面向多址MIMO的协作干扰策略研究
项目来源
项目主持人
项目受资助机构
项目编号
立项年度
立项时间
项目级别
研究期限
受资助金额
学科
学科代码
基金类别
关键词
参与者
参与机构
项目受资助省
项目结题报告(全文)
1.Communication-Efficient Federated Learning Based on Dynamic Gradient Compression and Client Selection
- 关键词:
- Data privacy;Federated learning;Learning systems;Machine learning;Client selection;;Communication cost;Data privacy and securities;Distributed machine learning;Dynamic gradient compression;Federated learning;;Global models;Learning paradigms;ON dynamics;Sparsification
- Wang, Yuxiang;Ma, Chunmei
- 《2nd International Conference on Computer, Internet of Things and Smart City, CIoTSC 2024》
- 2025年
- December 27, 2024 - December 29, 2024
- Nanchang, China
- 会议
Federated Learning is a distributed machine learning paradigm designed to protect data privacy and security while allowing multiple participants to collaboratively train a shared global model without uploading their data to a central server. Modern machine learning models often consist of millions of parameters, resulting in significant computational complexity and a heavy communication burden during the collection and distribution of training data. This becomes a key bottleneck that limits the effectiveness of federated learning. In order to reduce communication costs, we first propose the CS client selection strategy, which integrates model performance and fairness to construct scheduling priority metrics. Client selection is then carried out based on these metrics. And then, we propose a dynamic gradient sparsification algorithm that adjusts the level of sparsification applied to gradient updates for each client, ensuring that every client uploads a suitably compressed update. Finally, we conduct comprehensive experiments and the experimental results show that the method proposed in this paper can effectively reduce communication costs while ensuring model accuracy. © 2024 Copyright held by the owner/author(s).
...2.Distributed and Personalized Federated Learning inWireless Ad Hoc Networks
- 关键词:
- Ad hoc networks;Adversarial machine learning;Data statistics;Decentralised;Dynamic changes;Heterogeneous devices;In networks;Local model;Machine leaning;Model aggregations;Network topology;Wireless ad-hoc networks
- Huang, Baogui;Wang, Bei;Li, Xiangqian;Ma, Chunmei;Li, Guangshun;Lai, Qingliang
- 《18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024》
- 2025年
- June 21, 2024 - June 23, 2024
- Qingdao, China
- 会议
This paper studies the difficult task of designing federated learning algorithms tailored for wireless ad hoc networks. Federated learning in such networks presents numerous challenges, including signal interference, decentralized infrastructure, dynamic changes in network topology, heterogeneous devices, and diverse data statistics. In response to these challenges, this paper proposes a fully distributed and personalized federated learning algorithm specifically designed for wireless ad hoc networks, named ADDPFed. ADDPFed tackles the issue of wireless interference by leveraging non-orthogonal multiple access technology and successive interference cancellation for enhancing overall communication efficiency. Another key strength of ADDPFed lies in its ability to enable direct local model exchanges among neighboring clients, eliminating the need for central server coordination for model aggregation. For the model aggregation, ADDPFed first calculates the distance between local models using the Tonimoto coefficient, and then assigns suited aggregation weights to these models. This approach emphasizes the contribution of similar models to the global model, effectively tackling the issue of data statistical heterogeneity. Extensive experiments validate the effectiveness of ADDPFed, paving the way for enhanced collaborative and distributed learning paradigms in wireless ad hoc networks. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
...3.Trustworthy andIncentivized Federated Learning Based onBlockchain
- 关键词:
- Adversarial machine learning;Differential privacy;Block-chain;Byzantine attacks;Central servers;Communication cost;Incentive mechanism;Local data;Poisoning attacks;Privacy protection;Single point;Train model
- Ma, Chunmei;Chen, Haonan;Li, Xiangqian;Wang, Yuxiang;Li, Guangshun;Huang, Baogui
- 《20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024》
- 2025年
- December 7, 2024 - December 8, 2024
- Haikou, China
- 会议
Federated learning enables users to train models without transmitting local data to central servers, preserving data privacy and reducing communication costs. However, federated learning also faces various challenges, such as single point of failure issue, byzantine attack, and a lack of incentive mechanism. In this paper, a trustworthy and incentivized federated learning framework is proposed. Firstly, a blockchain network is used as a substitute for the central server in federated learning, addressing the vulnerability of servers to attacks and dishonesty. Secondly, a multi-key homomorphic encryption mechanism is introduced to safeguard the privacy of local models. Furthermore, to address the challenge of detecting malicious models within encrypted models, this paper proposes a verification mechanism based on the cosine similarity of group models. Finally, this paper evaluates the contributions of multiple participants using Shapley Value. This process effectively coordinates and distributes the interests of multiple participants, ultimately incenting more users to engage in federated learning. Experimental results demonstrate that the framework proposed in this paper can still converge and maintain good training accuracy even in the presence of attacks. © IFIP International Federation for Information Processing 2025.
