IEEE Signal Processing Letters最新文献

筛选
英文 中文
Transient Segment Detection Based on Energy Spectrum Coefficient Entropy Posterior Probability Density 基于能谱系数熵后验概率密度的暂态片段检测
IF 3.2 2区 工程技术
IEEE Signal Processing Letters Pub Date : 2025-03-27 DOI: 10.1109/LSP.2025.3555421
Jingbo Zhang;Rongwen Lin;Qingshuo Liu
{"title":"Transient Segment Detection Based on Energy Spectrum Coefficient Entropy Posterior Probability Density","authors":"Jingbo Zhang;Rongwen Lin;Qingshuo Liu","doi":"10.1109/LSP.2025.3555421","DOIUrl":"https://doi.org/10.1109/LSP.2025.3555421","url":null,"abstract":"In wireless communication devices, the power envelope during the transient segment of energy-limited pulse signals effectively captures the physical characteristics of the radio frequency circuit. This unique signature can serve as a radio frequency fingerprinting, enhancing the security of the wireless communication system. A key issue in this context is accurately detecting transient signals. The existing detection algorithms can only detect the start time of transient segments, making them unable to characterize the complete transient segments. This study proposes a transient segment detection algorithm based on energy spectral coefficient entropy posterior probability density (ESCE-PPD), which can simultaneously estimate the start and end time of transient segments without relying on prior information. The effectiveness of the proposed algorithm is verified using an open source Bluetooth dataset, and its performance is compared with existing algorithms. The results demonstrate that the ESCE-PPD algorithm adds the capability to detect the end time of transient segments without increasing computational complexity and reducing anti-noise performance.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1505-1509"},"PeriodicalIF":3.2,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143830478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alternating Offer-Based Payment Allocation for Privacy Non-Disclosure in Federated Learning 联邦学习中基于交替出价的隐私保密支付分配
IF 3.2 2区 工程技术
IEEE Signal Processing Letters Pub Date : 2025-03-27 DOI: 10.1109/LSP.2025.3555386
Suyeon Jin;Chaeyeon Cha;Hyunggon Park
{"title":"Alternating Offer-Based Payment Allocation for Privacy Non-Disclosure in Federated Learning","authors":"Suyeon Jin;Chaeyeon Cha;Hyunggon Park","doi":"10.1109/LSP.2025.3555386","DOIUrl":"https://doi.org/10.1109/LSP.2025.3555386","url":null,"abstract":"In federated learning (FL), it is essential to implement a payment allocation mechanism that compensates clients for the costs incurred from participating in FL tasks. In this letter, we formulate the payment allocation as a bargaining game between a global server and clients and adopt the Nash bargaining solution (NBS) to achieve optimal and fair payment assignments among clients. Unlike existing payment allocation mechanisms that require the disclosure of private information from the clients, the proposed approach ensures privacy non-disclosure for bargaining. The key idea is to decompose the one-to-many bargaining game into independent one-to-one bargaining games and use alternating-offers, which do not require the disclosure of private information from clients. We design an alternating-offers strategy and acceptance criteria to ensure fair agreements without the private information of clients. Simulation results show that the proposed payment allocation strategy can fairly allocate payments to clients while maintaining the accuracy of the global server in FL tasks.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1500-1504"},"PeriodicalIF":3.2,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143830477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Watermark Removal Attack Against Text-to-Image Generative Model Watermarking 针对文本到图像生成模型水印的水印去除攻击
IF 3.2 2区 工程技术
IEEE Signal Processing Letters Pub Date : 2025-03-26 DOI: 10.1109/LSP.2025.3554514
Zihan Yuan;Li Li;Zichi Wang;Jingyuan Jiang;Xinpeng Zhang
