-
-
Surprisingly Popular-Based Adaptive Memetic Algorithm for Energy-Efficient Distributed Flexible Job Shop Scheduling. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-06-08 Rui Li,Wenyin Gong,Ling Wang,Chao Lu,Xinying Zhuang
With the development of the economy, distributed manufacturing has gradually become the mainstream production mode. This work aims to solve the energy-efficient distributed flexible job shop scheduling problem (EDFJSP) while simultaneously minimizing makespan and energy consumption. Some gaps are stated following: 1) the previous works usually adopt the memetic algorithm (MA) with variable neighborhood
-
CNC Machines Integration in Smart Factories using OPC UA J. Ind. Inf. Integr. (IF 11.718) Pub Date : 2023-06-07 André Martins, João Lucas, Hugo Costelha, Carlos Neves
-
Increasing the Robustness of Deep Learning Models for Object Segmentation: A Framework for Blending Automatically Annotated Real and Synthetic Data. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-06-07 Artur Istvan Karoly,Sebestyen Tirczka,Huijun Gao,Imre J Rudas,Peter Galambos
Recent problems in robotics can sometimes only be tackled using machine learning technologies, particularly those that utilize deep learning (DL) with transfer learning. Transfer learning takes advantage of pretrained models, which are later fine-tuned using smaller task-specific datasets. The fine-tuned models must be robust against changes in environmental factors such as illumination since, often
-
Dynamic Threshold Finite-Time Prescribed Performance Control for Nonlinear Systems With Dead-Zone Output. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-06-06 Xin Liu,Huaguang Zhang,Jiayue Sun,Xiyue Guo
This article investigates the tracking control problem for nonlinear systems. An adaptive model is proposed to represent the dead-zone phenomenon and solve its control challenge with a Nussbaum function in conjunction. Drawing inspiration from the existing prescribed performance control schemes, a novel dynamic threshold scheme is developed that fuses a proposed continuous function with a finite-time
-
Large-Scale Data-Driven Optimization in Deep Modeling With an Intelligent Decision-Making Mechanism. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-06-06 Dayu Tan,Yansen Su,Xin Peng,Hongtian Chen,Chunhou Zheng,Xingyi Zhang,Weimin Zhong
This study focuses on building an intelligent decision-making attention mechanism in which the channel relationship and conduct feature maps among specific deep Dense ConvNet blocks are connected to each other. Thus, develop a novel freezing network with a pyramid spatial channel attention mechanism (FPSC-Net) in deep modeling. This model studies how specific design choices in the large-scale data-driven
-
Adaptive Internal Model Control for a Flexible Wing With Unsteady Aerodynamic Loads. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-06-05 Tingting Meng,Yipeng Zhang,Qiang Fu,Wei He
This article proposes adaptive internal model controls for the collocated output regulation of a flexible wing, where distributed disturbances, boundary disturbances, and references are from an exactly unknown exosystem. Observer-based tracking error feedback controls are first designed to address the robust output regulation in case of a known exosystem matrix. If the exosystem has an unknown matrix
-
Fault-Tolerant Fuzzy-Resilient Control for Fractional-Order Stochastic Underactuated System With Unmodeled Dynamics and Actuator Saturation. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-06-01 Yuqing Yan,Huaguang Zhang,Yunfei Mu,Jiayue Sun
This article is considered on underactuated fractional-order stochastic systems (FOSSs) with actuator saturation and incrementally conic nonlinear terms, whose fractional-order α ∈ (0,1). First, to bring FO dynamic signals, solving the unmodeled dynamics, in the meantime, the saturated nonlinear term of the control input is taken into account. At the time, to cope with the stability issue of FOSS under
-
Lifelong Dual Generative Adversarial Nets Learning in Tandem. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-06-01 Fei Ye,Adrian G Bors
Continually capturing novel concepts without forgetting is one of the most critical functions sought for in artificial intelligence systems. However, even the most advanced deep learning networks are prone to quickly forgetting previously learned knowledge after training with new data. The proposed lifelong dual generative adversarial networks (LD-GANs) consist of two generative adversarial networks
