Advertisement

Most Down Articles

    Published in last 1 year| In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    Published in last 1 year
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Overview of observational data-based time series causal inference
    Zefan ZENG, Siya CHEN, Xi LONG, Guang JIN
    Big Data Research    2023, 9 (4): 139-158.   DOI: 10.11959/j.issn.2096-0271.2022059
    Abstract690)   HTML72)    PDF(pc) (2614KB)(1549)       Save

    With the increase of data storage and the improvement of computing power,using observational data to infer time series causality has become a novel approach.Based on the properties and research status of time series causal inference,five observational data-based methods were induced,including Granger causal analysis,information theory-based method,causal network structure learning algorithm,structural causal model-based method and method based on nonlinear state-space model.Then we briefly introduced typical applications in economics and finance,medical science and biology,earth system science and other engineering fields.Further,we compared the advantages and disadvantages and analyzed the ways for improvement of the five methods according to the focus and difficulties of time series causal inference.Finally,we looked into the future research directions.

    Table and Figures | Reference | Related Articles | Metrics
    Intelligent communication and networking key technologies for manned/unmanned cooperation: states-of-the-art and trends
    Hao YIN, Jibo WEI, Haitao ZHAO, Jiao ZHANG, Haijun WANG, Baoquan REN
    Journal on Communications    2024, 45 (1): 1-17.   DOI: 10.11959/j.issn.1000-436x.2024037
    Abstract761)   HTML210)    PDF(pc) (2351KB)(1086)       Save

    The intelligent communication and networking technologies for manned/unmanned cooperation was comprehensively surveyed.Firstly, the requirements on communication and networking were analyzed from the application scenarios of manned/unmanned cooperation.Then, in context of physical layer, link layer and network layer respectively, the key issues regarding channel modeling, waveform design, networking protocol and intelligent collaboration were analyzed.And the states-of-the-art in this research area and the characteristics of representative technologies were deeply studied.In the end, the possible development trends and promising technologies were prospected on the way to make the manned/unmanned cooperative communication and networking more intelligent, more efficient and more flexible.

    Table and Figures | Reference | Related Articles | Metrics
    Telecommunications Science    2023, 39 (Z1): 235-238.   DOI: 10.11959/j.issn.1000-0801.2023057
    Abstract55)   HTML16)    PDF(pc) (671KB)(974)       Save
    Reference | Related Articles | Metrics
    Secure and collaborative spectrum sensing scheme based on audit game
    Yuntao WANG, Zhou SU, Qichao XU, Yiliang LIU, Haixia PENG, Hao LUAN
    Journal on Communications    2023, 44 (12): 1-14.   DOI: 10.11959/j.issn.1000-436x.2023238
    Abstract777)   HTML715)    PDF(pc) (920KB)(927)       Save

    To defend against poisoning attacks and free-riding attacks conducted by malicious sensing terminals in crowd sensing-based collaborative spectrum sensing (CCSS), a novel audit game-based defense scheme was proposed, which combined the pre-deterrence and post-punishment mechanisms.Firstly, considering the audit budget constraint, a mixed-strategy audit game model under incomplete information was designed, which set a penalty strategy to deter malicious collaborators before spectrum sensing, and audited and punished them after the fusion of sensing data.Then, a lightweight audit chain model with on-chain and off-chain collaboration was designed, in which audit evidence was stored in an off-chain data warehouse and its metadata was publicly published on the blockchain.Furthermore, a distributed and intelligent audit algorithm based on reinforcement learning was devised to adaptively seek the approximate mix-strategy equilibrium of the audit game.Simulation results demonstrate that the proposed scheme can quickly obtain the stable and approximately optimal audit strategies and actively suppress the poisoning and free-riding behaviors of malicious collaborators, in comparison with conventional schemes.

    Table and Figures | Reference | Related Articles | Metrics
    Research on the development path and countermeasures of data element value
    Yunlong YANG, Liang ZHANG, Xulei YANG
    Big Data Research    2023, 9 (6): 100-109.   DOI: 10.11959/j.issn.2096-0271.2022080
    Abstract701)   HTML110)    PDF(pc) (2022KB)(911)       Save

    Based on the development of data element marketization at home and abroad, the development path and characteristics of data element value in foreign countries were expounded.The current situation of China's data element market in terms of transaction market and application scenarios was summarized.In view of the current development of China's data element market, combined with China's data element market environment and development characteristics, through the construction of a data element market model with Chinese characteristics, we can speed up the release of data element value.

    Table and Figures | Reference | Related Articles | Metrics
    Research on new frameworks and key technologies for intelligent emergency command communication networks
    Li WANG, Aiguo FEI, Ping ZHANG, Lianming XU
    Journal on Communications    2023, 44 (6): 1-11.   DOI: 10.11959/j.issn.1000-436x.2023112
    Abstract352)   HTML102)    PDF(pc) (2103KB)(902)       Save

    The new generation of emergency command communication network is the basic means and important support for enhancing China’s emergency response capabilities such as national natural disasters and accidents, and is a key component of establishing a scientific emergency management technology system.Focusing on the requirements of communication, navigating, and sensing capabilities in “intelligent emergency”, a theoretical method and framework for intelligent emergency command and communication networks was proposed, which was introduced from three aspects in terms of network deployment, resource allocation, and assisted decision-making.The difficulties and technical ideas of multi-objective dynamic network deployment for communication, navigating, and sensing, multi-dimension efficient resource allocation for communication, computation, and caching, and multi-level decision-making and intelligent enhancement with cloud-edge-terminal collaboration were analyzed and discussed.It provides theoretical methods and key technical supports for building a new generation of emergency command and communication network in China.

