Logo

Publikacije (262)

Nazad
Jie Yang, Hao Gu, Chenhan Hu, Xixi Zhang, Guan Gui, H. Gačanin

Drone-aided ubiquitous applications play important roles in our daily lives. Accurate recognition of drones is required in aviation management due to their potential risks and disasters. Radiofrequency (RF) fingerprinting-based recognition technology based on deep learning (DL) is considered an effective approach to extracting hidden abstract features from the RF data of drones. Existing deep learning-based methods are either high computational burdens or have low accuracy. In this paper, we propose a deep complex-valued convolutional neural network (DC-CNN) method based on RF fingerprinting for recognizing different drones. Compared with existing recognition methods, the DC-CNN method has a high recognition accuracy, fast running time, and small network complexity. Nine algorithm models and two datasets are used to represent the superior performance of our system. Experimental results show that our proposed DC-CNN can achieve recognition accuracies of 99.5% and 74.1%, respectively, on four and eight classes of RF drone datasets.

Jian Zhou, Taotao Han, Fu Xiao, Guan Gui, B. Adebisi, H. Gačanin, H. Sari

As a typical Internet of Things application, network traffic prediction (NTP) plays a decisive role in congestion control, resource allocation, and anomaly detection. The trend of network traffic is different at different scales, so multiscale is an important characteristic of network traffic. In addition, the network traffic is nonlinear on each scale and dependent between scales. The existing NTP methods cannot comprehensively consider these characteristics, which limits their performance. In view of the characteristics of network traffic, such as multiscale, nonlinearity, and scale dependence, this article proposes a new multiscale NTP method based on a deep echo-state network (ESN). First, a multiscale parallel layered structure based on deep ESN is designed to fully consider the influence of each scale on the prediction result and then reduce the prediction error. Second, a feature extraction algorithm is proposed to improve the nonlinear approximation ability by extracting more abundant dynamic features with multiple reservoirs. Third, an NTP model based on scale dependence is proposed to reduce the influence from partial scale missing and then improve the prediction accuracy. Finally, simulation results demonstrate that compared with the state-of-the-art NTP methods, the proposed method significantly improves the prediction performance of network traffic with a slight increase in running time.

Olamide Jogunola, B. Adebisi, H. Gačanin, M. Hammoudeh, Guan Gui

As peer-to-peer energy trading and local energy market are gaining momentum, a follow-up challenge is scaling up to include multi-community, multi-region power schedule and trading. This study introduces community-to-community power trading and schedules considering various generating units, including coal, gas, wind, and solar, as well as import and export prices from community transactions. These generating sources are used to fulfil the demand requirements of each community over a time horizon, as well as absorbing or trading the margin among the inter-connected communities, while fulfilling certain distribution network constraints. For a practical case, the uncertainties in wind power generations are considered. An optimality condition decomposition technique is used to decompose the overall problem into a community-based local problem. Thus, individual community solves their optimisation local problem in parallel for operational efficiency of real-time multi-commodity power schedule and trading. The initial results indicate that each community acts in its best interest to minimise its costs when there is a change in the variable. When emission costs are applied as a constraint to their generation, a reduction in power generation is observed augmented by an increase of up to 30.8% of power transferred in the inter-community transaction.

Yuzhi Zhou, Jinlong Sun, Jie Yang, Guan Gui, H. Gačanin, F. Adachi

The development of the Internet of Things (IoT) and smart cities, combined with the widespread usage of cooperative or independent air traffic surveillance systems such as automatic dependent surveillance-broadcast (ADS-B) bring about novel deployment paradigms in air-ground integrated vehicular networks (AGVN). Therefore, how to make full use of infrastructures, which represented by high altitude platform station (HAPS), and can be orchestrated according to fully use information like ADS-B message, becomes the imminent problem that should be solved. In the view of above problems, in this paper, we propose a novel handover strategy based on side information of the ADS-B for AGVN. Firstly, a practical scenario which use single HAPS as air base station to assist cellular network with multiple users is proposed. Secondly, according to the surveillance platform, side information such as the location, speed, and realtime throughput of HAPS is obtained by all the static base stations using ADS-B system. Thirdly, a modified handover strategy over HAPS based on the side information is used to enhance the service ability of all the network. Simulation results show the fully use of side information can increase the capacity of the AGVN.