{"title":"Watermark Removal Attack Against Text-to-Image Generative Model Watermarking","authors":"Zihan Yuan;Li Li;Zichi Wang;Jingyuan Jiang;Xinpeng Zhang","doi":"10.1109/LSP.2025.3554514","DOIUrl":"https://doi.org/10.1109/LSP.2025.3554514","url":null,"abstract":"The artist's style can be quickly imitated by fine-tuning a text-to-image model using artist's artworks, which raises serious copyright concerns. Scholars have proposed many watermarking methods to protect the artists' copyright. To evaluate the security and enhance the performance of existing watermarking, this paper proposes a watermark removal attack for text-to-image generative model watermarking for the first time. This attack aims to invalidate watermarking designed to detect art theft mimicry in text-to-image models. In this method, a watermark recognition network and a watermark removal network are designed. The watermark recognition network identifies whether an artwork contains watermark, and the watermark removal network is used to remove it. Consequently, text-to-image models fine-tuned with watermark-removed artworks can reproduce an artist's style while evading watermark detection. This makes the copyright authentication of artworks ineffective. Experiments show that the proposed attack can effectively remove watermarks, with watermark extraction accuracy dropping below 48.64%. Additionally, the images after watermark removal retain high similarity to the original images, with PSNR exceeding 27.96 and SSIM exceeding 0.92.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1470-1474"},"PeriodicalIF":3.2,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143809027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Non-Matching Multiple References for Speech Quality Assessment 语音质量评价的非匹配多参考文献探索
IF 3.2 2区 工程技术
IEEE Signal Processing Letters Pub Date : 2025-03-26 DOI: 10.1109/LSP.2025.3555190
Bao Thang Ta;Nhat Minh Le;Huynh Thi Thanh Binh;Van Hai Do
{"title":"Exploring Non-Matching Multiple References for Speech Quality Assessment","authors":"Bao Thang Ta;Nhat Minh Le;Huynh Thi Thanh Binh;Van Hai Do","doi":"10.1109/LSP.2025.3555190","DOIUrl":"https://doi.org/10.1109/LSP.2025.3555190","url":null,"abstract":"Non-Matching Reference-based Speech Quality Assessment models typically require numerous references during inference to ensure stable and accurate predictions. However, this dependency introduces significant computational overhead, limiting their suitability for real-time applications. In this paper, we propose a novel training paradigm that directly addresses prediction instability at its source by integrating multiple references during training rather than during inference, as in existing approaches. This method allows the model to capture the inherent variability of reference signals, thereby enhancing prediction reliability. Additionally, we introduce an auxiliary variance loss function to minimize inconsistencies across predictions, ensuring stable assessments regardless of the number of references used. Experiments on the NISQA datasets demonstrate that, with the same training time, our method achieves consistent predictions with a single reference during inference, resulting in a 100-fold reduction in computational time while maintaining high accuracy.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1610-1614"},"PeriodicalIF":3.2,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143871046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-IRS-Aided Localization for Next-Generation Wireless Networks in Fading Environments 衰落环境下下一代无线网络的多irs辅助定位
IF 3.2 2区 工程技术
IEEE Signal Processing Letters Pub Date : 2025-03-25 DOI: 10.1109/LSP.2025.3554038
Nasir Saeed
{"title":"Multi-IRS-Aided Localization for Next-Generation Wireless Networks in Fading Environments","authors":"Nasir Saeed","doi":"10.1109/LSP.2025.3554038","DOIUrl":"https://doi.org/10.1109/LSP.2025.3554038","url":null,"abstract":"The growing demand for location-based services (LBS) in complex environments has increased the need for precise and reliable user localization techniques. Traditional methods often face limitations in scenarios with few access points (APs) and non-line-of-sight (NLOS) propagation, resulting in reduced accuracy. This paper presents a novel localization framework that leverages multiple Intelligent Reflecting Surfaces (IRS) to address these challenges and improve positioning accuracy in constrained conditions. The proposed method employs multiple IRSs to enhance signal propagation, mitigating the effects of NLOS conditions and improving signal quality. A Maximum Likelihood Estimation (MLE) algorithm is used to estimate user positions, while the Cramér-Rao Lower Bound (CRLB) is derived to benchmark the theoretical accuracy. By utilizing the reconfigurable capabilities of IRSs, the system dynamically adjusts wireless channels to optimize localization performance. Performance evaluations under practical fading conditions demonstrate significant improvements in accuracy compared to traditional methods. The results highlight the effectiveness and robustness of the proposed framework in diverse environments, showcasing the potential of IRS technology for advanced localization applications.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1460-1464"},"PeriodicalIF":3.2,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143808973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NADH: A NTRU-Based Adaptive Data Hiding Scheme for Underwater Acoustic Sensor Networks NADH:一种基于ntrus的水声传感器网络自适应数据隐藏方案