    Table and Figures | Reference | Related Articles | Metrics
    Byzantine-robust federated learning over Non-IID data
    Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA
    Journal on Communications    2023, 44 (6): 138-153.   DOI: 10.11959/j.issn.1000-436x.2023115
    Abstract385)   HTML99)    PDF(pc) (2173KB)(747)       Save

    The malicious attacks of Byzantine nodes in federated learning was studied over the non-independent and identically distributed dataset , and a privacy protection robust gradient aggregation algorithm was proposed.A reference gradient was designed to identify “poor quality” shared gradients in model training, and the influence of heterogeneity data on Byzantine node recognition was reduced by reputation evaluation.Meanwhile, the combination of homomorphic encryption and random noise obfuscation technology was introduced to protect user privacy in the process of model training and Byzantine node recognition.Finally, through the evaluation over the real-world datasets, the simulation results show that the proposed algorithm can accurately and efficiently identify Byzantine attack nodes while protecting user privacy and has good convergence and robustness.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on multi-agent reinforcement learning methods from the perspective of population
    Fengtao XIANG, Junren LUO, Xueqiang GU, Jiongming SU, Wanpeng ZHANG
    Chinese Journal of Intelligent Science and Technology    2023, 5 (3): 313-329.   DOI: 10.11959/j.issn.2096-6652.202326
    Abstract553)   HTML71)    PDF(pc) (3737KB)(682)       Save

    Multi-agent systems are a cutting-edge research concept in the field of distributed artificial intelligence. Traditional multi-agent reinforcement learning methods mainly focus on topics such as group behavior emergence, multi-agent cooperation and coordination, communication and communication between agents, opponent modeling and prediction. However, they still face challenges such as observable environment, non-stationary opponent strategies, high dimensionality of decision space, and difficulty in understanding credit allocation. How to design multi-agent reinforcement learning methods that meet the large number and scale of intelligent agents and adapt to multiple different application scenarios is a cutting-edge topic in this field. This article first outlined the relevant research progress of multi-agent reinforcement learning. Secondly, a comprehensive overview and induction of multi-agent learning methods with multiple types and paradigms were conducted from the perspectives of scalability and population adaptation. Four major categories of scalable learning methods were systematically sorted out, including set permutation invariance, attention, graph and network theory, and mean field theory. There were four major categories of population adaptive reinforcement learning methods: transfer learning, course learning, meta learning, and meta game, and typical application scenarios were provided. Finally, the frontier research directions were prospected from five aspects: benchmark platform development, two-layer optimization architecture, adversarial strategy learning, human-machine collaborative value alignment and adaptive game decision-making loop, providing reference for the research on relevant frontier key issues of multi-agent reinforcement learning in multimodal environments.

    Table and Figures | Reference | Related Articles | Metrics
    Deep learning-based multimodal trajectory prediction methods for autonomous driving: state of the art and perspectives
    Jun HUANG, Yonglin TIAN, Xingyuan DAI, Xiao WANG, Zhixing PING
    Chinese Journal of Intelligent Science and Technology    2023, 5 (2): 180-199.   DOI: 10.11959/j.issn.2096-6652.202317
    Abstract921)   HTML116)    PDF(pc) (6643KB)(673)       Save

    Although deep learning methods have achieved better results than traditional trajectory prediction algorithms, there are still problems such as information loss, interaction and uncertainty difficulties in modelling, and lack of interpretability of predictions when implementing multimodal high-precision prediction for autonomous vehicles in heterogeneous, highly dynamic and complex changing environments.The newly developed Transformer's long-range modelling capability and parallel computing ability make it a great success not only in the field of natural language processing, but also in solving the above problems when extended to the task of multimodal trajectory prediction for autonomous driving.Based on this, the aim of this paper is to provide a comprehensive summary and review of past deep neural network-based approaches, in particular the Transformer-based approach.The advantages of Transformer over traditional sequential network, graphical neural network and generative model were also analyzed and classified in relation to existing challenges, simultaneously.Transformer models can be better applied to multimodal trajectory prediction tasks, and that such models have better generalisation and interpretability.Finally, the future directions of multimodal trajectory prediction were presented.

    Table and Figures | Reference | Related Articles | Metrics
    AI-driven digital image art creation: methods and case analysis
    Changsheng WANG
    Chinese Journal of Intelligent Science and Technology    2023, 5 (3): 406-414.   DOI: 10.11959/j.issn.2096-6652.202333
    Abstract867)   HTML224)    PDF(pc) (48558KB)(645)       Save

    In recent years, the rapid advancement of artificial intelligence technology has introduced novel tools for the realm of digital image creation.The use of AI tools for digital image creation has gradually become a common practice.In this context, this paper analyzed the methods and cases of AI-driven digital image art creation through interviews, surveys, and case analyses.The survey revealed that the majority of respondents believed that AI tools had a significant impact on their creative process, especially the widespread use of direct output from artificial intelligence methods in digital image art creation.By analyzing the cases in detail, this paper revealed the typical paradigms of AI-based digital image art creation and summarized them as the “AI art creation workflow”, which included AI direct output, AI assisted drawing, and ControlNet precision drawing.These methods can effectively replace repetitive steps in digital image creation and improve image output efficiency, assist in digital image drawing and break through the conventional drawing ideas, and achieve precise and controllable expression of digital image art content.

    Table and Figures | Reference | Related Articles | Metrics
    Diffusion Model and Artificial Intelligence Generated Content
    Chinese Journal of Intelligent Science and Technology    2023, 5 (3): 378-379.   DOI: 10.11959/j.issn.2096-6652.202334-1
    Abstract140)   HTML39)    PDF(pc) (2154KB)(625)       Save
    Reference | Related Articles | Metrics
    Research on the internal logic and solution of the “Channel Computing Resources from the East to the West” project
    Nannan TONG, Dong CHEN, Huiying LI, Honglin ZHU
    Big Data Research    2023, 9 (5): 9-19.   DOI: 10.11959/j.issn.2096-0271.2023055
    Abstract369)   HTML151)    PDF(pc) (1659KB)(582)       Save

    The "Channel Computing Resources from the East to the West" project is a major strategic project to build a balance of computing resources and on-demand scheduling in China's territorial space.Since the full launch of the Chinese"Channel Computing Resources from the East to the West" project construction, a series of problems have been exposed on many different fields, such as the supply side, demand side, energy side, technology side, and mechanism side.It is urgent to re-analyze and define the internal logic of the "Channel Computing Resources from the East to the West"project from a theoretical level.The internal logic of "Channel Computing Resources from the East to the West", that is, the infrastructure of Chinese computing, was analyzed from different perspectives such as economic form, technological trend, technological competition, and cost-benefit.It also proposed to build a new type of infrastructure for the Chinese national computing network, called computing NET, and build a national computing NET construction path from the aspects of policy layout, network direct connection, technical support, and mechanism innovation.