Jin Ning, Guan Gui, Yu Wang, Jie Yang, B. Adebisi, S. Ci, H. Gačanin, F. Adachi

Malware traffic classification (MTC) is a key technology for anomaly and intrusion detection in secure Industrial Internet of Things (IIoT). Traditional MTC methods based on port, payload, and statistic depend on the manual-designed features, which have low accuracy. Recently, deep-learning methods have attracted a significant attention due to their high accuracy in terms of classification. However, in practical application scenarios, deep-learning methods require a large amount of labeled samples for training, while the available labeled samples for training are very rare. Furthermore, the preparation of a large amount of labeled samples requires a lot of labor costs. To solve these problems, this article proposes three methods based on semisupervised learning (SSL), transfer learning (TL), and domain adaptive (DA), respectively. Our proposed methods use a large amount of unlabeled data collected in the Internet traffic, which can greatly improve the classification accuracy with few labeled samples. Then, we use the DA method to solve the mismatch problem between the source domain and the target domain in the TL process. The proposed method is not only applicable to the shallow network but also to the deep neural network structure, and can achieve better classification results. Experimental results show that our proposed methods can satisfy the requirement of MTC in the case of few labeled samples in IIoT. The source code for all the experiments is available at GitHub.The code of this article can be downloaded from GitHub link: https://github.com/yzjh/Keras-MTC-DA-Ladder.

Biao Dong, Guozhen Xu, Xue Fu, Heng Dong, Guan Gui, H. Gačanin, F. Adachi

Due to the computing capability and memory limitations, it is difficult to apply the traditional deep learning (DL) models to the edge devices (EDs) for realizing automatic modulation classification (AMC). In this paper, a lightweight neural network for decentralized learning-based automatic modulation classification (DecentAMC) method is proposed. Specifically, group convolutional neural network (GCNN) is designed by replacing the standard convolution layer with the group convolution layer, replacing the flatten layer with the global average pooling (GAP) layer and removing part of fully connected layers. DecentAMC method is achieved by the cooperation in which multiple EDs update and upload the model weight to a central device (CD) for model aggregation to avoid the data privacy disclosure. Experimental results show that the proposed GCNN-based DecentAMC method can improve training efficiency to about 4 times and 57 times than that of GCNN-based centralized AMC (CentAMC) and CNN-based DecentAMC respectively. GCNN-based DecentAMC method can effectively reduce the communication cost and save storage of EDs when compared with CNN-based DecentAMC. Meanwhile, the time complexity and the space complexity of GCNN is significantly decreased when compared with CNN and SCNN, which is suitable to be deployed in EDs.

Yibin Zhang, Yang Peng, B. Adebisi, Guan Gui, H. Gačanin, H. Sari

The fast development of intelligent wireless communications enables many devices to access various networks. It often leads to the security risks of malicious access of illegal devices. To ensure a secure and reliable wireless access, it is necessary to identify illegal devices and prevent their attacks accurately. To improve the performance of specific emitter identification (SEI), this paper proposes a multi-scale convolution neural network (MSCNN) based on convolution layers of three branches with different convolution kernel sizes. MSCNN extracts radio frequency fingerprints (RFF) in three receptive fields through different convolution kernels. We verify the identification accuracy using the RF signals conforming to long term evolution (LTE) standard. The experimental results show that our proposed MSCNN-based SEI method can improve the absolute accuracy by 15% and the relative accuracy by 22% in perfect communication environment. In addition, we verify the robustness of proposed MSCNN by comparing identification performance in imperfect environment. Simulation results show that the proposed MSCNN can extract more hidden features through convolution kernels of different sizes, and thus achieves better SEI performance than existing methods.

