首页 > 最新文献

China Communications最新文献

英文 中文
LDA-ID: An LDA-based framework for real-time network intrusion detection LDA-ID:基于 LDA 的实时网络入侵检测框架
IF 4.1 3区 计算机科学 Q2 TELECOMMUNICATIONS Pub Date : 2023-12-01 DOI: 10.23919/JCC.ea.2021-0446.202302
Weidong Zhou, Shengwei Lei, Chunhe Xia, Tianbo Wang
Network intrusion poses a severe threat to the Internet. However, existing intrusion detection models cannot effectively distinguish different intrusions with high-degree feature overlap. In addition, efficient real-time detection is an urgent problem. To address the two above problems, we propose a Latent Dirichlet Allocation topic model-based framework for real-time network Intrusion Detection (LDA-ID), consisting of static and online LDA-ID. The problem of feature overlap is transformed into static LDA-ID topic number optimization and topic selection. Thus, the detection is based on the latent topic features. To achieve efficient real-time detection, we design an online computing mode for static LDA-ID, in which a parameter iteration method based on momentum is proposed to balance the contribution of prior knowledge and new information. Furthermore, we design two matching mechanisms to accommodate the static and online LDA-ID, respectively. Experimental results on the public NSL-KDD and UNSW-NB15 datasets show that our framework gets higher accuracy than the others.
网络入侵对互联网构成严重威胁。然而,现有的入侵检测模型无法有效区分特征高度重叠的不同入侵。此外,高效的实时检测也是一个亟待解决的问题。针对上述两个问题,我们提出了一种基于潜狄利克特分配(Latent Dirichlet Allocation)主题模型的实时网络入侵检测(LDA-ID)框架,包括静态和在线 LDA-ID。特征重叠问题被转化为静态 LDA-ID 主题数优化和主题选择。因此,检测是基于潜在主题特征的。为了实现高效的实时检测,我们为静态 LDA-ID 设计了一种在线计算模式,其中提出了一种基于动量的参数迭代方法,以平衡先验知识和新信息的贡献。此外,我们还设计了两种匹配机制,分别适用于静态和在线 LDA-ID。在公开的 NSL-KDD 和 UNSW-NB15 数据集上的实验结果表明,我们的框架比其他框架获得了更高的准确率。
{"title":"LDA-ID: An LDA-based framework for real-time network intrusion detection","authors":"Weidong Zhou, Shengwei Lei, Chunhe Xia, Tianbo Wang","doi":"10.23919/JCC.ea.2021-0446.202302","DOIUrl":"https://doi.org/10.23919/JCC.ea.2021-0446.202302","url":null,"abstract":"Network intrusion poses a severe threat to the Internet. However, existing intrusion detection models cannot effectively distinguish different intrusions with high-degree feature overlap. In addition, efficient real-time detection is an urgent problem. To address the two above problems, we propose a Latent Dirichlet Allocation topic model-based framework for real-time network Intrusion Detection (LDA-ID), consisting of static and online LDA-ID. The problem of feature overlap is transformed into static LDA-ID topic number optimization and topic selection. Thus, the detection is based on the latent topic features. To achieve efficient real-time detection, we design an online computing mode for static LDA-ID, in which a parameter iteration method based on momentum is proposed to balance the contribution of prior knowledge and new information. Furthermore, we design two matching mechanisms to accommodate the static and online LDA-ID, respectively. Experimental results on the public NSL-KDD and UNSW-NB15 datasets show that our framework gets higher accuracy than the others.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"601 ","pages":"166-181"},"PeriodicalIF":4.1,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139019480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radio frequency fingerprinting identification using semi-supervised learning with meta labels 利用带元标签的半监督学习进行射频指纹识别
IF 4.1 3区 计算机科学 Q2 TELECOMMUNICATIONS Pub Date : 2023-12-01 DOI: 10.23919/JCC.fa.2022-0609.202312
Tiantian Zhang, Pinyi Ren, Dongyang Xu, Zhanyi Ren
Radio frequency fingerprinting (RFF) is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things (IoT) systems. Deep learning (DL) is a critical enabler of RFF identification by leveraging the hardware-level features. However, traditional supervised learning methods require huge labeled training samples. Therefore, how to establish a highperformance supervised learning model with few labels under practical application is still challenging. To address this issue, we in this paper propose a novel RFF semi-supervised learning (RFFSSL) model which can obtain a better performance with few meta labels. Specifically, the proposed RFFSSL model is constituted by a teacher-student network, in which the student network learns from the pseudo label predicted by the teacher. Then, the output of the student model will be exploited to improve the performance of teacher among the labeled data. Furthermore, a comprehensive evaluation on the accuracy is conducted. We derive about 50 GB real long-term evolution (LTE) mobile phone's raw signal datasets, which is used to evaluate various models. Experimental results demonstrate that the proposed RFFSSL scheme can achieve up to 97% experimental testing accuracy over a noisy environment only with 10% labeled samples when training samples equal to 2700.
