.6,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5971803/10258149/10258248.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68027660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Few-Shot Graph Classification with Structural-Enhanced Contrastive Learning for Graph Data Copyright Protection 基于结构增强对比学习的少镜头图分类在图数据版权保护中的应用
IF 6.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.26599/TST.2023.9010071
Kainan Zhang;DongMyung Shin;Daehee Seo;Zhipeng Cai
Open-source licenses can promote the development of machine learning by allowing others to access, modify, and redistribute the training dataset. However, not all open-source licenses may be appropriate for data sharing, as some may not provide adequate protections for sensitive or personal information such as social network data. Additionally, some data may be subject to legal or regulatory restrictions that limit its sharing, regardless of the licensing model used. Hence, obtaining large amounts of labeled data can be difficult, time-consuming, or expensive in many real-world scenarios. Few-shot graph classification, as one application of meta-learning in supervised graph learning, aims to classify unseen graph types by only using a small amount of labeled data. However, the current graph neural network methods lack full usage of graph structures on molecular graphs and social network datasets. Since structural features are known to correlate with molecular properties in chemistry, structure information tends to be ignored with sufficient property information provided. Nevertheless, the common binary classification task of chemical compounds is unsuitable in the few-shot setting requiring novel labels. Hence, this paper focuses on the graph classification tasks of a social network, whose complex topology has an uncertain relationship with its nodes' attributes. With two multi-class graph datasets with large node-attribute dimensions constructed to facilitate the research, we propose a novel learning framework that integrates both meta-learning and contrastive learning to enhance the utilization of graph topological information. Extensive experiments demonstrate the competitive performance of our framework respective to other state-of-the-art methods.
开源许可证可以通过允许他人访问、修改和重新分发训练数据集来促进机器学习的发展。然而,并非所有开源许可证都适用于数据共享,因为有些许可证可能无法为社交网络数据等敏感或个人信息提供足够的保护。此外,无论使用何种许可模式,某些数据都可能受到限制其共享的法律或监管限制。因此,在许多现实世界的场景中,获取大量标记数据可能很困难、耗时或昂贵。少镜头图分类作为元学习在有监督图学习中的一种应用,旨在仅使用少量标记数据对看不见的图类型进行分类。然而,目前的图神经网络方法缺乏在分子图和社交网络数据集上充分利用图结构。由于已知结构特征与化学中的分子性质相关,在提供足够的性质信息的情况下,结构信息往往被忽略。然而,化合物的常见二元分类任务不适合需要新标签的少数镜头设置。因此,本文关注的是社交网络的图分类任务,其复杂拓扑与其节点的属性具有不确定关系。通过构建两个具有大节点属性维度的多类图数据集来促进研究,我们提出了一种新的学习框架,该框架集成了元学习和对比学习,以提高图拓扑信息的利用率。大量的实验证明了我们的框架相对于其他最先进的方法的竞争性能。
{"title":"Few-Shot Graph Classification with Structural-Enhanced Contrastive Learning for Graph Data Copyright Protection","authors":"Kainan Zhang;DongMyung Shin;Daehee Seo;Zhipeng Cai","doi":"10.26599/TST.2023.9010071","DOIUrl":"https://doi.org/10.26599/TST.2023.9010071","url":null,"abstract":"Open-source licenses can promote the development of machine learning by allowing others to access, modify, and redistribute the training dataset. However, not all open-source licenses may be appropriate for data sharing, as some may not provide adequate protections for sensitive or personal information such as social network data. Additionally, some data may be subject to legal or regulatory restrictions that limit its sharing, regardless of the licensing model used. Hence, obtaining large amounts of labeled data can be difficult, time-consuming, or expensive in many real-world scenarios. Few-shot graph classification, as one application of meta-learning in supervised graph learning, aims to classify unseen graph types by only using a small amount of labeled data. However, the current graph neural network methods lack full usage of graph structures on molecular graphs and social network datasets. Since structural features are known to correlate with molecular properties in chemistry, structure information tends to be ignored with sufficient property information provided. Nevertheless, the common binary classification task of chemical compounds is unsuitable in the few-shot setting requiring novel labels. Hence, this paper focuses on the graph classification tasks of a social network, whose complex topology has an uncertain relationship with its nodes' attributes. With two multi-class graph datasets with large node-attribute dimensions constructed to facilitate the research, we propose a novel learning framework that integrates both meta-learning and contrastive learning to enhance the utilization of graph topological information. Extensive experiments demonstrate the competitive performance of our framework respective to other state-of-the-art methods.","PeriodicalId":60306,"journal":{"name":"Tsinghua Science and Technology","volume":"29 2","pages":"605-616"},"PeriodicalIF":6.6,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5971803/10258149/10258268.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68028923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cover
