Advertisement

Most Down Articles

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    In last 2 years
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Overview of intelligent game:enlightenment of game AI to combat deduction
    Yuxiang SUN, Yihui PENG, Bin LI, Jiawei ZHOU, Xinlei ZHANG, Xianzhong ZHOU
    Chinese Journal of Intelligent Science and Technology    2022, 4 (2): 157-173.   DOI: 10.11959/j.issn.2096-6652.202209
    Abstract1349)   HTML112)    PDF(pc) (869KB)(2649)       Save

    The field of intelligent game has gradually become one of the hotspots of AI research.A series of research breakthroughs have been made in the field of game AI and intelligent wargame in recent years.However, how to develop game AI and apply it to the actual intelligent combat deduction is still facing great difficulties.The overall progress of research in the field of intelligent games in domestic and overseas were explored, the main attribute requirements of intelligent combat deduction was tracked, and it was summarized with the latest advancements in reinforcement learning.The feasibility of developing game AI into intelligent combat deduction were comprehensively analyzed from three dimensions: mainstream research technology in the field of intelligent game, relevant intelligent decision technology and technical difficulties of combat deduction, and finally, some suggestions for the development of future intelligent combat deductiongives were given.This paper can introduce a clear development status and provide valuable research ideas for researchers in the field of intelligent game.

    Table and Figures | Reference | Related Articles | Metrics
    Threats and defenses of federated learning: a survey
    Jianhan WU, Shijing SI, Jianzong WANG, Jing XIAO
    Big Data Research    2022, 8 (5): 12-32.   DOI: 10.11959/j.issn.2096-0271.2022038
    Abstract1795)   HTML263)    PDF(pc) (2537KB)(2019)       Save

    With the comprehensive application of machine learning technology, data security problems occur from time to time, and people’s demand for privacy protection is emerging, which undoubtedly reduces the possibility of data sharing between different entities, making it difficult to make full use of data and giving rise to data islands.Federated learning (FL), as an effective method to solve the problem of data islands, is essentially distributed machine learning.Its biggest characteristic is to save user data locally so that the models’ joint training process won’t leak sensitive data of partners.Nevertheless, there are still many security risks in federated learning in reality, which need to be further studied.The possible attack means and corresponding defense measures were investigated in federal learning comprehensively and systematically.Firstly, the possible attacks and threats were classified according to the training stages of federal learning, common attack methods of each category were enumerated, and the attack principle of corresponding attacks was introduced.Then the specific defense measures against these attacks and threats were summarized along with the principle analysis, to provide a detailed reference for the researchers who first contact this field.Finally, the future work in this research area was highlighted, and several areas that need to be focused on were pointed out to help improve the security of federal learning.

    Table and Figures | Reference | Related Articles | Metrics
    Intelligent task-oriented semantic communications:theory, technology and challenges
    Chuanhong LIU, Caili GUO, Yang YANG, Jiujiu CHEN, Meiyi ZHU, Lu’nan SUN
    Journal on Communications    2022, 43 (6): 41-57.   DOI: 10.11959/j.issn.1000-436x.2022117
    Abstract2862)   HTML342)    PDF(pc) (2824KB)(1641)       Save

    Objectives: In the future, intelligent interconnection of all things, such as machine-to-machine and human-to-machine, poses challenges to traditional communication methods. The semantic communication method that extracts semantic information from source information and transmits them provides a novel solution for the sixth generation (6G) communication system. However, there are challenges in how to measure semantic information and how to achieve optimal semantic codec.This paper reviews the existing works related to semantic communication,and proposes a semantic communication method and framework for intelligent tasks,paving the way for further development of semantic communication.

    Methods: Firstly, the development history and research status of semantic communication are reviewed, the two bottleneck problems faced by semantic communication are analyzed and summarized, and a semantic communication method oriented to intelligent tasks is proposed. Aiming at the difficulty of semantic entropy,this paper defines the smallest basic unit of semantic message as semantic element,introduces fuzzy mathematics theory to describe the fuzzy degree of semantic understanding, and gives the calculation expression of semantic information entropy. Then, based on the information bottleneck theory, this paper proposes a semantic information coding scheme and a semantic channel joint coding scheme,respectively considering whether the receiver needs to reconstruct the original source. Furthermore, from the perspective of neural network interpretability,an interpretability-based semantic encoding method is proposed.Finally, a semantic communication platform for intelligent tasks is built based on software and hardware such as USRP and LabView,and the performance of the proposed algorithm is verified.

    Results:In the communication scenario where the source needs to be reconstructed,the semantic communication method proposed in this paper can greatly improve the compression ratio of the source data and greatly reduce the amount of transmitted data.Under the same compression ratio, the performance of the receiver to perform subsequent intelligent tasks can be improved,and the performance of source reconstruction can be improved at the same time.In scenarios where there is no need to reconstruct the source,the semantic communication method can better accomplish intelligent tasks with a large compression ratio.This is because semantic communication transmits the semantic information of the image instead of all the data of the image,which greatly reduces its bandwidth requirements,and the bandwidth utilization rate of semantic communication is 100 times higher than that of traditional communication methods. In addition, the anti-noise performance of the semantic communication method is much better than that of the traditional communication method, because the data transmitted by the semantic communication method retains the semantic features of the image,and the influence of channel noise is considered during model training, which makes the performance of intelligent tasks better and makes the communication system more robust. The semantic communication method greatly reduces the amount of data transmitted, so the transmission delay is significantly reduced under the same bandwidth resources.In addition,since image reconstruction is not required,the processing load of software and hardware is reduced, and the processing delay is also reduced. Therefore, the scheme proposed in this paper can greatly reduce the delay of end-to-end intelligent tasks while ensuring high-precision classification performance.

    Conclusions: Compared with traditional communication methods, the semantic communication method oriented to intelligent tasks has obvious advantages,which can greatly reduce the amount of transmitted data and improve the performance of intelligent tasks at the receiving end. Therefore, semantic communication will continue to maintain the trend of rapid development. However,there are still a lot of basic concepts and basic problems in semantic communication that need to be further discussed and improved,such as the basic theory of semantic information,the unified architecture of semantic communication,and the resource allocation strategy in semantic communication. Research is of great significance to promoting technological innovation and breakthroughs in the 6G era,and academic colleagues need to jointly promote the realization.