    Table and Figures | Reference | Related Articles | Metrics
    An algorithm for joint optimization of dynamic routing and scheduling in time-sensitive networking
    Yang ZHOU, Honglong CHEN, Lei ZHANG
    Chinese Journal on Internet of Things    2023, 7 (4): 52-62.   DOI: 10.11959/j.issn.2096-3750.2023.00318
    Abstract349)   HTML31)    PDF(pc) (1460KB)(568)       Save

    Time-sensitive networking (TSN) is a set of protocols developed by the IEEE TSN task group, aiming at achieving deterministic communications over Ethernet.As the implementation method of TSN traffic scheduling is not specified in the protocols, the routing and scheduling algorithm for TSN remains an open issue.The joint optimization problem of routing and scheduling in TSN for industrial applications was modeled, and then an online heuristic algorithm was proposed to deliver the routing and scheduling solution for dynamic traffics.The routing path was determined by optimizing both the transmission delay and network load factors, and the scheduling time was quickly conducted by twice clipping operations.Finally, a simulated TSN testbed was developed with NeSTiNg framework based on OMNeT.The simulation results show that the execution time of the proposed algorithm outperforms the baseline algorithms even with large scale of network size and network traffics.It shows that the proposed algorithm guarantees the real-time performance even in dynamically changing networks.

    Table and Figures | Reference | Related Articles | Metrics
    Application Status and Analysis of Starlink Constellation
    Yu WANG, Qing LI, Kejun LI, Changlin JIANG, Ye WANG, Yong JIANG, Mingwei XU
    Space-Integrated-Ground Information Networks    2023, 4 (2): 93-102.   DOI: 10.11959/j.issn.2096-8930.2023023
    Abstract428)   HTML81)    PDF(pc) (6589KB)(566)       Save

    Starlink, asatellite broadband constellation operated by SpaceX, is currently the most influential and promising LEO broadband satellite constellation.With the expansion of the constellation deployment, its high-frequency launch and batch deployment of satellites, provision of diversified satellite broadband services, rapid growth of global user terminals, as well as potential support and capability enhancing for military are manifesting gradually.Firstiy, the current status of Starlink's on-orbit operations were analyzed, and its internet services with other satellite broadband service providers was compared.Then, the application characteristics and technical challenges of Starlink's inter-satellite laser links were focused on, and Starlink's military application progress and the evolution trend were discussed.Finally, the comprehensive application advantages Starlink offers, and technical challenges faced by Starlink were summarized, which could served as a stepping stone for the design of our country's satellite network.Overall, the construction and application of a mega LEO constellation like Starlink involves the chain integration of a series of component, ranging from satellite design and industrialized production, satellite launch facilities, constellation operation and maintenance, satellite networking, toglobal ground station supporting, rather than just the satellite platforms.

    Table and Figures | Reference | Related Articles | Metrics
    Potential risks and governance strategies of artificial intelligence generated content technology
    Yaling LI, Yuanqi QIN, Que WEI
    Chinese Journal of Intelligent Science and Technology    2023, 5 (3): 415-423.   DOI: 10.11959/j.issn.2096-6652.202332
    Abstract502)   HTML62)    PDF(pc) (2926KB)(545)       Save

    Artificial intelligence generated content technology is reshaping the production and consumption patterns of digital content.The research was based on the basic concepts and technological development process of artificial intelligence generated content technology, focusing on exploring ethical risks and governance challenges such as privacy leakage, algorithm hegemony, digital divide, intellectual property protection and employment impact caused by artificial intelligence generated content.After reviewing the typical governance paths and experiences of developed countries abroad, this paper summarized and proposed measures and development suggestions for China to address the potential risks of AI generated content.One was to prioritize development and coordinate layout; Second was to strengthen the full factor investment in the research and development of artificial intelligence technology; Third was to improve the governance rule system of artificial intelligence technology; Fourth was to accelerate the research and development of artificial intelligence governance technology.

    Table and Figures | Reference | Related Articles | Metrics
    Review on Networking and Control Technologies of Space Satellite Network
    Xinyue LIAO, Ran ZHANG, Zhengxuan HUANG, Jiang LIU, Qinqin TANG, Tao HUANG
    Space-Integrated-Ground Information Networks    2023, 4 (3): 48-58.   DOI: 10.11959/j.issn.2096-8930.2023030
    Abstract294)   HTML67)    PDF(pc) (6452KB)(534)       Save

    With the rapid advancement of aerospace technology and satellite internet, high-speed and high-bandwidth satellite communication systems have gradually become an essential component of the next-generation mobile communication infrastructure.The trend in the development of satellite internet has propelled the commercialization process of satellite networks, with low earth orbit satellites playing a significant role in constructing satellite internet.The efficient and reliable network management of large-scale low earth orbit satellite networks, along with the integration of space and ground routing, has gradually emerged as a cutting-edge issue in the development of integrated aerospace networks.In recent years, as satellite networks have expanded in scale, numerous network management methods have been proposed.Firstly, begined by examining the development status of large-scale satellite constellations both domestically and internationally, surveying the existing network architecture and protocol systems of various satellite networks.Subsequently, based on the current development status of large-scale satellite networks, the challenges and key technologies involved in satellite management were analyzed.Finally, built upon the network integration of space and ground, existing solutions were extensively researched and analyzed.

