Most cited

Baidu   Google scholar   CSCD   Crossref   Web of science   Sciencedirect

Published within: In last 1 yearsIn last 2 yearsIn last 3 yearsAll
Condition: CSCD + All
Please wait a minute...
  • Select all
    |
  • Review papers
    Qiao Lan, Dingzhu Wen, Zezhong Zhang, Qunsong Zeng, Xu Chen, Petar Popovski, Kaibin Huang
    Journal of Communications and Information Networks. 2021, 6(4): 336-371. https://doi.org/10.23919/JCIN.2021.9663101
    CSCD(7)

    In the 1940s,Claude Shannon developed the information theory focusing on quantifying the maximum data rate that can be supported by a communication channel. Guided by this fundamental work, the main theme of wireless system design up until the fifth generation(5G)was the data rate maximization. In Shannon’s theory, the semantic aspect and meaning of messages were treated as largely irrelevant to communication. The classic theory started to reveal its limitations in the modern era of machine intelligence, consisting of the synergy between Internet-of-things (IoT) and artificial intelligence (AI). By broadening the scope of the classic communication-theoretic framework, in this article, we present a view of semantic communication (SemCom) and conveying meaning through the communication systems. We address three communication modalities:human-to-human(H2H),human-to-machine(H2M),and machine-to-machine(M2M)communications. The latter two represent the paradigm shift in communication and computing, and define the main theme of this article. H2M SemCom refers to semantic techniques for conveying meanings understandable not only by humans but also by machines so that they can have interaction and“dialogue”. On the other hand, M2M SemCom refers to effective techniques for efficiently connecting multiple machines such that they can effectively execute a specific computation task in a wireless network. The first part of this article focuses on introducing the SemCom principles including encoding, layered system architecture, and two design approaches: 1) layer-coupling design; and 2) end-to-end design using a neural network. The second part focuses on the discussion of specific techniques for different application areas of H2M SemCom [including human and AI symbiosis,recommendation,human sensing and care, and virtual reality(VR)/augmented reality (AR)]and M2M SemCom(including distributed learning, split inference,distributed consensus,and machine-vision cameras). Finally,we discuss the approach for designing SemCom systems based on knowledge graphs.We believe that this comprehensive introduction will provide a useful guide into the emerging area of SemCom that is expected to play an important role in sixth generation (6G) featuring connected intelligence and integrated sensing, computing,communication,and control.

  • Review papers
    Wenxuan Long, Rui Chen, Moretti Marco, Wei Zhang, Jiandong Li
    Journal of Communications and Information Networks. 2021, 6(1): 1-16. https://doi.org/10.23919/JCIN.2021.9387701
    CSCD(3)

    The intelligent information society, which is highly digitized, intelligence inspired, and globally data driven, will be deployed in the next decade. The next 6G wireless communication networks are the key to achieve this grand blueprint, which is expected to connect everything, provide full dimensional wireless coverage and integrate all functions to support full-vertical applications. Recent research reveals that intelligent reflecting surface(IRS)with wireless environment control capability is a promising technology for 6G networks. Specifically, IRS can intelligently control the wavefront, e. g. , the phase, amplitude, frequency, and even polarization by massive tunable elements, thus achieving fine-grained 3-D passive beamforming. In this paper, we first give a blueprint of the next 6G networks including the vision, typical scenarios, and key performance indicators(KPIs). Then, we provide an overview of IRS including the new signal model, hardware architecture, and competitive advantages in 6G networks. Besides, we discuss the potential application of IRS in the connectivity of 6G networks in detail, including intelligent and controllable wireless environment, ubiquitous connectivity, deep connectivity, and holographic connectivity. At last, we summarize the challenges of IRS application and deployment in 6G networks. As a timely review of IRS, our summary will be of interest to both researchers and practitioners engaging in IRS for 6G networks.