IF 6.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22
{"title":"Cover","authors":"","doi":"","DOIUrl":"https://doi.org/","url":null,"abstract":"","PeriodicalId":60306,"journal":{"name":"Tsinghua Science and Technology","volume":"29 2","pages":"1-1"},"PeriodicalIF":6.6,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5971803/10258149/10258282.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68027591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning Security and Privacy-Preserving Algorithm and Experiments Research Under Internet of Things Critical Infrastructure 物联网关键基础设施下的联合学习安全与隐私保护算法及实验研究
IF 6.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.26599/TST.2023.9010007
Nasir Ahmad Jalali;Hongsong Chen
The widespread use of the Internet of Things (IoTs) and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band settings. Within such systems, all participants related to commercial and industrial systems must communicate and generate data. However, due to the small storage capacities of IoT devices, they are required to store and transfer the generated data to third-party entity called “cloud”, which creates one single point to store their data. However, as the number of participants increases, the size of generated data also increases. Therefore, such a centralized mechanism for data collection and exchange between participants is likely to face numerous challenges in terms of security, privacy, and performance. To address these challenges, Federated Learning (FL) has been proposed as a reasonable decentralizing approach, in which clients no longer need to transfer and store real data in the central server. Instead, they only share updated training models that are trained over their private datasets. At the same time, FL enables clients in distributed systems to share their machine learning models collaboratively without their training data, thus reducing data privacy and security challeges. However, slow model training and the execution of additional unnecessary communication rounds may hinder FL applications from operating properly in a distributed system. Furthermore, these unnecessary communication rounds make the system vulnerable to security and privacy issues, because irrelevant model updates are sent between clients and servers. Thus, in this work, we propose an algorithm for fully homomorphic encryption called Cheon-Kim-Kim-Song (CKKS) to encrypt model parameters for their local information privacy-preserving function. The proposed solution uses the impetus term to speed up model convergence during the model training process. Furthermore, it establishes a secure communication channel between IoT devices and the server. We also use a lightweight secure transport protocol to mitigate the communication overhead, thereby improving communication security and efficiency with low communication latency between client and server.
物联网(IoT)的广泛使用和人工智能技术的快速发展使应用程序能够跨越商业和工业波段。在这样的系统中,所有与商业和工业系统相关的参与者都必须进行通信并生成数据。然而,由于物联网设备的存储容量较小,它们需要将生成的数据存储并传输到名为“云”的第三方实体,该实体创建一个存储数据的单点。然而,随着参与者数量的增加,生成的数据的大小也会增加。因此,这种集中的参与者之间的数据收集和交换机制可能会在安全性、隐私性和性能方面面临许多挑战。为了应对这些挑战,联合学习(FL)被认为是一种合理的去中心化方法,其中客户端不再需要在中央服务器中传输和存储真实数据。相反,他们只共享在私人数据集上训练的更新训练模型。同时,FL使分布式系统中的客户端能够在没有训练数据的情况下协作共享他们的机器学习模型,从而减少数据隐私和安全挑战。然而,缓慢的模型训练和额外的不必要的通信轮次的执行可能会阻碍FL应用程序在分布式系统中正常运行。此外,这些不必要的通信回合使系统容易受到安全和隐私问题的影响,因为不相关的模型更新是在客户端和服务器之间发送的。因此,在这项工作中,我们提出了一种称为Cheon Kim Kim Song(CKKS)的全同态加密算法,以加密模型参数的局部信息隐私保护函数。所提出的解决方案在模型训练过程中使用动力项来加速模型收敛。此外,它在物联网设备和服务器之间建立了一个安全的通信通道。我们还使用了一种轻量级的安全传输协议来减轻通信开销,从而提高了通信安全性和效率,降低了客户端和服务器之间的通信延迟。
