With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performan...With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performance in various inference tasks.However,the users have concerns about privacy leakage for the use of AI and the performance and efficiency of computing on resource-constrained IoT edge devices.Therefore,this paper proposes an efficient privacy-preserving CNN framework(i.e.,EPPA)based on the Fully Homomorphic Encryption(FHE)scheme for AIoT application scenarios.In the plaintext domain,we verify schemes with different activation structures to determine the actual activation functions applicable to the corresponding ciphertext domain.Within the encryption domain,we integrate batch normalization(BN)into the convolutional layers to simplify the computation process.For nonlinear activation functions,we use composite polynomials for approximate calculation.Regarding the noise accumulation caused by homomorphic multiplication operations,we realize the refreshment of ciphertext noise through minimal“decryption-encryption”interactions,instead of adopting bootstrapping operations.Additionally,in practical implementation,we convert three-dimensional convolution into two-dimensional convolution to reduce the amount of computation in the encryption domain.Finally,we conduct extensive experiments on four IoT datasets,different CNN architectures,and two platforms with different resource configurations to evaluate the performance of EPPA in detail.展开更多
In the competitive retail industry of the digital era,data-driven insights into gender-specific customer behavior are essential.They support the optimization of store performance,layout design,product placement,and ta...In the competitive retail industry of the digital era,data-driven insights into gender-specific customer behavior are essential.They support the optimization of store performance,layout design,product placement,and targeted marketing.However,existing computer vision solutions often rely on facial recognition to gather such insights,raising significant privacy and ethical concerns.To address these issues,this paper presents a privacypreserving customer analytics system through two key strategies.First,we deploy a deep learning framework using YOLOv9s,trained on the RCA-TVGender dataset.Cameras are positioned perpendicular to observation areas to reduce facial visibility while maintaining accurate gender classification.Second,we apply AES-128 encryption to customer position data,ensuring secure access and regulatory compliance.Our system achieved overall performance,with 81.5%mAP@50,77.7%precision,and 75.7%recall.Moreover,a 90-min observational study confirmed the system’s ability to generate privacy-protected heatmaps revealing distinct behavioral patterns between male and female customers.For instance,women spent more time in certain areas and showed interest in different products.These results confirm the system’s effectiveness in enabling personalized layout and marketing strategies without compromising privacy.展开更多
As the demand for cross-departmental data collaboration continues to grow,traditional encryption methods struggle to balance data privacy with computational efficiency.This paper proposes a cross-departmental privacy-...As the demand for cross-departmental data collaboration continues to grow,traditional encryption methods struggle to balance data privacy with computational efficiency.This paper proposes a cross-departmental privacy-preserving computation framework based on BFV homomorphic encryption,threshold decryption,and blockchain technology.The proposed scheme leverages homomorphic encryption to enable secure computations between sales,finance,and taxation departments,ensuring that sensitive data remains encrypted throughout the entire process.A threshold decryption mechanism is employed to prevent single-point data leakage,while blockchain and IPFS are integrated to ensure verifiability and tamper-proof storage of computation results.Experimental results demonstrate that with 5,000 sample data entries,the framework performs efficiently and is highly scalable in key stages such as sales encryption,cost calculation,and tax assessment,thereby validating its practical feasibility and security.展开更多
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machin...Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machine learning applications in the Internet of Things(IoT).However,implementing FL across large-scale distributed fog networks presents significant challenges in maintaining privacy,preventing collusion attacks,and ensuring robust data aggregation.To address these challenges,we propose an Efficient Privacy-preserving and Robust Federated Learning(EPRFL)scheme for fog computing scenarios.Specifically,we first propose an efficient secure aggregation strategy based on the improved threshold homomorphic encryption algorithm,which is not only resistant to model inference and collusion attacks,but also robust to fog node dropping.Then,we design a dynamic gradient filtering method based on cosine similarity to further reduce the communication overhead.To minimize training delays,we develop a dynamic task scheduling strategy based on comprehensive score.Theoretical analysis demonstrates that EPRFL offers robust security and low latency.Extensive experimental results indicate that EPRFL outperforms similar strategies in terms of privacy preserving,model performance,and resource efficiency.展开更多