  • Research papers
    Xiang Cheng,Yiran Li,Lin Bai
    Journal of Communications and Information Networks. 2019, 4(4): 32-43. https://doi.org/10.23919/JCIN.2019.9005432
    CSCD(3)

    As unmanned aerial vehicles (UAV) deployment is shifting from military to civilian sectors, and in particular as a means of facilitating more flexible and versatile wireless communications, the UAV channels that were previously not well understood are attracting increasing research and investigation. As the key component facilitating the UAV-aided communications, UAV channel characteristics and modeling are of critical importance to the designed UAV system to achieve satisfactory performance. In this article, we will provide a comprehensive overview and the future perspective of envisioned UAV communication system benefits, the existing and needed UAV channel measurements and modeling approaches, together with the new viewpoint of UAV channel applications in different communication and networking layers. Both existing work and future directions are extensively covered.

  • Research papers
    Yizhi Zhou,Hong Yu,Junfeng Wu,Zhen Cui,Hongshuai Pang,Fangyan Zhang
    Journal of Communications and Information Networks. 2019, 4(3): 80-88. https://doi.org/10.23919/JCIN.2019.8917888
    CSCD(2)

    With the development of fishery industry, accurate estimation of the number of fish in aquaculture waters is of great importance to fish behavior analysis, bait feeding and fishery resource investigation. In this paper, we propose a method for fish density estimation based on the multi-scale context enhanced convolutional network, which could map a fish school image taken at any angle to a density map, and calculate the number of fish in the image finally. In order to eliminate the influence of camera perspective effect and image resolution on density estimation, multi-scale filters are utilized in a convolutional neural network to process fish image in parallel. And then, the context enhancement module is merged in the network structure to help the network understand the global context information of the image. Finally, different feature maps are merged together to construct the density map of fish school images, and finally get the number of fish in the image. In order to make the effectiveness of our method valid, we test the proposed method on DlouDataset. The results show that the proposed method has lower mean square error and mean absolute error, which is helpful to improve the accuracy of the fish counting in dense fish school images.

  • Research papers
    Xianda Wu,Shaodan Ma,Xi Yang
    Journal of Communications and Information Networks. 2020, 5(3): 88-98. https://doi.org/10.23919/JCIN.2020.9200896
    CSCD(2)

    Orthogonal time frequency space (OTFS) modulation, collaborated with millimeter-wave (mmWave) massive multiple-input-multiple-output (MIMO), is a promising technology for next generation wireless communications in high mobility scenarios. However, one of the main challenges for mmWave massive MIMO-OTFS systems is the enormous computational complexity of channel estimation incurred by the huge OTFS symbol size and the large number of antennas. To address this issue, in this paper, a tensor-based orthogonal matching pursuit(OMP)channel estimation algorithm is proposed by exploiting the channel sparsity in the delayDoppler-angle domain. In particular, we firstly propose a novel pilot design for the OTFS symbol structure in the frequency-time domain. Then, based on the proposed pilot structure, we formulate the channel estimation as a sparse signal recovery problem, and the tensor decomposition and parallel support detection are introduced into the tensor-based OMP algorithm to reduce the signal processing dimension significantly. Numerical simulations are performed to verify the superiority and the robustness of the proposed tensor-based OMP algorithm.

  • Review papers
    Yongming Huang, Chunmei Xu, Cheng Zhang, Meng Hua, Zhengming Zhang
    Journal of Communications and Information Networks. 2019, 4(2): 15-29. https://doi.org/10.23919/JCIN.2019.8917869
    CSCD(2)

    Future wireless communication networks tend to be intelligentized to accomplish the missions that cannot be preprogrammed. In the new intelligent communication systems, optimizing the network performance has become a challenge due to the ever-increasing complexity of the network environment. New theories and technologies for intelligent wireless communications have obtained widespread attention, among which deep reinforcement learning (DRL) is an excellent machine learning technology. DRL has great potential in enhancing the intelligence of wireless communication systems while overcoming the above challenge. This paper presents a review on applications of DRL in intelligent wireless communications with focuses on millimeter wave(mmWave), intelligent caching and unmanned aerial vehicle (UAV) scenarios. We first introduce the concepts and basic principles of single/multi- agent DRL techniques. Then, we review the related works where DRL algorithms are used to address emerging issues in wireless communications. These issues include mmWave communication, intelligent caching, UAV aided communication, and handover/access control in HetNets. Finally, critical challenges and future research directions of applying DRL in intelligent wireless communications are outlined.