-
A Herd-Foraging-Based Approach to Adaptive Coverage Path Planning in Dual Environments. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-31 Junqi Zhang,Peng Zu,Kun Liu,MengChu Zhou
Coverage path planning (CPP) is essential for robotic tasks, such as environmental monitoring and terrain surveying, which require covering all surface areas of interest. As the pioneering approach to CPP, inspired by the concept of predation risk in predator-prey relations, the predator-prey CPP (PPCPP) has the benefit of adaptively covering arbitrary bent 2-D manifolds and can handle unexpected changes
-
Investigating the strategic IT alignment process with a dynamic capabilities view: A multiple case study Inf. Manag. (IF 10.328) Pub Date : 2023-05-29 Claudia Pelletier, Louis Raymond
In the turbulent business environments brought about by the digital age, strategic IT alignment remains at the forefront of managers’ concerns, raising important issues for researchers. One of these issues is to further understand how firms enact their IT alignment processes and what IT and non-IT capabilities are required to support these processes. To understand this issue, we conducted four case
-
Generalized LRS Estimator for Min-Entropy Estimation IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-29 Jiheon Woo, Chanhee Yoo, Young-Sik Kim, Yuval Cassuto, Yongjune Kim
The min-entropy is a widely used metric to quantify the randomness of generated random numbers, which measures the difficulty of guessing the most likely output. It is difficult to accurately estimate the min-entropy of a non-independent and identically distributed (non-IID) source. Hence, NIST Special Publication (SP) 800-90B adopts ten different min-entropy estimators and then conservatively selects
-
Guest Editorial: Advanced Intelligent Manufacturing System: Theory, Algorithms, and Industrial Applications IEEE Trans. Ind. Inform. (IF 11.648) Pub Date : 2023-05-24 Qiang Liu, Jialu Fan, Jin-Xi Zhang, Yaochu Jin
Intelligent manufacturing has promoted the development of Industry 4.0 and enabled the manufacturing industry to gradually move into the stage of intelligence with the rapid development of the Internet of Things and the Industrial Internet. An intelligent manufacturing system is a manufacturing system that can automatically adapt to changing environments and varying process requirements with minimal
-
Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems IEEE Trans. Ind. Inform. (IF 11.648) Pub Date : 2023-05-24 A. Brighente, M. Conti, R. Poovendran, J. Zhou
The rapid evolution of technology has radically changed our everyday lives from multiple points of view. Systems and devices are nowadays more interconnected and capable of taking autonomous decisions without or with limited human intervention. Among the others, transportation systems are populated by smart and interconnected vehicles that need to communicate with each other and with critical infrastructures
-
Multiobjective Multitasking Optimization With Decomposition-Based Transfer Selection. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-25 Qiuzhen Lin,Zhongjian Wu,Lijia Ma,Maoguo Gong,Jianqiang Li,Carlos A Coello Coello
Multiobjective multitasking optimization (MTO) needs to solve a set of multiobjective optimization problems simultaneously, and tries to speed up their solution by transferring useful search experiences across tasks. However, the quality of transfer solutions will significantly impact the transfer effect, which may even deteriorate the optimization performance with an improper selection of transfer
-
SAFELearning: Secure Aggregation in Federated Learning With Backdoor Detectability IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-25 Zhuosheng Zhang, Jiarui Li, Shucheng Yu, Christian Makaya
For model privacy, local model parameters in federated learning shall be obfuscated before sent to the remote aggregator. This technique is referred to as secure aggregation . However, secure aggregation makes model poisoning attacks such as backdooring more convenient given that existing anomaly detection methods mostly require access to plaintext local models. This paper proposes a new federated
-
Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-25 Roee Diamant, Stefano Tomasin, Francesco Ardizzon, Davide Eccher, Paolo Casari