The rapid proliferation of Internet of Things(IoT)devices has heightened security concerns,making intrusion detection a pivotal challenge in safeguarding these networks.Traditional centralized Intrusion Detection Syst...The rapid proliferation of Internet of Things(IoT)devices has heightened security concerns,making intrusion detection a pivotal challenge in safeguarding these networks.Traditional centralized Intrusion Detection Systems(IDS)often fail to meet the privacy requirements and scalability demands of large-scale IoT ecosystems.To address these challenges,we propose an innovative privacy-preserving approach leveraging Federated Learning(FL)for distributed intrusion detection.Our model eliminates the need for aggregating sensitive data on a central server by training locally on IoT devices and sharing only encrypted model updates,ensuring enhanced privacy and scalability without compromising detection accuracy.Key innovations of this research include the integration of advanced deep learning techniques for real-time threat detection with minimal latency and a novel model to fortify the system’s resilience against diverse cyber-attacks such as Distributed Denial of Service(DDoS)and malware injections.Our evaluation on three benchmark IoT datasets demonstrates significant improvements:achieving 92.78%accuracy on NSL-KDD,91.47%on BoT-IoT,and 92.05%on UNSW-NB15.The precision,recall,and F1-scores for all datasets consistently exceed 91%.Furthermore,the communication overhead was reduced to 85 MB for NSL-KDD,105 MB for BoT-IoT,and 95 MB for UNSW-NB15—substantially lower than traditional centralized IDS approaches.This study contributes to the domain by presenting a scalable,secure,and privacy-preserving solution tailored to the unique characteristics of IoT environments.The proposed framework is adaptable to dynamic and heterogeneous settings,with potential applications extending to other privacy-sensitive domains.Future work will focus on enhancing the system’s efficiency and addressing emerging challenges such as model poisoning attacks in federated environments.展开更多
Privacy-Preserving Computation(PPC)comprises the techniques,schemes and protocols which ensure privacy and confidentiality in the context of secure computation and data analysis.Most of the current PPC techniques rely...Privacy-Preserving Computation(PPC)comprises the techniques,schemes and protocols which ensure privacy and confidentiality in the context of secure computation and data analysis.Most of the current PPC techniques rely on the complexity of cryptographic operations,which are expected to be efficiently solved by quantum computers soon.This review explores how PPC can be built on top of quantum computing itself to alleviate these future threats.We analyze quantum proposals for Secure Multi-party Computation,Oblivious Transfer and Homomorphic Encryption from the last decade focusing on their maturity and the challenges they currently face.Our findings show a strong focus on purely theoretical works,but a rise on the experimental consideration of these techniques in the last 5 years.The applicability of these techniques to actual use cases is an underexplored aspect which could lead to the practical assessment of these techniques.展开更多
Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server i...Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server introduces critical security vulnerabilities:malicious servers can infer private information from received local model updates or deliberately manipulate aggregation results.Consequently,achieving verifiable aggregation without compromising client privacy remains a critical challenge.To address these problem,we propose a reversible data hiding in encrypted domains(RDHED)scheme,which designs joint secret message embedding and extraction mechanism.This approach enables clients to embed secret messages into ciphertext redundancy spaces generated during model encryption.During the server aggregation process,the embedded messages from all clients fuse within the ciphertext space to form a joint embedding message.Subsequently,clients can decrypt the aggregated results and extract this joint embedding message for verification purposes.Building upon this foundation,we integrate the proposed RDHED scheme with linear homomorphic hash and digital signatures to design a verifiable privacy-preserving aggregation protocol for single-server architectures(VPAFL).Theoretical proofs and experimental analyses show that VPAFL can effectively protect user privacy,achieve lightweight computational and communication overhead of users for verification,and present significant advantages with increasing model dimension.展开更多
The progress of modern industry has given rise to great requirements for network transmission latency and reliability in domains such as smart grid and intelligent driving.To address these challenges,the concept of Ti...The progress of modern industry has given rise to great requirements for network transmission latency and reliability in domains such as smart grid and intelligent driving.To address these challenges,the concept of Time-sensitive networking(TSN)is proposed by IEEE 802.1TSN working group.In order to achieve low latency,Cyclic queuing and forwarding(CQF)mechanism is introduced to schedule Timetriggered(TT)flows.In this paper,we construct a TSN model based on CQF and formulate the flow scheduling problem as an optimization problem aimed at maximizing the success rate of flow scheduling.The problem is tackled by a novel algorithm that makes full use of the characteristics and the relationship between the flows.Firstly,by K-means algorithm,the flows are initially partitioned into subsets based on their correlations.Subsequently,the flows within each subset are sorted by a new special criteria extracted from multiple features of flow.Finally,a flow offset selecting method based on load balance is used for resource mapping,so as to complete the process of flow scheduling.Experimental results demonstrate that the proposed algorithm exhibits significant advantages in terms of scheduling success rate and time efficiency.展开更多
The somatotopic representation of specific body parts is a well-established spatial organizational principle in the primary somatosensory and motor cortices.
