Logo

Publikacije (259)

Nazad
Olamide Jogunola, B. Adebisi, H. Gačanin, M. Hammoudeh, Guan Gui

As peer-to-peer energy trading and local energy market are gaining momentum, a follow-up challenge is scaling up to include multi-community, multi-region power schedule and trading. This study introduces community-to-community power trading and schedules considering various generating units, including coal, gas, wind, and solar, as well as import and export prices from community transactions. These generating sources are used to fulfil the demand requirements of each community over a time horizon, as well as absorbing or trading the margin among the inter-connected communities, while fulfilling certain distribution network constraints. For a practical case, the uncertainties in wind power generations are considered. An optimality condition decomposition technique is used to decompose the overall problem into a community-based local problem. Thus, individual community solves their optimisation local problem in parallel for operational efficiency of real-time multi-commodity power schedule and trading. The initial results indicate that each community acts in its best interest to minimise its costs when there is a change in the variable. When emission costs are applied as a constraint to their generation, a reduction in power generation is observed augmented by an increase of up to 30.8% of power transferred in the inter-community transaction.

Yuzhi Zhou, Jinlong Sun, Jie Yang, Guan Gui, H. Gačanin, F. Adachi

The development of the Internet of Things (IoT) and smart cities, combined with the widespread usage of cooperative or independent air traffic surveillance systems such as automatic dependent surveillance-broadcast (ADS-B) bring about novel deployment paradigms in air-ground integrated vehicular networks (AGVN). Therefore, how to make full use of infrastructures, which represented by high altitude platform station (HAPS), and can be orchestrated according to fully use information like ADS-B message, becomes the imminent problem that should be solved. In the view of above problems, in this paper, we propose a novel handover strategy based on side information of the ADS-B for AGVN. Firstly, a practical scenario which use single HAPS as air base station to assist cellular network with multiple users is proposed. Secondly, according to the surveillance platform, side information such as the location, speed, and realtime throughput of HAPS is obtained by all the static base stations using ADS-B system. Thirdly, a modified handover strategy over HAPS based on the side information is used to enhance the service ability of all the network. Simulation results show the fully use of side information can increase the capacity of the AGVN.

Jin Ning, Guan Gui, Yu Wang, Jie Yang, B. Adebisi, S. Ci, H. Gačanin, F. Adachi

Malware traffic classification (MTC) is a key technology for anomaly and intrusion detection in secure Industrial Internet of Things (IIoT). Traditional MTC methods based on port, payload, and statistic depend on the manual-designed features, which have low accuracy. Recently, deep-learning methods have attracted a significant attention due to their high accuracy in terms of classification. However, in practical application scenarios, deep-learning methods require a large amount of labeled samples for training, while the available labeled samples for training are very rare. Furthermore, the preparation of a large amount of labeled samples requires a lot of labor costs. To solve these problems, this article proposes three methods based on semisupervised learning (SSL), transfer learning (TL), and domain adaptive (DA), respectively. Our proposed methods use a large amount of unlabeled data collected in the Internet traffic, which can greatly improve the classification accuracy with few labeled samples. Then, we use the DA method to solve the mismatch problem between the source domain and the target domain in the TL process. The proposed method is not only applicable to the shallow network but also to the deep neural network structure, and can achieve better classification results. Experimental results show that our proposed methods can satisfy the requirement of MTC in the case of few labeled samples in IIoT. The source code for all the experiments is available at GitHub.The code of this article can be downloaded from GitHub link: https://github.com/yzjh/Keras-MTC-DA-Ladder.