With the growing use of underwater acoustic communications and the recent adoption of standards in this field, it is becoming increasingly important to secure messages against eavesdroppers. In this paper, we focus on a physical-layer security solution to generate sequences of random bits (keys) between two devices (Alice and Bob) belonging to an underwater acoustic network (UWAN); the key must remain
-
Cooperative Game-Based Approximate Optimal Control of Modular Robot Manipulators for Human-Robot Collaboration. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-24 Tianjiao An,Yuexi Wang,Guangjun Liu,Yuanchun Li,Bo Dong
Major challenges of controlling human-robot collaboration (HRC)-oriented modular robot manipulators (MRMs) include the estimation of human motion intention while cooperating with a robot and performance optimization. This article proposes a cooperative game-based approximate optimal control method of MRMs for HRC tasks. A harmonic drive compliance model-based human motion intention estimation method
-
An efficient DNN splitting scheme for edge-AI enabled smart manufacturing J. Ind. Inf. Integr. (IF 11.718) Pub Date : 2023-05-24 Himanshu Gauttam, K.K. Pattanaik, Saumya Bhadauria, Garima Nain, Putta Bhanu Prakash
Deep Neural Network (DNN)-based IoT solutions are enabling automation in smart manufacturing. However, the execution of these compute-intensive solutions in real/near-real time is still a challenging issue. Edge-AI solutions utilize the partial computational offloading-based DNN splitting schemes, which employ collaborative computing to minimize the execution time of compute-intensive DNN task(s).
-
Block-Level Knowledge Transfer for Evolutionary Multitask Optimization. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-22 Yi Jiang,Zhi-Hui Zhan,Kay Chen Tan,Jun Zhang
Evolutionary multitask optimization is an emerging research topic that aims to solve multiple tasks simultaneously. A general challenge in solving multitask optimization problems (MTOPs) is how to effectively transfer common knowledge between/among tasks. However, knowledge transfer in existing algorithms generally has two limitations. First, knowledge is only transferred between the aligned dimensions
-
Model-Free Control in Wireless Cyber-Physical System With Communication Latency: A DRL Method With Improved Experience Replay. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-22 Yifei Qiu,Shaohua Wu,Jian Jiao,Ning Zhang,Qinyu Zhang
This article explores the model-free remote control problem in a wireless networked cyber-physical system (CPS) composed of spatially distributed sensors, controllers, and actuators. The sensors sample the states of the controlled system to generate control instructions at the remote controller, while the actuators maintain the system's stability by executing control commands. To realize the control
-
Pseudo-Label Noise Prevention, Suppression and Softening for Unsupervised Person Re-Identification IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-22 Haijian Wang, Meng Yang, Jialu Liu, Wei-Shi Zheng
Unsupervised person re-identification (ReID), including fully unsupervised ReID and unsupervised domain adaptive ReID, remains a challenge for the fields of biometrics and computer vision due to its difficulty in learning with unlabeled target domain data. Existing state-of-the-art methods, most of which generate pseudo-labels via unsupervised clustering for model optimization, are inevitably hampered
-
The Art of Defense: Letting Networks Fool the Attacker IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-22 Jinlai Zhang, Yinpeng Dong, Minchi Kuang, Binbin Liu, Bo Ouyang, Jihong Zhu, Houqing Wang, Yanmei Meng
3D perception of objects is critical for many real-world applications, such as autonomous cars and robots. Among them, most state-of-the-art (SOTA) 3D perception systems are based on deep learning models. Recently, the research community found that 3D object classifiers on point cloud based on deep learning are easily fooled by adversarial point cloud craft by attackers. To overcome this, adversarial
-
Survivability Analysis of IoT Systems Under Resource Exhausting Attacks IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-22 Roberto Pietrantuono, Massimo Ficco, Francesco Palmieri