    Table and Figures | Reference | Related Articles | Metrics
    Key problems and progress of pedestrian trajectory prediction methods: the state of the art and prospects
    Quancheng DU, Xiao WANG, Lingxi LI, Huansheng NING
    Chinese Journal of Intelligent Science and Technology    2023, 5 (2): 143-162.   DOI: 10.11959/j.issn.2096-6652.202315
    Abstract566)   HTML96)    PDF(pc) (5939KB)(530)       Save

    Pedestrian trajectory prediction aims to use observed human historical trajectories and surrounding environmental information to predict the future position of the target pedestrian, which has important application value in reducing collision risks for autonomous vehicles in social interactions.However, traditional model-driven pedestrian trajectory prediction methods are difficult to predict pedestrian trajectories in complex and highly dynamic scenes.In contrast, datadriven pedestrian trajectory prediction methods rely on large-scale datasets and can better capture and model more complex pedestrian interaction relationships, thereby achieving more accurate pedestrian trajectory prediction results, and have become a research hotspot in fields such as autonomous driving, robot navigation and video surveillance.In order to macroscopically grasp the research status and key issues of pedestrian trajectory prediction methods, We started with the classification of pedestrian trajectory prediction technology and methods.First, the research progress of existing pedestrian trajectory prediction methods were elaborated and the current key issues and challenges were summarized.Second, according to the modeling differences of pedestrian trajectory prediction models, existing methods were divided into model-driven and data-driven pedestrian trajectory prediction methods, and the advantages, disadvantages and applicable scenarios of different methods were summarized.Then, the mainstream datasets used in pedestrian trajectory prediction tasks were summarized and the performance indicators of different algoriths were compared.Finally, the future development direction of pedestrian trajectory prediction was prospected.

    Table and Figures | Reference | Related Articles | Metrics
    In celebration of McCulloch-Pitts ANN model’s 80th anniversary: its origin, principle, and influence
    Qinghai MIAO, Yutong WANG, Yisheng LV, Xiaoxiang NA, Fei-Yue WANG
    Chinese Journal of Intelligent Science and Technology    2023, 5 (2): 133-142.   DOI: 10.11959/j.issn.2096-6652.202314
    Abstract588)   HTML143)    PDF(pc) (8731KB)(528)       Save

    In 1943, Warren McCulloch and Walter Pitts published a paper titled “A logical calculus of the ideas immanent in nervous activity”, which demonstrated that the functioning of neural networks could be described using logical calculus.This expanded the field of computational neuroscience and laid the foundation for the development of artificial neural networks.On the occasion of the 80th anniversary of the publication of the M-P paper, the intellectual origins of the M-P theory was explored, taking into account the historical context and the authors’ career trajectories.With the help of examples from the original paper, the basic principles of the M-P model were outlined, and its advantages and limitations were summarized.Furthermore, the impact of the M-P theory on the development of information science was discussed, focusing on the authors’ contributions to cybernetics, including their work on circular causality and feedback mechanisms, which provided a foundation for the development of modern artificial intelligence technologies such as parallel intelligence and large-scale models.

    Table and Figures | Reference | Related Articles | Metrics
    Risks and countermeasures of artificial intelligence generated content technology in content security governance
    Zhe QIAO
    Telecommunications Science    2023, 39 (10): 136-146.   DOI: 10.11959/j.issn.1000-0801.2023190
    Abstract368)   HTML65)    PDF(pc) (1074KB)(514)       Save

    Recently, artificial intelligence generated content (AIGC) technology has achieved various disruptive results and has become a new trend in AI research and application, driving AI into a new era.Firstly, the development status of AIGC technology was analyzed, focusing on generative models such as generative adversarial networks and diffusion models, as well as multimodal technologies, and surveying and elaborating on the existing technological capabilities for text, speech, image and video generation.Then, the risks brought by AIGC technology in the field of content security governance were focused and analyzed, including fake information, content infringement, network and software supply chain security, data leakage and other aspects.Finally, in view of the above security risks, counter strategies were proposed from the technical, application and regulatory levels, respectively.

    Table and Figures | Reference | Related Articles | Metrics
    A survey on digital content generation, detection, and forensics techniques
    Juan CAO, Yongchun ZHU, Peng QI, Ziyao HUANG, Tianyun YANG, Zhengjia WANG, Yuyan BU
    Big Data Research    2023, 9 (5): 150-173.   DOI: 10.11959/j.issn.2096-0271.2023066
    Abstract251)   HTML60)    PDF(pc) (3015KB)(513)       Save

    In recent years, the technology of digital content generation has been greatly developed, and the detection and forensic technology of digital content are facing new challenges.This paper firstly introduced digital content generation technology from three aspects: large natural language model, visual generation technology, and multimodal generation technology.Secondly, it introduced digital content detection technology from three aspects: generated text detection, generated image detection, and generated audio and video detection.Thirdly, it introduced digital content forensics technology from two aspects: utilizing fact ual information and forging traces.Then, this paper introduced the application scenarios of these techniques.Finally, it prospected the future work in this research field, and pointed out several directions that need to be focused on.

    Table and Figures | Reference | Related Articles | Metrics
    A survey on application of block chain in next generation intelligent manufacturing
    Zhiwei LIN, Songchuan ZHANG, Chengji WANG, Yiwei ZHOU
    Chinese Journal of Intelligent Science and Technology    2023, 5 (2): 200-211.   DOI: 10.11959/j.issn.2096-6652.202248
    Abstract497)   HTML74)    PDF(pc) (13396KB)(513)       Save

    In the process of promoting digital transformation of Chinese manufacturing enterprises, block chain technology has attracted extensive attention of researchers.The overall research progress domestically and abroad in the field of block chain technology was concluded.The recent researches on block chain technology in manufacturing process of food and military products, cloud manufacturing and other fields were summarized.The future path of combining block chain technology with intelligent manufacturing was predicted from 4 aspects: storage problem, scalability problem, computational power waste problem, security and privacy problem, aiming to provide valuable research ideas for further researchers.