Biao Dong, Guozhen Xu, Xue Fu, Heng Dong, Guan Gui, H. Gačanin, F. Adachi

Due to the computing capability and memory limitations, it is difficult to apply the traditional deep learning (DL) models to the edge devices (EDs) for realizing automatic modulation classification (AMC). In this paper, a lightweight neural network for decentralized learning-based automatic modulation classification (DecentAMC) method is proposed. Specifically, group convolutional neural network (GCNN) is designed by replacing the standard convolution layer with the group convolution layer, replacing the flatten layer with the global average pooling (GAP) layer and removing part of fully connected layers. DecentAMC method is achieved by the cooperation in which multiple EDs update and upload the model weight to a central device (CD) for model aggregation to avoid the data privacy disclosure. Experimental results show that the proposed GCNN-based DecentAMC method can improve training efficiency to about 4 times and 57 times than that of GCNN-based centralized AMC (CentAMC) and CNN-based DecentAMC respectively. GCNN-based DecentAMC method can effectively reduce the communication cost and save storage of EDs when compared with CNN-based DecentAMC. Meanwhile, the time complexity and the space complexity of GCNN is significantly decreased when compared with CNN and SCNN, which is suitable to be deployed in EDs.

Yibin Zhang, Yang Peng, B. Adebisi, Guan Gui, H. Gačanin, H. Sari

The fast development of intelligent wireless communications enables many devices to access various networks. It often leads to the security risks of malicious access of illegal devices. To ensure a secure and reliable wireless access, it is necessary to identify illegal devices and prevent their attacks accurately. To improve the performance of specific emitter identification (SEI), this paper proposes a multi-scale convolution neural network (MSCNN) based on convolution layers of three branches with different convolution kernel sizes. MSCNN extracts radio frequency fingerprints (RFF) in three receptive fields through different convolution kernels. We verify the identification accuracy using the RF signals conforming to long term evolution (LTE) standard. The experimental results show that our proposed MSCNN-based SEI method can improve the absolute accuracy by 15% and the relative accuracy by 22% in perfect communication environment. In addition, we verify the robustness of proposed MSCNN by comparing identification performance in imperfect environment. Simulation results show that the proposed MSCNN can extract more hidden features through convolution kernels of different sizes, and thus achieves better SEI performance than existing methods.

Xixi Zhang, Haitao Zhao, Hongbo Zhu, B. Adebisi, Guan Gui, H. Gačanin, F. Adachi

Automatic modulation recognition (AMR) technique plays an important role in the identification of modulation types of unknown signal of integrated sensing and communication (ISAC) systems. Deep neural network (DNN) based AMR is considered as a promising method. Considering the complexity of a typical ISAC system, devising the DNN manually with limited knowledge of its various classifications will be very tasking. This paper proposes a neural architecture search (NAS) based AMR method to automatically adjust the structure and parameters of DNN and find the optimal structure under the combination of training and constraints. The proposed NAS-AMR method will improve the flexibility of model search and overcome the difficulty of gradient propagation caused by the non-differentiable quantization function in the process of back propagation. Simulation results are provided to confirm that the proposed NAS-AMR method can identify the modulation types in various ISAC electromagnetic environments. Furthermore, compared with other fixed structure networks, our proposed method delivers the highest recognition accuracy, under the condition of low parameters and floating-point operations (FLOPs).

Jie Zhou, Yang Peng, Guan Gui, Yun Lin, B. Adebisi, H. Gačanin, H. Sari

Radio frequency fingerprint (RFF) is regarded as a key technology in physical layer security in various wireless communications systems. Deep learning (DL) has achieved great success in the field of signal identification, particularly in improving performance and eliminating manual feature extraction. However, the training cost of these DL-based methods is usually large. It is unwise to retrain the network with whole data when it comes to new data. Therefore, we propose a novel RFF identification method based on incremental learning (IL), which uses continuous data stream to update the identification model, constantly. Experimental results show that with the increase of increment times, the accuracy of the proposed IL-based method gradually approaches the performance of joint training, and finally reaches 96.79%, which is only 1.9% lower than the performance upper bound.

Yuxin Ji, Xixi Zhang, Yu Wang, H. Gačanin, H. Sari, F. Adachi, Guan Gui

To address the problem of spectrum resources and transmitting power for vehicular networks, this paper proposes a resource allocation (RA) method based on dueling double deep-Q network (D3QN) reinforcement learning (RL). Due to the high mobility of the vehicle, the channel changes rapidly which makes it difficult to accurately collect high-accuracy channel state information at the base station and to perform centralized management. In response of this difficulty, we construct a multi-intelligence model, using Manhattan Grid Layout City Model as the basis of environment and with each vehicle-to-vehicle (V2V) link as an intelligence. They work together to interact with the environment, receive appropriate observations, get rewards, and finally learn to improve the allocation of power and spectrum to enable users to achieve a better entertainment experience and a safer driving environment. Experimental results demonstrate that with proper training mechanism and reward function construction, cooperation among multiple intelligence can be performed in a distributed manner, with improvements in both the capacity of total vehicle-to-infrastructure links and the effective payload delivery success rate of the V2V links compared to common Q-network.

