In this paper, based on the modified fuzzy c-regression model and noise clustering algorithm, a fuzzy identification method is proposed. Firstly, by considering the relations for the real model, the established model,...
详细信息
Anomaly detection is a unique type of classification challenge. The coupling of imbalance, overlap, and other complexity of the data, such as noise in industrial Internet of Things (IIoT) scenarios affect the detectio...
详细信息
Anomaly detection is a unique type of classification challenge. The coupling of imbalance, overlap, and other complexity of the data, such as noise in industrial Internet of Things (IIoT) scenarios affect the detection accuracy seriously. To address this issue, this article proposes a novel oversampling approach based on synthetic minority oversampling technology via hypersphere coverage and adaptive differential evolution (HCADE-SMOTE). However, overlap intensification caused by generated samples and over-loss of valid information have always been crucial problems for traditional SMOTE-based approaches. In HCADE-SMOTE, we identify error-prone samples, including minority noise and boundary samples based on the hypersphere coverage algorithm first. Then, we fine tune the distribution of these error-prone samples before generation with an adaptive differential evolution algorithm. Instead of deletion mechanism, it avoids transitional information loss. With error-prone samples far away from the boundary, HCADE-SMOTE improves the boundary distribution and simplifies the judge the decision boundary for the detection models. Furthermore, minority samples are oversampled based on local hypersphere density and compactness with a weighted SMOTE mechanism to address the imbalance problem. The superiority of this HCADE-SMOTE is verified by experiments from optimization of sample distribution, effect of anomaly detection, and statistical tests, compared with seven well-known SMOTE-based methods. The experimental results show that HCADE-SMOTE is the most prominent to alleviate overlap with Fisher's discriminant ratio metric. After HCADE-SMOTE, the detection results reached the best with classification metrics, for the four detection models support vector machines (SVM), logistic regression (LR), naive Bayes, and decision tree (DT). The statistical tests also prove HCADE-SMOTE has significant difference from other SMOTE-based methods, superior to them.
In a multi-source localization system, direction of arrival (DOA) estimation of angles always suffers from errors due to noise interference, sensor position inaccuracies, and other factors. When the distance between t...
详细信息
In a multi-source localization system, direction of arrival (DOA) estimation of angles always suffers from errors due to noise interference, sensor position inaccuracies, and other factors. When the distance between target sources is much smaller than the distance between sensors and target sources, the accuracy of traditional localization algorithms based on direction finding and cross-fixing deteriorates. In this paper, we propose a localization algorithm based on K-means clustering. To tackle the problem of unknown initial positions of target sources, we employ a grid density peak clustering(DPC) method for initial localization. In the K-means algorithm, we integrate a quartile range anomaly detection algorithm to address interference signal issues. Finally, we propose an invalid compensation algorithm to filter out invalid signals, thereby compensating for the estimation errors in angles. Through the collection of real-world data, we compare the performance of the traditional direction finding and cross-fixing algorithms with the proposed algorithm in the localization of nearby target points. Experimental results demonstrate that the proposed algorithm significantly improves localization accuracy.
A key challenge that is currently hindering the widespread use of retired electric vehicle (EV) batteries for second-life (SL) applications is the ability to accurately estimate and monitor their state of health (SOH)...
详细信息
A key challenge that is currently hindering the widespread use of retired electric vehicle (EV) batteries for second-life (SL) applications is the ability to accurately estimate and monitor their state of health (SOH). SL battery systems can be sourced from different battery packs with a lack of knowledge of their historical usage. Accurate SOH estimation is critical because it enables reliable performance, safety, and optimal utilization of SL batteries, ensuring they meet the requirements of various applications including grid energy storage and backup power. In this work, for in-the-field use of SL batteries, we introduce an online adaptive health estimation approach with the guarantees of bounded-input, bounded-output (BIBO) stability. This method relies exclusively on operational data that can be accessed in real-time from SL batteries. The effectiveness of the proposed approach is shown on a laboratory-aged experimental dataset of retired EV batteries.
