Cognitive radio can meet the increasing demand for wireless spectrum in 5G and B5G, and relay can relay-assisted covert communications in underlay cognitive radio networks (UCRN) to reaching distant destinations. Ther...
详细信息
ISBN:
(数字)9798350374216
ISBN:
(纸本)9798350374223
Cognitive radio can meet the increasing demand for wireless spectrum in 5G and B5G, and relay can relay-assisted covert communications in underlay cognitive radio networks (UCRN) to reaching distant destinations. Therefore, we investigated relay-assisted covert communication in UCRN. In phase 1, the secondary source (SS) sends covert messages to the relay, and the relay sends interference signals to Willie. In phase 2, the relay decodes and forwards the covert information received in phase 1, and SS sends interference signals to Willie to ensure covert transmission. The average detection error probability, the transmission outage probability and the maximum effective covert rate of the system are derived. The simulation results show that the average minimum detection error probability in phase 1 and the transmission outage probability decrease with the increase of the maximum interference tolerance of primary destination (PD), and the maximum effective covert rate increases with the increase of the maximum interference tolerance of PD.
Remote sensing has proven its utility in many critical domains, such as medicine, military, and ecology. Recently, we have been witnessing a surge in the adoption of deep learning (DL) techniques by the remote sensing...
详细信息
Remote sensing has proven its utility in many critical domains, such as medicine, military, and ecology. Recently, we have been witnessing a surge in the adoption of deep learning (DL) techniques by the remote sensing community. DL-based classifiers, such as convolutional neural networks (CNNs), have been reported to achieve impressive predictive performances reaching 99\% of accuracy when applied to hyperspectral images (HSIs), a high-dimensional type of remote sensing data. However, these deep learners are known to be highly sensitive to even slight perturbations of their high-dimensional raw inputs. In real-world contexts, concerns can be raised about how robust they really are against corner-case scenarios. When HSI classifiers are applied in safety-critical applications, ensuring an adequate level of robustness is crucial to prevent unexpected system behaviors. Yet, there are few studies dealing with their robustness, nor are RGB-testing methods able to cover the HSI-specific challenges. This led us to propose a systematic testing method to assess the robustness of the CNNs trained to classify HSIs. First, we elaborate domain-specific metamorphic transformations that simulate naturally-occurring distortions of remote sensing HSIs. Then, we leverage metaheuristic search algorithms to optimize the fitness of synthetically-distorted inputs to stress the weaknesses of the on-testing CNN, while remaining in compliance with domain expert requirements, in order to preserve the semantic of the generated inputs. Relying on our metamorphic testing method, we assess the robustness of established and novel CNNs for HSI classification, and demonstrate their failure, on average, in 25\% of the produced test cases. Furthermore, we fine-tuned the tested CNNs on training data augmented with these failure-revealing metamorphic transformations. Results show that the fined-tuning successfully fixed at least 90\% of the CNN weaknesses, with less than 1\% of degradation in the origi
Deepfakes are generated using sophisticated deep-learning models to create fake images or videos. As the techniques for creating deep fakes improve, issues like defamation, impersonation, fraud, and misinformation on ...
详细信息
Today's generation is heavily influenced by social media. However, most users decline to post their abilities on these platforms for a variety of reasons, including security, a lack of basic skills, and a lack of ...
详细信息
The 5G-MOBIX project applies 5G network communication technology and defines five user stories and specific user scenarios in order to solve the cross-border problem of 5G driverless vehicles. Combined with the remote...
详细信息
ISBN:
(纸本)9781665453523
The 5G-MOBIX project applies 5G network communication technology and defines five user stories and specific user scenarios in order to solve the cross-border problem of 5G driverless vehicles. Combined with the remote control user scenario in the remote driving user case, this paper explains the interconnect delay problem between PLMNS in this scenario. From the perspective of infrastructure, that is, the cooperation between vehicle infrastructure and cloud infrastructure, the CCAM architecture of remote control user story simulation test scenario is designed. The proposed solution of direct interconnection is verified and tested, and the cross-border test is simulated at the test site in China. The final test results show that the solution is feasible.