Hanyi Guo, Xixi Zhang, Yu Wang, B. Adebisi, H. Gačanin, Guan Gui

Malware traffic classification (MTC) is a very important component of cyber security, and a number of the MTC techniques are based on deep learning (DL) with a strong capability of feature mining and classification. However, these DL-based MTC methods are heavily dependent on a large amount of network traffic samples. In the few-shot scenarios, these methods usually overfit and have poor classification performance. Considering that the update cycle of malware is faster and faster, and there are more and more types of malware, collecting enough training samples for all malware is very challenging, if not impossible. In this paper, a novel few-shot MTC(FS-MTC) method is proposed based on convolutional neural network (CNN) and model-agnostic meta-learning (MAML) algorithm. Specifically, the CNN is trained on samples from normal softwares by MAML rather than the conventional optimization methods, then the CNN is finetuned by a few samples from malware for MTC. Simulation results show that our proposed MAML-based FS-MTC can outperform the traditional MTC methods. The performance of our proposed method can reach up to 95.69%.

Xue Fu, Yu Wang, Yun Lin, Guan Gui, H. Gačanin, F. Adachi

Specific emitter identification (SEI) is developed as a potential technology against attackers in cognitive radio networks and authenticate devices in Internet of Things (IoT). It refers to a process to discriminate individual emitters from each other by analyzing extracted characteristics from given radio signals. Due to the strong capability of deep learning (DL) in extracting the hidden features of data and making classification decision, deep neural networks (DNNs) have been widely used in the SEI. Considering the insufficiently labeled training dataset and large unlabeled training dataset, we propose a novel SEI method using semi-supervised (SS) learning framework, i.e., metric-adversarial training (MAT). Specifically, two object functions (i.e., cross-entropy (CE) loss combined with deep metric learning (DML) and CE loss combined with virtual adversarial training (VAT)) and an alternating optimization way are designed to extract discriminative and generalized semantic features of radio signals. The proposed MAT-based SS-SEI method is evaluated on an open source large-scale real-world automatic-dependent surveillance-broadcast (ADS-B) dataset. The simulation results show that the proposed method achieves a better identification performance than four latest SS-SEI methods.

Yuting Gu, Yu Wang, B. Adebisi, Guan Gui, H. Gačanin, Hikmet Sari

Blind signal recognition (BSR) is a significant research topic in the field of intelligent signal processing. However, existing BSR of space-time block codes (STBC) mainly depends on conventional algorithms, which require priori information and can only identify a relatively limited amount of STBC. Although deep learning (DL) has been widely used in signal recognition, so far there are few studies on BSR of STBC in multiple-input multiple-output (MIMO) systems using DL. In this paper, a blind recognition approach for STBC based on multichannel convolutional neural network (MCNN) is proposed. By leveraging the structure of multiple input channel, the in-phase and quadrature (IQ) channel information of STBC signals can be comprehensively extracted. Simulation results demonstrate that the proposed algorithm extends the recognizable STBC codes to 6, and can also improve the recognition accuracy in comparison to traditional convolutional neural network (CNN). The model proposed in this paper has been validated with two datasets and experimentally proved to be well generalized.

