IEEE Access最新文献

筛选
英文 中文
A Multi-Criteria Framework for Selecting Machine Learning Techniques for Industrial Fault Prognosis 工业故障预测中选择机器学习技术的多准则框架
IF 3.6 3区 计算机科学
IEEE Access Pub Date : 2025-09-02 DOI: 10.1109/ACCESS.2025.3604754
Miguel A. De C. Michalski;Carlos A. Murad;Fabio N. Kashiwagi;Gilberto F. M. De Souza;Halley J. B. Da Silva;Hyghor M. Côrtes
{"title":"A Multi-Criteria Framework for Selecting Machine Learning Techniques for Industrial Fault Prognosis","authors":"Miguel A. De C. Michalski;Carlos A. Murad;Fabio N. Kashiwagi;Gilberto F. M. De Souza;Halley J. B. Da Silva;Hyghor M. Côrtes","doi":"10.1109/ACCESS.2025.3604754","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3604754","url":null,"abstract":"Selecting appropriate Machine Learning (ML) techniques for fault prognosis remains a critical yet often understructured step in developing predictive maintenance strategies for industrial systems. While numerous studies apply ML to estimate Remaining Useful Life (RUL) or forecast failure probabilities, model selection is frequently guided by ad hoc practices or narrow performance metrics, overlooking contextual factors such as data availability, interpretability, automation level, and deployment feasibility. This paper presents a parameterized, multi-criteria decision-making framework to support ML techniques selection in fault prognosis, particularly within energy-related applications. Derived from a structured literature survey, the framework introduces twelve selection parameters, divided into primary requirements and secondary evaluation criteria. These parameters, such as label requirements, model complexity, and transferability, allow users to eliminate unsuitable techniques and rank viable candidates according to application-specific constraints. The framework is applied to a real-world use case involving failure prediction in electrical substations, illustrating how it supports transparent, replicable, and operationally grounded model selection. Results demonstrate the framework’s adaptability to different industrial contexts and its relevance for decision-making in energy systems. By bridging empirical insights with implementation demands, the proposed approach offers a practical tool for aligning ML technique selection with the goals of energy-sector prognostics and maintenance planning.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"154508-154544"},"PeriodicalIF":3.6,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11145754","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Dynamic Malware Behavior Analysis Through Novel Windows Events With Machine Learning 基于机器学习的新型Windows事件增强动态恶意软件行为分析
IF 3.6 3区 计算机科学
IEEE Access Pub Date : 2025-09-02 DOI: 10.1109/ACCESS.2025.3604979
Göksun Önal;Mesut Güven
{"title":"Enhancing Dynamic Malware Behavior Analysis Through Novel Windows Events With Machine Learning","authors":"Göksun Önal;Mesut Güven","doi":"10.1109/ACCESS.2025.3604979","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3604979","url":null,"abstract":"Malware analysis involves studying harmful software to understand its behavior and find ways to detect and prevent it. As cyberattacks become more advanced, this process becomes increasingly important for safeguarding systems and data. Traditional methods in malware analysis often rely on examining the code itself, which can miss malicious actions that only occur during execution. This study addresses this limitation by combining the dynamic observation of malware behavior with an innovative use of Windows Event Logs as input, a detailed system data source. During the study, a secure environment was created to safely execute malware, collect input, and provide valuable information on how malicious software interacts with systems. New methods were developed to extract meaningful information from the logs, then used to train machine-learning models capable of accurately distinguishing malware from legitimate programs. By demonstrating the untapped potential of Windows Event Logs, this study offers new tools to improve real-time malware detection and enhance cybersecurity. On a dataset of approximate 7000 Windows executable file, roughly sixty percent benign and forty percent malware, the log-feature MLP reached 91.2 % accuracy with a 1.6-point standard deviation across five folds, achieved a ROC-AUC of <inline-formula> <tex-math>$0.962~pm ~0.009$ </tex-math></inline-formula> on an unseen hold out set.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"153937-153958"},"PeriodicalIF":3.6,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11146719","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Make Large Language Models Efficient: A Review 使大型语言模型高效:综述
IF 3.6 3区 计算机科学
IEEE Access Pub Date : 2025-09-02 DOI: 10.1109/ACCESS.2025.3605110
Aman Mussa;Zhanseit Tuimebayev;Madina Mansurova
