期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
C-privacy:A social relationship-driven image customization sharing method in cyber-physical networks
1
作者 Dapeng Wu Jian Liu +3 位作者 Yangliang Wan Zhigang Yang ruyan wang Xinqi Lin 《Digital Communications and Networks》 2025年第2期563-573,共11页
Cyber-Physical Networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV... Cyber-Physical Networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV).With the increasing popularity of digital photography and Internet technology,more and more users are sharing images on CPN.However,many images are shared without any privacy processing,exposing hidden privacy risks and making sensitive content easily accessible to Artificial Intelligence(AI)algorithms.Existing image sharing methods lack fine-grained image sharing policies and cannot protect user privacy.To address this issue,we propose a social relationship-driven privacy customization protection model for publishers and co-photographers.We construct a heterogeneous social information network centered on social relationships,introduce a user intimacy evaluation method with time decay,and evaluate privacy levels considering user interest similarity.To protect user privacy while maintaining image appreciation,we design a lightweight face-swapping algorithm based on Generative Adversarial Network(GAN)to swap faces that need to be protected.Our proposed method minimizes the loss of image utility while satisfying privacy requirements,as shown by extensive theoretical and simulation analyses. 展开更多
关键词 Cyber-physical networks Customized privacy Face-swapping Heterogeneous information network Deep fakes
在线阅读 下载PDF
Interest-aware joint caching,computing,and communication optimization for mobile VR delivery in MEC networks
2
作者 Baojie Fu Tong Tang +1 位作者 Dapeng Wu ruyan wang 《Digital Communications and Networks》 2025年第4期1102-1112,共11页
In the upcoming B5G/6G era,Virtual Reality(VR)over wireless has become a typical application,which is an inevitable trend in the development of video.However,in immersive and interactive VR experiences,VR services typ... In the upcoming B5G/6G era,Virtual Reality(VR)over wireless has become a typical application,which is an inevitable trend in the development of video.However,in immersive and interactive VR experiences,VR services typically exhibit high delay,while simultaneously posing challenges for the energy consumption of local devices.To address these issues,this paper aims to improve the performance of VR service in the edge-terminal cooperative system.Specifically,we formulate a joint Caching,Computing,and Communication(3C)VR service policy problem by optimizing the weighted sum of the total VR delivery delay and the energy consumption of local devices.To design the optimal VR service policy,the optimization problem is decoupled into three independent subproblems to be solved separately.To improve the caching efficiency within the network,a Bert-based user interest analysis method is first proposed to accurately characterize the content request behavior.Based on this,a service cost minimum-maximization problem is formulated under the consideration of performance fairness among users.Then,the joint caching and computing scheme is derived for each user with a given allocation of communication resources while a bisection-based communication scheme is acquired with the given information on the joint caching and computing policy.With alternative optimization,an optimal policy for joint 3C based on user interest can be finally obtained.Simulation results are presented to demonstrate the superiority of the proposed user interest-aware caching scheme and the effectiveness of the joint 3C optimization policy while considering user fairness.Our code is available at https://github.com/mrfuqaq1108/Interest-Aware-Joint-3C-Optimization. 展开更多
关键词 VR service performance Edge-terminal cooperative system Interest analysis User fairness
在线阅读 下载PDF
Lightweight deep reinforcement learning for dynamic resource allocation in vehicular edge computing
3
作者 Dapeng Wu Sijun Wu +4 位作者 Yaping Cui Ailing Zhong Tong Tang ruyan wang Xinqi Lin 《Digital Communications and Networks》 2025年第5期1530-1542,共13页
Vehicular Edge Computing(VEC)enhances the quality of user services by deploying wealth of resources near vehicles.However,due to highly dynamic and complex nature of vehicular networks,centralized decisionmaking for r... Vehicular Edge Computing(VEC)enhances the quality of user services by deploying wealth of resources near vehicles.However,due to highly dynamic and complex nature of vehicular networks,centralized decisionmaking for resource allocation proves inadequate within VECs.Conversely,allocating resources via distributed decision-making consumes vehicular resources.To improve the quality of user service,we formulate a problem of latency minimization,further subdividing this problem into two subproblems to be solved through distributed decision-making.To mitigate the resource consumption caused by distributed decision-making,we propose Reinforcement Learning(RL)algorithm based on sequential alternating multi-agent system mechanism,which effectively reduces the dimensionality of action space without losing the informational content of action,achieving network lightweighting.We discuss the rationality,generalizability,and inherent advantages of proposed mechanism.Simulation results indicate that our proposed mechanism outperforms traditional RL algorithms in terms of stability,generalizability,and adaptability to scenarios with invalid actions,all while achieving network lightweighting. 展开更多