Yibin Zhang, Jinlong Sun, Guan Gui, Yun Lin, H. Gačanin, F. Adachi

The potential advantages of intelligent wireless communications with millimeter wave (mmWave) and massive multiple-input multiple-output (MIMO) are based on the availability of instantaneous channel state information (CSI) at the base station (BS). However, no existence of channel reciprocity leads to the difficult acquisition of accurate CSI at the BS in frequency division duplex (FDD) systems. Many researchers explored effective architectures based on deep learning (DL) to solve this problem and proved the success of DL-based solutions. However, existing schemes focused on the acquisition of complete CSI while ignoring the beamforming and precoding operations. In this paper, we propose an intelligent channel feedback architecture using eigenmatrix and eigenvector feedback neural network (EMEVNet). With the help of the attention mechanism, the proposed EMEVNet can be considered as a dual channel auto-encoder, which is able to jointly encode the eigenmatrix and eigenvector into codewords. Simulation results show great performance improvement and robustness with extremely low overhead of the proposed EMEVNet method compared with the traditional DL-based CSI feedback methods.

Xiaohu Xu, Yifei Liang, Xixi Zhang, Yu Wang, Yun Lin, B. Adebisi, H. Gačanin, Guan Gui

Malware detection is an important step in network security. Traditional malware detection methods suffer from the ability to learn, understand, process, and apply characteristics of network traffic data accurately, and in a relatively short space of time. It also cannot learn new tasks without forgetting the old tasks. In this paper, we propose a self-evolving malware detection (SEMD) method using network traffic and incremental learning. Incremental learning (IL) method is one of the important methods in deep learning, which can learn new tasks without forgetting the old tasks. Its loss function draws lessons from the idea of knowledge distillation. Experimental results show that the proposed method can recognize both old tasks and new tasks (overcoming the problem of catastrophic network forgetting). The performance of the proposed SEMD method is also better than the general method of incremental learning without self-evolving.

Xiaoyi Hu, Jin Ning, Jie Yin, Jie Yang, B. Adebisi, H. Gačanin

The proliferation of mobile communication systems, arrival of high-speed broadband networks and more complex network topologies have exacerbated cyber-threats. Cyber-warfare has become an aspect of modern war-fare that can no longer be overlooked. In recent years, network intrusions launched using the Internet have seriously undermined the security systems of many nations. Classifying malicious network traffic is the first step in network intrusion detection. In this paper, we propose three models using semi-supervised learning-based malicious traffic classification (MTC) methods that effectively improve the classification of traffic using a small proportion of labeled traffic data. Employing three different deep neural networks as feature extraction networks respectively, the proposed models use transductive transfer learning and domain adaptive ideas, and ladder networks as classification layers. Experimental results are provided to validate the proposed methods.

W. Yan, Wanming Hao, Chongwen Huang, Gangcan Sun, O. Muta, H. Gačanin, Chau Yuen

Reconfigurable intelligent surface (RIS)-aided terahertz (THz) communications have been regarded as a promising candidate for future 6G networks because of its ultra-wide bandwidth and ultra-low power consumption. However, there exists the beam split problem, especially when the base station (BS) or RIS owns the large-scale antennas, which may lead to serious array gain loss. Therefore, in this paper, we investigate the beam split and beamforming design problems in the THz RIS communications. Specifically, we first analyze the beam split effect caused by different RIS sizes, shapes and deployments. On this basis, we apply the fully connected time delayer phase shifter hybrid beamforming (FC-TD-PS-HB) architecture at the BS and deploy distributed RISs to cooperatively mitigate the beam split effect. We aim to maximize the achievable sum rate by jointly optimizing the hybrid analog/digital beamforming, time delays at the BS and reflection coefficients at the RISs. To solve the formulated problem, we first design the analog beamforming and time delays based on different RISs’ physical directions, and then it is transformed into an optimization problem by jointly optimizing the digital beamforming and reflection coefficients. Next, we propose an alternatively iterative optimization algorithm to deal with it. Specifically, for given the reflection coefficients, we propose an iterative algorithm based on the minimum mean square error technique to obtain the digital beamforming. After, we apply Lagrangian dual reformulation (LDR) and multidimensional complex quadratic transform (MCQT) methods to transform the original problem to a quadratically constrained quadratic program, which can be solved by alternating direction method of multipliers (ADMM) technique to obtain the reflection coefficients. Finally, the digital beamforming and reflection coefficients are obtained via repeating the above processes until convergence. Simulation results verify that the proposed scheme can effectively alleviate the beam split effect and improve the system capacity.

Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više