Essential services in an Internet of Things (IoT)-based critical system should be continuously provided even when undesirable events like failures, attacks, and emergencies happen. In this work, we analyze the system’s ability to survive failures that are caused by resource exhaustion attacks. Such ability to survive means that the system’s services should be provided in compliance with the associated
-
Special Issue on Green IoT for Future Space–Air–Ground–Ocean-Integrated Networks and Applications IEEE Internet Things J. (IF 10.238) Pub Date : 2023-05-17 Bo Rong, Mohamed Cheriet, Jon Montalban, Lei Shu, Yi Qian
The Internet of Things (IoT) plays a critical role in enabling the seamless integration of disparate devices. Future IoT will rapidly expand its coverage to offer future worldwide omnipresent applications and services by merging communications in diverse spatial domains to build the space–air–ground–ocean-integrated network (SAGOI-Net). SAGOI-Net will include a significant number of battery-powered
-
Multitask Image Clustering via Deep Information Bottleneck. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-17 Xiaoqiang Yan,Yiqiao Mao,Mingyuan Li,Yangdong Ye,Hui Yu
Multitask image clustering approaches intend to improve the model accuracy on each task by exploring the relationships of multiple related image clustering tasks. However, most existing multitask clustering (MTC) approaches isolate the representation abstraction from the downstream clustering procedure, which makes the MTC models unable to perform unified optimization. In addition, the existing MTC
-
Jamming the Relay-Assisted Multi-User Wireless Communication System: A Zero-Sum Game Approach IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-17 Bai Shi, Huaizong Shao, Jingran Lin, Shenglan Zhao, Shafei Wang
Recently, various wireless Internet-of-Things devices and unmanned aerial vehicles have been frequently used to facilitate daily life. On the other hand, they can also pose serious threats to public security if maliciously used. A countermeasure against these threats is to transmit jamming signals to break the communication links between attacker and wireless devices. However, this is not easy since
-
Noncoherent Massive MIMO With Embedded One-Way Function Physical Layer Security IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-17 Yuma Katsuki, Giuseppe Thadeu Freitas de Abreu, Koji Ishibashi, Naoki Ishikawa
We propose a novel physical layer security scheme that exploits an optimization method as a one-way function. The proposed scheme builds on nonsquare differential multiple-input multiple-output (MIMO), which is capable of noncoherent detection even in massive MIMO scenarios and thus resilient against risky pilot insertion and pilot contamination attacks. In contrast to conventional nonsquare differential
-
Fixed-Time Control for a Flexible Smart Structure With Actuator Failure: A Broad Learning System Approach. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-16 Donghao Zhang,Linghuan Kong,Wei He,Xinbo Yu
This article proposes an adaptive fault-tolerant control (AFTC) approach based on a fixed-time sliding mode for suppressing vibrations of an uncertain, stand-alone tall building-like structure (STABLS). The method incorporates adaptive improved radial basis function neural networks (RBFNNs) within the broad learning system (BLS) to estimate model uncertainty and uses an adaptive fixed-time sliding
-
Asymptotic Tracking Control With Bounded Performance Index for MIMO Systems: A Neuroadaptive Fault-Tolerant Proportional-Integral Solution. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-16 Zhen Gao,Yongduan Song,Changyun Wen
It is technically challenging to maintain stable tracking for multiple-input-multiple-output (MIMO) nonlinear systems with modeling uncertainties and actuation faults. The underlying problem becomes even more difficult if zero tracking error with guaranteed performance is pursued. In this work, by integrating filtered variables into the design process, we develop a neuroadaptive proportional-integral
-
Efficient and Effective Tree-based and Neural Learning to Rank Found. Trends Inf. Ret. (IF 13.286) Pub Date : 2023-5-14 Sebastian Bruch, Claudio Lucchese, Franco Maria Nardini
As information retrieval researchers, we not only develop algorithmic solutions to hard problems, but we also insist on a proper, multifaceted evaluation of ideas. The literature on the fundamental topic of retrieval and ranking, for instance, has a rich history of studying the effectiveness of indexes, retrieval algorithms, and complex machine learning rankers, while at the same time quantifying their