...4.Secure Ultra-reliable and Low Latency Communication in NOMA-UAV Networks
- 关键词:
- 5G mobile communication systems;Antennas;Electric power transmission;Network layers;Network security;Unmanned aerial vehicles (UAV);Aerial vehicle;Line-of-sight links;Low-latency communication;Multiple access;Non-orthogonal;Physical layer security;Secrecy rate maximization;Ultra-reliable and low-latency communication;Unmanned aerial vehicle and non-orthogonal multiple access;Wireless channel
- Zhao, Xiao;Yu, Kan;Li, Dong;Liu, Xiaowu;Luo, Chuanwen
- 《19th International Conference on Mobility, Sensing and Networking, MSN 2023》
- 2023年
- December 14, 2023 - December 16, 2023
- Jiangsu, China
- 会议
Ultra-reliable and low-latency communication (uRLLC) plays an important role in the development of 5G-advanced and 6G wireless networks. Combining unmanned aerial vehicles (UAVs) with non-orthogonal multiple access (NOMA) offers a promising solution to achieve improved reliability and lower latency. This is made possible by enabling line-of-sight (LoS) links and concurrent transmissions through the use of UAVs and NOMA, respectively. However, because of the inherent openness of wireless channel, uRLLC faces the security challenges against being eavesdropped. Physical Layer Security (PLS) has been proposed as an efficient method to secure uRLLC, since it uses only the properties of wireless channels (such as fading, interference, and noise). Although the potential benefits of NOMA-UAV provide a better coverage for ground users, it remains a significant challenge since it may provide a LoS link to eavesdroppers. Therefore, in this paper, we investigate the security and reliability performance of UAV and NOMA based uRLLC scenario, under which UAV serves two different types of users with different needs, i.e., secret users and public users. By using stochastic geometry tools, we derive the closed-form expression of the secrecy rate, an important metric in the study of PLS. Additionally, the secure performance is enhanced by maximizing the secrecy rate through optimizing the hovering height and power assignment of UAV. It should be noted that the hovering position is optimized via power allocation when there is only one secret user. Evaluations demonstrate the effectiveness and correctness of our theoretical analysis. © 2023 IEEE.