  • Research papers
    Ying-Chang Liang, Ruizhe Long, Qianqian Zhang, Jie Chen, HeiVictor Cheng, Huayan Guo
    Journal of Communications and Information Networks. 2019, 4(2): 40-50. https://doi.org/10.23919/JCIN.2019.8917871
    CSCD(2)

    Large intelligent surface/antennas(LISA), a two-dimensional artificial structure with a large number of reflective-surface/antenna elements, is a promising reflective radio technology to construct programmable wireless environments in a smart way. Specifically, each element of the LISA adjusts the reflection of the incident electromagnetic waves with unnatural properties, such as negative refraction, perfect absorption, and anomalous reflection, thus the wireless environments can be softwaredefined according to various design objectives. In this paper, we introduce the reflective radio basics, including backscattering principles, backscatter communication, reflective relay, the fundamentals and implementations of LISA technology. Then, we present an overview of the state-of-the-art research on emerging applications of LISA-aided wireless networks. Finally, the limitations, challenges, and open issues associated with LISA for future wireless applications are discussed.

  • Special Focus: Beyond 5G Technology for Aerial, Terrestrial, and Underwater Vehicular Networks
    Shiyu Jiao, Fang Fang, Xiaotian Zhou, Haixia Zhang
    Journal of Communications and Information Networks. https://doi.org/10.23919/JCIN.2020.9130430
    Accepted: 2023-08-28

    Abstract—This paper investigates a simple design of intelligent reflecting surface (IRS) based unmanned aerial vehicles(UAV)assisted multiple-input single-output nonorthogonal multiple access (NOMA) downlink network.The aim of this paper is to maximize the rate of the strong user while guaranteeing the target rate of the weak user given by the optimized UAV horizontal position.We first optimize the location of IRS-UAV.Then we propose an iterative algorithm to optimize the transmit beamforming and phase shift of IRS alternatively.For the beamforming optimization, the closed-form expressions of the optimal beamforming vectors are derived.Then, given by the obtained beamforming, we propose two methods to obtain the optimal phase shifting of IRS.One is the semidefinite relaxation based iteration algorithm which provides high data rate and the other one is based on successive convex approximation technique which has low complexity.Finally, simulation results are provided to show that the performance of the two proposed algorithms are significantly better than using random phase shifting scenario and IRS based UAV-assisted orthogonal frequency-division multiple access scheme.

    IRS辅助的NOMA下行UAV网络中的联合波束成形和相移设计

    本文研究了一种基于智能反射表面(Intelligent Reflecting SurfaceIRS)与无人机(Unmanned Aerial VehiclesUAV)的多输入单输出非正交多址(Nonorthogonal Multiple AccessNOMA)下行传输网络的简单设计。论文研究的目的是在给定UAV最优水平位置、以及保证弱用户数据速率需求的前提下,最大化强用户的数据传输速率。论文首先对挂载IRSUAV位置进行了优化,进而提出了一种迭代算法以交替优化IRS的发射波束与相移参数。针对波束成形优化,论文推导获得了最优波束成形矢量的闭式表达。以此为基础,设计提出了两种获得IRS最优相移的方法,即基于半定松弛的迭代算法与基于连续凸逼近技术的算法。其中前者可以提供高数据速率,后者具有较低复杂度。仿真结果表明,论文所提两类算法的性能皆明显优于随机相移方案,以及IRS-UAV正交分频多址方案。

  • Research papers
    Xiaopeng Mo, Jie Xu
    Journal of Communications and Information Networks. 2021, 6(2): 110-124. https://doi.org/10.23919/JCIN.2021.9475121
    CSCD(2)

    This paper studies a federated edge learning system, in which an edge server coordinates a set of edge devices to train a shared machine learning (ML) model based on their locally distributed data samples. During the distributed training, we exploit the joint communication and computation design for improving the system energy efficiency, in which both the communication resource allocation for global ML-parameters aggregation and the computation resource allocation for locally updating ML-parameters are jointly optimized. In particular,we consider two transmission protocols for edge devices to upload ML-parameters to edge server, based on the non-orthogonal multiple access (NOMA) and time division multiple access (TDMA), respectively. Under both protocols, we minimize the total energy consumption at all edge devices over a particular finite training duration subject to a given training accuracy,by jointly optimizing the transmission power and rates at edge devices for uploading ML-parameters and their central processing unit (CPU) frequencies for local update. We propose efficient algorithms to solve the formulated energy minimization problems by using the techniques from convex optimization. Numerical results show that as compared to other benchmark schemes,our proposed joint communication and computation design significantly can improve the energy efficiency of the federated edge learning system,by properly balancing the energy tradeoff between communication and computation.