{"title":"Federated Learning Security and Privacy-Preserving Algorithm and Experiments Research Under Internet of Things Critical Infrastructure","authors":"Nasir Ahmad Jalali;Hongsong Chen","doi":"10.26599/TST.2023.9010007","DOIUrl":"https://doi.org/10.26599/TST.2023.9010007","url":null,"abstract":"The widespread use of the Internet of Things (IoTs) and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band settings. Within such systems, all participants related to commercial and industrial systems must communicate and generate data. However, due to the small storage capacities of IoT devices, they are required to store and transfer the generated data to third-party entity called “cloud”, which creates one single point to store their data. However, as the number of participants increases, the size of generated data also increases. Therefore, such a centralized mechanism for data collection and exchange between participants is likely to face numerous challenges in terms of security, privacy, and performance. To address these challenges, Federated Learning (FL) has been proposed as a reasonable decentralizing approach, in which clients no longer need to transfer and store real data in the central server. Instead, they only share updated training models that are trained over their private datasets. At the same time, FL enables clients in distributed systems to share their machine learning models collaboratively without their training data, thus reducing data privacy and security challeges. However, slow model training and the execution of additional unnecessary communication rounds may hinder FL applications from operating properly in a distributed system. Furthermore, these unnecessary communication rounds make the system vulnerable to security and privacy issues, because irrelevant model updates are sent between clients and servers. Thus, in this work, we propose an algorithm for fully homomorphic encryption called Cheon-Kim-Kim-Song (CKKS) to encrypt model parameters for their local information privacy-preserving function. The proposed solution uses the impetus term to speed up model convergence during the model training process. Furthermore, it establishes a secure communication channel between IoT devices and the server. We also use a lightweight secure transport protocol to mitigate the communication overhead, thereby improving communication security and efficiency with low communication latency between client and server.","PeriodicalId":60306,"journal":{"name":"Tsinghua Science and Technology","volume":"29 2","pages":"400-414"},"PeriodicalIF":6.6,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5971803/10258149/10258150.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68027594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A GNSS Anti-Spoofing Technique Based on the Spatial Distribution Characteristic of the Residual Vectors 基于残差矢量空间分布特性的GNSS反欺骗技术
IF 6.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.26599/TST.2023.9010017
Qi'an Wu;Xiaowei Cui;Mingquan Lu;Pengxiang Yang;Peng Wu
Anti-spoofing is becoming a crucial technique for applications with high navigation accuracy and reliability requirements. Anti-spoofing technique based on Receiver Autonomous Integrity Monitoring (RAIM) is a good choice for most Global Navigation Satellite System (GNSS) receivers because it does not require any change to the hardware of the receiver. However, the conventional RAIM method can only detect and mitigate a single spoofing signal. Some improved RAIM methods can deal with more spoofing signals, but the computational complexity increases dramatically when the number of satellites in view increase or need additional information. This paper proposes a new RAIM method, called the SRV-RAIM method, which has a very low computation complexity regardless of the number of satellites in view and can deal with any number of spoofing signals. The key to the new method is the spatial distribution characteristic of the Satellites' Residual Vectors (SRV). In replay or generative spoofing scenarios, the pseudorange measurements of spoofing signals are consistent, the residual vectors of real satellites and those of spoofing satellites have good separation characteristics in spatial distribution. Based on this characteristic, the SRV-RAIM method is proposed, and the simulation results show that the method can separate the real signals and the spoofing signals with an average probability of 86.55% in the case of 12 visible satellites, regardless of the number of spoofing signals. Compared to the conventional traversal-RAIM method, the performance is only reduced by 3.59%, but the computational cost is reduced by 98.3%, so most of the GNSS receivers can run the SRV-RAIM algorithm in time.