...5.Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process
- 关键词:
- Bitcoin;Markov processes;Block-chain;Computing power;Decentralised;Low bound;Markov Decision Processes;Mining problems;Selfish mining;Stubborn mining
- Zhang, Yiting;Liu, Ming;Guo, Jianan;Wang, Zhaojie;Wang, Yilei;Liang, Tiancai;Singh, Sunil Kumar
- 《4th International Conference on Machine Learning for Cyber Security, ML4CS 2022》
- 2023年
- December 2, 2022 - December 4, 2022
- Guangzhou, China
- 会议
As one of the most popular cryptocurrencies, Bitcoin is essentially a decentralized ledger. Each node maintains the security of the blockchain through the workload proof mechanism, and the block that obtains the accounting right will receive a block reward in the form of Bitcoin. Because the Bitcoin system follows the "longest legal chain" principle, when a fork occurs, orphan blocks will inevitably be generated, and some miners’ computing power will be a waste. In recent years, researchers have discovered that miners can obtain profits disproportionate to their own computing power by deviating from Bitcoin’s honest mining. Selfish Mining (SM1) is a case in dishonest mining strategy, and dishonest miners (attackers) can obtain higher returns by retaining the blocks they create and selectively delaying their release. The stubborn mining strategy is a generalized form of selfish mining. It increases the revenue of the stubborn miner by adopting a wider range of parameters. Its three mining strategies are: Lead-Stubborn, Equal Fork stubborn and Trail stubborn. The mining problem can be formulated as a Markov Decision Process (MDP), which can be resolved to give the optimal mining strategy. This work describes the three mining strategies of stubborn mining as a Markov decision process, solves it and gives the lower bound of the highest return under the optimal stubborn mining strategy. Our experimental results demonstrate that the revenue of the optimal stubborn mining strategy is higher than SM1 under certain circumstances, and this strategy allows dishonest miners (stubborn miners) to obtain revenue that does not match the actual computing power paid. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
...6.PAMP: A New Atomic Multi-Path Payments Method with Higher Routing Efficiency
- 关键词:
- Atoms;Channel capacity;Efficiency;Network routing;Atomic multi-path payment;Block-chain;Channel network;Channel's capacity;Multipath;Network techniques;Payment channel network;Payment methods;Routing efficiency;Transaction throughput
- Guo, Jianan;Shang, Lei;Wang, Yilei;Liang, Tiancai;Wang, Zhaojie;An, Hui
- 《4th International Conference on Machine Learning for Cyber Security, ML4CS 2022》
- 2023年
- December 2, 2022 - December 4, 2022
- Guangzhou, China
- 会议
The payment channel networks (PCN) technique effectively improves the transaction efficiency of a blockchain system, further promotes its practical application. Atomic Multi-Path Payments (AMP) are usually used, in payment channel networks, to divide transactions to improve routing efficiency, thereby improving the transaction throughput. Improper transaction division, however, may increase the occurrence of routing failure. Therefore, how to perform efficient transaction partitioning is an urgent problem to be solved. In this work, we propose an improved transaction partition method, named Proportional Atomic Multi-Path Payments (PAMP), which can enhance the efficiency of transaction routing. The key insight of PAMP is that, when a transaction is executed, the trade share can be well divided by the remaining capacity in multiple channels, which can greatly improve the routing efficiency and maintain the balance of channel capacity in the network. Simulation results show that, in contrast to traditional routing algorithms, the transaction success rate is increased by 2.3%, and the average execution time is reduced by 75.09 ms. PAMP improves the transaction routing efficiency, and also promotes the balance of network channel capacity. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
...7.Communication-Efficient Personalized Federated Learning on Non-IID Data
- 关键词:
- Cloud computing;Cost reduction;Learning systems;Cloud servers;Communication cost;Communication resources;Distributed machine learning;Federated learning;IID data;Learning paradigms;Non-IID;Personalized;Personalized model
- Li, Xiangqian;Ma, Chunmei;Huang, Baogui;Li, Guangshun
- 《19th International Conference on Mobility, Sensing and Networking, MSN 2023》
- 2023年
- December 14, 2023 - December 16, 2023
- Jiangsu, China
- 会议
In this paper, we explore the challenges associated with federated learning, a distributed machine learning paradigm that promotes collaborative model training while preserving the privacy of local client data. One significant hurdle is the non-IID nature of clients' data, alongside limited communication resources between clients and the cloud server. These statistical heterogeneity and communication resource limitations pose practical obstacles to the implementation of federated learning. To address these challenges, we propose a communication-efficient framework called GCPFL for personalized federated learning. Our framework empowers individual clients to train personalized models while substantially reducing communication costs. Specifically, each client compresses the gradient before uploading it and handles the effects of gradient compression through an error correction process. By uploading only the compressed gradients, the communication costs are significantly diminished. On the cloud server side, the received gradients are recovered into models, and similarity aggregation is performed on these models to facilitate collaboration among clients. Once the aggregated models are received, clients conduct local updates to acquire personalized models. Extensive experimental results illustrate that the GCPFL algorithm not only achieves high model accuracy but also substantially reduces communication costs compared to existing methods. © 2023 IEEE.