射频指纹(RFF)是一种出色的轻量级身份验证方案,可支持物联网(IoT)系统中快速、可扩展的身份验证。通过利用硬件级特征,深度学习(DL)是 RFF 识别的重要推动力。然而,传统的监督学习方法需要大量的标注训练样本。因此,如何在实际应用中用少量标签建立高性能的监督学习模型仍是一个挑战。针对这一问题,我们在本文中提出了一种新颖的 RFF 半监督学习(RFFSSL)模型,它能在元标签较少的情况下获得更好的性能。具体来说,本文提出的 RFFSSL 模型由一个教师-学生网络构成,其中学生网络从教师预测的伪标签中学习。学生网络从教师预测的伪标签中学习,然后利用学生模型的输出来提高教师在标签数据中的性能。此外,我们还对准确性进行了综合评估。我们获得了约 50 GB 的真实长期演进(LTE)手机原始信号数据集,并用这些数据集来评估各种模型。实验结果表明,当训练样本等于 2700 个时,所提出的 RFFSSL 方案只需 10%的标记样本,就能在高噪声环境下实现高达 97% 的实验测试准确率。
{"title":"Radio frequency fingerprinting identification using semi-supervised learning with meta labels","authors":"Tiantian Zhang, Pinyi Ren, Dongyang Xu, Zhanyi Ren","doi":"10.23919/JCC.fa.2022-0609.202312","DOIUrl":"https://doi.org/10.23919/JCC.fa.2022-0609.202312","url":null,"abstract":"Radio frequency fingerprinting (RFF) is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things (IoT) systems. Deep learning (DL) is a critical enabler of RFF identification by leveraging the hardware-level features. However, traditional supervised learning methods require huge labeled training samples. Therefore, how to establish a highperformance supervised learning model with few labels under practical application is still challenging. To address this issue, we in this paper propose a novel RFF semi-supervised learning (RFFSSL) model which can obtain a better performance with few meta labels. Specifically, the proposed RFFSSL model is constituted by a teacher-student network, in which the student network learns from the pseudo label predicted by the teacher. Then, the output of the student model will be exploited to improve the performance of teacher among the labeled data. Furthermore, a comprehensive evaluation on the accuracy is conducted. We derive about 50 GB real long-term evolution (LTE) mobile phone's raw signal datasets, which is used to evaluate various models. Experimental results demonstrate that the proposed RFFSSL scheme can achieve up to 97% experimental testing accuracy over a noisy environment only with 10% labeled samples when training samples equal to 2700.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"86 9","pages":"78-95"},"PeriodicalIF":4.1,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139017402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep reinforcement learning for IRS-assisted UAV covert communications 用于 IRS 辅助无人机隐蔽通信的深度强化学习
IF 4.1 3区 计算机科学 Q2 TELECOMMUNICATIONS Pub Date : 2023-12-01 DOI: 10.23919/JCC.ea.2022-0336.202302
Songjiao Bi, Langtao Hu, QUAN LIU, Jianlan Wu, Rui Yang, L. Wu
Covert communications can hide the existence of a transmission from the transmitter to receiver. This paper considers an intelligent reflecting surface (IRS) assisted unmanned aerial vehicle (UAV) covert communication system. It was inspired by the high-dimensional data processing and decision-making capabilities of the deep reinforcement learning (DRL) algorithm. In order to improve the covert communication performance, an UAV 3D trajectory and IRS phase optimization algorithm based on double deep Q network (TAP-DDQN) is proposed. The simulations show that TAP-DDQN can significantly improve the covert performance of the IRS-assisted UAV covert communication system, compared with benchmark solutions.