    Table and Figures | Reference | Related Articles | Metrics
    Abnormal cell segmentation for lung pathological image based on denseblock and attention mechanism
    Wencheng CUI, Keli WANG, Hong SHAO
    Chinese Journal of Intelligent Science and Technology    2023, 5 (4): 525-534.   DOI: 10.11959/j.issn.2096-6652.202210
    Abstract251)   HTML3)    PDF(pc) (3799KB)(512)       Save

    Aiming at the problems of unbalanced brightness of lung cell images and achieving accurate segmentation of abnormal cell contour difficultly, an abnormal cell segmentation model based on U-Net was proposed, which combined the dense connection mechanism and attention mechanism. Firstly, U-Net with encoder-decoder structure was used to segment abnormal cells. Secondly, the dense block was introduced into U-Net to improve the propagation ability between features and extract more characteristic information of abnormal cells. Finally, the attention mechanism was used to increase the weight of abnormal cell regions and reduce the interference of the imbalance of brightness to the model. The experimental results show that the IoU value and Dice similarity coefficient achieved by this method are 0.6928 and 0.8060, respectively. Compared with other models, this proposed method is able to segment low-contrast regions and abnormal cells with diverse shapes.

    Table and Figures | Reference | Related Articles | Metrics
    Data center networks with performance guarantee: a survey
    Kaihui GAO, Dan LI
    Telecommunications Science    2023, 39 (6): 1-21.   DOI: 10.11959/j.issn.1000-0801.2023125
    Abstract260)   HTML88)    PDF(pc) (1681KB)(491)       Save

    As an important information infrastructure, data center network (DCN) supports numerous distributed applications, such as artificial intelligence training and cloud storage.These applications require the transmission of large amounts of data, and as a result, the demand for performance stability of DCN has been increasing.The performance guarantee of DCN has gained widespread attention from both academia and industry in recent years.Firstly, the main challenges of implementing performance guarantees in DCN were analyzed, and the research directions to improve performance stability were proposed.Secondly, three essential capabilities for a performance-guaranteed DCN were summarized, such as high availability, bandwidth guarantee, and bounded latency.The comparative analysis of the relevant research was provided from multiple perspectives.In the end, the future development trend of the research on the performance guarantee of DCN was looked forward to.

    Table and Figures | Reference | Related Articles | Metrics
    Research on geomagnetic indoor high-precision positioning algorithm based on generative model
    Shuai MA, Ke PEI, Huayan QI, Hang LI, Wen CAO, Hongmei WANG, Hailiang XIONG, Shiyin LI
    Journal on Communications    2023, 44 (6): 211-222.   DOI: 10.11959/j.issn.1000-436x.2023104
    Abstract150)   HTML24)    PDF(pc) (3116KB)(485)       Save

    Aiming at the current bottleneck of constructing a fine geomagnetic fingerprint library that required a lot of labor costs, two generative models called the conditional variational autoencoder and the conditional confrontational generative network were proposed, which could collect a small number of data samples for a given location, and generate pseudo-label fingerprints.At the same time, in order to solve the problem of low positioning accuracy of single-point geomagnetic fingerprints, a geomagnetic sequence positioning algorithm based on attention mechanism of convolutional neural network-gated recurrent unit was designed, which could effectively use the spatial and temporal characteristics of fingerprints to achieve precise positioning.In addition, a real-time, portable mobile terminal data collection and positioning system was also designed and built.The actual test shows that the proposed model can effectively construct the available geomagnetic fingerprint database, and the average error of the proposed algorithm can reach 0.16 m.

    Table and Figures | Reference | Related Articles | Metrics
    Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles
    Haibo ZHANG, Kai LAN, Zhou CHEN, Ruyan WANG, Can ZOU, Mingyue WANG
    Journal on Communications    2023, 44 (6): 103-116.   DOI: 10.11959/j.issn.1000-436x.2023055
    Abstract212)   HTML30)    PDF(pc) (2714KB)(484)       Save

    Aiming at the problem that the current batch authentication and key agreement protocol were relied on semi-trusted road side unit (RSU) and were not suitable for key update in large-scale Internet of vehicles (IoV), a ring-based efficient batch authentication and group key agreement protocol with anonymity in IoV was proposed.The anonymity was ensured by the pseudonym mechanism.The authentication key pairs were constructed by the chaotic map, and the batch authentication for many vehicles was quickly completed by a small number of bilinear maps.The joining and leaving of vehicles in large-scale IoV scenario were fully considered, a ring session group was efficiently constructed by using the semi-group property of chaotic maps, and a group key establishment and update mechanism suitable for large-scale vehicles was designed.In addition, a pseudonym update mechanism and an anonymous tracing mechanism were designed to ensure a more secure session process.At the same time, the BAN logic model was used to prove the semantic security of the protocol.The security analysis and simulation results show that the proposed protocol has multiple security attributes and certain efficiency advantages.

    Table and Figures | Reference | Related Articles | Metrics
    Big data and computing models
    Guojie LI
    Big Data Research    2024, 10 (1): 9-16.   DOI: 10.11959/j.issn.2096-0271.2024017
    Abstract385)   HTML188)    PDF(pc) (1457KB)(478)       Save

    At present, artificial intelligence continues to heat up.Large language models have attracted much attention and set off a wave of enthusiasm around the world.The success of artificial intelligence is not essentially a "miracle" of large computing power, but a change in computing models.Firstly, this paper affirms the fundamental role of data in AI, and points out that synthetic data will be the main source of data in the future.Then, this paper reviews the development of computing models, highlights the historic competition between neural network models and Turing models.We points out that the important hallmark of large language models is the emergence of intelligence in machines, emphasizes that the essence of large language models is "compression", and analyzes the reasons for the "illusion" of large language models.Finally, we call on the scientific community to attach importance to large scientific models in "AI for research(AI4R)".