{"title":"Make Large Language Models Efficient: A Review","authors":"Aman Mussa;Zhanseit Tuimebayev;Madina Mansurova","doi":"10.1109/ACCESS.2025.3605110","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3605110","url":null,"abstract":"Large Language Models (LLMs) have achieved remarkable success across a variety of natural language processing tasks, with larger architectures often exhibiting superior performance. This scaling behavior has fueled intense competition in generative AI, supported by projected investments that exceed <inline-formula> <tex-math>${$} $ </tex-math></inline-formula>1 trillion to develop increasingly sophisticated LLMs. This competition has in turn nurtured a vibrant ecosystem, inspiring new open-source models such as DeepSeek, and motivating application developers to harness state-of-the-art LLMs for real-world deployments. However, the extensive memory and computational requirements of large models present serious obstacles for small-medium organizations, leading to significant scalability concerns. This paper offers a comprehensive review of recent techniques to improve LLM efficiency through four categories: parameter-centric, architecture-centric, training-centric and data-centric. For a better understanding of the newcomer’s perspective, it covers the entire lifecycle when developing and deploying LLMs. Thus, this paper is organized around five core tasks: model compression for local deployment, accelerated pre-training to reduce time-to-train, efficient fine-tuning on custom data, optimized inference under resource constraints, and streamlined data preparation. Rather than focusing on broad strategies, we emphasize specialized techniques tailored to each stage of development. By applying targeted optimizations at each phase, the computational overhead can be reduced by 50–95% without compromising the quality of the model, making LLMs more accessible to researchers and practitioners with limited computational resources.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"154466-154490"},"PeriodicalIF":3.6,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11146704","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KC-UNet: Enhancing U-Net With KAN and CBAM for Medical Image Segmentation KC-UNet:用KAN和CBAM增强U-Net用于医学图像分割
IF 3.6 3区 计算机科学
IEEE Access Pub Date : 2025-09-02 DOI: 10.1109/ACCESS.2025.3605148
Jie Xu;Haoqing Gao;Zhifeng Wang
{"title":"KC-UNet: Enhancing U-Net With KAN and CBAM for Medical Image Segmentation","authors":"Jie Xu;Haoqing Gao;Zhifeng Wang","doi":"10.1109/ACCESS.2025.3605148","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3605148","url":null,"abstract":"Medical image segmentation is a critical task in medical image analysis. However, traditional convolutional neural network (CNN) based methods are limited in modeling long-range dependencies, while Transformer-based segmentation models, though effective, suffer from high computational complexity due to quadratic attention operations. To address these challenges, this paper proposes an innovative U-Net variant, KC-UNet, which integrates Kolmogorov-Arnold Networks (KAN) and the Channel-Spatial Attention Module (CBAM). KC-UNet leverages the KAN representation theorem to represent features more efficiently, while CBAM enhances the model’s ability to adaptively capture both spatial and channel-wise dependencies, striking a balance between accuracy and computational efficiency. To validate the effectiveness of CBAM, this paper conducts comprehensive ablation experiments by replacing CBAM with Squeeze-and-Excitation (SE), and Efficient Channel Attention (ECA), as well as removing the attention module entirely. Results demonstrate that CBAM provides the most significant performance improvements in terms of segmentation accuracy, confirming its superior capability in enhancing feature representation. This study evaluates KC-UNet on four widely used benchmark datasets (BUSI, GLAS, CVC, and ISIC2017) and compare it against recent state-of-the-art models such as TransUNet, Swin-unet, and U-KAN. KC-UNet consistently achieves the best performance, with an IoU of 66.60% on BUSI, outperforming Swin-unet by 1.28%, and a Dice score of 80.46%, which improves upon the baseline U-Net by 7.44%. Similar advantages are observed on GLAS and ISIC2017, demonstrating the effectiveness and generalizability of our approach across different modalities. To the best of our knowledge, KC-UNet is the first framework to integrate KAN and CBAM for medical image segmentation.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"153788-153797"},"PeriodicalIF":3.6,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11146708","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Literature Review on Effort Estimation by Software Development Life Cycle Phases 软件开发生命周期阶段工作量估算的系统文献综述
IF 3.6 3区 计算机科学
IEEE Access Pub Date : 2025-09-02 DOI: 10.1109/ACCESS.2025.3605102