对于具有高导航精度和可靠性要求的应用来说,反欺骗正成为一项关键技术。基于接收机自主完整性监测(RAIM)的反欺骗技术是大多数全球导航卫星系统(GNSS)接收机的良好选择,因为它不需要对接收机的硬件进行任何更改。然而,传统的RAIM方法只能检测和减轻单个欺骗信号。一些改进的RAIM方法可以处理更多的欺骗信号,但当视野中的卫星数量增加或需要额外信息时,计算复杂度会急剧增加。本文提出了一种新的RAIM方法,称为SRV-RAIM方法。无论视野中的卫星数量如何,该方法的计算复杂度都很低,并且可以处理任何数量的欺骗信号。新方法的关键是卫星残差矢量(SRV)的空间分布特性。在重放或生成欺骗场景中,欺骗信号的伪距测量是一致的,真实卫星和欺骗卫星的残差向量在空间分布上具有良好的分离特性。基于这一特点,提出了SRV-RAIM方法,仿真结果表明,在12颗可见卫星的情况下,无论欺骗信号的数量如何,该方法都可以将真实信号和欺骗信号分离,平均概率为86.55%。与传统的遍历RAIM方法相比,性能仅降低了3.59%,但计算成本降低了98.3%,因此大多数GNSS接收器都可以及时运行SRV-RAIM算法。
{"title":"A GNSS Anti-Spoofing Technique Based on the Spatial Distribution Characteristic of the Residual Vectors","authors":"Qi'an Wu;Xiaowei Cui;Mingquan Lu;Pengxiang Yang;Peng Wu","doi":"10.26599/TST.2023.9010017","DOIUrl":"https://doi.org/10.26599/TST.2023.9010017","url":null,"abstract":"Anti-spoofing is becoming a crucial technique for applications with high navigation accuracy and reliability requirements. Anti-spoofing technique based on Receiver Autonomous Integrity Monitoring (RAIM) is a good choice for most Global Navigation Satellite System (GNSS) receivers because it does not require any change to the hardware of the receiver. However, the conventional RAIM method can only detect and mitigate a single spoofing signal. Some improved RAIM methods can deal with more spoofing signals, but the computational complexity increases dramatically when the number of satellites in view increase or need additional information. This paper proposes a new RAIM method, called the SRV-RAIM method, which has a very low computation complexity regardless of the number of satellites in view and can deal with any number of spoofing signals. The key to the new method is the spatial distribution characteristic of the Satellites' Residual Vectors (SRV). In replay or generative spoofing scenarios, the pseudorange measurements of spoofing signals are consistent, the residual vectors of real satellites and those of spoofing satellites have good separation characteristics in spatial distribution. Based on this characteristic, the SRV-RAIM method is proposed, and the simulation results show that the method can separate the real signals and the spoofing signals with an average probability of 86.55% in the case of 12 visible satellites, regardless of the number of spoofing signals. Compared to the conventional traversal-RAIM method, the performance is only reduced by 3.59%, but the computational cost is reduced by 98.3%, so most of the GNSS receivers can run the SRV-RAIM algorithm in time.","PeriodicalId":60306,"journal":{"name":"Tsinghua Science and Technology","volume":"29 2","pages":"457-468"},"PeriodicalIF":6.6,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5971803/10258149/10258250.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68027596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Matching Algorithm with Reinforcement Learning and Decoupling Strategy for Order Dispatching in On-Demand Food Delivery 一种基于强化学习和解耦策略的按需配送订单调度匹配算法
IF 6.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.26599/TST.2023.9010069
Jingfang Chen;Ling Wang;Zixiao Pan;Yuting Wu;Jie Zheng;Xuetao Ding
The on-demand food delivery (OFD) service has gained rapid development in the past decades but meanwhile encounters challenges for further improving operation quality. The order dispatching problem is one of the most concerning issues for the OFD platforms, which refer to dynamically dispatching a large number of orders to riders reasonably in very limited decision time. To solve such a challenging combinatorial optimization problem, an effective matching algorithm is proposed by fusing the reinforcement learning technique and the optimization method. First, to deal with the large-scale complexity, a decoupling method is designed by reducing the matching space between new orders and riders. Second, to overcome the high dynamism and satisfy the stringent requirements on decision time, a reinforcement learning based dispatching heuristic is presented. To be specific, a sequence-to-sequence neural network is constructed based on the problem characteristic to generate an order priority sequence. Besides, a training approach is specially designed to improve learning performance. Furthermore, a greedy heuristic is employed to effectively dispatch new orders according to the order priority sequence. On real-world datasets, numerical experiments are conducted to validate the effectiveness of the proposed algorithm. Statistical results show that the proposed algorithm can effectively solve the problem by improving delivery efficiency and maintaining customer satisfaction.
