The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall...The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.展开更多
The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cy...The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cyber Threat Intelligence(CTI)can facilitate APT actors’profiling for an immediate response.However,it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature.Based on the Adversarial Tactics,Techniques and Common Knowledge(ATT&CK)of threat behavior description,this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network(HTN)and Graph Convolutional Network(GCN)to solve this issue.It leverages the hierarchical correlation relationships of attack techniques and tactics in the ATT&CK to construct a text network of heterogeneous cyber threat intelligence.With the help of the Bidirectional EncoderRepresentation fromTransformers(BERT)pretraining model to analyze the contextual semantics of cyber threat intelligence,the task of threat behavior identification is transformed into a text classification task,which automatically extracts attack behavior in CTI,then identifies the malware and advanced threat actors.The experimental results show that F1 achieve 94.86%and 92.15%for the multi-label classification tasks of tactics and techniques.Extend the experiment to verify the method’s effectiveness in identifying the malware and threat actors in APT attacks.The F1 for malware and advanced threat actors identification task reached 98.45%and 99.48%,which are better than the benchmark model in the experiment and achieve state of the art.The model can effectivelymodel threat intelligence text data and acquire knowledge and experience migration by correlating implied features with a priori knowledge to compensate for insufficient sample data and improve the classification performance and recognition ability of threat behavior in text.展开更多
Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to u...Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.展开更多
Federated learning is an emerging machine learning techniquethat enables clients to collaboratively train a deep learning model withoutuploading raw data to the aggregation server. Each client may be equippedwith diff...Federated learning is an emerging machine learning techniquethat enables clients to collaboratively train a deep learning model withoutuploading raw data to the aggregation server. Each client may be equippedwith different computing resources for model training. The client equippedwith a lower computing capability requires more time for model training,resulting in a prolonged training time in federated learning. Moreover, it mayfail to train the entire model because of the out-of-memory issue. This studyaims to tackle these problems and propose the federated feature concatenate(FedFC) method for federated learning considering heterogeneous clients.FedFC leverages the model splitting and feature concatenate for offloadinga portion of the training loads from clients to the aggregation server. Eachclient in FedFC can collaboratively train a model with different cutting layers.Therefore, the specific features learned in the deeper layer of the serversidemodel are more identical for the data class classification. Accordingly,FedFC can reduce the computation loading for the resource-constrainedclient and accelerate the convergence time. The performance effectiveness isverified by considering different dataset scenarios, such as data and classimbalance for the participant clients in the experiments. The performanceimpacts of different cutting layers are evaluated during the model training.The experimental results show that the co-adapted features have a criticalimpact on the adequate classification of the deep learning model. Overall,FedFC not only shortens the convergence time, but also improves the bestaccuracy by up to 5.9% and 14.5% when compared to conventional federatedlearning and splitfed, respectively. In conclusion, the proposed approach isfeasible and effective for heterogeneous clients in federated learning.展开更多
Existing simulations of terrorist attacks do not consider individual variations.To overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist attacks.We constructe...Existing simulations of terrorist attacks do not consider individual variations.To overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist attacks.We constructed an emotional model that integrated personality and visual perception for pedestrians.The emotional model was then integrated with pedestrian relationship networks to establish a decision-making model that sup-ported pedestrians’altruistic behaviors.A mapping model has been developed to correlate antisocial personality traits with attack strategies employed by terrorists.Experiments demonstrate that the proposed algorithm can generate practical heterogeneous behaviors that align with existing psychological research findings.展开更多
