IEEE Access最新文献

筛选
英文 中文
Corrections to “Data-Driven Driving State Control for Unmanned Agricultural Logistics Vehicle” 对“农业无人物流车数据驱动驾驶状态控制”的修正
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-06-03 DOI: 10.1109/ACCESS.2025.3570781
Xuesheng Zhou;sJun Zhou
{"title":"Corrections to “Data-Driven Driving State Control for Unmanned Agricultural Logistics Vehicle”","authors":"Xuesheng Zhou;sJun Zhou","doi":"10.1109/ACCESS.2025.3570781","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3570781","url":null,"abstract":"Presents corrections to the paper, (Corrections to “Data-Driven Driving State Control for Unmanned Agricultural Logistics Vehicle”).","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"94224-94224"},"PeriodicalIF":3.4,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11022718","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144205872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring 5G Backhaul: An In-Band Telemetry Approach for Quality of Service 监控5G回程:一种服务质量的带内遥测方法
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-30 DOI: 10.1109/ACCESS.2025.3565274
Eurico Dias;Duarte Raposo;Miguel Luís;Pedro Rito;Susana Sargento
{"title":"Monitoring 5G Backhaul: An In-Band Telemetry Approach for Quality of Service","authors":"Eurico Dias;Duarte Raposo;Miguel Luís;Pedro Rito;Susana Sargento","doi":"10.1109/ACCESS.2025.3565274","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3565274","url":null,"abstract":"The use of Ultra-Dense Networks within 5G communications can be leveraged by the adoption of Millimeter-Wave (mmWave) technology for the backhaul, resulting in cost reductions and faster deployment of the infrastructure. However, this shift also introduces new concerns and restrictions. The wireless link susceptibility to signal strength and link loss degradation, due to loss of line-of-sight, makes the link quality inconsistent. The heterogeneity of network nodes poses an additional challenge for tracking link quality changes reliably. An effective network monitoring system using 5G Quality of Service (QoS) Indicators is necessary to correctly characterize and track channel and flow quality conditions in a 5G wireless backhaul. To tackle these challenges, we introduce an In-Band Telemetry (INT) approach, consisting of a P4-compatible dataplane model and an aggregation agent capable of gathering and processing per-packet measurements, exposing them as link and QoS flow quality metrics, suitable for integration with Software Defined Network (SDN) environments and 5G networks. Our study compares the accuracy achieved by the proposed in-band solution to a commercial network management system, in an outdoor test-bed with an obstructed mmWave backhaul link. The results demonstrate that this approach exhibits minimal measurement errors when assessing the throughput, latency, and Packet Error Rate (PER) of mmWave links. The solution attains an average forwarding overhead of approximately 17%, while maintaining a per-node aggregation processing total time upper-bound of 45 ms at 2.5 Gbps line rate.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"77990-78006"},"PeriodicalIF":3.4,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10981470","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143925037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Z Packed U-Cell Modular Multilevel Converter for STATCOM Applications 用于STATCOM应用的Z封装u单元模块化多电平转换器
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-30 DOI: 10.1109/ACCESS.2025.3566015
Sandy Atanalian;Fadia Sebaaly;Rawad Zgheib;Kamal Al-Haddad
{"title":"Z Packed U-Cell Modular Multilevel Converter for STATCOM Applications","authors":"Sandy Atanalian;Fadia Sebaaly;Rawad Zgheib;Kamal Al-Haddad","doi":"10.1109/ACCESS.2025.3566015","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3566015","url":null,"abstract":"The Modular Multilevel Converter (MMC) is a promising topology for STATCOM applications due to its key features, such as modularity, scalability, and reduced harmonic content. Increasing the number of voltage levels in MMC reduces harmonics but simultaneously increases the number of submodules (SMs) per arm, leading to larger sizes and higher costs, which presents a challenge. To address this, this article introduces a novel 17-level MMC-STATCOM based on the Z Packed U-Cell (ZPUC) converter as its SM, which enables the generation of more voltage levels with fewer components and reduced harmonic content, offering significant advantages in terms of size and cost. Given the complex structure of the proposed converter and the associated challenges in building a physical prototype, real-time (RT) simulation using FPGA technology is employed for validation. The key contributions include integrating the ZPUC-SM into a three-phase STATCOM for the first time and adapting the converter model and its control system to RT tools, including RT-LAB with an electric hardware solver for FPGA execution. In addition, capacitor voltage balancing and energy sorting algorithms are integrated within Phase-Shift Pulse Width Modulation, eliminating the need for an additional controller while maintaining the floating capacitors of ZPUC-SMs balanced and regulated. The specifications of the proposed converter are defined, the mathematical model and control system are derived, and a real-time implementation based on CPU and FPGA execution is built to verify the scheme. The obtained RT simulation results provide practical evidence confirming the effective operation of the proposed scheme in VAR compensation mode.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"78795-78807"},"PeriodicalIF":3.4,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10981426","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143925255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Endoscopic Navigation for Monocular Depth and Ego-Motion Estimation in Wireless Capsule Endoscopy Through Transformer Network 基于变压器网络的无线胶囊内窥镜单眼深度自动导航及自我运动估计