IF 3.2 2区 工程技术
IEEE Signal Processing Letters Pub Date : 2025-03-24 DOI: 10.1109/LSP.2025.3554414
Ming Xu;Tongtong Guo
{"title":"NADH: A NTRU-Based Adaptive Data Hiding Scheme for Underwater Acoustic Sensor Networks","authors":"Ming Xu;Tongtong Guo","doi":"10.1109/LSP.2025.3554414","DOIUrl":"https://doi.org/10.1109/LSP.2025.3554414","url":null,"abstract":"To address the issue of data confidentiality and security in underwater acoustic sensor networks (UASNs), a NTRU-based Adaptive Data Hiding scheme called <sc>NADH</small> is proposed. The <sc>NADH</small> scheme is novel in two aspects. First, we propose a weighted interpolation approach based on information entropy to enhance both data security and embedding capacity. Second, we propose an adaptive coefficient selection mechanism to monitor environmental changes in real time and adjust the data embedding strategy to maximize embedding capacity. This letter also provides a theoretical analysis of the correctness and security of the NADH scheme, and proves the upper bound of its mean squared error (MSE). Experimental results show that when the embedding capacity of <sc>NADH</small> is 2048 bits, the MSE is 0.7495, the average peak signal-to-noise ratio (PSNR) is 49.792 dB, and the average structural similarity index (SSIM) is 0.9998, outperforming existing data hiding schemes.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1465-1469"},"PeriodicalIF":3.2,"publicationDate":"2025-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143809028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Vehicle Tracking in VANET Using a Distributed Improved Cubature Kalman Filter 基于分布式改进Cubature Kalman滤波的VANET协同车辆跟踪
IF 3.2 2区 工程技术
IEEE Signal Processing Letters Pub Date : 2025-03-24 DOI: 10.1109/LSP.2025.3553788
Xiaomei Qu;Tao Liu;Lei Mu;Wenrong Tan;Huanyan Jian
{"title":"Cooperative Vehicle Tracking in VANET Using a Distributed Improved Cubature Kalman Filter","authors":"Xiaomei Qu;Tao Liu;Lei Mu;Wenrong Tan;Huanyan Jian","doi":"10.1109/LSP.2025.3553788","DOIUrl":"https://doi.org/10.1109/LSP.2025.3553788","url":null,"abstract":"This letter addresses the issue of cooperative vehicle tracking in vehicular ad-hoc networks (VANETs) through the fusion of global navigation satellite system (GNSS) data and time-of-arrival (TOA) based ranging information. We propose a novel distributed improved Cubature Kalman Filter (CKF) to enhance the state estimation accuracy of all vehicles. This approach comprises two parts: local improved CKF processing and cooperative fusion tracking. Due to the nonlinearity of the ranging measurement function with respect to both local vehicle state and neighboring vehicle state, an augmented parameter vector is constructed in the improved CKF method to tackle this challenge. Then, we present the optimal cooperative fusion of the local vehicle state estimate and the estimates from its neighbors, in the sense of minimizing the fused mean squared error. Numerical examples demonstrate that the root of average mean squared error (RAMSE) of the proposed method can be significantly reduced.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1540-1544"},"PeriodicalIF":3.2,"publicationDate":"2025-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143845483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Image Counterfactuals in Deep Learning Models Without the Aid of Generative Models 在没有生成模型的帮助下,深度学习模型中生成图像反事实
IF 3.2 2区 工程技术
IEEE Signal Processing Letters Pub Date : 2025-03-24 DOI: 10.1109/LSP.2025.3554511
Ao Xu;Zihao Li;Yukai Zhang;Tieru Wu
