IEEE Transactions on Consumer Electronics最新文献

筛选
英文 中文
Guest Editorial Sustainable Computing for Next-Generation Low-Carbon Agricultural Consumer Electronics 新一代低碳农业消费电子产品的可持续计算
IF 10.9 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2025-12-19 DOI: 10.1109/TCE.2025.3599548
Yang Li;Muhammad Attique Khan;Muhammad Khurram Khan;Mohammad Kamrul Hasan
{"title":"Guest Editorial Sustainable Computing for Next-Generation Low-Carbon Agricultural Consumer Electronics","authors":"Yang Li;Muhammad Attique Khan;Muhammad Khurram Khan;Mohammad Kamrul Hasan","doi":"10.1109/TCE.2025.3599548","DOIUrl":"https://doi.org/10.1109/TCE.2025.3599548","url":null,"abstract":"In recent years, the widespread application of agricultural consumer electronic devices, such as sensors, actuators, controllers, unmanned aerial vehicles (UAVs), and robots, has significantly enhanced the intelligence and efficiency of agricultural production. These devices have become indispensable tools for modern farming, enabling precise monitoring, control, and automation of various agricultural processes. However, the current technologies employed in these devices have certain limitations in terms of optimizing computational resources and reducing carbon emissions. This is a pressing issue that needs to be addressed, especially against the global backdrop of actively promoting carbon neutrality and developing low-carbon sustainable agriculture.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 4","pages":"12358-12360"},"PeriodicalIF":10.9,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11306176","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Consumer Technology Society Officers and Committee Chairs IEEE消费技术协会官员和委员会主席
IF 10.9 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2025-12-19 DOI: 10.1109/TCE.2025.3633470
{"title":"IEEE Consumer Technology Society Officers and Committee Chairs","authors":"","doi":"10.1109/TCE.2025.3633470","DOIUrl":"https://doi.org/10.1109/TCE.2025.3633470","url":null,"abstract":"","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 4","pages":"C4-C4"},"PeriodicalIF":10.9,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11306168","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Consumer Technology Society Officers and Committee Chairs IEEE消费技术协会官员和委员会主席
IF 10.9 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2025-11-11 DOI: 10.1109/TCE.2025.3608519
{"title":"IEEE Consumer Technology Society Officers and Committee Chairs","authors":"","doi":"10.1109/TCE.2025.3608519","DOIUrl":"https://doi.org/10.1109/TCE.2025.3608519","url":null,"abstract":"","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 3","pages":"C4-C4"},"PeriodicalIF":10.9,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11241060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145486519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Consumer Technology Society Board of Governors IEEE消费者技术协会理事会
IF 10.9 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2025-11-11 DOI: 10.1109/TCE.2025.3608496
{"title":"IEEE Consumer Technology Society Board of Governors","authors":"","doi":"10.1109/TCE.2025.3608496","DOIUrl":"https://doi.org/10.1109/TCE.2025.3608496","url":null,"abstract":"","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 3","pages":"C3-C3"},"PeriodicalIF":10.9,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11241059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145486500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero Trust Edge and Federated Learning for Consumer Internet of Things 面向消费者物联网的零信任边缘和联邦学习
IF 10.9 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2025-11-11 DOI: 10.1109/TCE.2025.3560705
Xin Ning;Lusi Li;Neeraj Kumar
{"title":"Zero Trust Edge and Federated Learning for Consumer Internet of Things","authors":"Xin Ning;Lusi Li;Neeraj Kumar","doi":"10.1109/TCE.2025.3560705","DOIUrl":"https://doi.org/10.1109/TCE.2025.3560705","url":null,"abstract":"The widespread adoption of Consumer Internet of Things (CIoT) devices has transformed consumer electronics, facilitating seamless integration between physical and digital domains. However, the surge in connected devices and the accompanying data explosion present significant challenges in latency, security, and privacy. Traditional cloud-based architectures are increasingly inadequate, as vulnerabilities like gradient leakage, poisoning attacks, and single-point failures compromise data integrity. The integration of Zero Trust Edge (ZTE) and Federated Learning (FL) offers a groundbreaking approach, providing decentralized security and privacy-preserving collaborative learning.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 3","pages":"9132-9132"},"PeriodicalIF":10.9,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11241091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145510163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Spatial-Temporal Illumination Features and Convolution-Transformer Hybrid Networks for Deepfake Video Detection 利用时空照明特征和卷积-变压器混合网络进行深度假视频检测