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-30 DOI: 10.1109/ACCESS.2025.3565749
Junjun Huang;Tianran He;Juan Xu;Weiting Wu;Wei Wu
{"title":"Automatic Endoscopic Navigation for Monocular Depth and Ego-Motion Estimation in Wireless Capsule Endoscopy Through Transformer Network","authors":"Junjun Huang;Tianran He;Juan Xu;Weiting Wu;Wei Wu","doi":"10.1109/ACCESS.2025.3565749","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3565749","url":null,"abstract":"Gastrointestinal (GI) cancers are among the most prevalent globally. Wireless capsule endoscopy (WCE), a minimally invasive technology, offers a promising alternative for diagnosing and treating GI diseases. Accurate depth estimation from WCE but remains challenging due to the complexity of the GI environment and limited datasets. In this paper, we propose an automatic endoscopic navigation system for monocular depth and ego-motion estimation in wireless capsule endoscopy (WCE) through a Transformer-based encoder-decoder network. Minimally invasive surgeries, including gastrointestinal (GI) procedures, face unique challenges such as restricted field of view, illumination variation, and texture sparsity, which complicate depth estimation and pose estimation tasks. Traditional Structure from Motion (SfM) and SLAM methods are often inadequate for GI scenes due to these inherent complexities. To address these issues, we introduce a novel self-supervised neural network framework that integrates a dual-attention mechanism within a modified ResNet. This model simultaneously predicts depth maps and ego-motion from monocular GI images, without requiring ground truth depth data. Our approach enhances feature extraction through spatial and channel-wise attention, allowing the network to capture both local and global contextual information. Furthermore, a multi-scale structural similarity index combined with L1 loss function is employed to improve the accuracy of depth estimation in challenging endoscopic environments. The model leverages a multi-interval frame sampling strategy to simulate diverse ego-motion scenarios, making it robust to low frame rate inputs typically seen in WCE. For ego-motion estimation on the ColonSim dataset, our model achieves an Absolute Trajectory Error (ATE) of 0.09 m at 30 FPS, outperforming the next-best model, SC-SfMLearner, by 44.4%. Additionally, for depth estimation, our model records an Absolute Relative Error (Abs Rel) of 0.33, a Squared Relative Error (Sq Rel) of 0.27, and a Root Mean Square Error (RMSE) of 0.94 on the EndoSLAM dataset.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"77931-77951"},"PeriodicalIF":3.4,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10980270","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143925327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trending Machine Learning Methods for Vehicle, Pedestrian, and Traffic for Detection and Tracking Task in the Post-Covid Era: A Literature Review 后新冠时代车辆、行人和交通检测和跟踪任务的趋势机器学习方法:文献综述
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-30 DOI: 10.1109/ACCESS.2025.3565901
João Vitor de Andrade Porto;Péter Tamás Szemes;Hemerson Pistori;József Menyhárt
{"title":"Trending Machine Learning Methods for Vehicle, Pedestrian, and Traffic for Detection and Tracking Task in the Post-Covid Era: A Literature Review","authors":"João Vitor de Andrade Porto;Péter Tamás Szemes;Hemerson Pistori;József Menyhárt","doi":"10.1109/ACCESS.2025.3565901","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3565901","url":null,"abstract":"This study, aimed at professionals in research and development in the fields of computer vision, artificial intelligence, and intelligent transportation, presents a systematic literature review on recent machine learning methodologies applied to the detection and tracking of vehicles, pedestrians, and traffic flow. The analysis of articles published between 2022 and 2025 (early access) in the post-COVID era explored the integration of machine learning and deep learning to address traffic challenges, allowing for the comparison of different approaches and the formulation of hypotheses based on the 46 articles that comprised the review corpus. Furthermore, the evaluation of the reported metrics revealed inconsistencies in the methodologies employed, attributed to the lack of standardization across the studies. In light of this, this work proposes alternatives for future experiments, emphasizing the emerging potential of the field through the adoption of new standardization systems and the exploration of experimental combinations.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"77790-77803"},"PeriodicalIF":3.4,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10980333","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143925189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code TEDVIL:利用基于变压器的嵌入来检测提升代码中的漏洞
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-30 DOI: 10.1109/ACCESS.2025.3565980