    Table and Figures | Reference | Related Articles | Metrics
    Big data technologies forward-looking
    Hong MEI, Xiaoyong DU, Hai JIN, Xueqi CHENG, Yunpeng CHAI, Xuanhua SHI, Xiaolong JIN, Yasha WANG, Chi LIU
    Big Data Research    2023, 9 (1): 1-20.   DOI: 10.11959/j.issn.2096-0271.2023009
    Abstract2639)   HTML982)    PDF(pc) (1087KB)(1586)       Save

    Major countries in the world attach great importance to the development of big data technology.China also puts big data as a national strategy, of great significance to develop in the long run.Big data technologies include data collection, transmission, management, processing, analysis, and application, forming a data life cycle as well as the data governance related to each procedure.Big data management, processing, analysis, and governance in four areas were seleceted, to identify the gap between China and the world.On the other hand, driven by diverse successful big data applications, the system architecture of computing technology is being restructured.From “computation-centric” to “data-centric”, fundamental computing theories and core technologies need to be redesigned, therefore a new type of big data system technology is becoming an important research direction.Against this background, four technical challenges and ten future development trends of big data technologies were aimed at identifying.

    Reference | Related Articles | Metrics
    Overview of observational data-based time series causal inference
    Zefan ZENG, Siya CHEN, Xi LONG, Guang JIN
    Big Data Research    2023, 9 (4): 139-158.   DOI: 10.11959/j.issn.2096-0271.2022059
    Abstract690)   HTML72)    PDF(pc) (2614KB)(1548)       Save

    With the increase of data storage and the improvement of computing power,using observational data to infer time series causality has become a novel approach.Based on the properties and research status of time series causal inference,five observational data-based methods were induced,including Granger causal analysis,information theory-based method,causal network structure learning algorithm,structural causal model-based method and method based on nonlinear state-space model.Then we briefly introduced typical applications in economics and finance,medical science and biology,earth system science and other engineering fields.Further,we compared the advantages and disadvantages and analyzed the ways for improvement of the five methods according to the focus and difficulties of time series causal inference.Finally,we looked into the future research directions.

    Table and Figures | Reference | Related Articles | Metrics
    Artificial intelligence technologies and applications in the metaverse
    Qiang WU, Xueting JI, Linyuan LYU
    Chinese Journal of Intelligent Science and Technology    2022, 4 (3): 324-334.   DOI: 10.11959/j.issn.2096-6652.202241
    Abstract1739)   HTML329)    PDF(pc) (872KB)(1437)       Save

    Metaverse integrates and applies a variety of digital technologies, resulting in an Internet social form that integrates virtual and reality, digital and application.Artificial intelligence (AI) are systems and machine that imitate human intelligence to perform tasks and iteratively improve themselves based on the information gathered.In the process of constructing the metaverse, AI technologies not only vigorously promote the development of crucial metaverse technologies (human-computer interaction, communication, robotics, etc.) but also enables direct content creation in the metaverse, organically connecting the real and virtual worlds.By sorting out the concepts and representative technologies of the metaverse and AI, the optimization progress of AI technologies for constructing key technologies in the metaverse was introduced and the application process of AI in the metaverse was detailed.Finally, the AI technology’s development and application trends in the metaverse prospected.

    Table and Figures | Reference | Related Articles | Metrics
    Integrated sensing and communications for Internet of vehicles:current status and development trend
    Xiang CHENG, Haotian ZHANG, Zonghui YANG, Ziwei HUANG, Sijiang LI, Anlan YU
    Journal on Communications    2022, 43 (8): 188-202.   DOI: 10.11959/j.issn.1000-436x.2022137
    Abstract1673)   HTML319)    PDF(pc) (1875KB)(1403)       Save

    The Internet of vehicles, the most important component of intelligent transportation system (ITS) in the future, is one of the most important technologies to achieve smart traffic and convenient travel for the people.With the vigorous development and continuous utilization of sensing and communication functions, the combination of these two functions, that is, integrated sensing and communications (ISAC) technology of vehicular communication networks, has become the current research hotspot and is of great significance to the development of ITS.Firstly, two different models of ISAC system, i.e., functional ISAC and signaling ISAC were defined and differentiated.Then, for the two different ISAC models, the existing works were reviewed and analyzed comprehensively.Finally, the future development directions and technical challenges of ISAC design in vehicular communication networks were proposed.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on blockchain privacy protection techniques in cryptography
    Feng LIU, Jie YANG, Jiayin QI
    Chinese Journal of Network and Information Security    2022, 8 (4): 29-44.   DOI: 10.11959/j.issn.2096-109x.2022054
    Abstract1162)   HTML258)    PDF(pc) (1355KB)(1300)       Save

    In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy protection, the privacy protection methods of blockchain in transaction address,prophecy machine and smart contract were explained, and the privacy strategies of blockchain in the protection of basic elements were summarized.Based on high-level literature at home and abroad, two types of blockchain cryptographic protection methods and usage scenarios were analyzed, including special cryptographic primitives and post-quantum cryptography.The advantages and disadvantages of seven cryptographic techniques applicable to current blockchain privacy protection were also reviewed, including attribute-based encryption, special data signature, homomorphic encryption, secure multi-party computation, zero-knowledge proofs, and lattice ciphers.It was concluded that the privacy protection of blockchain applications cannot be achieved without cryptographic technology.Meanwhile, the blockchain privacy protection technologies were analyzed in terms of both basic element protection and cryptographic protection.It was concluded that it was difficult to effectively solve the privacy problem only from the application and contract layers of the blockchain, and various cryptographic technologies should be used to complement each other according to different needs and application scenarios.In addition, according to the current development status of blockchain privacy cryptography, the narrative was developed from blockchain basic element protection and cryptography-based protection.From the perspectives of both endogenous basic element security and exogenous cryptographic privacy security, basic element privacy protection should be studied first, followed by an in-depth analysis of cryptographic protection techniques for blockchain privacy.The strengths and weaknesses and the potential value of the privacy handling aspects of the corresponding safeguards should be measured in terms of the development of technology in conjunction with practical applications, while considering the timeliness of the technology.Finally, an outlook on the future direction of blockchain privacy protection technologies was provided, indicating the issues that need to be addressed in focus.