  • Research papers
    Zixuan Ren,Wei Li,Jin Jin,Yafeng Zhan,Ting Li
    Journal of Communications and Information Networks. 2019, 4(4): 87-94. https://doi.org/10.23919/JCIN.2019.9005436
    CSCD(2)

    Constrained by orbital configuration and spectrum sharing, non-geostationary orbit (NGEO) satellites may be interfered when they are in the beam range of geostationary orbit(GEO)satellite. However, it is difficult for NGEO operators to determine the signal source. Herein, we propose a method to locate the GEO signal source and estimate beam features, including beam pointing azimuth, elevation, and beamwidth, by the beam edge positions. We transform this estimation problem into two optimization problems by minimizing the estimation error, and solve both of them through a multi-variable joint iteration method with acceptable computation complexity. Numerical results show that when NGEO satellites pass through the beam twice, the longitude estimation error is about 0.01 degree, and the estimation results will be more and more accurate as the number of passing times increases. Besides, the proposed method is also effective when there are kilometer-level errors in beam edge positions.

  • Review paper
    Fangfang Liu, Jiaxi Pan, Xiangwei Zhou, GeoffreyYe Li
    Journal of Communications and Information Networks. 2021, 6(2): 101-109. https://doi.org/10.23919/JCIN.2021.9475120
    Abstract (1482) Download PDF (264) HTML (1183)   Knowledge map   Save
    CSCD(1)

    Atmospheric ducting has a significant impact on electromagnetic wave propagation. Radio signals that are trapped and guided by the atmospheric duct can travel a much longer distance over the horizon with lower attenuation since the signal power does not spread isotropically through the atmosphere.Atmospheric ducting brings both challenges and opportunities to wireless communications. On one hand, the signals propagating in the atmospheric duct may interfere with a receiver far away as remote co-channel interference. On the other hand, a point-to-point link can be established directly through the atmospheric duct to enable beyond line-of-sight communications. In this article, the formation of the atmospheric duct and its effects on radio wave propagation are first overviewed. Then solutions and standardization activities in the 3rd Generation Partnership Project (3GPP) to mitigate atmospheric duct induced remote interference are presented. Finally, the applications and design challenges of atmospheric duct enabled beyond line-of-sight communications are reviewed and future research directions are suggested.

  • Research papers
    Sultan Basudan
    Journal of Communications and Information Networks. 2020, 5(4): 89-98. https://doi.org/10.23919/JCIN.2020.9306019
    CSCD(1)

    Massive machine type communication (mMTC) is anticipated to be an essential part of fifth generation (5G) networks. The main challenge for mMTC devices (mMTCDs) is the design of an access authentication scheme that can fulfill the security and privacy requirements of 5G applications, which have specific conditions, including rigorous latency and simultaneous access. Thus, a novel 5G authentication and key agreement (5G-AKA) protocol was introduced by the 3rd generation partnership project (3GPP) to achieve mMTCD access authentication. However, 5GAKA protocol comes with some security vulnerabilities and significant delay for real-time mMTC applications, particularly when mMTCDs concurrently roam into new networks. In order to address the real-time secure and efficient access issues of multiple mMTCDs, this paper proposes a lightweight and efficient group authentication protocol for mMTC in 5G wireless networks. The proposed protocol, which integrates bilinear maps and an aggregate certificateless signature mechanism, can achieve several security goals, including avoidance of signaling congestion in the authentication process, mutual authentication, session key agreement, perfect forward/backward secrecy, and masked attack and key escrow resistance. Compared to existing conventional protocols, the proposed protocol demonstrates robust security and improved performance in terms of signaling cost authentication, bandwidth consumption and computational cost.