-
Resampling Estimation Based RPC Metadata Verification in Satellite Imagery IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-15 Chandrakanth Gudavalli, Michael Goebel, Tejaswi Nanjundaswamy, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath
Recent advances in machine learning and computer vision have made it simple to manipulate a variety of media, including satellite images. Most of the commercially available satellite images go through the process of orthorectification to remove potential distortions due to terrain variations. This orthorectification process typically involves the use of rational polynomial coefficients (RPC) that geometrically
-
Logistics-involved task scheduling in cloud manufacturing with offline deep reinforcement learning J. Ind. Inf. Integr. (IF 11.718) Pub Date : 2023-05-08 Xiaohan Wang, Lin Zhang, Yongkui Liu, Chun Zhao
As an application of industrial information integration engineering (IIIE) in manufacturing, cloud manufacturing (CMfg) integrates enterprises’ manufacturing information and provides an open and sharing platform for processing manufacturing tasks with distributed manufacturing services. Assigning tasks to manufacturing enterprises in the CMfg platform calls for effective scheduling algorithms. In recent
-
Cloud manufacturing architectures: State-of-art, research challenges and platforms description J. Ind. Inf. Integr. (IF 11.718) Pub Date : 2023-05-13 Santiago Chiappa, Emiliano Videla, Víctor Viana-Céspedes, Pedro Piñeyro, Daniel Alajandro Rossit
The increasing incorporation of digital technologies in industrial systems in recent years, and their corresponding connection to the Internet of Things, has made it possible to offer production services through the cloud, giving rise to the Cloud Manufacturing production paradigm. This paradigm allows customers and production service providers to meet on a virtual platform, and from there, to generate
-
Rapid Adaptation for Active Pantograph Control in High-Speed Railway via Deep Meta Reinforcement Learning. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-12 Hui Wang,Zhigang Liu,Zhiwei Han,Yanbo Wu,Derong Liu
Active pantograph control is the most promising technique for reducing contact force (CF) fluctuation and improving the train's current collection quality. Existing solutions, however, suffer from two significant limitations: 1) they are incapable of dealing with the various pantograph types, catenary line operating conditions, changing operating speeds, and contingencies well and 2) it is challenging
-
An Automatic Control Perspective on Parameterizing Generative Adversarial Network. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-12 Jinzhen Mu,Ming Xin,Shuang Li,Bin Jiang
This article presents a new perspective from control theory to interpret and solve the instability and mode collapse problems of generative adversarial networks (GANs). The dynamics of GANs are parameterized in the function space and control directed methods are applied to investigate GANs. First, the linear control theory is utilized to analyze and understand GANs. It is proved that the stability
-
LtRFT: Mitigate the Low-Rate Data Plane DDoS Attack With Learning-To-Rank Enabled Flow Tables IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-12 Dan Tang, Yudong Yan, Chenjun Gao, Wei Liang, Wenqiang Jin
Software-Defined Networking (SDN) switches typically have limited ternary content addressable memory (TCAM) that caches the flow entries on the data plane. The scarcity and strong resource competitiveness of TCAM space put the flow tables at the risk of malicious Distributed Denial-of-Service (DDoS) attacks. In this paper, we propose LtRFT, a Learning-To-Rank (LtR) based scheme for mitigating the low-rate
-
Blockchain Mining With Multiple Selfish Miners IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-12 Qianlan Bai, Yuedong Xu, Nianyi Liu, Xin Wang
This paper studies a fundamental problem regarding the security of blockchain PoW consensus on how the existence of multiple misbehaving miners influences the profitability of selfish mining. Each selfish miner maintains a private chain and makes it public opportunistically for acquiring more rewards incommensurate to his Hash power. We first establish a general Markov chain model to characterize the