Computational Intelligence (CI) holds the key to the development of smart grid to overcome the challenges of planning and optimization through accurate prediction of Renewable Energy Sources (RES). This paper presents...Computational Intelligence (CI) holds the key to the development of smart grid to overcome the challenges of planning and optimization through accurate prediction of Renewable Energy Sources (RES). This paper presents an architectural framework for the construction of hybrid intelligent predictor for solar power. This research investigates the applicability of heterogeneous regression algorithms for 6 hour ahead solar power availability forecasting using historical data from Rockhampton, Australia. Real life solar radiation data is collected across six years with hourly resolution from 2005 to 2010. We observe that the hybrid prediction method is suitable for a reliable smart grid energy management. Prediction reliability of the proposed hybrid prediction method is carried out in terms of prediction error performance based on statistical and graphical methods. The experimental results show that the proposed hybrid method achieved acceptable prediction accuracy. This potential hybrid model is applicable as a local predictor for any proposed hybrid method in real life application for 6 hours in advance prediction to ensure constant solar power supply in the smart grid operation.展开更多
Heterogeneous vehicular networks (HetVNETs) are regarded as a promising technique for meeting various requirements of intelli- gent transportation system (ITS) services. With the rapid development of mobile Intern...Heterogeneous vehicular networks (HetVNETs) are regarded as a promising technique for meeting various requirements of intelli- gent transportation system (ITS) services. With the rapid development of mobile Internet in the past decade, social networks (SNs) have become an indispensable part of human life. Based on this indivisible relationship between vehicles and users, social charac- teristics and human behaviors can significantly affect vehicular network performance. Hence, we firstly present two architectures for SNs by introducing social characteristics into the HetVNETs. Then, several user cases are also given in this paper, in which service requirements are analyzed simultaneously. At last, we briefly discuss potential challenges raised by the HetVNETs for SNs.展开更多
Reconfigurable intelligent surface(RIS)as a promising technology has been proposed to change weak communication environ-ments.However,most of the current resource allocation(RA)schemes have focused on RIS-assisted hom...Reconfigurable intelligent surface(RIS)as a promising technology has been proposed to change weak communication environ-ments.However,most of the current resource allocation(RA)schemes have focused on RIS-assisted homogeneous networks,and there is still no open works about RA schemes of RIS-assisted heterogeneous networks(HetNets).In this paper,we design an RA scheme for a RIS-assisted HetNet with non-orthogonal multiple access to improve spectrum efficiency and transmission rates.In particular,we jointly optimize the transmit power of the small-cell base station and the phase-shift matrix of the RIS to maximize the sum rates of all small-cell users,subject to the unit modulus constraint,the minimum signal-to-interference-plus-noise ratio constraint,and the cross-tier interference constraint for protecting communication quality of microcell users.An efficient suboptimal RA scheme is proposed based on the alternating iteration ap-proach,and successive convex approximation and logarithmic transformation approach.Simulation results verify the effectiveness of the pro-posed scheme in terms of data rates.展开更多
Based on the sticking point of the low intelligence of the existing management decision system,this paper puts forward the idea of enriching and refining the knowledge of the system and endowing it with the ability to...Based on the sticking point of the low intelligence of the existing management decision system,this paper puts forward the idea of enriching and refining the knowledge of the system and endowing it with the ability to learn by means of adopting three types of heterogeneous knowledge representation and knowledge management measures.At length,this paper outlines the basic framework of an intelligence system for the sake of management decision problem.展开更多
This study explores the potential of Artificial Intelligence(AI)in early screening and prognosis of Dry Eye Disease(DED),aiming to enhance the accuracy of therapeutic approaches for eye-care practitioners.Despite the ...This study explores the potential of Artificial Intelligence(AI)in early screening and prognosis of Dry Eye Disease(DED),aiming to enhance the accuracy of therapeutic approaches for eye-care practitioners.Despite the promising opportunities,challenges such as diverse diagnostic evidence,complex etiology,and interdisciplinary knowledge integration impede the interpretability,reliability,and applicability of AI-based DED detection methods.The research conducts a comprehensive review of datasets,diagnostic evidence,and standards,as well as advanced algorithms in AI-based DED detection over the past five years.The DED diagnostic methods are categorized into three groups based on their relationship with AI techniques:(1)those with ground truth and/or comparable standards,(2)potential AI-based methods with significant advantages,and(3)supplementary methods for AI-based DED detection.The study proposes suggested DED detection standards,the combination of multiple diagnostic evidence,and future research directions to guide further investigations.Ultimately,the research contributes to the advancement of ophthalmic disease detection by providing insights into knowledge foundations,advanced methods,challenges,and potential future perspectives,emphasizing the significant role of AI in both academic and practical aspects of ophthalmology.展开更多
基金supported by the National Key Research and Development Program of China(grant number 2019YFE0123600)。
文摘The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.
基金supported by China’s National Key R&D Program,No.2019QY1404the National Natural Science Foundation of China,Grant No.U20A20161,U1836103the Basic Strengthening Program Project,No.2019-JCJQ-ZD-113.