隐蔽通信可以隐藏从发射器到接收器之间存在的传输。本文探讨了一种智能反射面(IRS)辅助无人机(UAV)隐蔽通信系统。该系统的灵感来自于深度强化学习(DRL)算法的高维数据处理和决策能力。为了提高隐蔽通信性能,提出了一种基于双深度 Q 网络(TAP-DDQN)的无人机三维轨迹和 IRS 相位优化算法。模拟结果表明,与基准方案相比,TAP-DDQN 可以显著提高 IRS 辅助无人机隐蔽通信系统的隐蔽性能。
{"title":"Deep reinforcement learning for IRS-assisted UAV covert communications","authors":"Songjiao Bi, Langtao Hu, QUAN LIU, Jianlan Wu, Rui Yang, L. Wu","doi":"10.23919/JCC.ea.2022-0336.202302","DOIUrl":"https://doi.org/10.23919/JCC.ea.2022-0336.202302","url":null,"abstract":"Covert communications can hide the existence of a transmission from the transmitter to receiver. This paper considers an intelligent reflecting surface (IRS) assisted unmanned aerial vehicle (UAV) covert communication system. It was inspired by the high-dimensional data processing and decision-making capabilities of the deep reinforcement learning (DRL) algorithm. In order to improve the covert communication performance, an UAV 3D trajectory and IRS phase optimization algorithm based on double deep Q network (TAP-DDQN) is proposed. The simulations show that TAP-DDQN can significantly improve the covert performance of the IRS-assisted UAV covert communication system, compared with benchmark solutions.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"329 ","pages":"131-141"},"PeriodicalIF":4.1,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139022980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient federated learning framework deployed in resource-constrained IoV: User selection and learning time optimization schemes 在资源受限的物联网中部署高效的联合学习框架:用户选择和学习时间优化方案
IF 4.1 3区 计算机科学 Q2 TELECOMMUNICATIONS Pub Date : 2023-12-01 DOI: 10.23919/JCC.fa.2022-0726.202312
Qiang Wang, Shaoyi Xu, Rongtao Xu, Dongji Li
In this article, an efficient federated learning (FL) Framework in the Internet of Vehicles (IoV) is studied. In the considered model, vehicle users implement an FL algorithm by training their local FL models and sending their models to a base station (BS) that generates a global FL model through the model aggregation. Since each user owns data samples with diverse sizes and different quality, it is necessary for the BS to select the proper participating users to acquire a better global model. Meanwhile, considering the high computational overhead of existing selection methods based on the gradient, the lightweight user selection scheme based on the loss decay is proposed. Due to the limited wireless bandwidth, the BS needs to select an suitable subset of users to implement the FL algorithm. Moreover, the vehicle users' computing resource that can be used for FL training is usually limited in the IoV when other multiple tasks are required to be executed. The local model training and model parameter transmission of FL will have significant effects on the latency of FL. To address this issue, the joint communication and computing optimization problem is formulated whose objective is to minimize the FL delay in the resource-constrained system. To solve the complex nonconvex problem, an algorithm based on the concave-convex procedure (CCCP) is proposed, which can achieve superior performance in the small-scale and delay-insensitive FL system. Due to the fact that the convergence rate of CCCP method is too slow in a large-scale FL system, this method is not suitable for delay-sensitive applications. To solve this issue, a block coordinate descent algorithm based on the one-step projected gradient method is proposed to decrease the complexity of the solution at the cost of light performance degrading. Simulations are conducted and numerical results show the good performance of the proposed methods.