Sulem Martínez-Aguilar;Ángel J. Sánchez-García;Cuauhtémoc López-Martín;Jorge Octavio Ocharán-Hernández
{"title":"Systematic Literature Review on Effort Estimation by Software Development Life Cycle Phases","authors":"Sulem Martínez-Aguilar;Ángel J. Sánchez-García;Cuauhtémoc López-Martín;Jorge Octavio Ocharán-Hernández","doi":"10.1109/ACCESS.2025.3605102","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3605102","url":null,"abstract":"Several techniques have been proposed to estimate the total effort of the Software Development Life Cycle (SDLC) rather than by SDLC phase to be performed for an independent team. An accurate effort estimation is needed for software managers to create realistic plans and allocate resources appropriately to independent teams. Therefore, this Systematic Literature Review (SLR), unlike other secondary studies, examines the current state of effort estimation by SDLC phase instead of estimating it across the entire SDLC. In addition, this SLR identifies metaheuristics used for optimizing the parameters of effort estimation models. We searched for studies whose objective has been to propose models for estimating the effort of specific SDLC phases, rather than total SDLC effort. We firstly identified 216 studies, and finally we selected 31 of them published between 2014 and march 2025 in journals and conferences. The majority of the studies investigated effort estimation in the testing and maintenance phases, mainly using Machine Learning (ML) techniques. Functional size and project characteristics were the most common explanatory variables. International Software Benchmarking Standards Group was the predominant dataset for training models and the mean of Absolute Residual was the recommended precision measure. Cross-validation was the most used model validation method. We can conclude that more research is needed on effort estimation by SDLC phases such as requirements specification, design, and construction, as well as to further explore ML and metaheuristics to improve the prediction accuracies of models.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"153340-153358"},"PeriodicalIF":3.6,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11146651","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145027971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Multi Objective Video Summarization Approach for Video Surveillance Analytics Applications on Smart Cities 面向智慧城市视频监控分析应用的多目标视频汇总新方法
IF 3.6 3区 计算机科学
IEEE Access Pub Date : 2025-09-02 DOI: 10.1109/ACCESS.2025.3605259
Turan Goktug Altundogan;Mehmet Karaköse;Fatih Mert
{"title":"A New Multi Objective Video Summarization Approach for Video Surveillance Analytics Applications on Smart Cities","authors":"Turan Goktug Altundogan;Mehmet Karaköse;Fatih Mert","doi":"10.1109/ACCESS.2025.3605259","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3605259","url":null,"abstract":"Summarizing surveillance videos used in smart city applications is very important in terms of transaction costs and sustainability. Although there is a considerable amount of literature on video summarization, the methods in the literature for summarizing surveillance videos used in smart cities are few and inadequate. Because, both object and event features of the mentioned video data must be preserved. In this study, we integrated an object-centric and an event-centric summarization method with Apache Kafka for effective summarization of such videos. With the object-centric summarization module of our proposed method, we focused on preserving the statistical and motion features of the objects in the videos. With the event-centric summarization module, we ensured the preservation of abnormal events in the videos. We presented the performance results of both modules and the integrated system in detail with different metrics. Finally, we compared the performances of both modules with the video summarization approaches in the literature based on different metrics. The developed object-centric summarization method preserves the statistical features of the video with a success rate of over 90% and shortens the videos with a rate of over 95%. The developed event-centric summarization approach provides summaries that include abnormal situations found in videos with a success rate of over 95%. The presented comparative results prove that this original method we developed is superior to the studies in the literature in terms of performance and many different evaluations.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"154353-154382"},"PeriodicalIF":3.6,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11146661","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
YOLOv8-ECA-SPD-Lite for Cantilever Bolt Defect Detection in Railway Catenary Systems 铁路接触网系统悬臂螺栓缺陷检测YOLOv8-ECA-SPD-Lite
IF 3.6 3区 计算机科学
IEEE Access Pub Date : 2025-09-02 DOI: 10.1109/ACCESS.2025.3604831
Yapeng Wang;Mengru Chen;Lina Guo;Yi Ma;Min Wu