    Reference | Related Articles | Metrics
    Survey on community detection method based on random walk
    Yang GAO, Hongli ZHANG
    Journal on Communications    2023, 44 (6): 198-210.   DOI: 10.11959/j.issn.1000-436x.2023108
    Abstract275)   HTML43)    PDF(pc) (1285KB)(468)       Save

    Random walk techniques achieve high accuracy and efficiency in community detection.To summarize and analyze community detection methods based on random walk, the random walk technique was classified into personalized PageRank, heat kernel diffusion and other random walk methods, and community detection was classified into tasks of local community detection and global community structure identification.A detailed overview of different techniques based on random walk and their application to the tasks of community detection was provided, problems in existing methods were analyzed, and future research directions were pointed out.Finally, evaluation metrics of community detection accuracy for different community detection tasks were summarized in terms of similarity and structure respectively to facilitate research in community detection.

    Table and Figures | Reference | Related Articles | Metrics
    Next-generation mmWave WLAN: vision and key enabling technologies
    Min FAN, Siyuan SHAO, Chao HE, Xiang WANG, Haiming WANG
    Chinese Journal on Internet of Things    2023, 7 (3): 1-14.   DOI: 10.11959/j.issn.2096-3750.2023.00354
    Abstract241)   HTML60)    PDF(pc) (1433KB)(463)       Save

    With the rapid development and wide applications of information and communication technologies, human production and life and social governance are evolving in the direction of digitizing, informatization, and intelligence.As one of the most widely applied wireless communication technologies, the wireless local area network (WLAN) needs to make further breakthroughs in the key performance such as data throughput, reliability, and latency and needs to add sensing functions and intelligence.The huge frequency resources of the millimeter wave (mmWave) band have injected new momentum into the development of WLAN.But the mmWave WLAN has also brought new technical challenges and requirements.Firstly, the WLAN development history was reviewed, and network structures, typical applications, development directions, and performance index requirements of WLAN in the future were summarized.Then, the characteristics of wireless channels in the mmWave band were given, and the new requirements and challenges for mmWave WLAN design were analyzed.Finally, some potential key technologies that may meet these challenges and requirements were discussed and prospected.

    Table and Figures | Reference | Related Articles | Metrics
    Prototype verification for integrated sensing and communications:current status and development trends
    Jie YANG, Yixuan HUANG, Tao DU, Hang QUE, Shuqiang XIA, Shi JIN
    Journal on Communications    2023, 44 (11): 43-54.   DOI: 10.11959/j.issn.1000-436x.2023205
    Abstract259)   HTML55)    PDF(pc) (1731KB)(459)       Save

    Considering the practical challenges faced by the commercialization of integrated sensing and communication (ISAC), the implementation progress and future trends of ISAC were elaborated and summarized.First, the research progress and empirical performance of single node-based ISAC prototype systems were summarized, including positioning, environmental mapping, imaging, waveform design, and beam tracking.Next, the actual gain of multi-nodes cooperation-based ISAC prototype systems in the scenarios of the Internet of vehicles and the Internet of things were analyzed.Then, focusing on cross-sensor-based ISAC prototype systems, the advantages and disadvantages of each kind of sensor and the experimental fusion performance were overviewed.Finally, the future trends in the system implementation and technical validation of ISAC were highlighted, addressing the challenges encountered in existing ISAC prototype systems.

    Table and Figures | Reference | Related Articles | Metrics
    Research on 6G standardization of International Telecommunications Union(ITU)
    Yan WANG, Ying PENG
    Telecommunications Science    2023, 39 (6): 129-138.   DOI: 10.11959/j.issn.1000-0801.2023130
    Abstract291)   HTML69)    PDF(pc) (1219KB)(451)       Save

    The International Telecommunications Union (ITU), as the authoritative international standardization organization in the field of information and communications (ICT), is leading the pace of the work in technology research and standardization of 6G.With the joint efforts of various parties in the global industry, it expected to officially release international standards for 6G around 2030 and promote its commercialization.Firstly, the basic information and organizational structure of ITU was introduced.And the current progress of ITU’s IMT-2030(6G) standardization work including the Recommendation “ITU-R M.[IMT.Framework for 2030 and Beyond]”, Report “Future technology trends of terrestrial IMT systems towards 2030 and beyond” and etc., as well as subsequent standardization research were analyzed.In addition, the impact of ITU’s 6G standardization work on the mobile communication and industries was also analyzed.The standardization work of 6G in ITU can not only promote technological changes and upgrades for the new generation of mobile communication systems, but also drive the transformation and development of the industry ecosystem.

    Table and Figures | Reference | Related Articles | Metrics
    Multi-UAV cooperative channel model for emergency communication
    Lu BAI, Mingran SUN, Ziwei HUANG, Tao FENG, Xiang CHENG
    Journal on Communications    2023, 44 (7): 38-50.   DOI: 10.11959/j.issn.1000-436x.2023058
    Abstract247)   HTML68)    PDF(pc) (3796KB)(451)       Save

    To carry out the system design and technology development for emergency communications, and greatly improve our ability of risk prevention and emergency disposal, the research on multi-unmanned aerial vehicle (multi-UAV) cooperative channel model for emergency communications was carried out.First, the channel dataset of multi-UAV cooperative emergency communications in two typical emergency environments, i.e., the urban earthquake and suburban blizzard, was established.The channel parameters and statistical properties of multi-UAV cooperative emergency communications were analyzed.Second, a more general geometry-based stochastic channel model (GBSM) was proposed for multi-UAV cooperative emergency communications.The channel impulse response (CIR) and the cooperative non-station arity of multi-UAV cooperative channels in the space and time domains in multi-UAV cooperative emergency communications were calculated and captured.Finally, the channel characteristics of multi-UAV cooperative emergency communication in urban earthquake and suburban blizzard scenarios were analyzed, which could support the practical implementation of multi-UAV cooperative emergency communications.Meanwhile, the statistical characteristic of the proposed model can fit well with that of ray-tracing-based channel data, verifying the utility of the proposed model.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on model inversion attack and defense in federated learning
    Dong WANG, Qianqian QIN, Kaitian GUO, Rongke LIU, Weipeng YAN, Yizhi REN, Qingcai LUO, Yanzhao SHEN
    Journal on Communications    2023, 44 (11): 94-109.   DOI: 10.11959/j.issn.1000-436x.2023209
    Abstract374)   HTML65)    PDF(pc) (4179KB)(449)       Save