本文研究了车联网(IoV)中的高效联合学习(FL)框架。在所考虑的模型中,车辆用户通过训练其本地 FL 模型实施 FL 算法,并将其模型发送到基站(BS),后者通过模型聚合生成全局 FL 模型。由于每个用户都拥有不同大小和质量的数据样本,因此基站有必要选择合适的参与用户,以获得更好的全局模型。同时,考虑到现有基于梯度的选择方法计算开销较大,提出了基于损耗衰减的轻量级用户选择方案。由于无线带宽有限,BS 需要选择合适的用户子集来实现 FL 算法。此外,在 IoV 中,当需要执行其他多个任务时,可用于 FL 训练的车辆用户计算资源通常是有限的。FL 的本地模型训练和模型参数传输将对 FL 的延迟产生重大影响。为解决这一问题,提出了通信和计算联合优化问题,其目标是在资源受限的系统中使 FL 延迟最小。为了解决这个复杂的非凸问题,提出了一种基于凹凸过程(CCCP)的算法,该算法可以在小规模和对延迟不敏感的 FL 系统中实现卓越的性能。由于 CCCP 方法在大规模 FL 系统中收敛速度太慢,因此该方法不适合对延迟敏感的应用。为了解决这个问题,我们提出了一种基于一步投影梯度法的块坐标下降算法,以降低求解的复杂度,但代价是轻度性能下降。仿真和数值结果表明了所提方法的良好性能。
{"title":"An efficient federated learning framework deployed in resource-constrained IoV: User selection and learning time optimization schemes","authors":"Qiang Wang, Shaoyi Xu, Rongtao Xu, Dongji Li","doi":"10.23919/JCC.fa.2022-0726.202312","DOIUrl":"https://doi.org/10.23919/JCC.fa.2022-0726.202312","url":null,"abstract":"In this article, an efficient federated learning (FL) Framework in the Internet of Vehicles (IoV) is studied. In the considered model, vehicle users implement an FL algorithm by training their local FL models and sending their models to a base station (BS) that generates a global FL model through the model aggregation. Since each user owns data samples with diverse sizes and different quality, it is necessary for the BS to select the proper participating users to acquire a better global model. Meanwhile, considering the high computational overhead of existing selection methods based on the gradient, the lightweight user selection scheme based on the loss decay is proposed. Due to the limited wireless bandwidth, the BS needs to select an suitable subset of users to implement the FL algorithm. Moreover, the vehicle users' computing resource that can be used for FL training is usually limited in the IoV when other multiple tasks are required to be executed. The local model training and model parameter transmission of FL will have significant effects on the latency of FL. To address this issue, the joint communication and computing optimization problem is formulated whose objective is to minimize the FL delay in the resource-constrained system. To solve the complex nonconvex problem, an algorithm based on the concave-convex procedure (CCCP) is proposed, which can achieve superior performance in the small-scale and delay-insensitive FL system. Due to the fact that the convergence rate of CCCP method is too slow in a large-scale FL system, this method is not suitable for delay-sensitive applications. To solve this issue, a block coordinate descent algorithm based on the one-step projected gradient method is proposed to decrease the complexity of the solution at the cost of light performance degrading. Simulations are conducted and numerical results show the good performance of the proposed methods.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"372 2","pages":"111-130"},"PeriodicalIF":4.1,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139022303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective optimization for NOMA-based mobile edge computing offloading by maximizing system utility 通过系统效用最大化实现基于 NOMA 的移动边缘计算卸载的多目标优化
IF 4.1 3区 计算机科学 Q2 TELECOMMUNICATIONS Pub Date : 2023-12-01 DOI: 10.23919/JCC.ea.2021-0252.202302
Hong Qin, Haitao Du, Huahua Wang, Li Su, Yunfeng Peng
Mobile Edge Computing (MEC) is a technology for the fifth-generation (5G) wireless communications to enable User Equipment (UE) to offload tasks to servers deployed at the edge of network. However, taking both delay and energy consumption into consideration in the 5G MEC system is usually complex and contradictory. Non-orthogonal multiple access (NOMA) enable more UEs to offload their computing tasks to MEC servers using the same spectrum resources to enhance the spectrum efficiency for 5G, which makes the problem even more complex in the NOMA-MEC system. In this work, a system utility maximization model is present to NOMA-MEC system, and two optimization algorithms based on Newton method and greedy algorithm respectively are proposed to jointly optimize the computing resource allocation, SIC order, transmission time slot allocation, which can easily achieve a better trade-off between the delay and energy consumption. The simulation results prove that the proposed method is effective for NOMA-MEC systems.
