Intelligent Transportation Systems(ITS)leverage Integrated Sensing and Communications(ISAC)to enhance data exchange between vehicles and infrastructure in the Internet of Vehicles(IoV).This integration inevitably incr...Intelligent Transportation Systems(ITS)leverage Integrated Sensing and Communications(ISAC)to enhance data exchange between vehicles and infrastructure in the Internet of Vehicles(IoV).This integration inevitably increases computing demands,risking real-time system stability.Vehicle Edge Computing(VEC)addresses this by offloading tasks to Road Side Units(RSUs),ensuring timely services.Our previous work,the FLSimCo algorithm,which uses local resources for federated Self-Supervised Learning(SSL),has a limitation:vehicles often can’t complete all iteration tasks.Our improved algorithm offloads partial tasks to RSUs and optimizes energy consumption by adjusting transmission power,CPU frequency,and task assignment ratios,balancing local and RSU-based training.Meanwhile,setting an offloading threshold further prevents inefficiencies.Simulation results show that the enhanced algorithm reduces energy consumption and improves offloading efficiency and accuracy of federated SSL.展开更多
Cloud computing is a new paradigm of computing and is considered to be the next generation of information technology infrastructure for an enterprise. The distributed architecture of cloud data storage facilitates the...Cloud computing is a new paradigm of computing and is considered to be the next generation of information technology infrastructure for an enterprise. The distributed architecture of cloud data storage facilitates the customer to get benefits from the greater quality of storage and minimized the operating cost. This technology also brought numerous possible threats including data confidentiality, integrity and availability. A homomorphic based model of storage is proposed, which enable the customer and a third party auditor to perform the authentication of data stored on the cloud storage. This model performs the verification of huge file’s integrity and availability with less consumption of computation, storage and communication resources. The proposed model also supports public verifiability and dynamic data recovery.展开更多
With the rapid advancements in edge computing and artificial intelligence,federated learning(FL)has gained momentum as a promising approach to collaborative data utilization across organizations and devices,while ensu...With the rapid advancements in edge computing and artificial intelligence,federated learning(FL)has gained momentum as a promising approach to collaborative data utilization across organizations and devices,while ensuring data privacy and information security.In order to further harness the energy efficiency of wireless networks,an integrated sensing,communication and computation(ISCC)framework has been proposed,which is anticipated to be a key enabler in the era of 6G networks.Although the advantages of pushing intelligence to edge devices are multi-fold,some challenges arise when incorporating FL into wireless networks under the umbrella of ISCC.This paper provides a comprehensive survey of FL,with special emphasis on the design and optimization of ISCC.We commence by introducing the background and fundamentals of FL and the ISCC framework.Subsequently,the aforementioned challenges are highlighted and the state of the art in potential solutions is reviewed.Finally,design guidelines are provided for the incorporation of FL and ISCC.Overall,this paper aims to contribute to the understanding of FL in the context of wireless networks,with a focus on the ISCC framework,and provide insights into addressing the challenges and optimizing the design for the integration of FL into future 6G networks.展开更多
Finite element(FE) is a powerful tool and has been applied by investigators to real-time hybrid simulations(RTHSs). This study focuses on the computational efficiency, including the computational time and accuracy...Finite element(FE) is a powerful tool and has been applied by investigators to real-time hybrid simulations(RTHSs). This study focuses on the computational efficiency, including the computational time and accuracy, of numerical integrations in solving FE numerical substructure in RTHSs. First, sparse matrix storage schemes are adopted to decrease the computational time of FE numerical substructure. In this way, the task execution time(TET) decreases such that the scale of the numerical substructure model increases. Subsequently, several commonly used explicit numerical integration algorithms, including the central difference method(CDM), the Newmark explicit method, the Chang method and the Gui-λ method, are comprehensively compared to evaluate their computational time in solving FE numerical substructure. CDM is better than the other explicit integration algorithms when the damping matrix is diagonal, while the Gui-λ(λ = 4) method is advantageous when the damping matrix is non-diagonal. Finally, the effect of time delay on the computational accuracy of RTHSs is investigated by simulating structure-foundation systems. Simulation results show that the influences of time delay on the displacement response become obvious with the mass ratio increasing, and delay compensation methods may reduce the relative error of the displacement peak value to less than 5% even under the large time-step and large time delay.展开更多
Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server a...Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server anywhere and anytime.However,this new paradigm of data outsourcing services also introduces new security challenges,among which is how to ensure the integrity of the outsourced data.Although the cloud storage providers commit a reliable and secure environment to users,the integrity of data can still be damaged owing to the carelessness of humans and failures of hardwares/softwares or the attacks from external adversaries.Therefore,it is of great importance for users to audit the integrity of their data outsourced to the cloud.In this paper,we first design an auditing framework for cloud storage and proposed an algebraic signature based remote data possession checking protocol,which allows a third-party to auditing the integrity of the outsourced data on behalf of the users and supports unlimited number of verifications.Then we extends our auditing protocol to support data dynamic operations,including data update,data insertion and data deletion.The analysis and experiment results demonstrate that our proposed schemes are secure and efficient.展开更多
Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new ch...Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure.展开更多
Task offloading is a potential solution to satisfy the strict requirements of computation-intensive and latency-sensitive vehicular applications due to the limited onboard computing resources.However,the overwhelming ...Task offloading is a potential solution to satisfy the strict requirements of computation-intensive and latency-sensitive vehicular applications due to the limited onboard computing resources.However,the overwhelming upload traffic may lead to unacceptable uploading time.To tackle this issue,for tasks taking environmental data as input,the data perceived by roadside units(RSU)equipped with several sensors can be directly exploited for computation,resulting in a novel task offloading paradigm with integrated communications,sensing and computing(I-CSC).With this paradigm,vehicles can select to upload their sensed data to RSUs or transmit computing instructions to RSUs during the offloading.By optimizing the computation mode and network resources,in this paper,we investigate an I-CSC-based task offloading problem to reduce the cost caused by resource consumption while guaranteeing the latency of each task.Although this nonconvex problem can be handled by the alternating minimization(AM)algorithm that alternatively minimizes the divided four sub-problems,it leads to high computational complexity and local optimal solution.To tackle this challenge,we propose a creative structural knowledge-driven meta-learning(SKDML)method,involving both the model-based AM algorithm and neural networks.Specifically,borrowing the iterative structure of the AM algorithm,also referred to as structural knowledge,the proposed SKDML adopts long short-term memory(LSTM)networkbased meta-learning to learn an adaptive optimizer for updating variables in each sub-problem,instead of the handcrafted counterpart in the AM algorithm.Furthermore,to pull out the solution from the local optimum,our proposed SKDML updates parameters in LSTM with the global loss function.Simulation results demonstrate that our method outperforms both the AM algorithm and the meta-learning without structural knowledge in terms of both the online processing time and the network performance.展开更多
随着第六代移动通信网络(6th generation mobile network,6G)的不断发展,通感算一体化技术已成为提升未来网络性能和智能化水平的关键技术之一。通感算一体化网络将通信、感知和计算能力深度融合,实现了对信息的全方位获取、传输和处理...随着第六代移动通信网络(6th generation mobile network,6G)的不断发展,通感算一体化技术已成为提升未来网络性能和智能化水平的关键技术之一。通感算一体化网络将通信、感知和计算能力深度融合,实现了对信息的全方位获取、传输和处理,为各类应用场景提供强有力的技术支撑。全面综述了通感算在6G中的应用及其关键技术,探讨了通感算在低空经济、移动通信系统、智能交通系统、工业互联网与智能制造、智慧城市与环境监测等领域中的广泛应用,并深入讨论了通感算融合技术的核心技术,包括通信感知融合(integrated sensing and communication,ISC)技术、通信计算融合(integrated communication and computation,ICC)技术、感知计算融合(integrated sensing and computation,ISAC)技术、通感算融合(integrated sensing,communication,and computation,ISCC)技术及通感算智融合(integrated sensing,communication,computation and intelligence,ISCCI)技术的最新进展。展望了通感算一体化网络在6G时代的发展趋势,重点分析了未来面临的挑战与研究方向。展开更多
文摘Intelligent Transportation Systems(ITS)leverage Integrated Sensing and Communications(ISAC)to enhance data exchange between vehicles and infrastructure in the Internet of Vehicles(IoV).This integration inevitably increases computing demands,risking real-time system stability.Vehicle Edge Computing(VEC)addresses this by offloading tasks to Road Side Units(RSUs),ensuring timely services.Our previous work,the FLSimCo algorithm,which uses local resources for federated Self-Supervised Learning(SSL),has a limitation:vehicles often can’t complete all iteration tasks.Our improved algorithm offloads partial tasks to RSUs and optimizes energy consumption by adjusting transmission power,CPU frequency,and task assignment ratios,balancing local and RSU-based training.Meanwhile,setting an offloading threshold further prevents inefficiencies.Simulation results show that the enhanced algorithm reduces energy consumption and improves offloading efficiency and accuracy of federated SSL.