    As a distributed machine learning technology, federated learning can solve the problem of data islands.However, because machine learning models will unconsciously remember training data, model parameters and global models uploaded by participants will suffer various privacy attacks.A systematic summary of existing attack methods was conducted for model inversion attacks in privacy attacks.Firstly, the theoretical framework of model inversion attack was summarized and analyzed in detail.Then, existing attack methods from the perspective of threat models were summarized, analyzed and compared.Then, the defense strategies of different technology types were summarized and compared.Finally, the commonly used evaluation criteria and datasets were summarized for inversion attack of existing models, and the main challenges and future research directions were summarized for inversion attack of models.

    Table and Figures | Reference | Related Articles | Metrics
    Optimized design of sensing transmission and computing collaborative industrial Internet
    Jingbo LI, Li MA, Yang LI, Yingxun FU, Dongchao MA
    Journal on Communications    2023, 44 (6): 12-22.   DOI: 10.11959/j.issn.1000-436x.2023118
    Abstract237)   HTML52)    PDF(pc) (2488KB)(448)       Save

    In view of the new scenario and time-sensitive requirements of sensing-transmission end to computing end in the industrial Internet, and to solve the problem of end-to-end delay in applications that were not up to standard, a network optimized design scheme for sensing-transmission cooperative computing was proposed.First, the sensing-transmission computing cooperative network architecture based on cloud-edge-end was proposed to promote the deep integration of multidimensional systems and heterogeneous resources.Secondly, the network topology construction mode was optimized to reduce the average path length of the network, shorten the propagation distance, and offset the problem of signal decay due to the use of higher frequencies.Finally, the routing method was improved, and an integrated algorithm of topology optimization and routing strategy was designed to reduce the queuing delay in the network, control the end-to-end delay within a bounded range, and weaken the “long tail phenomenon”.The experimental results show that the scheme reduces the end-to-end delay and ensures the real-time and reliability of the network by optimizing the network topology and routing strategy and integrating the design.

    Table and Figures | Reference | Related Articles | Metrics
    Research on edge offloading delay optimization of cellular networks based on optimal transport theory
    Xiangyu LYU, Yong XIAO, Yi ZHONG, Qiang LI, Xiaohu GE
    Chinese Journal on Internet of Things    2023, 7 (4): 13-27.   DOI: 10.11959/j.issn.2096-3750.2023.00352
    Abstract131)   HTML28)    PDF(pc) (7864KB)(446)       Save

    With the development of the internet of things, a large number of user device (UD) were connected to cellular network.Since the changes in the spatial distribution of UD and application requirements, it is necessary to dynamically adjust the UD’ offloading decision.Comprehensively considering various parameter information in the networks such as the spatial distribution of UD, application requirements, and the processing capability of the edge servers on the base station (BS) side, the offloading decision of UD were optimized from the perspective of distribution.Based on the optimal transport theory, a delay optimization algorithm was proposed to reduce the average delay of the UD’ computing tasks offloading process by reasonably planning the offloading BS of the UD in the networks.The simulation results show that the average delay can be reduced by 81.06% using the proposed offloading mechanism based on delay optimization, and the traffic handled by each BS is balanced.

    Table and Figures | Reference | Related Articles | Metrics
    Adversarial sample generation algorithm for vertical federated learning
    Xiaolin CHEN, Daoguang ZAN, Bingchao WU, Bei GUAN, Yongji WANG
    Journal on Communications    2023, 44 (8): 1-13.   DOI: 10.11959/j.issn.1000-436x.2023149
    Abstract287)   HTML81)    PDF(pc) (2945KB)(441)       Save

    To adapt to the scenario characteristics of vertical federated learning (VFL) applications regarding high communication cost, fast model iteration, and decentralized data storage, a generalized adversarial sample generation algorithm named VFL-GASG was proposed.Specifically, an adversarial sample generation framework was constructed for the VFL architecture.A white-box adversarial attack in the VFL was implemented by extending the centralized machine learning adversarial sample generation algorithm with different policies such as L-BFGS, FGSM, and C&W.By introducing deep convolutional generative adversarial network (DCGAN), an adversarial sample generation algorithm named VFL-GASG was designed to address the problem of universality in the generation of adversarial perturbations.Hidden layer vectors were utilized as local prior knowledge to train the adversarial perturbation generation model, and through a series of convolution-deconvolution network layers, finely crafted adversarial perturbations were produced.Experiments show that VFL-GASG can maintain a high attack success while achieving a higher generation efficiency, robustness, and generalization ability than the baseline algorithm, and further verify the impact of relevant settings for adversarial attacks.