-
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-12 Biwen Chen, Tao Xiang, Debiao He, Hongwei Li, Kim-Kwang Raymond Choo
Cloud-assisted electronic health records (EHRs) provide convenient medical services for patients by storing and analyzing medical data records in the cloud, but searching for sensitive data (e.g., identity, medical history) in the cloud conflicts with privacy protection requirements. Searchable encryption (SE) is a good cryptographic primitive for solving this conflict, which allows the user to store
-
Self-Supervised Modality-Aware Multiple Granularity Pre-Training for RGB-Infrared Person Re-Identification IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-12 Lin Wan, Qianyan Jing, Zongyuan Sun, Chuang Zhang, Zhihang Li, Yehansen Chen
RGB-Infrared person re-identification (RGB-IR ReID) aims to associate people across disjoint RGB and IR camera views. Currently, state-of-the-art performance of RGB-IR ReID is not as impressive as that of conventional ReID. Much of that is due to the notorious modality bias training issue brought by the single-modality ImageNet pre-training, which might yield RGB-biased representations that severely
-
Value co-creation for digital innovation: An interorganizational boundary-spanning perspective Inf. Manag. (IF 10.328) Pub Date : 2023-05-07 Yunfei Shi, Tingru Cui, Sherah Kurnia
Despite the enthusiasm for engaging in interorganizational collaboration to enable digital product innovation, firms often face challenges in integrating knowledge across organizational boundaries. Our research examines how collaborating firms use Interorganizational Systems (IOS) tools and project coordinators to overcome knowledge boundaries in different types of ideation tasks. Drawing on boundary-spanning
-
Unlocking the shopping myth: Can smartphone dependency relieve shopping anxiety? – A mixed-methods approach in UK Omnichannel retail Inf. Manag. (IF 10.328) Pub Date : 2023-05-08 Jing (Daisy) Lyu, Ioannis Krasonikolakis, Cheng-Hao (Steve) Chen
Digital technologies have enriched various consumer shopping patterns across multiple contexts and channels. Smartphones, as the most daily dependent device, have altered and assisted individual shopping decisions in omnichannel retailing. Drawing on the uses and gratifications theory, this research investigates emerging smartphone uses and consumers’ corresponding gratifications in shopping centers
-
Practically Predefined-Time Adaptive Fuzzy Tracking Control for Nonlinear Stochastic Systems. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-11 Tianliang Zhang,Shun-Feng Su,Wei Wei,Ruey-Huei Yeh
This article addresses the practically predefined-time adaptive fuzzy tracking control problem of strict-feedback nonlinear stochastic systems, where the system under consideration includes stochastic disturbances and uncertain parameters. First, in this study, practically predefined-time stochastic stabilization (PPSS) in the p th moment sense is introduced, and a Lyapunov-type criterion for PPSS
-
Distributed Multiagent-Based Event-Driven Fault-Tolerant Control of Islanded Microgrids. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-11 Meina Zhai,Qiuye Sun,Rui Wang,Bingyu Wang,Jie Hu,Huaguang Zhang
This article proposes an observer-based event-driven fault-tolerant (OBEDFT) secondary control strategy for AC microgrids (MGs) to achieve load voltage regulation. First, the input-output feedback linearization method transforms the voltage regulation issue into an output feedback tracking problem for linear multiagent systems (MASs) with nonlinear dynamics. This transformation provides the necessary
-
SBHA: Sensitive Binary Hashing Autoencoder for Image Retrieval. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-11 Ting Wang,Su Lu,Jianjun Zhang,Xuyu Liu,Xing Tian,Wing W Y Ng,Wei-Neng Chen
Binary hashing is an effective approach for content-based image retrieval, and learning binary codes with neural networks has attracted increasing attention in recent years. However, the training of hashing neural networks is difficult due to the binary constraint on hash codes. In addition, neural networks are easily affected by input data with small perturbations. Therefore, a sensitive binary hashing
-