Gary A. McCully;John D. Hastings;Shengjie Xu
{"title":"TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code","authors":"Gary A. McCully;John D. Hastings;Shengjie Xu","doi":"10.1109/ACCESS.2025.3565980","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3565980","url":null,"abstract":"Ransomware and other malware inflict devastating financial and operational damage on organizations worldwide by exploiting deeply embedded, hard-to-detect vulnerabilities in their systems. Detecting these vulnerabilities in compiled code before malicious actors exploit them remains a critical challenge in cybersecurity. This research introduces TEDVIL (Transformer-based Embeddings for Discovering Vulnerabilities in Lifted Code), a novel framework which uses transformer-based embeddings to train neural networks to detect vulnerabilities in lifted code. The framework was implemented using bidirectional (BERT and RoBERTa) and unidirectional (GPT-1 and GPT-2) transformer-based models to generate embeddings for training Long Short-Term Memory (LSTM) neural networks to detect stack-based buffer overflows in Low-Level Virtual Machine (LLVM) intermediate representation code. For comparison, simpler word2vec models (Skip-Gram and Continuous Bag of Words) were also trained, and their embeddings were used to train LSTMs. The results show that the LSTMs using GPT-2 embeddings outperformed those using GPT-1, BERT, RoBERTa, and word2vec embeddings, achieving a top accuracy of 92.5% and an F1-score of 89.7%. Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. The findings underscore the effectiveness of TEDVIL in identifying hard-to-detect vulnerabilities in compiled code, and lay the groundwork for future research in leveraging transformer-based models for vulnerability detection.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"76894-76913"},"PeriodicalIF":3.4,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10980253","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143913430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Node-Oriented Data Placement for Heterogeneous Hadoop Clusters 异构Hadoop集群的自适应面向节点的数据放置
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-30 DOI: 10.1109/ACCESS.2025.3565759
Vishnu Prasad Verma;Santosh Kumar;Nenavath Srinivas Naik
{"title":"Adaptive Node-Oriented Data Placement for Heterogeneous Hadoop Clusters","authors":"Vishnu Prasad Verma;Santosh Kumar;Nenavath Srinivas Naik","doi":"10.1109/ACCESS.2025.3565759","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3565759","url":null,"abstract":"Modern society is experiencing a data explosion thanks to rapid IT development and the increasing intelligence of devices. The vast and complex data can be utilized to extract actionable insight using a big data processing framework. Hadoop is a popular big data processing framework on heterogeneous commodity hardware. While Hadoop offers a robust framework for large-scale, data-intensive tasks via its MapReduce paradigm, hardware heterogeneity across nodes often leads to straggler effects that degrade Hadoop cluster performance. This paper introduces the Adaptive Node-Oriented Data placement for Efficient Hadoop Execution (ANODE) method, which leverages historical job execution data to dynamically assess each node’s processing capability. By employing an agent-based mechanism, ANODE optimizes block allocation within the data node, alleviating imbalances caused by Hadoop’s default uniform placement strategy. Experimental results on a heterogeneous eleven-node Hadoop cluster demonstrate that ANODE reduces job completion times by up to 25%, significantly enhancing data locality and resource utilization compared to the default approach.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"79548-79559"},"PeriodicalIF":3.4,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10980281","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143932277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
YOLO-Air: An Efficient Deep Learning Network for Small Object Detection in Drone-Based Imagery YOLO-Air:基于无人机图像的小目标检测的高效深度学习网络
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-30 DOI: 10.1109/ACCESS.2025.3565560
Jigang Qiu;Fangkai Cai;Ning Fu;Yuanfei Yao
{"title":"YOLO-Air: An Efficient Deep Learning Network for Small Object Detection in Drone-Based Imagery","authors":"Jigang Qiu;Fangkai Cai;Ning Fu;Yuanfei Yao","doi":"10.1109/ACCESS.2025.3565560","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3565560","url":null,"abstract":"UAV imagery is widely used in areas like traffic safety, disaster rescue, and airspace management, due to its small size and low cost. However, it poses unique challenges for object detection due to small objects, complex backgrounds, and noise interference. To tackle these challenges, we propose YOLO-Air, a novel small object detection network designed specifically for UAV imagery. We propose SECAConv (Squeeze-Excitation Convolution with Attention), which enhances the feature representation of small objects through dynamic weight allocation and channel attention mechanisms. Additionally, we design the novel AeroFPN (Aerial Feature Pyramid Network) to optimize feature transmission by alleviating shallow feature loss through the inclusion of the xsmall detection head. Furthermore, we develop ASFM (Adaptive Scale Fusion Module), which suppresses background noise interference through effective multi-scale feature fusion and adaptive channel attention mechanisms, thereby improving the network’s ability to detect small objects. Experimental results demonstrate that YOLO-Air achieves significant accuracy improvements on both the VisDrone-DET2019 and AI-TOD datasets. Compared to the baseline YOLOv8n, YOLO-Air improved <inline-formula> <tex-math>$mAP_{50}$ </tex-math></inline-formula> from 41.2% to 44.5% on the VisDrone-DET2019 dataset, and from 44.9% to 47.5% on the AI-TOD dataset, while maintaining computational efficiency. These results validate YOLO-Air as an effective solution for small object detection in UAV aerial imagery.