Autonomous aerial vehicles (AAVs) can provide detection coverage service in many scenarios. The fair coverage is achieved by designing carefully AAVs' trajectories, which are established at each step by choosing t...
详细信息
Autonomous aerial vehicles (AAVs) can provide detection coverage service in many scenarios. The fair coverage is achieved by designing carefully AAVs' trajectories, which are established at each step by choosing the moving action and channel access for transmitting data. However, under the jamming environment, the problematic trajectories could lead to mutual interference and malicious jamming, such that the coverage service fails. The selections of moving action and channel access are usually coupled, and so far no work has addressed them jointly for planning trajectory. As such, this paper investigates the multi-AAV joint optimization of moving action and channel access for the energy-efficient detection coverage. To decouple the strongly-coupled moving action and channel access, we model the studied optimization problem as a hierarchical game, where the stochastic game (resp. potential game) is applied for selecting moving action (resp. channel access). Then, we propose a multi-agent hierarchical cooperative learning (MAHCL) algorithm to attain near-optimal solution for the joint optimization. It is proved that the proposed MAHCL algorithm can asymptotically converge to the near-optimal joint strategy with lower computational complexity. Finally, the simulation results show the higher energy efficiency of MAHCL algorithm compared with the benchmarks.
The traditional recommendation system provides web services by modeling user behavior characteristics, which also faces the risk of leaking user privacy. To mitigate the rising concern on privacy leakage in recommende...
详细信息
The traditional recommendation system provides web services by modeling user behavior characteristics, which also faces the risk of leaking user privacy. To mitigate the rising concern on privacy leakage in recommender systems, federated learning (FL) based recommendation has received tremendous attention, which can preserve data privacy by conducting local model training on clients. However, devices (e.g., mobile phones) used by clients in a recommender system may have limited capacity for computation and communication, which can severely deteriorate FL training efficiency. Besides, offloading local training tasks to the cloud can lead to privacy leakage and excessive pressure to the cloud. To overcome this deficiency, we propose a novel federated cloud-edge recommendation framework, which is called FCER, by offloading local training tasks to powerful and trusted edge servers. The challenge of FCER lies in the heterogeneity of edge servers, which makes the parameter server (PS) deployed in the cloud face difficulty in judiciously selecting edge servers for model training. To address this challenge, we divide the FCER framework into two stages. In the first pre-training stage, edge servers expose their data statistical features protected by local differential privacy (LDP) to the PS so that edge servers can be grouped into clusters. In the second training stage, FCER activates a single cluster in each communication round, ensuring that edge servers with statistical homogenization are not repeatedly involved in FL. The PS only selects a certain number of edge servers with the highest data quality in each cluster for FL. Effective metrics are proposed to dynamically evaluate the data quality of each edge server. Convergence rate analysis is conducted to show the convergence of recommendation algorithms in FCER. We also perform extensive experiments to demonstrate that FCER remarkably out performs competitive baselines by 3.85%-9.14%on HR@10 and1.46%-11.77%on NDCG@10
In the Wireless Sensor Network (WSN), there has been a significant increase in intruders, owing towards rapid expansion in the cyber-space that encloses multi-layered cybersecurity. The aim of this work is to tackle t...