    Table and Figures | Reference | Related Articles | Metrics
    Survey of research on multimodal semantic communication
    Zhijin QIN, Tantan ZHAO, Fan LI, Xiaoming TAO
    Journal on Communications    2023, 44 (5): 28-41.   DOI: 10.11959/j.issn.1000-436x.2023105
    Abstract835)   HTML135)    PDF(pc) (1190KB)(1274)       Save

    With the cross-integration of artificial intelligence and communications, technologies for processing multimodal data such as text, image, audio, and video are booming, the shared dimension of modal semantics is deeply excavated, and the characteristics of multimodal semantic information such as high abstraction, intelligence and simplicity are being fully utilized, which brings new ideas and means to semantic communications.First, the fundamental theories and classifications of semantic communication were introduced, and the research status of single-modal semantic communication was reviewed for text, image, audio, and video respectively.Then, the research status of multimodal semantic communication was reviewed, and multimodal data fusion technology and secure semantic communication were introduced.Finally, the challenges faced by multimodal semantic communication were summarized.

    Table and Figures | Reference | Related Articles | Metrics
    The DAOs to AI for Science by DeSci: the state of the art and perspective
    Fei-Yue WANG, Qinghai MIAO, Junping ZHANG, Wenbo ZHENG, Wenwen DING
    Chinese Journal of Intelligent Science and Technology    2023, 5 (1): 1-6.   DOI: 10.11959/j.issn.2096-6652.202310
    Abstract876)   HTML259)    PDF(pc) (788KB)(1246)       Save

    The new wave of artificial intelligence technology represented by ChatGPT is promoting the comprehensive transformation of human society, the transformation of scientific research paradigm is accelerating, and an artificial intelligence-driven scientific research (AI for Science, AI4S) revolution is coming.The basic concepts and characteristics of AI4S were analyzed, and the development status of AI4S were briefly summarized from the perspectives of mathematics, physics, biology, and materials.Vigorously developing AI4S is of great significance to improving national competitiveness, developing social economy, and strengthening technical reserves.In order to promote the development of AI4S better, the following two points are essential: one is to change the contemporary teaching and education, and advocate AI for Education (AI4E) and Education for AI (E4AI); the other is to establish and adapt to the "new scientific research paradigm" with "new organization mode" in a "new research ecology", based on DAOs and DeSci, for open, fair and just sustainable support for AI4S.

    Reference | Related Articles | Metrics
    Impact and countermeasures of generative AI represented by ChatGPT on the telecom industry
    Sihong ZHANG, Jian ZHANG
    Telecommunications Science    2023, 39 (5): 67-75.   DOI: 10.11959/j.issn.1000-0801.2023116
    Abstract730)   HTML124)    PDF(pc) (1269KB)(1208)       Save

    The release of ChatGPT, sparked a wave of generative AI, representing the arrival of the singularity moment of general artificial intelligence and highly likely restructuring the information industry ecosystem.The domestic industry has strengthened the research in the field of intelligent computing represented by ChatGPT, and operators have become the main force in the construction of computing network infrastructure, ushering in new opportunities for the development of intelligent computing.A detailed analysis of the capabilities, development status, and application prospects of generative AI were provided, and the technical elements behind generative AI, the demands for computing network resources, the impact on the communication industry, the opportunities and challenges faced by operators in the development wave of generative AI were thought about.Finally, the positioning and response strategies of operators were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on federated recommendation systems
    Zhitao ZHU, Shijing SI, Jianzong WANG, Jing XIAO
    Big Data Research    2022, 8 (4): 105-132.   DOI: 10.11959/j.issn.2096-0271.2022032
    Abstract1099)   HTML140)    PDF(pc) (2663KB)(1181)       Save

    In the federated learning (FL) paradigm, the original data are stored in independent clients while masked data are sent to a central server to be aggregated, which proposes a novel design approach to numerous domains.Given the wide application of recommendation systems (RS) in diverse domains, combining RS with FL techniques has been gaining momentum to reduce the computational cost, do cross-domain recommendation and protect users’ privacy while maintaining recommendations performance as traditional RS.The federated learning-based recommendation systems in recent years were comprehensively summarized.The difference between traditional and federated recommendation systems was analyzed, and the main research direction and progress of federated recommendation systems were demonstrated with comparison and analysis.Firstly, the traditional recommendation systems and their bottleneck were summarized.Then the federated learning paradigm was introduced.Furthermore, the advantages of combining federated learning with recommendation systems were depicted in two aspects: privacy protection and usage of multi-domain user information, along with the technical challenges during the combination.At the same time, the existing deployment of federated recommendation systems was illustrated in detail.Finally, future research on federated recommendation systems was prospected and summarized.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on vertical federated learning: algorithm, privacy and security
    Jinyin CHEN, Rongchang LI, Guohan HUANG, Tao LIU, Haibin ZHENG, Yao CHENG
    Chinese Journal of Network and Information Security    2023, 9 (2): 1-20.   DOI: 10.11959/j.issn.2096-109x.2023017
    Abstract793)   HTML174)    PDF(pc) (1439KB)(1148)       Save

    Federated learning (FL) is a distributed machine learning technology that enables joint construction of machine learning models by transmitting intermediate results (e.g., model parameters, parameter gradients, embedding representation, etc.) applied to data distributed across various institutions.FL reduces the risk of privacy leakage, since raw data is not allowed to leave the institution.According to the difference in data distribution between institutions, FL is usually divided into horizontal federated learning (HFL), vertical federated learning (VFL), and federal transfer learning (TFL).VFL is suitable for scenarios where institutions have the same sample space but different feature spaces and is widely used in fields such as medical diagnosis, financial and security of VFL.Although VFL performs well in real-world applications, it still faces many privacy and security challenges.To the best of our knowledge, no comprehensive survey has been conducted on privacy and security methods.The existing VFL was analyzed from four perspectives: the basic framework, communication mechanism, alignment mechanism, and label processing mechanism.Then the privacy and security risks faced by VFL and the related defense methods were introduced and analyzed.Additionally, the common data sets and indicators suitable for VFL and platform framework were presented.Considering the existing challenges and problems, the future direction and development trend of VFL were outlined, to provide a reference for the theoretical research of building an efficient, robust and safe VFL.