关键词 Vehicular edge computing Resource allocation Reinforcement learning LIGHTWEIGHT
在线阅读 下载PDF
Energy-saving control strategy for ultra-dense network base stations based on multi-agent reinforcement learning
4
作者 Yan Zhen Litianyi Tao +2 位作者 Dapeng Wu Tong Tang ruyan wang 《Digital Communications and Networks》 2025年第4期1006-1016,共11页
Aiming at the problem of mobile data traffic surge in 5G networks,this paper proposes an effective solution combining massive multiple-input multiple-output techniques with Ultra-Dense Network(UDN)and focuses on solvi... Aiming at the problem of mobile data traffic surge in 5G networks,this paper proposes an effective solution combining massive multiple-input multiple-output techniques with Ultra-Dense Network(UDN)and focuses on solving the resulting challenge of increased energy consumption.A base station control algorithm based on Multi-Agent Proximity Policy Optimization(MAPPO)is designed.In the constructed 5G UDN model,each base station is considered as an agent,and the MAPPO algorithm enables inter-base station collaboration and interference management to optimize the network performance.To reduce the extra power consumption due to frequent sleep mode switching of base stations,a sleep mode switching decision algorithm is proposed.The algorithm reduces unnecessary power consumption by evaluating the network state similarity and intelligently adjusting the agent’s action strategy.Simulation results show that the proposed algorithm reduces the power consumption by 24.61% compared to the no-sleep strategy and further reduces the power consumption by 5.36% compared to the traditional MAPPO algorithm under the premise of guaranteeing the quality of service of users. 展开更多
关键词 Ultra dense networks Base station sleep Multiple input multiple output Reinforcement learning
在线阅读 下载PDF
Multi-agent reinforcement learning for edge information sharing in vehicular networks 被引量:3
5
作者 ruyan wang Xue Jiang +5 位作者 Yujie Zhou Zhidu Li Dapeng Wu Tong Tang Alexander Fedotov Vladimir Badenko 《Digital Communications and Networks》 SCIE CSCD 2022年第3期267-277,共11页
To guarantee the heterogeneous delay requirements of the diverse vehicular services,it is necessary to design a full cooperative policy for both Vehicle to Infrastructure(V2I)and Vehicle to Vehicle(V2V)links.This pape... To guarantee the heterogeneous delay requirements of the diverse vehicular services,it is necessary to design a full cooperative policy for both Vehicle to Infrastructure(V2I)and Vehicle to Vehicle(V2V)links.This paper investigates the reduction of the delay in edge information sharing for V2V links while satisfying the delay requirements of the V2I links.Specifically,a mean delay minimization problem and a maximum individual delay minimization problem are formulated to improve the global network performance and ensure the fairness of a single user,respectively.A multi-agent reinforcement learning framework is designed to solve these two problems,where a new reward function is proposed to evaluate the utilities of the two optimization objectives in a unified framework.Thereafter,a proximal policy optimization approach is proposed to enable each V2V user to learn its policy using the shared global network reward.The effectiveness of the proposed approach is finally validated by comparing the obtained results with those of the other baseline approaches through extensive simulation experiments. 展开更多
关键词 Vehicular networks Edge information sharing Delay guarantee Multi-agent reinforcement learning Proximal policy optimization
在线阅读 下载PDF
UTM:A trajectory privacy evaluating model for online health monitoring 被引量:2
6
作者 Zhigang Yang ruyan wang +1 位作者 Dapeng Wu Daizhong Luo 《Digital Communications and Networks》 SCIE CSCD 2021年第3期445-452,共8页