Xixi Zhang, Haitao Zhao, Hongbo Zhu, B. Adebisi, Guan Gui, H. Gačanin, F. Adachi

Automatic modulation recognition (AMR) technique plays an important role in the identification of modulation types of unknown signal of integrated sensing and communication (ISAC) systems. Deep neural network (DNN) based AMR is considered as a promising method. Considering the complexity of a typical ISAC system, devising the DNN manually with limited knowledge of its various classifications will be very tasking. This paper proposes a neural architecture search (NAS) based AMR method to automatically adjust the structure and parameters of DNN and find the optimal structure under the combination of training and constraints. The proposed NAS-AMR method will improve the flexibility of model search and overcome the difficulty of gradient propagation caused by the non-differentiable quantization function in the process of back propagation. Simulation results are provided to confirm that the proposed NAS-AMR method can identify the modulation types in various ISAC electromagnetic environments. Furthermore, compared with other fixed structure networks, our proposed method delivers the highest recognition accuracy, under the condition of low parameters and floating-point operations (FLOPs).

Hanyi Guo, Xixi Zhang, Yu Wang, B. Adebisi, H. Gačanin, Guan Gui

Malware traffic classification (MTC) is a very important component of cyber security, and a number of the MTC techniques are based on deep learning (DL) with a strong capability of feature mining and classification. However, these DL-based MTC methods are heavily dependent on a large amount of network traffic samples. In the few-shot scenarios, these methods usually overfit and have poor classification performance. Considering that the update cycle of malware is faster and faster, and there are more and more types of malware, collecting enough training samples for all malware is very challenging, if not impossible. In this paper, a novel few-shot MTC(FS-MTC) method is proposed based on convolutional neural network (CNN) and model-agnostic meta-learning (MAML) algorithm. Specifically, the CNN is trained on samples from normal softwares by MAML rather than the conventional optimization methods, then the CNN is finetuned by a few samples from malware for MTC. Simulation results show that our proposed MAML-based FS-MTC can outperform the traditional MTC methods. The performance of our proposed method can reach up to 95.69%.

Jie Zhou, Yang Peng, Guan Gui, Yun Lin, B. Adebisi, H. Gačanin, H. Sari

Radio frequency fingerprint (RFF) is regarded as a key technology in physical layer security in various wireless communications systems. Deep learning (DL) has achieved great success in the field of signal identification, particularly in improving performance and eliminating manual feature extraction. However, the training cost of these DL-based methods is usually large. It is unwise to retrain the network with whole data when it comes to new data. Therefore, we propose a novel RFF identification method based on incremental learning (IL), which uses continuous data stream to update the identification model, constantly. Experimental results show that with the increase of increment times, the accuracy of the proposed IL-based method gradually approaches the performance of joint training, and finally reaches 96.79%, which is only 1.9% lower than the performance upper bound.

Xue Fu, Yu Wang, Yun Lin, Guan Gui, H. Gačanin, F. Adachi

Specific emitter identification (SEI) is developed as a potential technology against attackers in cognitive radio networks and authenticate devices in Internet of Things (IoT). It refers to a process to discriminate individual emitters from each other by analyzing extracted characteristics from given radio signals. Due to the strong capability of deep learning (DL) in extracting the hidden features of data and making classification decision, deep neural networks (DNNs) have been widely used in the SEI. Considering the insufficiently labeled training dataset and large unlabeled training dataset, we propose a novel SEI method using semi-supervised (SS) learning framework, i.e., metric-adversarial training (MAT). Specifically, two object functions (i.e., cross-entropy (CE) loss combined with deep metric learning (DML) and CE loss combined with virtual adversarial training (VAT)) and an alternating optimization way are designed to extract discriminative and generalized semantic features of radio signals. The proposed MAT-based SS-SEI method is evaluated on an open source large-scale real-world automatic-dependent surveillance-broadcast (ADS-B) dataset. The simulation results show that the proposed method achieves a better identification performance than four latest SS-SEI methods.