文摘The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cyber Threat Intelligence(CTI)can facilitate APT actors’profiling for an immediate response.However,it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature.Based on the Adversarial Tactics,Techniques and Common Knowledge(ATT&CK)of threat behavior description,this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network(HTN)and Graph Convolutional Network(GCN)to solve this issue.It leverages the hierarchical correlation relationships of attack techniques and tactics in the ATT&CK to construct a text network of heterogeneous cyber threat intelligence.With the help of the Bidirectional EncoderRepresentation fromTransformers(BERT)pretraining model to analyze the contextual semantics of cyber threat intelligence,the task of threat behavior identification is transformed into a text classification task,which automatically extracts attack behavior in CTI,then identifies the malware and advanced threat actors.The experimental results show that F1 achieve 94.86%and 92.15%for the multi-label classification tasks of tactics and techniques.Extend the experiment to verify the method’s effectiveness in identifying the malware and threat actors in APT attacks.The F1 for malware and advanced threat actors identification task reached 98.45%and 99.48%,which are better than the benchmark model in the experiment and achieve state of the art.The model can effectivelymodel threat intelligence text data and acquire knowledge and experience migration by correlating implied features with a priori knowledge to compensate for insufficient sample data and improve the classification performance and recognition ability of threat behavior in text.
文摘Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.
基金supported by the National Science and Technology Council (NSTC)of Taiwan under Grants 108-2218-E-033-008-MY3,110-2634-F-A49-005,111-2221-E-033-033the Veterans General Hospitals and University System of Taiwan Joint Research Program under Grant VGHUST111-G6-5-1.
文摘Federated learning is an emerging machine learning techniquethat enables clients to collaboratively train a deep learning model withoutuploading raw data to the aggregation server. Each client may be equippedwith different computing resources for model training. The client equippedwith a lower computing capability requires more time for model training,resulting in a prolonged training time in federated learning. Moreover, it mayfail to train the entire model because of the out-of-memory issue. This studyaims to tackle these problems and propose the federated feature concatenate(FedFC) method for federated learning considering heterogeneous clients.FedFC leverages the model splitting and feature concatenate for offloadinga portion of the training loads from clients to the aggregation server. Eachclient in FedFC can collaboratively train a model with different cutting layers.Therefore, the specific features learned in the deeper layer of the serversidemodel are more identical for the data class classification. Accordingly,FedFC can reduce the computation loading for the resource-constrainedclient and accelerate the convergence time. The performance effectiveness isverified by considering different dataset scenarios, such as data and classimbalance for the participant clients in the experiments. The performanceimpacts of different cutting layers are evaluated during the model training.The experimental results show that the co-adapted features have a criticalimpact on the adequate classification of the deep learning model. Overall,FedFC not only shortens the convergence time, but also improves the bestaccuracy by up to 5.9% and 14.5% when compared to conventional federatedlearning and splitfed, respectively. In conclusion, the proposed approach isfeasible and effective for heterogeneous clients in federated learning.
基金Supported by the Natural Science Foundation of Zhejiang Province(LZ23F020005)Ningbo Science Technology Plan projects(2022Z077 and 2021S091).
文摘Existing simulations of terrorist attacks do not consider individual variations.To overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist attacks.We constructed an emotional model that integrated personality and visual perception for pedestrians.The emotional model was then integrated with pedestrian relationship networks to establish a decision-making model that sup-ported pedestrians’altruistic behaviors.A mapping model has been developed to correlate antisocial personality traits with attack strategies employed by terrorists.Experiments demonstrate that the proposed algorithm can generate practical heterogeneous behaviors that align with existing psychological research findings.
文摘Computational Intelligence (CI) holds the key to the development of smart grid to overcome the challenges of planning and optimization through accurate prediction of Renewable Energy Sources (RES). This paper presents an architectural framework for the construction of hybrid intelligent predictor for solar power. This research investigates the applicability of heterogeneous regression algorithms for 6 hour ahead solar power availability forecasting using historical data from Rockhampton, Australia. Real life solar radiation data is collected across six years with hourly resolution from 2005 to 2010. We observe that the hybrid prediction method is suitable for a reliable smart grid energy management. Prediction reliability of the proposed hybrid prediction method is carried out in terms of prediction error performance based on statistical and graphical methods. The experimental results show that the proposed hybrid method achieved acceptable prediction accuracy. This potential hybrid model is applicable as a local predictor for any proposed hybrid method in real life application for 6 hours in advance prediction to ensure constant solar power supply in the smart grid operation.