移动边缘计算(MEC)是第五代(5G)无线通信的一项技术,可使用户设备(UE)将任务卸载到部署在网络边缘的服务器上。然而,在 5G MEC 系统中同时考虑延迟和能耗通常是复杂而矛盾的。非正交多址接入(NOMA)可以让更多的 UE 使用相同的频谱资源将计算任务卸载到 MEC 服务器上,从而提高 5G 的频谱效率,这使得 NOMA-MEC 系统中的问题变得更加复杂。本研究针对 NOMA-MEC 系统提出了系统效用最大化模型,并分别提出了基于牛顿法和贪婪算法的两种优化算法,对计算资源分配、SIC 顺序、传输时隙分配等进行联合优化,从而在时延和能耗之间轻松实现较好的权衡。仿真结果证明,所提出的方法对 NOMA-MEC 系统是有效的。
{"title":"Multi-objective optimization for NOMA-based mobile edge computing offloading by maximizing system utility","authors":"Hong Qin, Haitao Du, Huahua Wang, Li Su, Yunfeng Peng","doi":"10.23919/JCC.ea.2021-0252.202302","DOIUrl":"https://doi.org/10.23919/JCC.ea.2021-0252.202302","url":null,"abstract":"Mobile Edge Computing (MEC) is a technology for the fifth-generation (5G) wireless communications to enable User Equipment (UE) to offload tasks to servers deployed at the edge of network. However, taking both delay and energy consumption into consideration in the 5G MEC system is usually complex and contradictory. Non-orthogonal multiple access (NOMA) enable more UEs to offload their computing tasks to MEC servers using the same spectrum resources to enhance the spectrum efficiency for 5G, which makes the problem even more complex in the NOMA-MEC system. In this work, a system utility maximization model is present to NOMA-MEC system, and two optimization algorithms based on Newton method and greedy algorithm respectively are proposed to jointly optimize the computing resource allocation, SIC order, transmission time slot allocation, which can easily achieve a better trade-off between the delay and energy consumption. The simulation results prove that the proposed method is effective for NOMA-MEC systems.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"244 ","pages":"156-165"},"PeriodicalIF":4.1,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139026621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoV and blockchain-enabled driving guidance strategy in complex traffic environment 复杂交通环境下基于车联网和区块链的驾驶引导策略
IF 4.1 3区 计算机科学 Q2 TELECOMMUNICATIONS Pub Date : 2023-12-01 DOI: 10.23919/jcc.ea.2020-0174.202302
Yuchuan Fu, Changle Li, T. Luan, Yao Zhang
Diversified traffic participants and complex traffic environment (e.g., roadblocks or road damage exist) challenge the decision-making accuracy of a single connected and autonomous vehicle (CAV) due to its limited sensing and computing capabilities. Using Internet of Vehicles (IoV) to share driving rules between CAVs can break limitations of a single CAV, but at the same time may cause privacy and safety issues. To tackle this problem, this paper proposes to combine IoV and blockchain technologies to form an efficient and accurate autonomous guidance strategy. Specifically, we first use reinforcement learning for driving decision learning, and give the corresponding driving rule extraction method. Then, an architecture combining IoV and blockchain is designed to ensure secure driving rule sharing. Finally, the shared rules will form an effective autonomous driving guidance strategy through driving rules selection and action selection. Extensive simulation proves that the proposed strategy performs well in complex traffic environment, mainly in terms of accuracy, safety, and robustness.
{"title":"IoV and blockchain-enabled driving guidance strategy in complex traffic environment","authors":"Yuchuan Fu, Changle Li, T. Luan, Yao Zhang","doi":"10.23919/jcc.ea.2020-0174.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2020-0174.202302","url":null,"abstract":"Diversified traffic participants and complex traffic environment (e.g., roadblocks or road damage exist) challenge the decision-making accuracy of a single connected and autonomous vehicle (CAV) due to its limited sensing and computing capabilities. Using Internet of Vehicles (IoV) to share driving rules between CAVs can break limitations of a single CAV, but at the same time may cause privacy and safety issues. To tackle this problem, this paper proposes to combine IoV and blockchain technologies to form an efficient and accurate autonomous guidance strategy. Specifically, we first use reinforcement learning for driving decision learning, and give the corresponding driving rule extraction method. Then, an architecture combining IoV and blockchain is designed to ensure secure driving rule sharing. Finally, the shared rules will form an effective autonomous driving guidance strategy through driving rules selection and action selection. Extensive simulation proves that the proposed strategy performs well in complex traffic environment, mainly in terms of accuracy, safety, and robustness.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"1 1","pages":"230-243"},"PeriodicalIF":4.1,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68734630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-source underwater DOA estimation using PSO-BP neural network based on high-order cumulant optimization 基于高阶累积优化的PSO-BP神经网络水下多源DOA估计
IF 4.1 3区 计算机科学 Q2 TELECOMMUNICATIONS Pub Date : 2023-12-01 DOI: 10.23919/jcc.ea.2021-0031.202302
Haihua Chen, Jingyao Zhang, Binbin Jiang, Xuerong Cui, Rongrong Zhou, Yucheng Zhang
Due to the complex and changeable environment under water, the performance of traditional DOA estimation algorithms based on mathematical model, such as MUSIC, ESPRIT, etc., degrades greatly or even some mistakes can be made because of the mismatch between algorithm model and actual environment model. In addition, the neural network has the ability of generalization and mapping, it can consider the noise, transmission channel inconsistency and other factors of the objective environment. Therefore, this paper utilizes Back Propagation (BP) neural network as the basic framework of underwater DOA estimation. Furthermore, in order to improve the performance of DOA estimation of BP neural network, the following three improvements are proposed. (1) Aiming at the problem that the weight and threshold of traditional BP neural network converge slowly and easily fall into the local optimal value in the iterative process, PSO-BP-NN based on optimized particle swarm optimization (PSO) algorithm is proposed. (2) The Higher-order cumulant of the received signal is utilized to establish the training model. (3) A BP neural network training method for arbitrary number of sources is proposed. Finally, the effectiveness of the proposed algorithm is proved by comparing with the state-of-the-art algorithms and MUSIC algorithm.