  • Research papers
    Chang Cai,Huiyuan Yang,Xiaojun Yuan,Ying-JunAngela Zhang,Yi Liu
    Journal of Communications and Information Networks. 2020, 5(4): 1-12. https://doi.org/10.23919/JCIN.2020.9306011
    CSCD(1)

    The performance of a device-to-device (D2D) underlay communication system is limited by the co-channel interference between cellular users (CUs) and D2D devices. To address this challenge, a reconfigurable intelligent surface (RIS) aided D2D underlay system is studied in this paper. A two-timescale optimization scheme is proposed to reduce the required channel training and feedback overhead, where transmit beamforming at the base station(BS)and power control at the D2D transmitters are adapted to instantaneous effective channel state information (CSI); and the RIS phase shifts are adapted to slow-varying channel mean. Based on the two-timescale optimization scheme, we aim to maximize the D2D ergodic weighted sum-rate (WSR)subject to a given outage probability constrained signal-to-interference-plus-noise ratio (SINR) target for each CU. The two-timescale problem is decoupled into two sub-problems, and the two sub-problems are solved iteratively. Numerical results verified that the two-timescale based optimization performs better than two baselines, and also demonstrated a favourable trade-off between system performance and CSI overhead.

  • Research papers
    Jiyu Jiao, Xuehong Sun, Yanpeng Zhang, Liping Liu, Jianfeng Shao, Jiafeng Lyu, Liang Fang
    Journal of Communications and Information Networks. 2021, 6(3): 280-300. https://doi.org/10.23919/JCIN.2021.9549123
    CSCD(1)

    Software defined radio (SDR) is a wireless communication technology that uses modern software to control the traditional“pure hardware circuit”. It can provide an effective and secure solution to the problem of building multi-mode, multi-frequency and multifunction wireless communication equipment.Although the concept and application of SDR have been studied a lot, there is little discussion about the operating efficiency of the established system. For the purpose of shortening the delay of mapping and reducing the high computing load in the cloud, a radio monitoring system based on edge computing is developed to achieve the flexible,extensible and real-time monitoring of high-performance SDR applications. To promote the edge intelligence of deep learning (DL) service deployment through edge computing(EC),we developed an edge intelligence algorithm of convolutional neural network (CNN) based on attention mechanism to carry out modulation recognition (MR) of the edge signal and make MR closer to the antenna terminal. Through the experiment of the system and the edge algorithm,this thesis verifies the effectiveness of the developed multifunction radio signal monitoring system.

  • Research papers
    Huaqing Wu, Jiayin Chen, Conghao Zhou, Junling Li, Xuemin(Sherman) Shen
    Journal of Communications and Information Networks. 2021, 6(3): 208-223. https://doi.org/10.23919/JCIN.2021.9549118
    CSCD(1)

    In this paper, we investigate the resource slicing and scheduling problem in the space-terrestrial integrated vehicular networks to support both delaysensitive services (DSSs) and delay-tolerant services (DTSs). Resource slicing and scheduling are to allocate spectrum resources to different slices and determine user association and bandwidth allocation for individual vehicles. To accommodate the dynamic network conditions, we first formulate a joint resource slicing and scheduling (JRSS) problem to minimize the long-term system cost, including the DSS requirement violation cost,DTS delay cost,and slice reconfiguration cost. Since resource slicing and scheduling decisions are interdependent with different timescales, we decompose the JRSS problem into a large-timescale resource slicing subproblem and a smalltimescale resource scheduling subproblem. We propose a two-layered reinforcement learning (RL)-based JRSS scheme to find the solutions to the subproblems.In the resource slicing layer,spectrum resources are pre-allocated to different slices via a proximal policy optimization-based RL algorithm. In the resource scheduling layer,spectrum resources in each slice are scheduled to individual vehicles based on dynamic network conditions and service requirements via matching-based algorithms.We conduct extensive trace-driven experiments to demonstrate that the proposed scheme can effectively reduce the system cost while satisfying service quality requirements.