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"79718-79735"},"PeriodicalIF":3.4,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10980347","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143929700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Ruminant Optimization With LoRa-Based Communication for Formation Control of Multiple UAVs 基于lora通信的多无人机编队控制自适应反刍优化
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-30 DOI: 10.1109/ACCESS.2025.3565815
Muhammad Aamir Khan;Zain Anwar Ali;Muhammad Haris Muneer;Raza Hasan
{"title":"Adaptive Ruminant Optimization With LoRa-Based Communication for Formation Control of Multiple UAVs","authors":"Muhammad Aamir Khan;Zain Anwar Ali;Muhammad Haris Muneer;Raza Hasan","doi":"10.1109/ACCESS.2025.3565815","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3565815","url":null,"abstract":"In a dynamic environment with mountains and hazardous peaks, avoiding collisions and maintaining the desired formation is a crucial problem. This paper addresses this problem by presenting a novel formation control strategy of a cluster of UAVs in three different scenarios. The first scenario is designed to test the designed algorithm and hence contains no obstacles. The second scenario introduces some obstacles in the form of mountains to see whether the proposed algorithm can avoid the obstacles while maintaining the formation. In the last scenario, all the UAVs join together in one big cluster and have to avoid the obstacles while maintaining the formation. To design the environment for the scenarios, this study uses graph theory. To address the aforementioned scenarios, this paper offers a novel strategy by integrating a bio-inspired algorithm called the Adaptive Ruminant Optimization Algorithm (AROA) with the Long Range (LoRa) communication to achieve the formation control of multiple UAVs. Initially, AROA offers the best agents of each of the swarm. Then, the proposed method helps choose the best agent to be the leader for each of the swarm. The leader of each swarm finds the best trajectory for each swarm. LoRa-based networking technique is used for the connectivity between the UAVs. In addition, this study uses basis splines (B-splines) to smooth the planned trajectories of UAVs. Lastly, simulations demonstrate the better convergence and efficiency of the designed strategy by comparing it with classic algorithms. The simulations also show that the proposed method successfully maintains formation control in all three scenarios.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"80076-80087"},"PeriodicalIF":3.4,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10980250","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143929701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Malicious Clients in Federated Learning Using Graph Neural Network 基于图神经网络的联邦学习中恶意客户端的检测
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-30 DOI: 10.1109/ACCESS.2025.3565712
Anee Sharma;Ningrinla Marchang
{"title":"Detection of Malicious Clients in Federated Learning Using Graph Neural Network","authors":"Anee Sharma;Ningrinla Marchang","doi":"10.1109/ACCESS.2025.3565712","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3565712","url":null,"abstract":"Federated Learning (FL) facilitates decentralized model training without the exchange of raw data, thereby guaranteeing privacy. However, due to its distributed nature, this paradigm is susceptible to adversarial threats such as sign-flipping attacks, in which malicious clients reverse model parameter signs in order to poison the global aggregation process. This study introduces a detection framework that is graph-based and leverages Graph Attention Networks (GATs) to overcome these challenges. The framework detects malicious clients with high accuracy by representing FL local models as directed graphs and capturing layer-wise statistical features. The efficacy of the approach is demonstrated by extensive experiments on the FEMNIST dataset, which simulate varying attacker percentages (15%, 35%) and attack probabilities (0.5, 0.7, 1.0). The GAT model obtains a 100% detection rate with zero false positives within an optimal threshold range of 0.5–0.9, as demonstrated by the results. Furthermore, isolating detected attackers during targeted rounds (20-60) substantially maintains FL global model performance, thereby mitigating the cascading effects of poisoned updates and ensuring system stability. This work offers a practicable, scalable, and robust solution to improve the security of FL systems against adversarial behaviors.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"77952-77972"},"PeriodicalIF":3.4,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10980311","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143925138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信