{"title":"Generating Image Counterfactuals in Deep Learning Models Without the Aid of Generative Models","authors":"Ao Xu;Zihao Li;Yukai Zhang;Tieru Wu","doi":"10.1109/LSP.2025.3554511","DOIUrl":"https://doi.org/10.1109/LSP.2025.3554511","url":null,"abstract":"With the rapid development of artificial intelligence, particularly the rise of deep learning, the importance of Explainable Artificial Intelligence has become increasingly prominent. Among its key techniques, counterfactual explanation plays a crucial role in understanding the decision-making mechanisms of opaque models. However, the high dimensionality and complex feature patterns of image data pose significant challenges for the task of generating counterfactuals for images. Existing literature has proposed various algorithms based on different assumptions, many of which rely on the existence of appropriate generative models. Some of these assumptions, particularly the assumption regarding the existence of generative models, may be overly stringent. To address this issue, this letter introduces a novel assumption-free image counterfactual generation algorithm, DFO-S, based on Score Matching and gradient-free optimization techniques. The proposed method achieves high-quality counterfactual generation without relying on generative models. Through extensive empirical analysis, we demonstrate the significant superiority of our method in terms of performance.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1495-1499"},"PeriodicalIF":3.2,"publicationDate":"2025-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143830479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Optimal Hierarchical Arithmetic Average Fusion of GM-PHD Filters GM-PHD滤波器的最优层次算法平均融合
IF 3.2 2区 工程技术
IEEE Signal Processing Letters Pub Date : 2025-03-24 DOI: 10.1109/LSP.2025.3554142
Xue Yu;Feng Xi-An
{"title":"An Optimal Hierarchical Arithmetic Average Fusion of GM-PHD Filters","authors":"Xue Yu;Feng Xi-An","doi":"10.1109/LSP.2025.3554142","DOIUrl":"https://doi.org/10.1109/LSP.2025.3554142","url":null,"abstract":"We achieve the optimal Arithmetic Average (AA) fusion algorithm of Gaussian Mixture Probability Hypothesis Density (GM-PHD) filters in a hierarchical structure. First, the optimal single-target estimate fusion is derived, during which the prior estimate is indispensable. Then, the derived optimal estimate fusion is employed as the merging method of the AA fusion. A master filter dedicated to computing prior density is introduced, so our fusion algorithm features a hierarchical structure. Experiment results evidence our algorithm's optimality and superiority over the standard AA fusion.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1605-1609"},"PeriodicalIF":3.2,"publicationDate":"2025-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143870996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domain-Assisted Few-Shot Linguistic Steganalysis in Imbalanced Class Scenarios 非平衡类场景下的域辅助少射语言隐写分析
IF 3.2 2区 工程技术
IEEE Signal Processing Letters Pub Date : 2025-03-21 DOI: 10.1109/LSP.2025.3553427
Qingying Niu;Zhen Yang;Yufei Luo;Jiangrui Zhao;Yuwen Jiang
{"title":"Domain-Assisted Few-Shot Linguistic Steganalysis in Imbalanced Class Scenarios","authors":"Qingying Niu;Zhen Yang;Yufei Luo;Jiangrui Zhao;Yuwen Jiang","doi":"10.1109/LSP.2025.3553427","DOIUrl":"https://doi.org/10.1109/LSP.2025.3553427","url":null,"abstract":"Linguistic steganalysis aims to distinguish stego text from cover text. However, most existing methods heavily rely on a large number of stego text samples for training. In real-world scenarios, the cover text is far more abundant than the stego text, making it extremely difficult to obtain sufficient stego text for training. Furthermore, the scarcity of stego text also increases the difficulty of detection, posing greater challenges for steganalysis. In contrast, cover text is relatively easier to obtain in real-world scenarios, but current methods fail to fully utilize this resource. In this paper, we propose a Domain-Assisted Few-shot linguistic steganalysis method called DAF-Stega. To make full use of the cover text, we incorporate cover texts from multiple domains to assist in training. To address the scarcity of stego texts, we perform few-shot steganalysis based on a small amount of stego text and employ dynamic decision-making to generate pseudo-labels for self-training, enhancing model performance. Experimental results show that in few-shot learning scenarios, DAF-Stega effectively addresses the steganalysis problem under uncertain stego text proportions and outperforms existing methods.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"1391-1395"},"PeriodicalIF":3.2,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143748911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信