The main function of electronic support measure system is to detect threating signals in order to take countermeasures against them. To accomplish this objective, a process of associating each interleaved pulse with i...The main function of electronic support measure system is to detect threating signals in order to take countermeasures against them. To accomplish this objective, a process of associating each interleaved pulse with its emitter must be done. This process is termed sorting or de-interleaving. A novel point symmetry based radar sorting (PSBRS) algorithm is addressed. In order to deal with all kinds of radar signals, the symmetry measure distance is used to cluster pulses instead of the conventional Euclidean distance. The reference points of the symmetrical clusters are initialized by the alternative fuzzy c-means (AFCM) algorithm to ameliorate the effects of noise and the false sorting. Besides, the density filtering (DF) algorithm is proposed to discard the noise pulses or clutter. The performance of the algorithm is evaluated under the effects of noise and missing pulses. It has been observed that the PSBRS algorithm can cope with a large number of noise pulses and it is completely independent of missing pulses. Finally, PSBRS is compared with some benchmark algorithms, and the simulation results reveal the feasibility and efficiency of the algorithm.展开更多
The non-dominated sorting genetic algorithm (NSGA) is improved with the controlled elitism and dynamic crowding distance. A novel multi-objective optimization algorithm is obtained for wind turbine blades. As an exa...The non-dominated sorting genetic algorithm (NSGA) is improved with the controlled elitism and dynamic crowding distance. A novel multi-objective optimization algorithm is obtained for wind turbine blades. As an example, a 5 MW wind turbine blade design is presented by taking the maximum power coefficient and the minimum blade mass as the optimization objectives. The optimal results show that this algorithm has good performance in handling the multi-objective optimization of wind turbines, and it gives a Pareto-optimal solution set rather than the optimum solutions to the conventional multi objective optimization problems. The wind turbine blade optimization method presented in this paper provides a new and general algorithm for the multi-objective optimization of wind turbines.展开更多
Under the background of increasingly scarce ore worldwide and increasingly fierce market competition,developing the mining industry could be strongly restricted.Intelligent ore sorting equipment not only improves ore ...Under the background of increasingly scarce ore worldwide and increasingly fierce market competition,developing the mining industry could be strongly restricted.Intelligent ore sorting equipment not only improves ore use and enhances the economic benefits of enterprises but also increases the ore grade and lessens the grinding cost and tailings production.However,long-term research on intelligent ore sorting equipment found that the factors affecting sorting efficiency mainly include ore information identification technology,equipment sorting actuator,and information processing algorithm.The high precision,strong anti-interference capability,and high speed of these factors guarantee the separation efficiency of intelligent ore sorting equipment.Color ore sorter,X-ray ore transmission sorter,dual-energy X-ray transmission ore sorter,X-ray fluorescence ore sorter,and near-infrared ore sorter have been successfully developed in accordance with the different characteristics of minerals while ensuring the accuracy of equipment sorting and improving the equipment sorting efficiency.With the continuous improvement of mine automation level,the application of online element rapid analysis technology with high speed,high precision,and strong anti-interference capability in intelligent ore sorting equipment will become an inevitable trend of equipment development in the future.Laser-induced breakdown spectroscopy,transientγneutron activation analysis,online Fourier transform infrared spectroscopy,and nuclear magnetic resonance techniques will promote the development of ore sorting equipment.In addition,the improvement and joint application of additional high-speed and high-precision operation algorithms(such as peak area,principal component analysis,artificial neural network,partial least squares,and Monte Carlo library least squares methods)are an essential part of the development of intelligent ore sorting equipment in the future.展开更多
A novel class of periodically changing features hidden in radar pulse sequence environment,named G features,is proposed.Combining fractal theory and Hilbert-Huang transform,the features are extracted using changing ch...A novel class of periodically changing features hidden in radar pulse sequence environment,named G features,is proposed.Combining fractal theory and Hilbert-Huang transform,the features are extracted using changing characteristics of pulse parameters in radar emitter signals.The features can be applied in modern complex electronic warfare environment to address the issue of signal sorting when radar emitter pulse signal parameters severely or even completely overlap.Experiment results show that the proposed feature class and feature extraction method can discriminate periodically changing pulse sequence signal sorting features from radar pulse signal flow with complex variant features,therefore provide a new methodology for signal sorting.展开更多