Yuxin Ji, Xixi Zhang, Yu Wang, H. Gačanin, H. Sari, F. Adachi, Guan Gui

To address the problem of spectrum resources and transmitting power for vehicular networks, this paper proposes a resource allocation (RA) method based on dueling double deep-Q network (D3QN) reinforcement learning (RL). Due to the high mobility of the vehicle, the channel changes rapidly which makes it difficult to accurately collect high-accuracy channel state information at the base station and to perform centralized management. In response of this difficulty, we construct a multi-intelligence model, using Manhattan Grid Layout City Model as the basis of environment and with each vehicle-to-vehicle (V2V) link as an intelligence. They work together to interact with the environment, receive appropriate observations, get rewards, and finally learn to improve the allocation of power and spectrum to enable users to achieve a better entertainment experience and a safer driving environment. Experimental results demonstrate that with proper training mechanism and reward function construction, cooperation among multiple intelligence can be performed in a distributed manner, with improvements in both the capacity of total vehicle-to-infrastructure links and the effective payload delivery success rate of the V2V links compared to common Q-network.

Yuting Gu, Yu Wang, B. Adebisi, Guan Gui, H. Gačanin, Hikmet Sari

Blind signal recognition (BSR) is a significant research topic in the field of intelligent signal processing. However, existing BSR of space-time block codes (STBC) mainly depends on conventional algorithms, which require priori information and can only identify a relatively limited amount of STBC. Although deep learning (DL) has been widely used in signal recognition, so far there are few studies on BSR of STBC in multiple-input multiple-output (MIMO) systems using DL. In this paper, a blind recognition approach for STBC based on multichannel convolutional neural network (MCNN) is proposed. By leveraging the structure of multiple input channel, the in-phase and quadrature (IQ) channel information of STBC signals can be comprehensively extracted. Simulation results demonstrate that the proposed algorithm extends the recognizable STBC codes to 6, and can also improve the recognition accuracy in comparison to traditional convolutional neural network (CNN). The model proposed in this paper has been validated with two datasets and experimentally proved to be well generalized.

Yibin Zhang, Jinlong Sun, Guan Gui, Yun Lin, H. Gačanin, F. Adachi

The potential advantages of intelligent wireless communications with millimeter wave (mmWave) and massive multiple-input multiple-output (MIMO) are based on the availability of instantaneous channel state information (CSI) at the base station (BS). However, no existence of channel reciprocity leads to the difficult acquisition of accurate CSI at the BS in frequency division duplex (FDD) systems. Many researchers explored effective architectures based on deep learning (DL) to solve this problem and proved the success of DL-based solutions. However, existing schemes focused on the acquisition of complete CSI while ignoring the beamforming and precoding operations. In this paper, we propose an intelligent channel feedback architecture using eigenmatrix and eigenvector feedback neural network (EMEVNet). With the help of the attention mechanism, the proposed EMEVNet can be considered as a dual channel auto-encoder, which is able to jointly encode the eigenmatrix and eigenvector into codewords. Simulation results show great performance improvement and robustness with extremely low overhead of the proposed EMEVNet method compared with the traditional DL-based CSI feedback methods.

Xiaoyi Hu, Jin Ning, Jie Yin, Jie Yang, B. Adebisi, H. Gačanin

The proliferation of mobile communication systems, arrival of high-speed broadband networks and more complex network topologies have exacerbated cyber-threats. Cyber-warfare has become an aspect of modern war-fare that can no longer be overlooked. In recent years, network intrusions launched using the Internet have seriously undermined the security systems of many nations. Classifying malicious network traffic is the first step in network intrusion detection. In this paper, we propose three models using semi-supervised learning-based malicious traffic classification (MTC) methods that effectively improve the classification of traffic using a small proportion of labeled traffic data. Employing three different deep neural networks as feature extraction networks respectively, the proposed models use transductive transfer learning and domain adaptive ideas, and ladder networks as classification layers. Experimental results are provided to validate the proposed methods.

Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više