按需送餐服务在过去几十年中得到了快速发展,但同时也面临着进一步提高运营质量的挑战。订单调度问题是OFD平台最关心的问题之一,它指的是在非常有限的决策时间内合理地向骑手动态调度大量订单。为了解决这样一个具有挑战性的组合优化问题,将强化学习技术与优化方法相结合,提出了一种有效的匹配算法。首先,为了处理大规模复杂性,通过减少新订单和骑手之间的匹配空间,设计了一种解耦方法。其次,为了克服高动态性和满足对决策时间的严格要求,提出了一种基于强化学习的调度启发式算法。具体地说,基于问题的特征构建了序列到序列的神经网络,以生成顺序优先级序列。此外,还专门设计了一种训练方法来提高学习成绩。此外,采用贪婪启发式算法,根据订单优先级序列有效地调度新订单。在真实世界的数据集上,进行了数值实验来验证所提出算法的有效性。统计结果表明,该算法可以有效地解决问题,提高配送效率,保持客户满意度。
{"title":"A Matching Algorithm with Reinforcement Learning and Decoupling Strategy for Order Dispatching in On-Demand Food Delivery","authors":"Jingfang Chen;Ling Wang;Zixiao Pan;Yuting Wu;Jie Zheng;Xuetao Ding","doi":"10.26599/TST.2023.9010069","DOIUrl":"https://doi.org/10.26599/TST.2023.9010069","url":null,"abstract":"The on-demand food delivery (OFD) service has gained rapid development in the past decades but meanwhile encounters challenges for further improving operation quality. The order dispatching problem is one of the most concerning issues for the OFD platforms, which refer to dynamically dispatching a large number of orders to riders reasonably in very limited decision time. To solve such a challenging combinatorial optimization problem, an effective matching algorithm is proposed by fusing the reinforcement learning technique and the optimization method. First, to deal with the large-scale complexity, a decoupling method is designed by reducing the matching space between new orders and riders. Second, to overcome the high dynamism and satisfy the stringent requirements on decision time, a reinforcement learning based dispatching heuristic is presented. To be specific, a sequence-to-sequence neural network is constructed based on the problem characteristic to generate an order priority sequence. Besides, a training approach is specially designed to improve learning performance. Furthermore, a greedy heuristic is employed to effectively dispatch new orders according to the order priority sequence. On real-world datasets, numerical experiments are conducted to validate the effectiveness of the proposed algorithm. Statistical results show that the proposed algorithm can effectively solve the problem by improving delivery efficiency and maintaining customer satisfaction.","PeriodicalId":60306,"journal":{"name":"Tsinghua Science and Technology","volume":"29 2","pages":"386-399"},"PeriodicalIF":6.6,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5971803/10258149/10258151.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68027600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature-Grounded Single-Stage Text-to-Image Generation 基于特征的单阶段文本到图像生成
IF 6.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.26599/TST.2023.9010023
Yuan Zhou;Peng Wang;Lei Xiang;Haofeng Zhang
Recently, Generative Adversarial Networks (GANs) have become the mainstream text-to-image (T2I) framework. However, a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approaches the ground-truth image distribution. Moreover, the multistage generation strategy results in complex T2I applications. Therefore, this study proposes a novel feature-grounded single-stage T2I model, which considers the “real” distribution learned from training images as one input and introduces a worst-case-optimized similarity measure into the loss function to enhance the model's generation capacity. Experimental results on two benchmark datasets demonstrate the competitive performance of the proposed model in terms of the Frechet inception distance and inception score compared to those of some classical and state-of-the-art models, showing the improved similarities among the generated image, text, and ground truth.
近年来,生成对抗性网络(GANs)已成为主流的文本到图像(T2I)框架。然而,输入的标准正态分布噪声不能提供足够的信息来合成接近真实图像分布的图像。此外,多级生成策略导致复杂的T2I应用。因此,本研究提出了一种新的基于特征的单阶段T2I模型,该模型将从训练图像中学习到的“真实”分布作为一个输入,并在损失函数中引入最坏情况下优化的相似性度量,以提高模型的生成能力。在两个基准数据集上的实验结果表明,与一些经典和最先进的模型相比,所提出的模型在Frechet起始距离和起始得分方面具有竞争力,显示了生成的图像、文本和基本事实之间的相似性得到了改善。
{"title":"Feature-Grounded Single-Stage Text-to-Image Generation","authors":"Yuan Zhou;Peng Wang;Lei Xiang;Haofeng Zhang","doi":"10.26599/TST.2023.9010023","DOIUrl":"https://doi.org/10.26599/TST.2023.9010023","url":null,"abstract":"Recently, Generative Adversarial Networks (GANs) have become the mainstream text-to-image (T2I) framework. However, a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approaches the ground-truth image distribution. Moreover, the multistage generation strategy results in complex T2I applications. Therefore, this study proposes a novel feature-grounded single-stage T2I model, which considers the “real” distribution learned from training images as one input and introduces a worst-case-optimized similarity measure into the loss function to enhance the model's generation capacity. Experimental results on two benchmark datasets demonstrate the competitive performance of the proposed model in terms of the Frechet inception distance and inception score compared to those of some classical and state-of-the-art models, showing the improved similarities among the generated image, text, and ground truth.","PeriodicalId":60306,"journal":{"name":"Tsinghua Science and Technology","volume":"29 2","pages":"469-480"},"PeriodicalIF":6.6,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5971803/10258149/10258251.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68027435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Tsinghua Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1