    Table and Figures | Reference | Related Articles | Metrics
    Key technologies of 6G mobile network
    Haijun ZHANG, Anqi CHEN, Yabo LI, Keping LONG
    Journal on Communications    2022, 43 (7): 189-202.   DOI: 10.11959/j.issn.1000-436x.2022140
    Abstract889)   HTML197)    PDF(pc) (1398KB)(1133)       Save

    The development and social needs of mobile communication networks were firstly introduced.Then four key technologies of 6G network were respectively introduced from the perspectives of communication spectrum, coverage dimension, communication empowerment, and new paradigm, namely terahertz (THz) communication, space-air-ground-sea integration network, artificial intelligence (AI), and semantic communication.The related researches of the four key technologies in recent years were analyzed, and some typical application scenarios, coverage scheme, technique principles, etc., were summarized.Finally, based on the summary, main problems of the four technologies were proposed for the future development.Besides, other candidate technologies of 6G network, including integrated sensing and communication, reconfigurable intelligence surface and new materials, blockchain, digital twin, and deterministic network technology, etc., were briefly discussed in the conclusion part.

    Table and Figures | Reference | Related Articles | Metrics
    Application and prospect of blockchain in Metaverse
    Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG
    Chinese Journal of Network and Information Security    2022, 8 (4): 45-65.   DOI: 10.11959/j.issn.2096-109x.2022045
    Abstract1250)   HTML184)    PDF(pc) (2107KB)(1108)       Save

    The metaverse is a new ecology that seamlessly integrates the virtual digital world and the real physical world, and has recently attracted widespread attention from all walks of life.With the maturity of various new IT technologies such as blockchain technology, artificial intelligence technology, VR/AR and sensing technology, mobile communication technology and ubiquitous computing technology, the further development of the Metaverse is possible.At present, research on the Metaverse mainly involves industrial projects, infrastructure, key technologies, privacy and security, etc.Although blockchain technology is covered in these studies, the specific points about the advantages of blockchain applied to the Metaverse are still lacked.Blockchain technology can not only provide an open and free decentralized environment for the Metaverse, but also act as a fair and reasonable digital asset distribution mechanism.The digital identity and digital asset management in the Metaverse empowered by blockchain was studied.The development process and characteristics of the Metaverse were analyzed.And the core technologies and challenges faced by the development of the Metaverse were discussed.Meanwhile, the key technologies of the blockchain were studied, and the feasibility of applying the blockchain to the Metaverse was analyzed from two aspects: the essential characteristics of the blockchain and the advantages of other technology integration.The Metaverse ecosystem architecture was further proposed, and the blockchain-based self-sovereign identity management model, blockchain-NFT workflow and its application in the Metaverse were analyzed in detail.Furthermore, combining the latest research progress of blockchain and the Metaverse, it was pointed out that the application of blockchain to the Metaverse will be from four aspects: infrastructure, communication and computing resource management mechanisms, regulation and privacy protection, and blockchain scalability and interoperability.Then the related challenges ahead and future research directions were presented at last.

    Table and Figures | Reference | Related Articles | Metrics
    Research and optimization on the sensing algorithm for 6G integrated sensing and communication network
    Xiaoyun WANG, Xiaozhou ZHANG, Liang MA, Yajuan WANG, Mengting LOU, Tao JIANG, Jing JIN, Qixing WANG, Guangyi LIU
    Journal on Communications    2023, 44 (2): 219-230.   DOI: 10.11959/j.issn.1000-436x.2023054
    Abstract543)   HTML118)    PDF(pc) (2149KB)(1107)       Save

    High-precision sensing is one of the basic capabilities of 6G mobile communication system to fulfill the demands of many application scenarios in the future, and the integrated design of sensing and communication (ISAC) is an important direction of 6G research.The works on ISAC mainly focus on improving the sensing performance.However, besides high sensing accuracy, 6G ISAC network still has a high communication rate requirement.Therefore, joint analysis and design of communication and sensing is necessary.First, three classic sensing algorithms were introduced that could achieve multi-target ranging and speed measurement, and the algorithms were analyzed from three aspects: sensing accuracy, communication performance and computational complexity.It is shown that the optimal sensing accuracy, sensing capacity and communication rate could not be achieved at the same time by using either one algorithm.Second, combined with the characteristics of different sensing algorithms, an adaptive sensing algorithm was proposed that the receiver selected the appropriate sensing algorithm according to the measured receive signal-to-interference-plus-noise ratio to realize the joint optimization of sensing and communication performance.Finally, the link-level simulation was carried out to verify that the proposed algorithm can obtain better sensing accuracy and communication capacity than any single algorithm.

    Table and Figures | Reference | Related Articles | Metrics
    Intelligent communication and networking key technologies for manned/unmanned cooperation: states-of-the-art and trends
    Hao YIN, Jibo WEI, Haitao ZHAO, Jiao ZHANG, Haijun WANG, Baoquan REN
    Journal on Communications    2024, 45 (1): 1-17.   DOI: 10.11959/j.issn.1000-436x.2024037
    Abstract759)   HTML210)    PDF(pc) (2351KB)(1086)       Save

    The intelligent communication and networking technologies for manned/unmanned cooperation was comprehensively surveyed.Firstly, the requirements on communication and networking were analyzed from the application scenarios of manned/unmanned cooperation.Then, in context of physical layer, link layer and network layer respectively, the key issues regarding channel modeling, waveform design, networking protocol and intelligent collaboration were analyzed.And the states-of-the-art in this research area and the characteristics of representative technologies were deeply studied.In the end, the possible development trends and promising technologies were prospected on the way to make the manned/unmanned cooperative communication and networking more intelligent, more efficient and more flexible.