{"title":"Multi-source underwater DOA estimation using PSO-BP neural network based on high-order cumulant optimization","authors":"Haihua Chen, Jingyao Zhang, Binbin Jiang, Xuerong Cui, Rongrong Zhou, Yucheng Zhang","doi":"10.23919/jcc.ea.2021-0031.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2021-0031.202302","url":null,"abstract":"Due to the complex and changeable environment under water, the performance of traditional DOA estimation algorithms based on mathematical model, such as MUSIC, ESPRIT, etc., degrades greatly or even some mistakes can be made because of the mismatch between algorithm model and actual environment model. In addition, the neural network has the ability of generalization and mapping, it can consider the noise, transmission channel inconsistency and other factors of the objective environment. Therefore, this paper utilizes Back Propagation (BP) neural network as the basic framework of underwater DOA estimation. Furthermore, in order to improve the performance of DOA estimation of BP neural network, the following three improvements are proposed. (1) Aiming at the problem that the weight and threshold of traditional BP neural network converge slowly and easily fall into the local optimal value in the iterative process, PSO-BP-NN based on optimized particle swarm optimization (PSO) algorithm is proposed. (2) The Higher-order cumulant of the received signal is utilized to establish the training model. (3) A BP neural network training method for arbitrary number of sources is proposed. Finally, the effectiveness of the proposed algorithm is proved by comparing with the state-of-the-art algorithms and MUSIC algorithm.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"1 1","pages":"212-229"},"PeriodicalIF":4.1,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68734795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-accuracy NLOS identification based on random forest and high-precision positioning on 60 GHz millimeter wave 基于随机森林和 60 GHz 毫米波高精度定位的高精度 NLOS 识别
IF 4.1 3区 计算机科学 Q2 TELECOMMUNICATIONS Pub Date : 2023-12-01 DOI: 10.23919/JCC.fa.2021-0742.202312
Qiuna Niu, Wei Shi, Yongdao Xu, Weijun Wen
60 GHz millimeter wave (mmWave) system provides extremely high time resolution and multipath components (MPC) separation and has great potential to achieve high precision in the indoor positioning. However, the ranging data is often contaminated by non-line-of-sight (NLOS) transmission. First, six features of 60GHz mmWave signal under LOS and NLOS conditions are evaluated. Next, a classifier constructed by random forest (RF) algorithm is used to identify line-of-sight (LOS) or NLOS channel. The identification mechanism has excellent generalization performance and the classification accuracy is over 97%. Finally, based on the identification results, a residual weighted least squares positioning method is proposed. All ranging information including that under NLOS channels is fully utilized, positioning failure caused by insufficient LOS links can be avoided. Compared with the conventional least squares approach, the positioning error of the proposed algorithm is reduced by 49%.