    Table and Figures | Reference | Related Articles | Metrics
    Parallel scientific research institutes: from digital transformation to intelligent revolution
    Rui QIN, Xiaolong LIANG, Juanjuan LI, Wenwen DING, Jiachen HOU, Yutong WANG, Yonglin TIAN, Ding WEN
    Chinese Journal of Intelligent Science and Technology    2023, 5 (2): 212-221.   DOI: 10.11959/j.issn.2096-6652.202318
    Abstract232)   HTML28)    PDF(pc) (8131KB)(437)       Save

    Aiming to address the dual complexities that current scientific research institutes face in both management work and research tasks, parallel scientific research institutes were proposed.Parallel scientific research institutes were constructed based on the virtual-real interactive parallel intelligence theory, which leveraged digital construction technologies based on digital twins and metaverse, distributed governance technologies based on blockchain and decentralized autonomous organizations and operations (DAOs), intelligent decision-making technologies based on big data and foundation models, as well as scientific innovation paradigms based on decentralized science (DeSci) and artificial intelligence for science (AI4S).Their core goal was to form a prescriptive scheme for scientific research institute transformation driven by complex science, thereby constructing a trustworthy, reliable, usable, efficient and effective intelligent research organizational and operational ecosystem.The systematic design and key technologies of parallel scientific research institutes were introduced, their main characteristics and advantages were described, and their typical application scenarios were explored.Parallel scientific research institutes go beyond the simple digital transformation of scientific research institutes, and emphasize a higher level of intelligent transformation, promoting the sustainable and healthy development of scientific research institutes.

    Table and Figures | Reference | Related Articles | Metrics
    Interference and Protection in Satellite Laser Communication
    Chenzhe LAO, Jianfeng SUN
    Space-Integrated-Ground Information Networks    2023, 4 (2): 24-30.   DOI: 10.11959/j.issn.2096-8930.2023016
    Abstract165)   HTML16)    PDF(pc) (1207KB)(435)       Save

    In order to explore the safety protection technologies for various external interferences in satellite laser communication, four interference sources in the satellite laser communication link and their principles were introduced, included atmospheric turbulence, space background noise, weak light interference, and strong laser interference.And numerical models commonly used in theoretical analysis of the first two interferences were provided.Weak light interference and strong laser interference, also known as laser active interference, were artificial interference methods.From the scheme of communication, the impact of these four interference sources on coherent and incoherent communication systems was analyzed, and the current mainstream protection technologies for these four interferences under different systems were provided.The characteristics of various protection technologies were compared from versatility, cost, usability and their main application scenarios in satellite laser communication were explained.

    Table and Figures | Reference | Related Articles | Metrics
    GenFedRL: a general federated reinforcement learning framework for deep reinforcement learning agents
    Biao JIN, Yikang LI, Zhiqiang YAO, Yulin CHEN, Jinbo XIONG
    Journal on Communications    2023, 44 (6): 183-197.   DOI: 10.11959/j.issn.1000-436x.2023122
    Abstract407)   HTML70)    PDF(pc) (1359KB)(431)       Save

    To solve the problem that intelligent devices equipped with deep reinforcement learning agents lack effective security data sharing mechanisms in the intelligent Internet of things, a general federated reinforcement learning (GenFedRL) framework was proposed for deep reinforcement learning agents.The joint training through model-sharing technology was realized by GenFedRL without the need to share the local private data of deep reinforcement learning agents.Each agent device’s data and computing resources could be effectively used without disclosing the privacy of its private data.To cope with the complexity of the real communication environment and meet the need to accelerate the training speed, a model-sharing mechanism based on synchronization and parallel was designed for GenFedRL.Combined with the model structure characteristics of common deep reinforcement learning algorithms, general federated reinforcement learning algorithm suitable for single network structure and multi-network structure was designed based on the FedAvg algorithm, respectively.Then, the model sharing mechanism among agents with the same network structure was implemented to protect the private data of various agents better.Simulation experiments show that common deep reinforcement learning algorithms still perform well in GenFedRL even in the harsh communication environment where most data nodes cannot participate in training.

    Table and Figures | Reference | Related Articles | Metrics
    Adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption
    Zhuo MA, Jiayu JIN, Yilong YANG, Yang LIU, Zuobin YING, Teng LI, Junwei ZHANG
    Journal on Communications    2023, 44 (7): 76-85.   DOI: 10.11959/j.issn.1000-436x.2023140
    Abstract320)   HTML105)    PDF(pc) (1773KB)(429)       Save

    Aiming at the communication bottleneck problem when the current federated learning security aggregation algorithm was applied in a complex network environment, an adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption was proposed.While protecting gradient privacy, users adaptively compress gradients based on the current available bandwidth, greatly reduced communication overhead for federated users.Furthermore, the new dynamic decryption task distribution algorithm and gradient combination algorithm were designed in the phase of aggregation gradient decryption, which relieved the user’s uplink communication pressure.The experimental results show that the proposed scheme can sharply reduce the amount of communication to 4% compared with the existing federated learning scheme with a trivial model accuracy loss of 1%.

    Table and Figures | Reference | Related Articles | Metrics
    Channel-space endogenous anti-jamming method based on multi-reconfigurable intelligent surface
    Yonggang ZHU, Yifu SUN, Fuqiang YAO, Cheng LI, Wenlong GUO, Kang AN
    Journal on Communications    2023, 44 (10): 13-22.   DOI: 10.11959/j.issn.1000-436x.2023207
    Abstract343)   HTML122)    PDF(pc) (1679KB)(429)       Save

    In view of the concern that the traditional anti-jamming method based on jamming recognition is challenging to defend against both the unknown and the intelligent jamming attacks, a dynamic, heterogeneous, and redundant channel-space anti-jamming technique was proposed by adopting multiple reconfigurable intelligent surface (RIS), which facilitated the exploitation of channels’ resources for combating with the unknown jamming attacks.To elaborate, a channel-space endogenous anti-jamming method was proposed by leveraging the optimization of both the RIS’ coefficients and the multiple RIS’ on-off status.Firstly, after decoupling the tightly coupled variables, the optimal closed-form solutions of transmit precoder, RIS’ coefficients, and receive decoder could be derived under the alternative optimization framework.Then, the greedy algorithm was adopted to optimize the multiple RIS’ on-off status for obtaining better anti-jamming communications, and the convergence and the computation complexity of the proposed method was analyzed.Theoretical analysis and simulation results show that the proposed method can effectively defend against the uncertain jamming attacks.

    Table and Figures | Reference | Related Articles | Metrics