    Table and Figures | Reference | Related Articles | Metrics
    Overview of reconfigurable intelligent surface for new-generation mobile communication
    Zilu GAO, Shaohui SUN, Li LI
    Telecommunications Science    2022, 38 (10): 20-35.   DOI: 10.11959/j.issn.1000-0801.2022278
    Abstract803)   HTML129)    PDF(pc) (1165KB)(1081)       Save

    Reconfigurable intelligent surface technology, which features low cost, low energy consumption and easy deployment, is the potential key technology of 6G.By intelligently regulating electromagnetic waves in space, RIS can assist in building an intelligent and controllable wireless electromagnetic environment, thus providing a new paradigm for the development of mobile communications.Firstly, the basic principle, main technology advantages and application scenarios were analyzed.Then, the key technologies such as channel estimation and beamforming in RIS aided communication transmission were discussed, and relevant research suggestions were given.Finally, the main challenges of RIS technology in practical application were analyzed from the aspects of hardware implementation, algorithm design and network deployment.

    Table and Figures | Reference | Related Articles | Metrics
    Artificial intelligence and deep learning methods for solving differential equations: the state of the art and prospects
    Jingwei LU, Xiang CHENG, Fei-Yue WANG
    Chinese Journal of Intelligent Science and Technology    2022, 4 (4): 461-476.   DOI: 10.11959/j.issn.2096-6652.202255
    Abstract936)   HTML128)    PDF(pc) (6809KB)(1075)       Save

    With the rapid advancement of fundamental theories and computing capacity, deep learning techniques have made impressive achievements in many fields.Differential equations, as an important tool for describing the physical world, have long been a focus of interest for researchers in various fields.Combining the two methods has gained popularity as a study issue in recent years.Since deep learning can efficiently extract features from large amounts of data and differential equations can reflect objective physical laws, the combination of the two can effectively improve the generalization ability of deep learning and enhance the interpretability of deep learning.Firstly, the problem of solving differential equations by deep learning was briefly introduced.Then, two types of deep learning methods for solving differential equations were introduced: data-driven and physical-informed methods.Furthermore, the applications of relevant deep learning-based solving methods were discussed.Meanwhile, DeDAO (differential equations DAO), a foundation model for artificial intelligence for science, was proposed to address existing challenges.Finally, conclusions of deep learning methods for solving differential equations were presented.

    Table and Figures | Reference | Related Articles | Metrics
    Survey of Low Earth Orbit Satellite Communication Network Routing Technology
    Shuang ZHENG, Xing ZHANG, Wenbo WANG
    Space-Integrated-Ground Information Networks    2022, 3 (3): 97-105.   DOI: 10.11959/j.issn.2096-8930.2022037
    Abstract803)   HTML168)    PDF(pc) (921KB)(1046)       Save

    Low earth orbit satellite communication network is an important part of the internet of everything era, but the characteristics of satellite constellation topology such as high dynamic, limited heterogeneous resources and unbalanced network service capacity make the traditional routing protocol applied to the ground network no longer suitable for low earth orbit satellite network.In this regard, scholars at home and abroad had carried out extensive research on low-orbit satellite routing technology.Firstly, the research status of low-orbit satellite routing was discussed from inter-satellite routing and satellite-to-ground routing, and the inter-satellite routing technologies with business as the core and topology as the core were compared in detail.On this basis, the key problems faced by low-orbit satellite routing strategies were analyzed, namely, high dynamic network topology, large inter-satellite link propagation delay, uneven network load and limited on-board resources.The future research of routing technology was prospected accordingly.

    Table and Figures | Reference | Related Articles | Metrics
    A survey of 3D object detection algorithms
    Zhe HUANG, Yongcai WANG, Deying LI
    Chinese Journal of Intelligent Science and Technology    2023, 5 (1): 7-31.   DOI: 10.11959/j.issn.2096-6652.202312
    Abstract1141)   HTML179)    PDF(pc) (6364KB)(1039)       Save

    3D object detection is a fundamental problem in autonomous driving,virtual reality,robotics,and other applications.Its goal is to extract the most accurate 3D box characterizing interested targets from the disordered point clouds,such as the closest 3D box surrounding the pedestrians or vehicles.The target 3D box's location,size,and orientation are also output.Currently,there are two primary approaches for 3D object detection: (1) pure point cloud based 3D object detection,in which the point clouds are created by binocular vision,RGB-D camera,and lidar; (2) fusion-based 3D object detection based on the fusion of image and point cloud.The various representations of 3D point clouds were introduced.Then representative methods were introduced from three aspects: traditional machine learning techniques; non-fusion deep learning based algorithms; and multimodal fusion-based deep learning algorithms in progressive relation.The algorithms within and across each category were examined and compared,and the differences and connections between the various methods were analyzed thoroughly.Finally,remaining challenges of 3D object detection were discussed and explored.And the primary datasets and metrics used in 3D object detection studies were summarized.

    Table and Figures | Reference | Related Articles | Metrics
    Low earth orbit satellite communication supporting direct connection with mobile phones: key technologies, recent progress and future directions
    Yaohua SUN, Mugen PENG
    Telecommunications Science    2023, 39 (2): 25-36.   DOI: 10.11959/j.issn.1000-0801.2023031
    Abstract772)   HTML114)    PDF(pc) (1647KB)(1036)       Save

    In order to realize anytime and anywhere communication, low earth orbit (LEO) satellite communication becomes a key component in 6G.Through the adaptive enhancement of terrestrial mobile communication protocol, LEO satellites can provide direct connection services for mobile phones.The related key technologies and the recent progress of various commercial programs were introduced, and future issues were also identified together with potential technical solutions.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on explainable knowledge graph reasoning methods
    Yi XIA, Mingjng LAN, Xiaohui CHEN, Junyong LUO, Gang ZHOU, Peng HE
    Chinese Journal of Network and Information Security    2022, 8 (5): 1-25.   DOI: 10.11959/j.issn.2096-109x.2022063
    Abstract1042)   HTML159)    PDF(pc) (4689KB)(1017)       Save