The deterministic lateral displacement (DLD) is an important method used to sort particles and cells of different sizes. In this paper, the flexible cell sorting with the DLD method is studied by using a numerical mod...The deterministic lateral displacement (DLD) is an important method used to sort particles and cells of different sizes. In this paper, the flexible cell sorting with the DLD method is studied by using a numerical model based on the immersed boundary-lattice Boltzmann method (IB-LBM). In this model, the fluid motion is solved by the LBM, and the cell membrane-fluid interaction is modeled with the LBM. The proposed model is validated by simulating the rigid particle sorted with the DLD method, and the results are found in good agreement with those measured in experiments. We first study the effect of flexibility on a single cell and multiple cells continuously going through a DLD device. It is found that the cell flexibility can significantly affect the cell path, which means the flexibility could have significant effects on the continuous cell sorting by the DLD method. The sorting characteristics of white blood cells and red blood cells are further studied by varying the spatial distribution of cylinder arrays and the initial cell-cell distance. The numerical results indicate that a well concentrated cell sorting can be obtained under a proper arrangement of cylinder arrays and a large enough initial cell-cell distance.展开更多
Common sorting method have low sorting rates and is sensitive to the Signal-to-Noise Ratio(SNR),wavelet characteristics of Wigner-Ville distribution are applied to sort unknown complicated radar signal,high sorting ac...Common sorting method have low sorting rates and is sensitive to the Signal-to-Noise Ratio(SNR),wavelet characteristics of Wigner-Ville distribution are applied to sort unknown complicated radar signal,high sorting accuracy can be got.The Wigner-Ville distribution of received signal is calculated,then it is predigested to two-dimensional characteristics.Using wavelet transformation to extract characteristics from two-dimensional of Wigner-Ville distribution,the best characteristics are selected to be used as sorting parameters.Experiment results demonstrated that the characteristics of eight typical radar emitter signals extracted by this method showed good performance of noise-resistance and clustering at large-scale SNR.展开更多
The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have be...The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have been raised over the security and privacy of the tons of traffic and vehicle data.In this regard,Federated Learning(FL)with privacy protection features is considered a highly promising solution.However,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global model.Most existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same time.In this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of FL.We improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving privacy-preservation.Additionally,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice honesty.The security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model.展开更多
Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the clou...Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels.展开更多
With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT t...With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT terminal devices are also the important bottlenecks that would restrict the application of blockchain,but edge computing could solve this problem.The emergence of edge computing can effectively reduce the delay of data transmission and improve data processing capacity.However,user data in edge computing is usually stored and processed in some honest-but-curious authorized entities,which leads to the leakage of users’privacy information.In order to solve these problems,this paper proposes a location data collection method that satisfies the local differential privacy to protect users’privacy.In this paper,a Voronoi diagram constructed by the Delaunay method is used to divide the road network space and determine the Voronoi grid region where the edge nodes are located.A random disturbance mechanism that satisfies the local differential privacy is utilized to disturb the original location data in each Voronoi grid.In addition,the effectiveness of the proposed privacy-preserving mechanism is verified through comparison experiments.Compared with the existing privacy-preserving methods,the proposed privacy-preserving mechanism can not only better meet users’privacy needs,but also have higher data availability.展开更多
基金supported by the Natural Science Foundation of China No.62362008the Major Scientific and Technological Special Project of Guizhou Province([2024]014).