基金supported in part by National Science Foundation of China(No.61331009)National Key Technology R&D Program of China(No.2015ZX03002009-004)
文摘Heterogeneous vehicular networks (HetVNETs) are regarded as a promising technique for meeting various requirements of intelli- gent transportation system (ITS) services. With the rapid development of mobile Internet in the past decade, social networks (SNs) have become an indispensable part of human life. Based on this indivisible relationship between vehicles and users, social charac- teristics and human behaviors can significantly affect vehicular network performance. Hence, we firstly present two architectures for SNs by introducing social characteristics into the HetVNETs. Then, several user cases are also given in this paper, in which service requirements are analyzed simultaneously. At last, we briefly discuss potential challenges raised by the HetVNETs for SNs.
基金partially supported by the China National Key R&D Program under Grant No. 2021YFA1000502National Natural Science Foundation of China under Grant No. 62101492+4 种基金Zhejiang Provincial Natural Science Foundation of China under Grant No. LR22F010002Distinguished Young Scholars of the National Natural Science Foundation of ChinaNg Teng Fong Charitable Foundation in the form of ZJU-SUTD IDEA GrantZhejiang University Education Foundation Qizhen Scholar FoundationFundamental Research Funds for the Central Universities under Grant No. 2021FZZX001-21
文摘Reconfigurable intelligent surface(RIS)as a promising technology has been proposed to change weak communication environ-ments.However,most of the current resource allocation(RA)schemes have focused on RIS-assisted homogeneous networks,and there is still no open works about RA schemes of RIS-assisted heterogeneous networks(HetNets).In this paper,we design an RA scheme for a RIS-assisted HetNet with non-orthogonal multiple access to improve spectrum efficiency and transmission rates.In particular,we jointly optimize the transmit power of the small-cell base station and the phase-shift matrix of the RIS to maximize the sum rates of all small-cell users,subject to the unit modulus constraint,the minimum signal-to-interference-plus-noise ratio constraint,and the cross-tier interference constraint for protecting communication quality of microcell users.An efficient suboptimal RA scheme is proposed based on the alternating iteration ap-proach,and successive convex approximation and logarithmic transformation approach.Simulation results verify the effectiveness of the pro-posed scheme in terms of data rates.
基金The paper is supported by National Natural Science Foundation of China (No 70271002)
文摘Based on the sticking point of the low intelligence of the existing management decision system,this paper puts forward the idea of enriching and refining the knowledge of the system and endowing it with the ability to learn by means of adopting three types of heterogeneous knowledge representation and knowledge management measures.At length,this paper outlines the basic framework of an intelligence system for the sake of management decision problem.
基金funded by the National Natural Science Foundation of China Natural(Nos.U22A2041,82071915,and 62372047)the Shenzhen Key Laboratory of Intelligent Bioinformatics(No.ZDSYS20220422103800001)+5 种基金the Shenzhen Science and Technology Program(No.KQTD20200820113106007)the Guangdong Basic and Applied Basic Research Foundation(No.2022A1515220015)the Zhuhai Technology and Research Foundation(Nos.ZH22036201210034PWC,2220004000131,and 2220004002412)the Project of Humanities and Social Science of MOE(Ministry of Education in China)(No.22YJCZH213)the Science and Technology Research Program of Chongqing Municipal Education Commission(Nos.KJZD-K202203601,KJQN0202203605,and KJQN202203607)the Natural Science Foundation of Chongqing China(No.cstc2021jcyj-msxmX1108).
文摘This study explores the potential of Artificial Intelligence(AI)in early screening and prognosis of Dry Eye Disease(DED),aiming to enhance the accuracy of therapeutic approaches for eye-care practitioners.Despite the promising opportunities,challenges such as diverse diagnostic evidence,complex etiology,and interdisciplinary knowledge integration impede the interpretability,reliability,and applicability of AI-based DED detection methods.The research conducts a comprehensive review of datasets,diagnostic evidence,and standards,as well as advanced algorithms in AI-based DED detection over the past five years.The DED diagnostic methods are categorized into three groups based on their relationship with AI techniques:(1)those with ground truth and/or comparable standards,(2)potential AI-based methods with significant advantages,and(3)supplementary methods for AI-based DED detection.The study proposes suggested DED detection standards,the combination of multiple diagnostic evidence,and future research directions to guide further investigations.Ultimately,the research contributes to the advancement of ophthalmic disease detection by providing insights into knowledge foundations,advanced methods,challenges,and potential future perspectives,emphasizing the significant role of AI in both academic and practical aspects of ophthalmology.