A huge amount of sensitive personal data is being collected by various online health monitoring applications.Although the data is anonymous,the personal trajectories(e.g.,the chronological access records of small cell... A huge amount of sensitive personal data is being collected by various online health monitoring applications.Although the data is anonymous,the personal trajectories(e.g.,the chronological access records of small cells)could become the anchor of linkage attacks to re-identify the users.Focusing on trajectory privacy in online health monitoring,we propose the User Trajectory Model(UTM),a generic trajectory re-identification risk predicting model to reveal the underlying relationship between trajectory uniqueness and aggregated data(e.g.,number of individuals covered by each small cell),and using the parameter combination of aggregated data to further mathematically derive the statistical characteristics of uniqueness(i.e.,the expectation and the variance).Eventually,exhaustive simulations validate the effectiveness of the UTM in privacy risk evaluation,confirm our theoretical deductions and present counter-intuitive insights. 展开更多
关键词 Online health monitoring Trajectory privacy User trajectory model Aggregated data UNIQUENESS
在线阅读 下载PDF
Deep space multi-file delivery protocol based on LT codes 被引量:2
7
作者 ruyan wang Hua Liang +1 位作者 Hui Zhao Gaofeng Fang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第3期524-530,共7页
A deep space multi-file delivery protocol(DSMDP)based on LT codes is proposed to reduce the influence of long delay and a high bit error rate(BER)in deep space communication.The protocol increases sending redundancy b... A deep space multi-file delivery protocol(DSMDP)based on LT codes is proposed to reduce the influence of long delay and a high bit error rate(BER)in deep space communication.The protocol increases sending redundancy by LT codes to improve the success rate of file delivery,and adopts different protective strategies for different situations of packet loss.At the same time,the multi-file united delivery strategy is adopted to make full use of the retransmission time to reduce the end-toend transmission delay.Furthermore,the protocol determines the quantity of encoded packets according to the feedback for controlling redundancy.The simulation results show that the proposed protocol can significantly reduce the transmission delay of files,which would be effectively suitable for deep space communication environment of high BER and long delay. 展开更多
关键词 deep space communication multi-file delivery protocol LT codes delay
在线阅读 下载PDF
刷状沙柳沙障固沙性能风洞模拟 被引量:2
8
作者 姚正毅 屈建军 +3 位作者 肖建华 王茹燕 韩胜利 陆文赋 《中国沙漠》 CSCD 北大核心 2024年第3期290-297,共8页
与传统的沙柳沙障人工逐根布设不同,刷状沙柳沙障采用机械编织形成,有类似拒马的外形,布设后稳定性好,也便于施工。对一种以沙柳枝条为原料的刷状沙障固沙性能进行了风洞模拟。结果表明:(1)在第1道沙障前风速略有降低,在第1、2、4道沙障... 与传统的沙柳沙障人工逐根布设不同,刷状沙柳沙障采用机械编织形成,有类似拒马的外形,布设后稳定性好,也便于施工。对一种以沙柳枝条为原料的刷状沙障固沙性能进行了风洞模拟。结果表明:(1)在第1道沙障前风速略有降低,在第1、2、4道沙障处,风速增加较大。在经过每道沙障后,风速下降较大,形成一个降速区。(2)沙障正下方沙面多表现为侵蚀状态。迎风的第1道沙障,侵蚀现象最严重,随着时间推移,甚至发生掏蚀现象。沙障之间多处于堆积状态,第1格堆积最严重,其后堆积程度减弱。(3)沙障设置后,风沙流结构呈复杂的指数下降曲线。8、12、16、20 m·s^(-1)风速下的集沙量分别减少86.8%、81.6%、53.4%、67.8%。这表明刷状沙柳沙障有较好的固沙性能。由于沙障的扰动,沙物质向上飘散,使地表10~14 cm高度以上进沙口的集沙量有所增加。 展开更多
关键词 沙柳 刷状沙障 风洞模拟 固沙
原文传递
Auction-based profit maximization offloading in mobile edge computing 被引量:1
9
作者 ruyan wang Chunyan Zang +2 位作者 Peng He Yaping Cui Dapeng Wu 《Digital Communications and Networks》 SCIE CSCD 2023年第2期545-556,共12页
Offloading Mobile Devices(MDs)computation tasks to Edge Nodes(ENs)is a promising solution to overcome computation and energy resources limitations of MDs.However,there exists an unreasonable profit allocation problem ... Offloading Mobile Devices(MDs)computation tasks to Edge Nodes(ENs)is a promising solution to overcome computation and energy resources limitations of MDs.However,there exists an unreasonable profit allocation problem between MDs and ENs caused by the excessive concern on MD profit.In this paper,we propose an auction-based computation offloading algorithm,inspiring ENs to provide high-quality service by maximizing the profit of ENs.Firstly,a novel cooperation auction framework is designed to avoid overall profit damage of ENs,which is derived from the high computation delay at the overloaded ENs.Thereafter,the bidding willingness of each MD in every round of auction is determined to ensure MD rationality.Furthermore,we put forward a payment rule for the pre-selected winner to effectively guarantee auction truthfulness.Finally,the auction-based profit maximization offloading algorithm is proposed,and the MD is allowed to occupy the computation and spectrum resources of the EN for offloading if it wins the auction.Numerical results verify the performance of the proposed algorithm.Compared with the VA algorithm,the ENs profit is increased by 23.8%,and the task discard ratio is decreased by 7.5%. 展开更多
关键词 Mobile edge computing Computation offloading Heterogeneous network Auction pricing
在线阅读 下载PDF
Scalable privacy-preserving big data aggregation mechanism 被引量:3
10
作者 Dapeng Wu Boran Yang ruyan wang 《Digital Communications and Networks》 SCIE 2016年第3期122-129,共8页