    In recent years, deep learning models have achieved remarkable progress in the prediction and classification tasks of artificial intelligence systems.However, most of the current deep learning models are black box, which means it is not conducive to human cognitive reasoning process.Meanwhile, with the continuous breakthroughs of artificial intelligence in the researches and applications, high-performance complex algorithms, models and systems generally lack the transparency and interpretability of decision making.This makes it difficult to apply the technologies in a wide range of fields requiring strict interpretability, such as national defense, medical care and cyber security.Therefore, the interpretability of artificial intelligence should be integrated into these algorithms and systems in the process of knowledge reasoning.By means of carrying out explicit explainable intelligence reasoning based on discrete symbolic representation and combining technologies in different fields, a behavior explanation mechanism can be formed which is an important way for artificial intelligence to realize data perception to intelligence perception.A comprehensive review of explainable knowledge graph reasoning was given.The concepts of explainable artificial intelligence and knowledge reasoning were introduced briefly.The latest research progress of explainable knowledge graph reasoning methods based on the three paradigms of artificial intelligence was introduced.Specifically, the ideas and improvement process of the algorithms in different scenarios of explainable knowledge graph reasoning were explained in detail.Moreover, the future research direction and the prospect of explainable knowledge graph reasoning were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Review of threat discovery and forensic analysis based on system provenance graph
    Tao LENG, Lijun CAI, Aimin YU, Ziyuan ZHU, Jian’gang MA, Chaofei LI, Ruicheng NIU, Dan MENG
    Journal on Communications    2022, 43 (7): 172-188.   DOI: 10.11959/j.issn.1000-436x.2022105
    Abstract744)   HTML130)    PDF(pc) (1126KB)(1009)       Save

    By investigating works of literature related to provenance graph research, a research framework for network threat discovery and forensic analysis based on system-level provenance graph was proposed.A detailed overview of data collection, data management, data query, and visualization methods based on provenance graphs was provided.The rule-based, anomaly-based, and learning-based threat detection classification methods were proposed.Threats based on threat intelligence or based on strategy, technology, and process-driven threats hunting methods were summarized.Forensic analysis methods based on causality, sequence learning, language query and semantic reconstruction in special fields were summarized.Finally, the future research trends were pointed out.

    Table and Figures | Reference | Related Articles | Metrics
    Value chain model of data governance and its application on data governance regulation analysis
    Keman HUANG, Xiaoyong DU
    Big Data Research    2022, 8 (4): 3-16.   DOI: 10.11959/j.issn.2096-0271.2022062
    Abstract923)   HTML351)    PDF(pc) (1444KB)(998)       Save

    Cultivating the data marketplace is an important mechanism to achieve the value of big data.The prosperity of such a data marketplace needs a sustainable and healthy data service ecosystem.A data governance value chain model was developed to identify the primary and support activities for data value release.Then the data service ecosystem model was implemented accordingly to distinguish different stakeholders and their core functions that a data marketplace should have.Using the developed data governance value chain model and data service ecosystem model, the data dovernance regulation was analyzed systematically, aiming at providing suggestions to promote the growth of the data marketplace.

    Table and Figures | Reference | Related Articles | Metrics
    A survey on AI techniques applied in the satellite communication/satellite Internet field
    Yaqiong LIU, Zhe LYU, Yafei ZHAO, Guochu SHOU
    Telecommunications Science    2023, 39 (2): 10-24.   DOI: 10.11959/j.issn.1000-0801.2023030
    Abstract756)   HTML126)    PDF(pc) (2027KB)(981)       Save

    The birth of satellite Internet brings new development opportunities, but also many challenges.How artificial intelligence, as an important auxiliary tool, was widely used in the field of satellite communication/satellite Internet in the context of the development of space-air-ground integration, was investigated, which involved communication anti-jamming, communication routing, satellite-terrestrial network system architecture, constellation operation and management and other scenarios.The AI algorithms included traditional machine learning, deep learning, reinforcement learning and so on.Finally, by taking the development trend of the AI applied in the satellite field into consideration, several future research directions were put forward, which provided new ideas and technical solutions for the intelligent development of satellite field in our country.

    Table and Figures | Reference | Related Articles | Metrics
    Development Status and Trend of Space Optical Communication Technology
    Shaowen LU, Xia HOU, Guotong LI, Jianfeng SUN, Hanghua YU, Weibiao CHEN
    Space-Integrated-Ground Information Networks    2022, 3 (2): 39-46.   DOI: 10.11959/j.issn.2096-8930.2022019
    Abstract632)   HTML97)    PDF(pc) (2383KB)(978)       Save

    Based on the laser inter-satellite communication link to realize information transmission between diff erent satellite nodes in satellite constellation, it can solve the problems of slow data rate and limited frequency resources in traditional satellite communication technology.Firstly, the main components of space laser communication technology and the research status at home and abroad were introduced.Then, the technical difficulties and main solutions of high-performance tracking, fast acquisition and high-throughput communication of the terminal were described respectively.Finally, the development trend of space laser communication miniaturization, lightweight and low power consumption technology were described, and the new technology was discussed, which provided relevant reference for the development of space laser communication technology.

    Table and Figures | Reference | Related Articles | Metrics
    Remote Satellites Computing transmission and Key Technologies
    lang HuYan, Ying Li, Quan Zhou, Jiayuan Wei, Juanni Liu, Yi Zhang
    Space-Integrated-Ground Information Networks    2022, 3 (2): 63-71.   DOI: 10.11959/j.issn.2096-8930.2022022
    Abstract378)   HTML47)    PDF(pc) (1054KB)(975)       Save

    The diversity of remote sensing data and the increase of acquisition ability make the amount of data generated on the satellite increase geometrically.This situation puts tremendous pressure on the remote satellite data transmission system.This makes the remote satellite data transmission system unable to meet the needs of real-time transmission and becomes the bottleneck of remote sensing data application.The research on massive remote satellite data transmission systems and technology is one of the frontier fi elds of international satellite information network science and technology.Focused on the critical problems of remote satellite real-time data transmission bottleneck, remote sensing data transmission timeliness, remote sensing load utilization, and onboard storage, combined with the traditional satellite data transmission system with onboard intelligent processing, a new remote satellite computing transmission framework was proposed, and its key technologies were analyzed.