文摘With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performance in various inference tasks.However,the users have concerns about privacy leakage for the use of AI and the performance and efficiency of computing on resource-constrained IoT edge devices.Therefore,this paper proposes an efficient privacy-preserving CNN framework(i.e.,EPPA)based on the Fully Homomorphic Encryption(FHE)scheme for AIoT application scenarios.In the plaintext domain,we verify schemes with different activation structures to determine the actual activation functions applicable to the corresponding ciphertext domain.Within the encryption domain,we integrate batch normalization(BN)into the convolutional layers to simplify the computation process.For nonlinear activation functions,we use composite polynomials for approximate calculation.Regarding the noise accumulation caused by homomorphic multiplication operations,we realize the refreshment of ciphertext noise through minimal“decryption-encryption”interactions,instead of adopting bootstrapping operations.Additionally,in practical implementation,we convert three-dimensional convolution into two-dimensional convolution to reduce the amount of computation in the encryption domain.Finally,we conduct extensive experiments on four IoT datasets,different CNN architectures,and two platforms with different resource configurations to evaluate the performance of EPPA in detail.
文摘In the competitive retail industry of the digital era,data-driven insights into gender-specific customer behavior are essential.They support the optimization of store performance,layout design,product placement,and targeted marketing.However,existing computer vision solutions often rely on facial recognition to gather such insights,raising significant privacy and ethical concerns.To address these issues,this paper presents a privacypreserving customer analytics system through two key strategies.First,we deploy a deep learning framework using YOLOv9s,trained on the RCA-TVGender dataset.Cameras are positioned perpendicular to observation areas to reduce facial visibility while maintaining accurate gender classification.Second,we apply AES-128 encryption to customer position data,ensuring secure access and regulatory compliance.Our system achieved overall performance,with 81.5%mAP@50,77.7%precision,and 75.7%recall.Moreover,a 90-min observational study confirmed the system’s ability to generate privacy-protected heatmaps revealing distinct behavioral patterns between male and female customers.For instance,women spent more time in certain areas and showed interest in different products.These results confirm the system’s effectiveness in enabling personalized layout and marketing strategies without compromising privacy.
文摘As the demand for cross-departmental data collaboration continues to grow,traditional encryption methods struggle to balance data privacy with computational efficiency.This paper proposes a cross-departmental privacy-preserving computation framework based on BFV homomorphic encryption,threshold decryption,and blockchain technology.The proposed scheme leverages homomorphic encryption to enable secure computations between sales,finance,and taxation departments,ensuring that sensitive data remains encrypted throughout the entire process.A threshold decryption mechanism is employed to prevent single-point data leakage,while blockchain and IPFS are integrated to ensure verifiability and tamper-proof storage of computation results.Experimental results demonstrate that with 5,000 sample data entries,the framework performs efficiently and is highly scalable in key stages such as sales encryption,cost calculation,and tax assessment,thereby validating its practical feasibility and security.
基金supported in part by the National Natural Science Foundation of China(62462053)the Science and Technology Foundation of Qinghai Province(2023-ZJ-731)+1 种基金the Open Project of the Qinghai Provincial Key Laboratory of Restoration Ecology in Cold Area(2023-KF-12)the Open Research Fund of Guangdong Key Laboratory of Blockchain Security,Guangzhou University。
文摘Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machine learning applications in the Internet of Things(IoT).However,implementing FL across large-scale distributed fog networks presents significant challenges in maintaining privacy,preventing collusion attacks,and ensuring robust data aggregation.To address these challenges,we propose an Efficient Privacy-preserving and Robust Federated Learning(EPRFL)scheme for fog computing scenarios.Specifically,we first propose an efficient secure aggregation strategy based on the improved threshold homomorphic encryption algorithm,which is not only resistant to model inference and collusion attacks,but also robust to fog node dropping.Then,we design a dynamic gradient filtering method based on cosine similarity to further reduce the communication overhead.To minimize training delays,we develop a dynamic task scheduling strategy based on comprehensive score.Theoretical analysis demonstrates that EPRFL offers robust security and low latency.Extensive experimental results indicate that EPRFL outperforms similar strategies in terms of privacy preserving,model performance,and resource efficiency.
基金supported and funded by the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2025).