60 GHz 毫米波(mmWave)系统具有极高的时间分辨率和多径分量(MPC)分离能力,在实现高精度室内定位方面潜力巨大。然而,测距数据经常受到非视距(NLOS)传输的污染。首先,评估了 60GHz 毫米波信号在 LOS 和 NLOS 条件下的六个特征。然后,使用随机森林(RF)算法构建的分类器来识别视距(LOS)或非视距(NLOS)信道。该识别机制具有出色的泛化性能,分类准确率超过 97%。最后,基于识别结果,提出了一种残差加权最小二乘法定位方法。该方法充分利用了包括 NLOS 信道在内的所有测距信息,避免了因 LOS 链路不足而导致的定位失败。与传统的最小二乘法相比,所提算法的定位误差减少了 49%。
{"title":"High-accuracy NLOS identification based on random forest and high-precision positioning on 60 GHz millimeter wave","authors":"Qiuna Niu, Wei Shi, Yongdao Xu, Weijun Wen","doi":"10.23919/JCC.fa.2021-0742.202312","DOIUrl":"https://doi.org/10.23919/JCC.fa.2021-0742.202312","url":null,"abstract":"60 GHz millimeter wave (mmWave) system provides extremely high time resolution and multipath components (MPC) separation and has great potential to achieve high precision in the indoor positioning. However, the ranging data is often contaminated by non-line-of-sight (NLOS) transmission. First, six features of 60GHz mmWave signal under LOS and NLOS conditions are evaluated. Next, a classifier constructed by random forest (RF) algorithm is used to identify line-of-sight (LOS) or NLOS channel. The identification mechanism has excellent generalization performance and the classification accuracy is over 97%. Finally, based on the identification results, a residual weighted least squares positioning method is proposed. All ranging information including that under NLOS channels is fully utilized, positioning failure caused by insufficient LOS links can be avoided. Compared with the conventional least squares approach, the positioning error of the proposed algorithm is reduced by 49%.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"1 2","pages":"96-110"},"PeriodicalIF":4.1,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139014842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning based signal detector for OFDM systems 基于深度学习的 OFDM 系统信号检测器
IF 4.1 3区 计算机科学 Q2 TELECOMMUNICATIONS Pub Date : 2023-12-01 DOI: 10.23919/JCC.fa.2021-0347.202312
Guangliang Pan, Wei Wang, Minglei Li
In this paper, we propose a novel deep learning (DL)-based receiver design for orthogonal frequency division multiplexing (OFDM) systems. The entire process of channel estimation, equalization, and signal detection is replaced by a neural network (NN), and hence, the detector is called a NN detector (N2D). First, an OFDM signal model is established. We analyze both temporal and spectral characteristics of OFDM signals, which are the motivation for DL. Then, the generated data based on the simulation of channel statistics is used for offline training of bi-directional long short-term memory (Bi-LSTM) NN. Especially, a discriminator (F) is added to the input of Bi-LSTM NN to look for subcarrier transmission data with optimal channel gain (OCG), which can greatly improve the performance of the detector. Finally, the trained N2D is used for online recovery of OFDM symbols. The performance of the proposed N2D is analyzed theoretically in terms of bit error rate (BER) by Monte Carlo simulation under different parameter scenarios. The simulation results demonstrate that the BER of N2D is obviously lower than other algorithms, especially at high signal-to-noise ratios (SNRs). Meanwhile, the proposed N2D is robust to the fluctuation of parameter values.