...8.Equitable Consensus: A PoS Mechanism based on Group Polynomial Election
- 关键词:
- Blockchain;% reductions;A-stable;Block-chain;Calculation results;Fairness;Generation right;Gini coefficients;High probability;Mechanism-based;Selection methods
- Zhang, Mingyue;Li, Chunmei;Zhang, Yiting;Liu, Ming;Wang, Yilei
- 《2023 International Conference on Data Security and Privacy Protection, DSPP 2023》
- 2023年
- October 16, 2023 - October 18, 2023
- Xi'an, China
- 会议
PoS is a consensus mechanism where the probability of generating a block is directly proportional to a participant's stake, but block generation rights concentrated in rich participants can lead to unfairness. Existing solutions mainly use linear consensus mechanisms where block generation rights are linked to the stake, but since these solutions fail to extend block generation rights to the majority of participants, compounding may occur. To address the problem, we propose a block producer selection method that extends block generation rights, called Grouped Polynomial Elections-based PoS (GPE-PoS). Specifically, GPE-PoS groups participants with similar stakes into independent groups, and performs polynomial calculations on the nodes in each group. Then GPE-PoS calculates the probability of block generation for each participant based on the polynomial calculations results and selects the participant with the highest probability as the block producer. At the same time, the Gini coefficient is used to measure the fairness of the blockchain system, where a Gini coefficient closer to 0 indicates higher fairness. Simulation results show that compared to linear consensus mechanisms based on stake, GPE-PoS has a stable Gini coefficient of around 0.1, which is an 83.33% reduction compared to traditional PoS. © 2023 IEEE.
...9.Blockchain-based Secure Medical Data Management and Disease Prediction
- Wang, Meiquan ; Zhang, Huiru ; Wu, Haoyang ; Li, Guangshun ; Gai, Keke
- 《BSCI 2022 - Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure》
- 2022年
- 会议
10.Speech Enhancement Generative Adversarial Network Architecture with Gated Linear Units and Dual-Path Transformers
- 关键词:
- Benchmarking;Convolution;Convolutional neural networks;Decoding;Deep learning;Discrete cosine transforms;Frequency domain analysis;Learning systems;Network architecture;Signal encoding ;Speech enhancement;De-noising;Deep learning;Dual path;Due-path transformer;Gated linear unit;Generative adversarial network;Linear units;Phase denoising;Real part;Time frequency domain
- Zhang, Dehui;Dong, Anming;Yu, Jiguo;Cao, Yi;Zhang, Chuanting;Zhou, You
- 《2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022》
- 2022年
- October 9, 2022 - October 12, 2022
- Prague, Czech republic
- 会议
Generative Adversarial Networks (GANs) have been used in the field of speech enhancement due to their huge potentials in reducing the noise mixed in the signals. Most of existing GAN-based speech enhancement approaches either operate on time domain or exploit the magnitude spectra in time-frequency domain, but lack consideration of direct optimization of the phase. In this paper, we propose a GAN architecture for speech enhancement based on gated linear units (GLUs) and Dual-Path Transformers (DPTs), which simultaneously deals with the amplitude and phase information on the time-frequency domain. The generator of the proposed GAN architecture is designed following an autoencoder structure fed by the real and imaginary parts of the time-frequency frames. The encoder of the generator is constructed by multiple cascaded convolutional GLUs (ConvGLUs), while the decoder consists of two groups of cascaded deconvolutional GLUs (DeconvGLUs), one for the real part of the spectrogram and the other for the imaginary part. The GLUs are adopted since they are potential in avoiding the gradient vanishing issue dwelling in deep architectures by providing a linear path for the gradients while retaining non-linear capabilities. Aiming at capturing the long-range dependent features in speech, we place DPTs between the encoder and the decoder of the generator, which contains multi-head attention modules and Bi-directional Gated Recurrent Units (BiGRUs). Moreover, the DPT structure is also merged with multiple one-dimensional convolutional layers in the discriminator of the GAN. Such a design not only improves the speech enhancement performance of GAN by focusing on multiple features of speech, but also reducing the volume of model parameters of GAN. Experimental results suggest that the proposed GAN architecture outperforms the existing benchmark GANs in terms of both objective speech intelligibility and quality with less computational complexity. © 2022 IEEE.
...