文摘The rapid proliferation of Internet of Things(IoT)devices has heightened security concerns,making intrusion detection a pivotal challenge in safeguarding these networks.Traditional centralized Intrusion Detection Systems(IDS)often fail to meet the privacy requirements and scalability demands of large-scale IoT ecosystems.To address these challenges,we propose an innovative privacy-preserving approach leveraging Federated Learning(FL)for distributed intrusion detection.Our model eliminates the need for aggregating sensitive data on a central server by training locally on IoT devices and sharing only encrypted model updates,ensuring enhanced privacy and scalability without compromising detection accuracy.Key innovations of this research include the integration of advanced deep learning techniques for real-time threat detection with minimal latency and a novel model to fortify the system’s resilience against diverse cyber-attacks such as Distributed Denial of Service(DDoS)and malware injections.Our evaluation on three benchmark IoT datasets demonstrates significant improvements:achieving 92.78%accuracy on NSL-KDD,91.47%on BoT-IoT,and 92.05%on UNSW-NB15.The precision,recall,and F1-scores for all datasets consistently exceed 91%.Furthermore,the communication overhead was reduced to 85 MB for NSL-KDD,105 MB for BoT-IoT,and 95 MB for UNSW-NB15—substantially lower than traditional centralized IDS approaches.This study contributes to the domain by presenting a scalable,secure,and privacy-preserving solution tailored to the unique characteristics of IoT environments.The proposed framework is adaptable to dynamic and heterogeneous settings,with potential applications extending to other privacy-sensitive domains.Future work will focus on enhancing the system’s efficiency and addressing emerging challenges such as model poisoning attacks in federated environments.
基金supported by the Basque Government through the ELKARTEK program for Research and Innovation,under the BRTAQUANTUM project(Grant Agreement No.KK-2022/00041)。
文摘Privacy-Preserving Computation(PPC)comprises the techniques,schemes and protocols which ensure privacy and confidentiality in the context of secure computation and data analysis.Most of the current PPC techniques rely on the complexity of cryptographic operations,which are expected to be efficiently solved by quantum computers soon.This review explores how PPC can be built on top of quantum computing itself to alleviate these future threats.We analyze quantum proposals for Secure Multi-party Computation,Oblivious Transfer and Homomorphic Encryption from the last decade focusing on their maturity and the challenges they currently face.Our findings show a strong focus on purely theoretical works,but a rise on the experimental consideration of these techniques in the last 5 years.The applicability of these techniques to actual use cases is an underexplored aspect which could lead to the practical assessment of these techniques.
基金supported in part by the National Natural Science Foundation of China under Grants 62102450,62272478the Independent Research Project of a Certain Unit under Grant ZZKY20243127.
文摘Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server introduces critical security vulnerabilities:malicious servers can infer private information from received local model updates or deliberately manipulate aggregation results.Consequently,achieving verifiable aggregation without compromising client privacy remains a critical challenge.To address these problem,we propose a reversible data hiding in encrypted domains(RDHED)scheme,which designs joint secret message embedding and extraction mechanism.This approach enables clients to embed secret messages into ciphertext redundancy spaces generated during model encryption.During the server aggregation process,the embedded messages from all clients fuse within the ciphertext space to form a joint embedding message.Subsequently,clients can decrypt the aggregated results and extract this joint embedding message for verification purposes.Building upon this foundation,we integrate the proposed RDHED scheme with linear homomorphic hash and digital signatures to design a verifiable privacy-preserving aggregation protocol for single-server architectures(VPAFL).Theoretical proofs and experimental analyses show that VPAFL can effectively protect user privacy,achieve lightweight computational and communication overhead of users for verification,and present significant advantages with increasing model dimension.