  • Research papers
    Lanting Yan, Xiaojin Ding, Gengxin Zhang
    Journal of Communications and Information Networks. 2021, 6(2): 134-141. https://doi.org/10.23919/JCIN.2021.9475123
    CSCD(1)

    Considering the global demands on Internet of things (IoT), and the limitation of constructing base stations for the terrestrial IoT, the satellite IoT approach is a realizable and powerful supplement to the terrestrial IoT. Meanwhile, in order to dynamically access the available terrestrial and satellite networks, IoT terminals may have the ability of accessing both the terrestrial IoT and the satellite IoT, leading to great challenges on the access-control of the IoT.In this paper, we design a satellite-terrestrial integrated architecture for the IoT relying on the software defined network (SDN). Moreover, based on this architecture, we further propose a dynamic channel resource allocation algorithm to control the access of the IoT terminals with different priorities. Simulation results show that the demands on the probabilities of successful access of IoT terminals with various priorities can be simultaneously met if the access of the IoT terminals are well controlled.

  • Research papers
    Chongrui Pan, Rui Liu, Guanding Yu
    Journal of Communications and Information Networks. 2021, 6(2): 125-133. https://doi.org/10.23919/JCIN.2021.9475122
    CSCD(1)

    With the rapid growth of wireless data demand and the shortage of global bandwidth,the use of millimeter-wave (mmWave) frequency band for wireless cellular networks has become the core content of the fifth generation cellular network. Because mmWave communication has different characteristics from microwave communication,using traditional optimization techniques to manage the resource of mmWave communication networks is inappropriate. In this paper, we propose a neural network-based algorithm to solve the joint user association and resource allocation for mmWave communication system with multi-connectivity(MC)and integrated access backhaul(IAB).The resource allocation problem is formulated as a mixed-integer quadratically constrained quadratic programming(MIQCQP),which is very difficult to solve. First,we decompose the MIQCQP into two sub-problems, i.e., binary associated matrix sub-problem and continuous IAB ratio sub-problem. Then we propose a neural network to solve the binary associated matrix inference problem and a resource allocation algorithm to find the sub-optimal IAB ratio. Simulation results show that the proposed algorithm can achieve good performance with a fast inference speed.

  • Research papers
    Jiaqi Huang, Yi Qian
    Journal of Communications and Information Networks. 2020, 5(1): 40-49. https://doi.org/10.23919/JCIN.2020.9055109
    CSCD(1)

    As a major component of thefifth-generation (5G)wireless networks, network densification greatly increases the network capacity by adding more cell sites into the network. However, the densified network increases the handover frequency of fast-moving mobile users, like vehicles. Thus, seamless handover with security provision is highly desirable in 5G networks. The third generation partnership project (3GPP) has been working on standardization of the handover procedure in 5G networks to meet the stringent efficiency and security requirement. However, the existing handover authentication process in 5G networks has securityflaws, i. e. vulnerable to replay and de-synchronization attacks, and cannot provide perfect forward secrecy. In this paper, we propose a secure and efficient handover authentication and key management protocol utilizing the Chinese remainder theory. The proposed scheme preserves the majority part of the original 5G system architecture defined by 3GPP, thus can be easily implemented in practice. Formal security analysis based on BAN-logic shows that the proposed scheme achieves secure mutual authentication and can remedy some security flaws in original 5G handover process. Performance analysis shows that the proposed protocol has lower communication overhead and computation overhead compared with other handover authentication schemes.

    一安全高效的5G网络切换认证和密钥管理协议

    作为第五代(5G)移动通信网络的主要组成部分,网络密集化通过向网络中添加更多的微基站来大大增加网络容量。然而,密集化的网络增加了快速移动用户(如车辆)的网络切换频率。因此,在5G网络中,具有安全保障的无缝切换是被强烈需求的。第三代伙伴计划(3GPP)一直致力于5G网络中交接程序的标准化,以满足严格的效率和安全要求。然而现有的5G网络切换认证过程存在安全漏洞,容易受到重放和去同步攻击,且不能提供完美前向保密。本文利用中国剩余定理,提出了一种安全高效的切换认证和密钥管理协议。该方案保留了3GPP定义的5G系统的大部分原有构架,因此更易于在实践中实现。基于BAN-逻辑的形式化安全分析表明,该方案实现了安全的相互认证,并弥补了原有5G切换过程中的一些安全缺陷。性能分析表明,该方案与其他切换认证方案相比具有较低的通信开销和计算开销。