详细信息
In the Wireless Sensor Network (WSN), there has been a significant increase in intruders, owing towards rapid expansion in the cyber-space that encloses multi-layered cybersecurity. The aim of this work is to tackle the increasing cybersecurity issues in Wireless Sensor Networks (WSNs) by proposing an innovative framework named WSNetDefender. It encompasses a Boosted BiLSTM Intrusion Detector Network (BBIDNet) to identify intrusions with precise accuracy and a Fuzzy-DQN Threat Mitigation System (FD-TMS) to respond to threats dynamically. The framework aims to enhance the accuracy of detection of intrusion while reducing false positives and resource *** first step involves gathering data from two distinct wireless sensor network datasets. Subsequently, preprocessing is done using the new Integrated Preprocessing Engine (IPE), wherein the Gaussian filtering for denoising, Kalman filtering for data fusion (2 databases), and Min-Max normalization for standardization are available. Then, features are extracted using the new NetFlow Profiling Network (NPN), which encloses the CAN Bus Analysis, Behavior Profiling, and Netflow Analysis. The newly introduced Jackal-Wolf Hybrid Optimizer (JWHO) assisted in selecting the optimal features from NPN, thereby assisting the model in lowering computing difficulty in terms of both memory and time. The proposed JWHO is the conceptual synergy of Golden Jackal Optimization and Grey Wolf Optimizer (GJO-GWO), respectively. The extracted JWHO-based features are utilized to train the new BBIDNet, which makes the accurate detection of intruders in WSN. This BBIDNet is the combination of the Bidirectional Long Short-Term Memory (BiLSTM) network with AdaBoost. Once, an attacker is found to be available, then for the concern attacker is mitigated via the new FD-TMS. In FD-TMS, the threat scoring and prioritization are undergone with respect to fuzzy rules, and based on the critical level identified, the mitigation is done using the Dee
During the development and utilization of new energy, the transient abnormal characteristics of power grid control mode switching are multi-terminal. In order to realize efficient access to new energy, the time sequen...
详细信息
In crowdsourcing scenarios, we can acquire each instance's multiple noisy label set from crowd workers and then infer its integrated label via label integration. To further enhance the quality of integrated labels...
详细信息
In crowdsourcing scenarios, we can acquire each instance's multiple noisy label set from crowd workers and then infer its integrated label via label integration. To further enhance the quality of integrated labels, some noise correction algorithms have been proposed in recent years. Most of them aim to partition the dataset into a clean set and a noise set, followed by training one or multiple classifiers on the clean set to rectify the instances in the noise set. However, they overlook the fact that the class distribution of the clean set is often inconsistent with that of the noise set, resulting in the subpar correction performance of trained classifiers. To mitigate this inconsistency, this paper proposes a class-specific instance weighting-based noise correction (CIWNC) algorithm. In CIWNC, each class's weight is computed based on the class distribution of the clean set firstly. Subsequently, a class-specific weight is computed for each instance using the weight of the class that its integrated label belongs to, as well as its multiple noisy label set. Finally, a classifier is trained on the instance weighted clean set to rectify the instances in the noise set. Experimental results on 34 simulated and two real-world datasets demonstrate that CIWNC outperforms existing state-of-the-art noise correction algorithms significantly.
In the current era of rapid advancements in Artificial Intelligence of Things (AIoT), with the increase in cloud data center operations and the limited security computing capabilities of AIoT terminal devices, link fl...
详细信息
In the current era of rapid advancements in Artificial Intelligence of Things (AIoT), with the increase in cloud data center operations and the limited security computing capabilities of AIoT terminal devices, link flooding attack (LFA) has emerged as a complex and stealthy new threat. However, the existing defense methods based on programmable networks usually have issues of slow offline inference and delayed defense activation. To address these issues, we propose a collaborative programmable defense framework (CPDTG) to predict, detect, and mitigate LFA. First, an early attack intention prediction model based on temporal graph learning (TGL) is proposed to accurately locate attacks and promptly activate defenses to save resource consumption during idle time. Second, a switch-native clustering algorithm independent of the global perspective is introduced for line-speed detection of LFA. The unsupervised algorithm does not rely on labeled datasets for training, which enhances its robustness against differentiated attack scenarios. Third, we propose a distributed defense mechanism that achieves the pushback deployment of adaptive rate-limiting strategies. Compressing the potential attack vector space effectively increases the difficulty of launching rolling attacks. Extensive experimental validation demonstrates the effectiveness of the proposed CPDTG in predicting and defending against LFA.
暂无评论