基金supported by Science and Technology Project of State Grid Corporation Headquarters under Grant 5108-202218280A-2-170-XG(Development and Application of Power Time-Sensitive Network Switching Chip。
文摘The progress of modern industry has given rise to great requirements for network transmission latency and reliability in domains such as smart grid and intelligent driving.To address these challenges,the concept of Time-sensitive networking(TSN)is proposed by IEEE 802.1TSN working group.In order to achieve low latency,Cyclic queuing and forwarding(CQF)mechanism is introduced to schedule Timetriggered(TT)flows.In this paper,we construct a TSN model based on CQF and formulate the flow scheduling problem as an optimization problem aimed at maximizing the success rate of flow scheduling.The problem is tackled by a novel algorithm that makes full use of the characteristics and the relationship between the flows.Firstly,by K-means algorithm,the flows are initially partitioned into subsets based on their correlations.Subsequently,the flows within each subset are sorted by a new special criteria extracted from multiple features of flow.Finally,a flow offset selecting method based on load balance is used for resource mapping,so as to complete the process of flow scheduling.Experimental results demonstrate that the proposed algorithm exhibits significant advantages in terms of scheduling success rate and time efficiency.
文摘The somatotopic representation of specific body parts is a well-established spatial organizational principle in the primary somatosensory and motor cortices.
基金supported by the National Natural Science Foundation of China(61172116)
文摘The main function of electronic support measure system is to detect threating signals in order to take countermeasures against them. To accomplish this objective, a process of associating each interleaved pulse with its emitter must be done. This process is termed sorting or de-interleaving. A novel point symmetry based radar sorting (PSBRS) algorithm is addressed. In order to deal with all kinds of radar signals, the symmetry measure distance is used to cluster pulses instead of the conventional Euclidean distance. The reference points of the symmetrical clusters are initialized by the alternative fuzzy c-means (AFCM) algorithm to ameliorate the effects of noise and the false sorting. Besides, the density filtering (DF) algorithm is proposed to discard the noise pulses or clutter. The performance of the algorithm is evaluated under the effects of noise and missing pulses. It has been observed that the PSBRS algorithm can cope with a large number of noise pulses and it is completely independent of missing pulses. Finally, PSBRS is compared with some benchmark algorithms, and the simulation results reveal the feasibility and efficiency of the algorithm.
基金Project supported by the National Basic Research Program of China (973 Program) (No. 2007CB714600)
文摘The non-dominated sorting genetic algorithm (NSGA) is improved with the controlled elitism and dynamic crowding distance. A novel multi-objective optimization algorithm is obtained for wind turbine blades. As an example, a 5 MW wind turbine blade design is presented by taking the maximum power coefficient and the minimum blade mass as the optimization objectives. The optimal results show that this algorithm has good performance in handling the multi-objective optimization of wind turbines, and it gives a Pareto-optimal solution set rather than the optimum solutions to the conventional multi objective optimization problems. The wind turbine blade optimization method presented in this paper provides a new and general algorithm for the multi-objective optimization of wind turbines.
基金supported by the National Science and Technology Support Program of China(No.2012BAC11B07)the Jiangxi Science and Technology Innovation Base Plan(No.20212BCD42017)。
文摘Under the background of increasingly scarce ore worldwide and increasingly fierce market competition,developing the mining industry could be strongly restricted.Intelligent ore sorting equipment not only improves ore use and enhances the economic benefits of enterprises but also increases the ore grade and lessens the grinding cost and tailings production.However,long-term research on intelligent ore sorting equipment found that the factors affecting sorting efficiency mainly include ore information identification technology,equipment sorting actuator,and information processing algorithm.The high precision,strong anti-interference capability,and high speed of these factors guarantee the separation efficiency of intelligent ore sorting equipment.Color ore sorter,X-ray ore transmission sorter,dual-energy X-ray transmission ore sorter,X-ray fluorescence ore sorter,and near-infrared ore sorter have been successfully developed in accordance with the different characteristics of minerals while ensuring the accuracy of equipment sorting and improving the equipment sorting efficiency.With the continuous improvement of mine automation level,the application of online element rapid analysis technology with high speed,high precision,and strong anti-interference capability in intelligent ore sorting equipment will become an inevitable trend of equipment development in the future.Laser-induced breakdown spectroscopy,transientγneutron activation analysis,online Fourier transform infrared spectroscopy,and nuclear magnetic resonance techniques will promote the development of ore sorting equipment.In addition,the improvement and joint application of additional high-speed and high-precision operation algorithms(such as peak area,principal component analysis,artificial neural network,partial least squares,and Monte Carlo library least squares methods)are an essential part of the development of intelligent ore sorting equipment in the future.