    Table and Figures | Reference | Related Articles | Metrics
    Telecommunications Science    2023, 39 (Z1): 235-238.   DOI: 10.11959/j.issn.1000-0801.2023057
    Abstract54)   HTML16)    PDF(pc) (671KB)(974)       Save
    Reference | Related Articles | Metrics
    Analysis of some key technical problems in the development of computing power network
    Tao HE, Zhendong YANG, Chang CAO, Yan ZHANG, Xiongyan TANG
    Telecommunications Science    2022, 38 (6): 62-70.   DOI: 10.11959/j.issn.1000-0801.2022147
    Abstract771)   HTML102)    PDF(pc) (1026KB)(959)       Save

    The current development status of domestic and foreign computing power network technology was introduced.The key technology of the computing power network was described.The problems which were encountered in the development and practice of the computing power network technology were deeply analyzed from five aspects and the preliminary solutions were proposed.The five aspects include the computing power measurement and computing power modeling, the routing decision based on the computing power information, the computing power collaboration of cloud-edge-end, the integration of cloud and network based on service, and the computing power network information security.

    Table and Figures | Reference | Related Articles | Metrics
    Design of efficient anonymous identity authentication protocol for lightweight IoT devices
    Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG
    Journal on Communications    2022, 43 (7): 49-61.   DOI: 10.11959/j.issn.1000-436x.2022125
    Abstract526)   HTML93)    PDF(pc) (1481KB)(957)       Save

    Aiming at the problem that complex security primitives in existing schemes were not suitable for resource-constrained IoT devices, a lightweight efficient anonymous identity authentication protocol for IoT devices was designed based on physical unclonable function (PUF).Through the formal security model and ProVerif tool, it was proved that the protocol satisfies 13 security properties such as information confidentiality, integrity, un-traceability, and forward/backward secrecy.Compared with existing relevant protocols, the computing overhead of the protocol on the device side and the server side is 0.468 ms and 0.072 ms respectively, and the device storage and communication overheads are 256 bit and 896 bit respectively, which is highly suitable for lightweight IoT devices with limited resources.

    Table and Figures | Reference | Related Articles | Metrics
    Semantic communications for future: basic principle and implementation methodology
    Ping ZHANG, Kai NIU, Shengshi YAO, Jincheng DAI
    Journal on Communications    2023, 44 (5): 1-14.   DOI: 10.11959/j.issn.1000-436x.2023079
    Abstract894)   HTML273)    PDF(pc) (2053KB)(953)       Save

    The basic principle of semantic communications and the associated implementation methodology were introduced.First, the systematic model of semantic communications was proposed and basic concepts and terminology were deduced by comparing the fundamental differences between classic communications and semantic communications.Thus, the technological advantages of semantic communications were concluded.Then, the development of semantic information theory was retrospected and the measurement system of semantic information was established.Furthermore, the normalized conditional complexity (NCC) was proposed to evaluate the limit of semantic compression and the property of semantic typical sequence coding was discussed so as to reveal the corresponding asymptotic performance.In addition, the semantic coding transmission methods were classified into two typical schemes, that is, direct coding and transform coding, and the basic principles of these schemes were presented.For the text, speech, and image sources, the superior performance of the semantic coding techniques were demonstrated.Finally, the difficulty and open issues of the semantic communications were further concluded and further research directions were pointed out.

    Table and Figures | Reference | Related Articles | Metrics
    A survey on AI algorithms applied in communication and computation in Internet of vehicles
    Yu KANG, Yaqiong LIU, Tongyu ZHAO, Guochu SHOU
    Telecommunications Science    2023, 39 (1): 1-19.   DOI: 10.11959/j.issn.1000-0801.2023019
    Abstract652)   HTML108)    PDF(pc) (2390KB)(940)       Save

    In the 5G era, the development of communication and computing in the Internet of vehicles has been limited by the rapidly increasing amount of information.New breakthroughs in communication and computing in Internet of vehicles can be achieved by applying AI algorithms to the Internet of vehicles.Firstly, the application of AI algorithms in communication security, communication resource allocation, computation resource allocation, task offloading decision, server deployment, communication-computation integration were investigated.Secondly, the achievements and shortcomings of the present AI algorithms in different scenarios were analyzed.Finally, combined with the Internet of vehicle development trend, some future research directions for AI algorithms applied in the Internet of vehicles were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Deep image semantic communication model for 6G
    Feibo JIANG, Yubo PENG, Li DONG
    Journal on Communications    2023, 44 (3): 198-208.   DOI: 10.11959/j.issn.1000-436x.2023050
    Abstract513)   HTML126)    PDF(pc) (2900KB)(936)       Save

    Current semantic communication models still have some parts that can be improved in processing image data, including effective image semantic codec, efficient semantic model training, and accurate image semantic evaluation.Hence, a deep image semantic communication (DeepISC) model was proposed.The vision transformer-based autoencoder (ViTA) network was used to achieve high-quality image semantic encoding and decoding.Then, an autoencoder realized channel codec to ensure the transmission of semantics on the channel.Furthermore, the discriminator network (DSN) and ViTA’s dual network architecture were used to jointly train, thus improving the semantic accuracy of the reconstructed image.Finally, for different downstream vision tasks, different evaluation indicators of image semantics were presented.Simulation results show that compared with other schemes, DeepISC can more effectively restore the semantic features of the transmitted image, so that the reconstructed image can show the same or similar semantic results as the original image in various downstream tasks.

    Table and Figures | Reference | Related Articles | Metrics
    Optimized scheduling mechanism based on IEEE 802.1Qch standard in time-sensitive networking
    Hongrui NIE, Shaosheng LI, Yong LIU
    Journal on Communications    2022, 43 (9): 12-26.   DOI: 10.11959/j.issn.1000-436x.2022183
    Abstract451)   HTML58)    PDF(pc) (1328KB)(936)       Save

    To address the problem of complex gating planning for generic time-aware shaper (TAS), a traffic scheduling mechanism of adaptive queue buffer size and hardware time slot length was proposed with the help of IEEE 802.1Qch standard.Taking traffic and network characteristics into account, a mixed integer linear programming routing and scheduling model was formulated to maximize the number of time-sensitive flows mapped to the target network and then further improve the network scheduling capability by balancing the traffic carried by each scheduling time slot.Moreover, the impact of traffic and network features on queue buffer and hardware scheduling time slot was obtained through different scenarios.Simulation results show that the proposed method could successfully deploy thousands of time-sensitive flows for solving the scheduling problem in local area networks, and can improve the scheduling success rate by up to 28% compared with other algorithms with feasible execution time.