State-of-the-art AI-based computational analysis in civil engineering J. Ind. Inf. Integr. (IF 11.718) Pub Date : 2023-05-05 Chen Wang, Ling-han Song, Zhou Yuan, Jian-sheng Fan
With the informatization of the building and infrastructure industry, conventional analysis methods are gradually proving inadequate in meeting the demands of the new era, such as intelligent synchronization and real-time simulation. Artificial intelligence (AI) technology has emerged as a promising alternative due to its high expressiveness, efficiency, and scalability. This has given rise to a new
-
Adversarial Image Color Transformations in Explicit Color Filter Space IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-10 Zhengyu Zhao, Zhuoran Liu, Martha Larson
Deep Neural Networks have been shown to be vulnerable to adversarial images. Conventional attacks strive for indistinguishable adversarial images with strictly restricted perturbations. Recently, researchers have moved to explore distinguishable yet non-suspicious adversarial images and demonstrated that color transformation attacks are effective. In this work, we propose Adversarial Color Filter (AdvCF)
-
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things IEEE Internet Things J. (IF 10.238) Pub Date : 2023-05-05 Antonino Rullo, Elisa Bertino, Kui Ren
The proliferation of IoT devices in everyday life has made their security a critical requirement. Currently, those devices are not secure enough because of several reasons. First, manufacturers do not account much for security, releasing products that are vulnerable to attacks, thus leaving security issues that are unlikely to be resolved. Second, many IoT devices lack the processing power to run antivirus
-
Distributed Discrete-Time Convex Optimization With Closed Convex Set Constraints: Linearly Convergent Algorithm Design. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-09 Meng Luan,Guanghui Wen,Hongzhe Liu,Tingwen Huang,Guanrong Chen,Wenwu Yu
The convergence rate and applicability to directed graphs with interaction topologies are two important features for practical applications of distributed optimization algorithms. In this article, a new kind of fast distributed discrete-time algorithms is developed for solving convex optimization problems with closed convex set constraints over directed interaction networks. Under the gradient tracking
-
Multifactorial Evolutionary Algorithm Based on Diffusion Gradient Descent. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-09 Zhaobo Liu,Guo Li,Haili Zhang,Zhengping Liang,Zexuan Zhu
The multifactorial evolutionary algorithm (MFEA) is one of the most widely used evolutionary multitasking (EMT) algorithms. The MFEA implements knowledge transfer among optimization tasks via crossover and mutation operators and it obtains high-quality solutions more efficiently than single-task evolutionary algorithms. Despite the effectiveness of MFEA in solving difficult optimization problems, there
-
Event-Triggered Impulsive Control for Input-to-State Stabilization of Nonlinear Time-Delay Systems. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-09 Xiaodi Li,Wenlu Liu,Sergey Gorbachev,Jinde Cao
This article investigates the event-triggered impulsive control (ETIC) problem for a class of nonlinear time-delay systems subject to exogenous disturbances. An original event-triggered mechanism (ETM) which utilizes the information of system state and external input is constructed based on Lyapunov function approach. To achieve the input-to-state stability (ISS) of the considered system, some sufficient
-
Distributed Energy-Based Estimation Over Harvesting-Constrained Sensor Networks. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-09 Shuqi Chen,Daniel W C Ho
This article investigates the distributed joint state and fault estimation issue for a class of nonlinear time-varying systems over sensor networks constrained by energy harvesting. It is assumed that data transmission between sensors requires energy consumption, and each sensor can harvest energy from the external environment. A Poisson process models the energy harvested by each sensor, and the sensor's
-
Capabilities and metrics in DevOps: A design science study Inf. Manag. (IF 10.328) Pub Date : 2023-05-09 Ricardo Amaro, Rúben Pereira, Miguel Mira da Silva