基金supported by the National Natural Science Foundation of China (60872108)the Postdoctoral Science Foundation of China(200902411+3 种基金20080430903)Heilongjiang Postdoctoral Financial Assistance (LBH-Z08129)the Scientific and Technological Creative Talents Special Research Foundation of Harbin Municipality (2008RFQXG030)Central University Basic Research Professional Expenses Special Fund Project
文摘A novel class of periodically changing features hidden in radar pulse sequence environment,named G features,is proposed.Combining fractal theory and Hilbert-Huang transform,the features are extracted using changing characteristics of pulse parameters in radar emitter signals.The features can be applied in modern complex electronic warfare environment to address the issue of signal sorting when radar emitter pulse signal parameters severely or even completely overlap.Experiment results show that the proposed feature class and feature extraction method can discriminate periodically changing pulse sequence signal sorting features from radar pulse signal flow with complex variant features,therefore provide a new methodology for signal sorting.
基金supported by the National Natural Science Foundation of China (Grant 81301291)the Beijing Higher Education Young Elite Teacher Project (Grant YETP1208)UNSW Special Research Grants Program
文摘The deterministic lateral displacement (DLD) is an important method used to sort particles and cells of different sizes. In this paper, the flexible cell sorting with the DLD method is studied by using a numerical model based on the immersed boundary-lattice Boltzmann method (IB-LBM). In this model, the fluid motion is solved by the LBM, and the cell membrane-fluid interaction is modeled with the LBM. The proposed model is validated by simulating the rigid particle sorted with the DLD method, and the results are found in good agreement with those measured in experiments. We first study the effect of flexibility on a single cell and multiple cells continuously going through a DLD device. It is found that the cell flexibility can significantly affect the cell path, which means the flexibility could have significant effects on the continuous cell sorting by the DLD method. The sorting characteristics of white blood cells and red blood cells are further studied by varying the spatial distribution of cylinder arrays and the initial cell-cell distance. The numerical results indicate that a well concentrated cell sorting can be obtained under a proper arrangement of cylinder arrays and a large enough initial cell-cell distance.
基金Supported by the National Science and Technology Supported Program of China(No.2011BAH24B05)
文摘Common sorting method have low sorting rates and is sensitive to the Signal-to-Noise Ratio(SNR),wavelet characteristics of Wigner-Ville distribution are applied to sort unknown complicated radar signal,high sorting accuracy can be got.The Wigner-Ville distribution of received signal is calculated,then it is predigested to two-dimensional characteristics.Using wavelet transformation to extract characteristics from two-dimensional of Wigner-Ville distribution,the best characteristics are selected to be used as sorting parameters.Experiment results demonstrated that the characteristics of eight typical radar emitter signals extracted by this method showed good performance of noise-resistance and clustering at large-scale SNR.
基金supported by the National Natural Science Foundation of China under Grant 61972148.
文摘The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have been raised over the security and privacy of the tons of traffic and vehicle data.In this regard,Federated Learning(FL)with privacy protection features is considered a highly promising solution.However,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global model.Most existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same time.In this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of FL.We improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving privacy-preservation.Additionally,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice honesty.The security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model.
基金This work was supported by the National Natural Science Foundation of China(No.61702276)the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology under Grant 2016r055 and the Priority Academic Program Development(PAPD)of Jiangsu Higher Education Institutions.The authors are grateful for the anonymous reviewers who made constructive comments and improvements.
文摘Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels.
文摘With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT terminal devices are also the important bottlenecks that would restrict the application of blockchain,but edge computing could solve this problem.The emergence of edge computing can effectively reduce the delay of data transmission and improve data processing capacity.However,user data in edge computing is usually stored and processed in some honest-but-curious authorized entities,which leads to the leakage of users’privacy information.In order to solve these problems,this paper proposes a location data collection method that satisfies the local differential privacy to protect users’privacy.In this paper,a Voronoi diagram constructed by the Delaunay method is used to divide the road network space and determine the Voronoi grid region where the edge nodes are located.A random disturbance mechanism that satisfies the local differential privacy is utilized to disturb the original location data in each Voronoi grid.In addition,the effectiveness of the proposed privacy-preserving mechanism is verified through comparison experiments.Compared with the existing privacy-preserving methods,the proposed privacy-preserving mechanism can not only better meet users’privacy needs,but also have higher data availability.