ContextThe performance of the defect prediction model by using balanced and imbalanced datasets makes a big impact on the discovery of future defects. Current resampling techniques only address the imbalanced datasets...
详细信息
In the era of Internet of Everything (IoE), there is an explosive growth in data volumes and the data usually with time series characteristics. Therefore, how to deal with time series data to improve prediction accura...
In the era of Internet of Everything (IoE), there is an explosive growth in data volumes and the data usually with time series characteristics. Therefore, how to deal with time series data to improve prediction accuracy remains a critical issue. In this paper, an efficient hybrid scheme combining linear and nonlinear models is proposed to greatly improve the prediction performance and simplify the hyperparameter selection process. Gradient-based least mean square (GD-LMS) is introduced for adaptive linear section, while a hyperparameter-determined long short-term memory (LSTM) is used for nonlinear section. In particular, an improved sparrow search algorithm combining opposition-based learning and Cauchy variance (ISSA) is used to construct the optimal hyperparameters for the two-layer LSTM. computer simulations with the UMass weather dataset reveal that the proposed scheme considerably outperforms three benchmarking methods in terms of data prediction accuracy and robustness.
With the deployment of more and more 5g networks,the limitations of 5g networks have been found,which undoubtedly promotes the exploratory research of 6G networks as the next generation *** investigations include the ...
详细信息
With the deployment of more and more 5g networks,the limitations of 5g networks have been found,which undoubtedly promotes the exploratory research of 6G networks as the next generation *** investigations include the fundamental security and privacy problems associated with 6G ***,in order to consolidate and solidify this foundational research as a basis for future investigations,we have prepared a survey on the status quo of 6G security and *** survey begins with a historical review of previous networking technologies and how they have informed the current trends in 6G *** then discuss four key aspects of 6G networks–real-time intelligent edge computing,distributed artificial intelligence,intelligent radio,and 3D intercoms–and some promising emerging technologies in each area,along with the relevant security and privacy *** survey concludes with a report on the potential use of *** of the references used in this paper along and further details of several points raised can be found at:***.
This paper presents an architecture design of vehicle-road-cloud collaboration based on a 5g communication network, which supports vehicle platooning and applies it in the case of vehicle formation crossing the border...
详细信息
ISBN:
(纸本)9781665453523
This paper presents an architecture design of vehicle-road-cloud collaboration based on a 5g communication network, which supports vehicle platooning and applies it in the case of vehicle formation crossing the border. The architecture includes roadside, cloud systems, 5g network, and infrastructure deployment connecting vehicles, as well as specifications for interfaces of automated vehicles (network communication interface specifications and application interface specifications). In addition, solutions and simple tests are proposed for the cross-border problems in the case of vehicle platooning crossing the border, mainly including interconnection delay between PLMNs, and low delay communication between leader and team members' vehicles and roadside infrastructure.
In 2008, Blockchain was introduced to the world as the underlying technology of the Bitcoin system. After more than a decade of development, various Blockchain systems have been proposed by both academia and industry....
详细信息
In 2008, Blockchain was introduced to the world as the underlying technology of the Bitcoin system. After more than a decade of development, various Blockchain systems have been proposed by both academia and industry. This paper focuses on the consensus algorithm, which is one of the core technologies of Blockchain. In this paper, we propose a unified consensus algorithm process model that is suitable for Blockchains based on both the chain and directed acyclic graph(DAG) structure. Subsequently, we analyze various mainstream Blockchain consensus algorithms and classify them according to their design in different phases of the process model. Additionally, we present an evaluation framework of Blockchain consensus algorithms and then discuss the security design principles that enable resistance from different ***, we provide some suggestions for selecting consensus algorithms in different Blockchain application scenarios.
暂无评论