As the massive sensor data generated by large-scale Wireless Sensor Networks (WSNs) recently become an indispensable part of 'Big Data', the collection, storage, transmission and analysis of the big sensor data at... As the massive sensor data generated by large-scale Wireless Sensor Networks (WSNs) recently become an indispensable part of 'Big Data', the collection, storage, transmission and analysis of the big sensor data attract considerable attention from researchers. Targeting the privacy requirements of large-scale WSNs and focusing on the energy-efficient collection of big sensor data, a Scalable Privacy-preserving Big Data Aggregation (Sca-PBDA) method is proposed in this paper. Firstly, according to the pre-established gradient topology structure, sensor nodes in the network are divided into clusters. Secondly, sensor data is modified by each node according to the privacy-preserving configuration message received from the sink. Subsequently, intra- and inter-cluster data aggregation is employed during the big sensor data reporting phase to reduce energy consumption. Lastly, aggregated results are recovered by the sink to complete the privacy-preserving big data aggregation. Simulation results validate the efficacy and scalability of Sca-PBDA and show that the big sensor data generated by large-scale WSNs is efficiently ag- gregated to reduce network resource consumption and the sensor data privacy is effectively protected to meet the ever-growing application requirements. 展开更多
关键词 Big sensor dataPrivacy-preserving methodData aggregationGradient-based clustering
在线阅读 下载PDF
A fine-grained intrusion protection system for inter-edge trust transfer
11
作者 Boran Yang Dapeng Wu +2 位作者 ruyan wang Zhigang Yang Yu Yang 《Digital Communications and Networks》 CSCD 2024年第5期1365-1374,共10页
The phenomenal popularity of smart mobile computing hardware is enabling pervasive edge intelligence and ushering us into a digital twin era.However,the natural barrier between edge equipment owned by different intere... The phenomenal popularity of smart mobile computing hardware is enabling pervasive edge intelligence and ushering us into a digital twin era.However,the natural barrier between edge equipment owned by different interested parties poses unique challenges for cross-domain trust management.In addition,the openness of radio access and the accessibility of edge services render edge intelligence systems vulnerable and put sensitive user data in jeopardy.This paper presents an intrusion protection mechanism for edge trust transfer to address the inter-edge trust management issue and the conundrum of detecting indistinguishable malevolent nodes launching weak attacks.First,an inter-edge reputation transfer framework is established to leverage the trust quality of different edges to retain the accumulated trust histories of users when they roam in multi-edge environments structurally.Second,a fine-grained intrusion protection system is proposed to reduce the negative impact of attacks on user interactions and improve the overall trust quality and system security of edge intelligence services.The experimental results validate the effectiveness and superior performance of the proposed intrusion protection for edge trust transfer in securing,enhancing,and consolidating edge intelligence services. 展开更多
关键词 Edge computing Cross-domain trust management Trust transfer Intrusion protection
在线阅读 下载PDF
Chaotic moving video quality enhancement based on deep in-loop filtering
12
作者 Tong Tang Yi Yang +2 位作者 Dapeng Wu ruyan wang Zhidu Li 《Digital Communications and Networks》 CSCD 2024年第6期1708-1715,共8页
The Joint Video Experts Team(JVET)has announced the latest generation of the Versatile Video Coding(VVC,H.266)standard.The in-loop filter in VVC inherits the De-Blocking Filter(DBF)and Sample Adaptive Offset(SAO)of Hi... The Joint Video Experts Team(JVET)has announced the latest generation of the Versatile Video Coding(VVC,H.266)standard.The in-loop filter in VVC inherits the De-Blocking Filter(DBF)and Sample Adaptive Offset(SAO)of High Efficiency Video Coding(HEVC,H.265),and adds the Adaptive Loop Filter(ALF)to minimize the error between the original sample and the decoded sample.However,for chaotic moving video encoding with low bitrates,serious blocking artifacts still remain after in-loop filtering due to the severe quantization distortion of texture details.To tackle this problem,this paper proposes a Convolutional Neural Network(CNN)based VVC in-loop filter for chaotic moving video encoding with low bitrates.First,a blur-aware attention network is designed to perceive the blurring effect and to restore texture details.Then,a deep in-loop filtering method is proposed based on the blur-aware network to replace the VVC in-loop filter.Finally,experimental results show that the proposed method could averagely save 8.3%of bit consumption at similar subjective quality.Meanwhile,under close bit rate consumption,the proposed method could reconstruct more texture information,thereby significantly reducing the blocking artifacts and improving the visual quality. 展开更多
关键词 H.266 Versatile Video Coding Convolutional neural network In-loop filter
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部