{"title":"YOLOv8-ECA-SPD-Lite for Cantilever Bolt Defect Detection in Railway Catenary Systems","authors":"Yapeng Wang;Mengru Chen;Lina Guo;Yi Ma;Min Wu","doi":"10.1109/ACCESS.2025.3604831","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3604831","url":null,"abstract":"To address the challenges of highly variable operating conditions in electrified railway catenary systems, the small target size of cantilever bolt defects, and the large parameter sizes of existing catenary inspection models, this paper proposes an improved lightweight algorithm named You Only Look Once version 8 Enhanced by Efficient Channel Attention, Space-to-Depth Convolution, and Lightweight Optimization via Pruning and Distillation (YOLOv8-ECA-SPD-Lite). The core innovations lie in: 1) Data augmentation on the original images to improve generalization capability; 2) Integration of the Efficient Channel Attention (ECA) module to enhance feature responses in bolt regions for small target detection; 3) The Space-to-Depth convolution (SPD-Conv) module was first applied to cantilever bolt defect detection to minimize feature loss for small targets; and 4) Replacement of the detection head with a decoupled head to enhance defect perception capabilities. Furthermore, applying model pruning and distillation techniques significantly improves model lightweighting, facilitating deployment on embedded onboard systems. Ablation studies validated the effectiveness of each proposed module. Comparative experiments demonstrated that the improved YOLOv8 model outperforms Faster R-CNN, SSD, YOLOv6s, YOLOX-s, YOLOv9s, and the original YOLOv8s across multiple metrics. Specifically, the proposed model achieved a higher mean Average Precision (mAP) than all comparison models. In terms of lightweight design, the improved YOLOv8s model achieves the lowest computational complexity among all compared methods, with only 17.2 GFLOPs. It demonstrates exceptional suitability for mobile deployment. This research holds significant theoretical and practical value, facilitating the transition of railway operation and maintenance to artificial intelligence, enhancing the efficiency of catenary inspection, and meeting the demands of high-density railway operations.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"155167-155180"},"PeriodicalIF":3.6,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11146734","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Single-Input Bipolar-Output (SIBO) DC–DC Boost Converter for Solar Generators and On-Chip Power Delivery: Modeling and Experimental Assessment of the So-Called Perilla Converter 用于太阳能发电机和片上供电的单输入双极输出(SIBO) DC-DC升压变换器:紫苏变换器的建模和实验评估
IF 3.6 3区 计算机科学
IEEE Access Pub Date : 2025-09-02 DOI: 10.1109/ACCESS.2025.3605109
Robert Urbina;Carlos Ivan Paez-Rueda;Germán Yamhure;Manuel R. Pérez;José Vuelvas;Manuel Fernando Párraga Meneses;Abdel Karim Hay Harb;Luis Fernando Melchior Ramirez;Gabriel Perilla Galindo;Arturo Fajardo
{"title":"A Single-Input Bipolar-Output (SIBO) DC–DC Boost Converter for Solar Generators and On-Chip Power Delivery: Modeling and Experimental Assessment of the So-Called Perilla Converter","authors":"Robert Urbina;Carlos Ivan Paez-Rueda;Germán Yamhure;Manuel R. Pérez;José Vuelvas;Manuel Fernando Párraga Meneses;Abdel Karim Hay Harb;Luis Fernando Melchior Ramirez;Gabriel Perilla Galindo;Arturo Fajardo","doi":"10.1109/ACCESS.2025.3605109","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3605109","url":null,"abstract":"Hybrid power converters that cascade switched-capacitor stages with conventional LC-based DC/DC switching converters have recently emerged as promising solutions for applications requiring a bipolar DC bus, such as photovoltaic systems and in-chip OLED drivers. However, despite clear advantages in efficiency, compactness, and implementation simplicity, their adoption has been limited due to the lack of accurate modeling and experimental validation. Traditional modeling techniques often fail to capture the static and dynamic behavior of these hybrid topologies. Some previous works either neglected capacitive losses or relied on empirical equivalent models without a clearly defined methodology. The Perilla SIBO (Single-Input Bipolar-Output) Boost Converter is a representative example of this new class of hybrid converters, integrating a conventional Single-Inductor Single-Output (SISO) boost stage with a switched-capacitor inverter. In earlier work, a static model for the Perilla Boost converter was derived using the small-ripple approximation and charge balance principles, assuming matched output capacitors and balanced load conditions—but without considering efficiency estimation. This paper extends the previous model to account for unbalanced loading and mismatched output capacitances and introduces a novel analytical expression to estimate converter efficiency. A comprehensive static modeling and experimental evaluation is presented under realistic operating conditions. The model is validated using a prototype operating across an input voltage range of 3 V to 10 V and delivering output power between 1 W and 20 W. The proposed model achieves a mean absolute percentage error of 5.76% and a standard deviation of 5.68%, offering a reliable tool for steady-state performance prediction. The dynamic modeling of the converter, as well as the development of a systematic design methodology, are beyond the scope of this work.