文摘Cloud computing is a new paradigm of computing and is considered to be the next generation of information technology infrastructure for an enterprise. The distributed architecture of cloud data storage facilitates the customer to get benefits from the greater quality of storage and minimized the operating cost. This technology also brought numerous possible threats including data confidentiality, integrity and availability. A homomorphic based model of storage is proposed, which enable the customer and a third party auditor to perform the authentication of data stored on the cloud storage. This model performs the verification of huge file’s integrity and availability with less consumption of computation, storage and communication resources. The proposed model also supports public verifiability and dynamic data recovery.
文摘With the rapid advancements in edge computing and artificial intelligence,federated learning(FL)has gained momentum as a promising approach to collaborative data utilization across organizations and devices,while ensuring data privacy and information security.In order to further harness the energy efficiency of wireless networks,an integrated sensing,communication and computation(ISCC)framework has been proposed,which is anticipated to be a key enabler in the era of 6G networks.Although the advantages of pushing intelligence to edge devices are multi-fold,some challenges arise when incorporating FL into wireless networks under the umbrella of ISCC.This paper provides a comprehensive survey of FL,with special emphasis on the design and optimization of ISCC.We commence by introducing the background and fundamentals of FL and the ISCC framework.Subsequently,the aforementioned challenges are highlighted and the state of the art in potential solutions is reviewed.Finally,design guidelines are provided for the incorporation of FL and ISCC.Overall,this paper aims to contribute to the understanding of FL in the context of wireless networks,with a focus on the ISCC framework,and provide insights into addressing the challenges and optimizing the design for the integration of FL into future 6G networks.
基金National Natural Science Foundation of China under Grant Nos.51639006 and 51725901
文摘Finite element(FE) is a powerful tool and has been applied by investigators to real-time hybrid simulations(RTHSs). This study focuses on the computational efficiency, including the computational time and accuracy, of numerical integrations in solving FE numerical substructure in RTHSs. First, sparse matrix storage schemes are adopted to decrease the computational time of FE numerical substructure. In this way, the task execution time(TET) decreases such that the scale of the numerical substructure model increases. Subsequently, several commonly used explicit numerical integration algorithms, including the central difference method(CDM), the Newmark explicit method, the Chang method and the Gui-λ method, are comprehensively compared to evaluate their computational time in solving FE numerical substructure. CDM is better than the other explicit integration algorithms when the damping matrix is diagonal, while the Gui-λ(λ = 4) method is advantageous when the damping matrix is non-diagonal. Finally, the effect of time delay on the computational accuracy of RTHSs is investigated by simulating structure-foundation systems. Simulation results show that the influences of time delay on the displacement response become obvious with the mass ratio increasing, and delay compensation methods may reduce the relative error of the displacement peak value to less than 5% even under the large time-step and large time delay.
基金The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work is supported by National Natural Science Foundation of China (No: 61379144), Foundation of Science and Technology on Information Assurance Laboratory (No: KJ-13-002) and the Graduate Innovation Fund of the National University of Defense Technology.