本文针对正交频分复用(OFDM)系统提出了一种基于深度学习(DL)的新型接收器设计。整个信道估计、均衡和信号检测过程都由神经网络(NN)代替,因此该检测器被称为 NN 检测器(N2D)。首先,我们建立了一个 OFDM 信号模型。我们分析了 OFDM 信号的时间和频谱特征,这是 DL 的动机。然后,基于信道统计模拟生成的数据被用于离线训练双向长短期记忆(Bi-LSTM)NN。特别是在 Bi-LSTM NN 的输入中加入判别器(F),以寻找具有最佳信道增益(OCG)的子载波传输数据,这可以大大提高检测器的性能。最后,经过训练的 N2D 被用于在线恢复 OFDM 符号。在不同参数情况下,通过蒙特卡洛仿真从误码率(BER)的角度对所提出的 N2D 性能进行了理论分析。仿真结果表明,N2D 的误码率明显低于其他算法,尤其是在高信噪比(SNR)条件下。同时,所提出的 N2D 对参数值的波动具有鲁棒性。
{"title":"Deep learning based signal detector for OFDM systems","authors":"Guangliang Pan, Wei Wang, Minglei Li","doi":"10.23919/JCC.fa.2021-0347.202312","DOIUrl":"https://doi.org/10.23919/JCC.fa.2021-0347.202312","url":null,"abstract":"In this paper, we propose a novel deep learning (DL)-based receiver design for orthogonal frequency division multiplexing (OFDM) systems. The entire process of channel estimation, equalization, and signal detection is replaced by a neural network (NN), and hence, the detector is called a NN detector (N2D). First, an OFDM signal model is established. We analyze both temporal and spectral characteristics of OFDM signals, which are the motivation for DL. Then, the generated data based on the simulation of channel statistics is used for offline training of bi-directional long short-term memory (Bi-LSTM) NN. Especially, a discriminator (F) is added to the input of Bi-LSTM NN to look for subcarrier transmission data with optimal channel gain (OCG), which can greatly improve the performance of the detector. Finally, the trained N2D is used for online recovery of OFDM symbols. The performance of the proposed N2D is analyzed theoretically in terms of bit error rate (BER) by Monte Carlo simulation under different parameter scenarios. The simulation results demonstrate that the BER of N2D is obviously lower than other algorithms, especially at high signal-to-noise ratios (SNRs). Meanwhile, the proposed N2D is robust to the fluctuation of parameter values.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"39 1","pages":"66-77"},"PeriodicalIF":4.1,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139016808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure short-packet transmission in uplink massive MU-MIMO assisted URLLC under imperfect CSI 不完全CSI下上行海量MU-MIMO辅助URLLC的安全短包传输
IF 4.1 3区 计算机科学 Q2 TELECOMMUNICATIONS Pub Date : 2023-12-01 DOI: 10.23919/jcc.ea.2021-0067.202302
Tianyue Yu, Xiaoli Sun, Yueming Cai, Z. Zhu
Ultra-reliable and low-latency communication (URLLC) is still in the early stage of research due to its two strict and conflicting requirements, i.e., ultra-low latency and ultra-high reliability, and its impact on security performance is still unclear. Specifically, short-packet communication is expected to meet the delay requirement of URLLC, while the degradation of reliability caused by it makes traditional physical-layer security metrics not applicable. In this paper, we investigate the secure short-packet transmission in uplink massive multiuser multiple-input-multiple-output (MU-MIMO) system under imperfect channel state information (CSI). We propose an artificial noise scheme to improve the security performance of the system and use the system average secrecy throughput (AST) as the analysis metric. We derive the approximate closed-form expression of the system AST and further analyze the system asymptotic performance in two regimes. Furthermore, a one-dimensional search method is used to optimize the maximum system AST for a given pilot length. Numerical results verify the correctness of theoretical analysis, and show that there are some parameters that affect the tradeoff between security and latency. Moreover, appropriately increasing the number of antennas at the base station (BS) and transmission power at user devices (UDs) can increase the system AST to achieve the required threshold.
{"title":"Secure short-packet transmission in uplink massive MU-MIMO assisted URLLC under imperfect CSI","authors":"Tianyue Yu, Xiaoli Sun, Yueming Cai, Z. Zhu","doi":"10.23919/jcc.ea.2021-0067.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2021-0067.202302","url":null,"abstract":"Ultra-reliable and low-latency communication (URLLC) is still in the early stage of research due to its two strict and conflicting requirements, i.e., ultra-low latency and ultra-high reliability, and its impact on security performance is still unclear. Specifically, short-packet communication is expected to meet the delay requirement of URLLC, while the degradation of reliability caused by it makes traditional physical-layer security metrics not applicable. In this paper, we investigate the secure short-packet transmission in uplink massive multiuser multiple-input-multiple-output (MU-MIMO) system under imperfect channel state information (CSI). We propose an artificial noise scheme to improve the security performance of the system and use the system average secrecy throughput (AST) as the analysis metric. We derive the approximate closed-form expression of the system AST and further analyze the system asymptotic performance in two regimes. Furthermore, a one-dimensional search method is used to optimize the maximum system AST for a given pilot length. Numerical results verify the correctness of theoretical analysis, and show that there are some parameters that affect the tradeoff between security and latency. Moreover, appropriately increasing the number of antennas at the base station (BS) and transmission power at user devices (UDs) can increase the system AST to achieve the required threshold.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"1 1","pages":"196-211"},"PeriodicalIF":4.1,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68734342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
China Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1