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"155411-155424"},"PeriodicalIF":3.6,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11146771","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Ansätze Expressibility and Complexity and Their Impact on Classification Accuracy Using QNN and QLSTM 利用QNN和QLSTM分析Ansätze可表达性和复杂性及其对分类精度的影响
IF 3.6 3区 计算机科学
IEEE Access Pub Date : 2025-09-01 DOI: 10.1109/ACCESS.2025.3604721
Sarvapriya M. Tripathi;Himanshu Upadhyay;Jayesh Soni
{"title":"Analysis of Ansätze Expressibility and Complexity and Their Impact on Classification Accuracy Using QNN and QLSTM","authors":"Sarvapriya M. Tripathi;Himanshu Upadhyay;Jayesh Soni","doi":"10.1109/ACCESS.2025.3604721","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3604721","url":null,"abstract":"Quantum Neural Networks (QNN) and Quantum Long Short-Term Memory (QLSTM) models are emerging as powerful tools in quantum machine learning. The effectiveness of these models is largely governed by the structure of their parameterized quantum circuits, also known as Ansätze. The Expressibility (measure of how well an ansätz can explore Hilbert space), Entanglement (which governs the correlation between states of multiple qubits), and Depth (a measure of how many layers of quantum gates a circuit has) are fundamental to a model’s capacity to learn complex patterns. In this paper, we analyze how varying these attributes for various ansätze influences classification cost and accuracy. We evaluated QNN and QLSTM models across three cybersecurity datasets using ten ansätze with varying expressibility and complexity. Results showed that ansätze with lower expressibility and complexity achieved accuracy and training stability comparable to the more complex ones. Additionally, we found that QNN models consistently offered a better trade-off between accuracy, training time, and computational efficiency compared to QLSTM models.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"152412-152429"},"PeriodicalIF":3.6,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11145787","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145005444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel-Robust Specific Emitter Identification Based on Domain-Adversarial Training of Neural Networks and Multi-Feature Fusion 基于神经网络域对抗训练和多特征融合的信道鲁棒特定发射器识别
IF 3.6 3区 计算机科学
IEEE Access Pub Date : 2025-09-01 DOI: 10.1109/ACCESS.2025.3604428
Jialong He;Yuelei Xie;Xiangguo Liu
{"title":"Channel-Robust Specific Emitter Identification Based on Domain-Adversarial Training of Neural Networks and Multi-Feature Fusion","authors":"Jialong He;Yuelei Xie;Xiangguo Liu","doi":"10.1109/ACCESS.2025.3604428","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3604428","url":null,"abstract":"To address the significant decline in the accuracy of Specific Emitter Identification(SEI) under wireless channel, we propose a novel method that combines a domain adversarial network with multi-feature fusion(MFF) to extract domain-invariant features of the signal and leverage the complementary nature of signal features extracted from different views. Initially, we employ the IQ Convolutional Neural Network (IQCNN), the Gate Recurrent Unit (GRU), and the stacked Fourier Analysis Networks (SFAN) to directly extract and fuse correlation, temporal, and periodic features from the raw I/Q data. Subsequently, we integrate a Domain-Adversarial Training of Neural Networks (DANN) to eliminate channel features, ultimately enabling SEI under channel interference. The experimental results on the WiFi dataset demonstrate that the MFF network designed in this study achieves an identification accuracy of 97% under Additive White Gaussian Noise(AWGN) channel interference with a signal-to-noise ratio(SNR) of 10dB. Furthermore, the proposed method achieves identification accuracy of 93.8%, 90.3%, and 78.2% under three complex real-world channel interference scenarios, respectively. These findings indicate that the proposed method effectively mitigates channel interference and significantly enhances the robustness of SEI.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"153093-153104"},"PeriodicalIF":3.6,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11145769","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145027947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信