文摘Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server anywhere and anytime.However,this new paradigm of data outsourcing services also introduces new security challenges,among which is how to ensure the integrity of the outsourced data.Although the cloud storage providers commit a reliable and secure environment to users,the integrity of data can still be damaged owing to the carelessness of humans and failures of hardwares/softwares or the attacks from external adversaries.Therefore,it is of great importance for users to audit the integrity of their data outsourced to the cloud.In this paper,we first design an auditing framework for cloud storage and proposed an algebraic signature based remote data possession checking protocol,which allows a third-party to auditing the integrity of the outsourced data on behalf of the users and supports unlimited number of verifications.Then we extends our auditing protocol to support data dynamic operations,including data update,data insertion and data deletion.The analysis and experiment results demonstrate that our proposed schemes are secure and efficient.
基金the National Natural Science Foundation of China,the National Basic Research Program of China ("973" Program) the National High Technology Research and Development Program of China ("863" Program)
文摘Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure.
基金supported in part by National Key Research and Development Program of China(2020YFB1807700)in part by National Natural Science Foundation of China(62201414)+2 种基金in part by Qinchuangyuan Project(OCYRCXM-2022-362)in part by Science and Technology Project of Guangzhou(2023A04J1741)in part by Chongqing key laboratory of Mobile Communications Technologg(cqupt-mct-202202).
文摘Task offloading is a potential solution to satisfy the strict requirements of computation-intensive and latency-sensitive vehicular applications due to the limited onboard computing resources.However,the overwhelming upload traffic may lead to unacceptable uploading time.To tackle this issue,for tasks taking environmental data as input,the data perceived by roadside units(RSU)equipped with several sensors can be directly exploited for computation,resulting in a novel task offloading paradigm with integrated communications,sensing and computing(I-CSC).With this paradigm,vehicles can select to upload their sensed data to RSUs or transmit computing instructions to RSUs during the offloading.By optimizing the computation mode and network resources,in this paper,we investigate an I-CSC-based task offloading problem to reduce the cost caused by resource consumption while guaranteeing the latency of each task.Although this nonconvex problem can be handled by the alternating minimization(AM)algorithm that alternatively minimizes the divided four sub-problems,it leads to high computational complexity and local optimal solution.To tackle this challenge,we propose a creative structural knowledge-driven meta-learning(SKDML)method,involving both the model-based AM algorithm and neural networks.Specifically,borrowing the iterative structure of the AM algorithm,also referred to as structural knowledge,the proposed SKDML adopts long short-term memory(LSTM)networkbased meta-learning to learn an adaptive optimizer for updating variables in each sub-problem,instead of the handcrafted counterpart in the AM algorithm.Furthermore,to pull out the solution from the local optimum,our proposed SKDML updates parameters in LSTM with the global loss function.Simulation results demonstrate that our method outperforms both the AM algorithm and the meta-learning without structural knowledge in terms of both the online processing time and the network performance.
文摘随着第六代移动通信网络(6th generation mobile network,6G)的不断发展,通感算一体化技术已成为提升未来网络性能和智能化水平的关键技术之一。通感算一体化网络将通信、感知和计算能力深度融合,实现了对信息的全方位获取、传输和处理,为各类应用场景提供强有力的技术支撑。全面综述了通感算在6G中的应用及其关键技术,探讨了通感算在低空经济、移动通信系统、智能交通系统、工业互联网与智能制造、智慧城市与环境监测等领域中的广泛应用,并深入讨论了通感算融合技术的核心技术,包括通信感知融合(integrated sensing and communication,ISC)技术、通信计算融合(integrated communication and computation,ICC)技术、感知计算融合(integrated sensing and computation,ISAC)技术、通感算融合(integrated sensing,communication,and computation,ISCC)技术及通感算智融合(integrated sensing,communication,computation and intelligence,ISCCI)技术的最新进展。展望了通感算一体化网络在6G时代的发展趋势,重点分析了未来面临的挑战与研究方向。