  • Research papers
    Liang Xue, Dongxiao Liu, Cheng Huang, Xiaodong Lin, Xuemin(Sherman) Shen
    Journal of Communications and Information Networks. 2020, 5(1): 16-25. https://doi.org/10.23919/JCIN.2020.9055107
    CSCD(1)

    As a widely-used machine-learning classifier, a decision tree model can be trained and deployed at a service provider to provide classification services for clients, e. g. , remote diagnostics. To address privacy concerns regarding the sensitive information in these services(i. e. , the clients’ inputs, model parameters, and classification results), we propose a privacy-preserving decision tree classification scheme (PDTC) in this paper. Specifically, we first tailor an additively homomorphic encryption primitive and a secret sharing technique to design a new secure two-party comparison protocol, where the numeric inputs of each party can be privately compared as a whole instead of doing that in a bit-by-bit manner. Then, based on the comparison protocol, we exploit the structure of the decision tree to construct PDTC, where the input of a client and the model parameters of a service provider are concealed from the counterparty and the classification result is only revealed to the client. A formal simulation-based security model and the security proof demonstrate that PDTC achieves desirable security properties. In addition, performance evaluation shows that PDTC achieves a lower communication and computation overhead compared with existing schemes.

    安全高效的隐私保护的决策树分类

    决策树作为一种被广泛应用的机器学习分类器,可以被服务提供者部署到远程服务器中并为客户提供服务,例如远程医疗诊断服务。为了解决客户及服务提供者的敏感信息(客户的输入及分类结果,服务提供者的模型参数)可能会被泄露这一隐私问题,我们提出了一个隐私保护的决策树分类方案。具体来说,我们首先利用加法同态加密原语和秘密共享技术设计了一个新的两方安全比较协议,协议中两方的数值输入可以被作为一个整体安全地进行比较,而不用以逐比特方式进行。基于提出的比较协议,我们利用决策树的树形结构构建了隐私保护的决策树分类方案(PDTC),其中客户的输入和服务提供者的模型参数都不会泄露给对方,并且决策树分类结果只会被客户知晓。基于模拟的安全模型和安全性证明论证了PDTC实现了预期的安全特性。此外,性能评估部分展示了相较于现有的方案,PDTC具有较低的通信开销和计算开销。

  • Research papers
    Dixiao Wu, Feng Wang, Xiaowen Cao, Jie Xu
    Journal of Communications and Information Networks. 2019, 4(4): 72-86. https://doi.org/10.23919/JCIN.2019.9005435
    CSCD(1)

    This paper studies a wireless powered mobile edge computing(MEC)system with device-to-device (D2D)-enabled task offloading. In this system, a set of distributed multi-antenna energy transmitters (ETs) use collaborative energy beamforming to wirelessly charge multiple users. By using the harvested energy, the actively computing user nodes can offload their computation tasks to nearby idle users (as helper nodes) via D2D communication links for self-sustainable remote computing. We consider the frequency division multiple access (FDMA) protocol, such that the D2D communications of different user-helper pairs are implemented over orthogonal frequency bands. Furthermore, we focus on a particular time block for task execution, which is divided into three slots for computation task offloading, remote computing, and result downloading, respectively, at different user-helper pairs. Under this setup, we jointly optimize the collaborative energy beamforming at ETs, the communication and computation resource allocation at users and helpers, and the user-helper pairing, so as to maximize the sum computation rate (i. e. , the number of task input-bits executed over this block) of the users, subject to individual energy neutrality constraints at both users and helpers. First, we consider the computation rate maximization problem under any given user-helper pairs, for which an efficient solution is proposed by using the techniques of alternating optimization and convex optimization. Next, we develop the optimal user-helper pairing scheme based on exhaustive search and a lowcomplexity scheme based on greedy selection. Numerical results show that the proposed design significantly improves the sum computation rate at users, as compared to benchmark schemes without such joint optimization.