Customer demands, competition, regulatory environments, and sophisticated external threats have all increased the importance of DevOps in IT organizations. However, DevOps adoption is still uneven, emphasizing the need to provide management with relevant IS data and insights. Regrettably, there is a measurement inefficiency between these capabilities. To sustain promoting DevOps adoption, Design Science
-
Comprehensive Study in Open-Set Iris Presentation Attack Detection IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-09 Aidan Boyd, Jeremy Speth, Lucas Parzianello, Kevin W. Bowyer, Adam Czajka
Research in presentation attack detection (PAD) for iris recognition has largely moved beyond evaluation in “closed-set” scenarios, to emphasize ability to generalize to presentation attack types not present in the training data. This paper offers multiple contributions to understand and extend the state-of-the-art in open-set iris PAD. First, it describes the most authoritative evaluation to date
-
PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-09 Yang Liu, Debiao He, Qi Feng, Min Luo, Kim-Kwang Raymond Choo
The anonymous credential has broad-ranging applications, for example for the pay-as-you-go strategy in the electronic subscription. However, the ‘plain vanilla’ pay-as-you-go strategy may not be suitable for non-regular users since the latter group is likely to require a tighter identity supervision mechanism. We also note that a key building block in the construction of an anonymous credential system
-
Nonlinear Spiking Neural Systems With Autapses for Predicting Chaotic Time Series. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-08 Qian Liu,Hong Peng,Lifan Long,Jun Wang,Qian Yang,Mario J Perez-Jimenez,David Orellana-Martin
Spiking neural P (SNP) systems are a class of distributed and parallel neural-like computing models that are inspired by the mechanism of spiking neurons and are 3rd-generation neural networks. Chaotic time series forecasting is one of the most challenging problems for machine learning models. To address this challenge, we first propose a nonlinear version of SNP systems, called nonlinear SNP systems
-
A Robot Motion Learning Method Using Broad Learning System Verified by Small-Scale Fish-Like Robot. IEEE Trans. Cybern. (IF 19.118) Pub Date : 2023-05-08 Sheng Xu,Tiantian Xu,Dong Li,Chenguang Yang,Chenyang Huang,Xinyu Wu
The widespread application of learning-based methods in robotics has allowed significant simplifications to controller design and parameter adjustment. In this article, robot motion is controlled with learning-based methods. A control policy using a broad learning system (BLS) for robot point-reaching motion is developed. A sample application based on a magnetic small-scale robotic system is designed
-
Breaking Free From Entropy’s Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-08 Yenlung Lai, Xingbo Dong, Zhe Jin, Massimo Tistarelli, Wun-She Yap, Bok-Min Goi
Biometric cryptosystems present a promising avenue for secure authentication; however, the efficiency and security of such systems can be hindered by errors in biometric data. To address this challenge, existing systems employ error-correction codes, but often fail to consider the distribution of biometric sources, potentially leading to an underestimation of the system’s security. In response to this
-
RAPP: Reversible Privacy Preservation for Various Face Attributes IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-08 Yushu Zhang, Tao Wang, Ruoyu Zhao, Wenying Wen, Youwen Zhu
The tremendous progress in deep learning has enabled to extract soft-biometric attributes from faces, which raises privacy concerns over images collected for face recognition. Advances toward attribute privacy have been able to conceal multiple attributes while preserving identity information but suffer from limitations: they 1) only consider a few soft-biometric attributes and 2) fail to support reversibility
-
Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction IEEE Trans. Inform. Forensics Secur. (IF 7.231) Pub Date : 2023-05-08 Ngoc Duy Pham, Alsharif Abuadbba, Yansong Gao, Khoa Tran Phan, Naveen Chilamkurti
Split learning (SL) enables data privacy preservation by allowing clients to collaboratively train a deep learning model with the server without sharing raw data. However, SL still has limitations such as potential data privacy leakage and high computation for clients. In this paper, we propose to binarize the SL local layers for faster computation (up to 17.5 times less forward-propagation time in