    Table and Figures | Reference | Related Articles | Metrics
    A survey of V2X security protection technologies
    Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU
    Telecommunications Science    2023, 39 (3): 1-15.   DOI: 10.11959/j.issn.1000-0801.2023046
    Abstract577)   HTML188)    PDF(pc) (1250KB)(933)       Save

    The vehicle-road-cloud collaborative V2X system has gradually become a national strategy, and the safety of V2X is related to driving security, life security, property security and even national security, which has increasingly become a hot spot for industry research.Firstly, the overall situation of the V2X security industry and the technology architecture of vehicle-road-cloud collaboration were introduced.Secondly, based on the “vehicle-road-cloud” technology system of V2X, the current status of domestic and international research was discussed, and the remaining problems and challenges in the field of V2X security protection were analyzed from three levels: V2X terminal security, roadside security and cloud security.Finally, the future development and research focus of the V2X security and protection technology were foreseen.

    Table and Figures | Reference | Related Articles | Metrics
    Research on deterministic computing power network
    Qingmin JIA, Yujiao HU, Huayu ZHANG, Kailai PENG, Pingping CHEN, Renchao XIE, Tao HUANG
    Journal on Communications    2022, 43 (10): 55-64.   DOI: 10.11959/j.issn.1000-436x.2022191
    Abstract736)   HTML127)    PDF(pc) (806KB)(932)       Save

    In order to meet the development requirements of time-sensitive and computing-intensive businesses, the guarantee problem of real-time transmission and real-time computing of computing tasks was studied.Firstly, the research progress of computing power network and deterministic networking was briefly overviewed.Then, the technical scheme of deterministic computing power network was proposed, and the technical architecture and working mechanism were designed.Real-time transmission and real-time computing of computing tasks were realized through the technical capabilities such as computing-network perception, planning and scheduling, resource management and control.The simulation results also verified the effectiveness of the proposed technical scheme.Finally, the representative application scenarios of deterministic computing power network were analyzed, and the future development trends and technical challenges were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Secure and collaborative spectrum sensing scheme based on audit game
    Yuntao WANG, Zhou SU, Qichao XU, Yiliang LIU, Haixia PENG, Hao LUAN
    Journal on Communications    2023, 44 (12): 1-14.   DOI: 10.11959/j.issn.1000-436x.2023238
    Abstract777)   HTML715)    PDF(pc) (920KB)(926)       Save

    To defend against poisoning attacks and free-riding attacks conducted by malicious sensing terminals in crowd sensing-based collaborative spectrum sensing (CCSS), a novel audit game-based defense scheme was proposed, which combined the pre-deterrence and post-punishment mechanisms.Firstly, considering the audit budget constraint, a mixed-strategy audit game model under incomplete information was designed, which set a penalty strategy to deter malicious collaborators before spectrum sensing, and audited and punished them after the fusion of sensing data.Then, a lightweight audit chain model with on-chain and off-chain collaboration was designed, in which audit evidence was stored in an off-chain data warehouse and its metadata was publicly published on the blockchain.Furthermore, a distributed and intelligent audit algorithm based on reinforcement learning was devised to adaptively seek the approximate mix-strategy equilibrium of the audit game.Simulation results demonstrate that the proposed scheme can quickly obtain the stable and approximately optimal audit strategies and actively suppress the poisoning and free-riding behaviors of malicious collaborators, in comparison with conventional schemes.

    Table and Figures | Reference | Related Articles | Metrics
    Research on the development path and countermeasures of data element value
    Yunlong YANG, Liang ZHANG, Xulei YANG
    Big Data Research    2023, 9 (6): 100-109.   DOI: 10.11959/j.issn.2096-0271.2022080
    Abstract700)   HTML110)    PDF(pc) (2022KB)(908)       Save

    Based on the development of data element marketization at home and abroad, the development path and characteristics of data element value in foreign countries were expounded.The current situation of China's data element market in terms of transaction market and application scenarios was summarized.In view of the current development of China's data element market, combined with China's data element market environment and development characteristics, through the construction of a data element market model with Chinese characteristics, we can speed up the release of data element value.

    Table and Figures | Reference | Related Articles | Metrics
    Computing satellite networks—the novel development of computing-empowered space-air-ground integrated networks
    Pingke DENG, Tongxu ZHANG, Nanxiang SHI, Tong ZHANG, Tianzhu SHAO, Shaowen ZHENG
    Telecommunications Science    2022, 38 (6): 71-81.   DOI: 10.11959/j.issn.1000-0801.2022138
    Abstract805)   HTML107)    PDF(pc) (1932KB)(907)       Save

    Facing the increasing demands for computing ability and network access, the space-air-ground integrated networks in 6G systems is expected to surmount the limits on a single point of computing ability and traditional network transmission through the advantages of network cluster, where the novel space-air-ground integrated networks that deeply integrate cloud, edge, terminal, network, data, and computation is subsequently formed by taking computing ability as the core and network infrastructure as the foundation.Initially, the current situation and development in existing computing force networks and space-air-ground integrated networks (SAGIN) was introduced.Along with the demands for 6G computing-empowered space-air-ground integrated networks, the concept of satellite computing networks was defined and the co-existed system of computing capability and communication networks was further discussed.Then, the space networks, air networks, and ground networks of the layered satellite computing network architecture were discussed.Based on that, its logical network architecture that includes computing resource layer, computing abstract layer, and computing orchestration layer was further introduced.After that, the key technology enablers with respct to computing and storage issue, trusted transmission issue, satellite computing force addressing issue, and high-mobility computing force routing issue was discussed.Finally, the typical applicaiton scenarios of satellite computing networks and envision its future was presented.

    Table and Figures | Reference | Related Articles | Metrics