IF 10.9 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2025-10-23 DOI: 10.1109/TCE.2025.3624764
Guoqiang Zhang;Yu Liang;Kaiyue Tian;Jiachen Yi;Hadeel Alsolai;Menglu Liu;Xiyuan Hu
{"title":"Leveraging Spatial-Temporal Illumination Features and Convolution-Transformer Hybrid Networks for Deepfake Video Detection","authors":"Guoqiang Zhang;Yu Liang;Kaiyue Tian;Jiachen Yi;Hadeel Alsolai;Menglu Liu;Xiyuan Hu","doi":"10.1109/TCE.2025.3624764","DOIUrl":"https://doi.org/10.1109/TCE.2025.3624764","url":null,"abstract":"Current deepfake detection methods primarily focus on exploring inter-frame inconsistencies using convolutional networks, neglecting the investigation of long-range spatiotemporal inconsistencies. Simultaneously, these methods rely on single-feature exploitation for forgery detection, resulting in limited generalization capability and robustness. To address these issues, this paper proposes a novel network that comprehensively utilizes illumination-geometric features and facial forgery trace features to excavate deepfake artifacts across multiple scales. The architecture comprises three main components: First, the Lighting-Geometric Information Capture Module (LGCM) integrates facial landmark normal vectors and illumination coefficients to construct comprehensive spatiotemporal representations. Then, the Bi-directional Multiscale Enhancement Module (BMEM) captures attention information between different frames in the spatial domain and models inter-frame discrepancy attention in the temporal domain. Furthermore, the Spatio-temporal Attention Module (STAM) mines global semantics and adaptively derives long-range spatiotemporal representations. Experimental results demonstrate that the proposed method achieves high AUC values on the four subsets of FF++ C40, Celeb-DF, and DFDC datasets, outperforming the comparative methods. Similarly, cross-forgery method detection validates the robustness and generalization capability of the proposed approach.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 4","pages":"12479-12489"},"PeriodicalIF":10.9,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DICE: Tuning-Free Dynamic High-Fidelity Identity Customization and Enhancement Using Multi-Modal Contrastive Fusion for Consumer Devices DICE:使用多模态对比融合的无调谐动态高保真身份定制和增强
IF 10.9 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2025-10-23 DOI: 10.1109/TCE.2025.3624567
Sunder Ali Khowaja;Muhammad Salman Pathan;Kapal Dev;Ik Hyun Lee
{"title":"DICE: Tuning-Free Dynamic High-Fidelity Identity Customization and Enhancement Using Multi-Modal Contrastive Fusion for Consumer Devices","authors":"Sunder Ali Khowaja;Muhammad Salman Pathan;Kapal Dev;Ik Hyun Lee","doi":"10.1109/TCE.2025.3624567","DOIUrl":"https://doi.org/10.1109/TCE.2025.3624567","url":null,"abstract":"High Fidelity (HiFi) identity customization with text-to-image generation has gained a lot of interest from all four quadrants, such as industries, consumers, researchers, and digital content creators. Such generational models are capable of personalizing images with pretrained diffusion models without extensive fine-tuning. However, existing works often compromise HiFi or generative behavior of the original model due to computational constraints associated with training identity customization on consumer electronic devices. Furthermore, when using auxiliary images for fusion, existing models often compromise the identity customization. In this regard, we propose Dynamic high-fidelity Identity Customization and Enhancement (DICE) that integrates a vision transformer (ViT), specifically dealing with facial and non-facial images to extract semantic features, a dynamic and multi-model contrastive fusion strategy, denoising diffusion model, and a composite loss function. The DICE leverages evolved feature extraction, multi-scale feature fusion, adaptive contrastive paths, and adaptive composite loss to achieve high fidelity, editability, and minimal refinement to the base model even for the fusion of base image with the auxiliary one. Such tuning-free identity customization is appropriate for the consumers on their resource constrained electronic devices, as it requires no retraining, shifting the computational burden to a one-time, server-side training process. Experiments demonstrate that DICE outperforms existing state-of-the-art methods while offering a flexible solution for personalized image generation.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 4","pages":"12510-12518"},"PeriodicalIF":10.9,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Opportunistic Energy Harvesting Scheme for Tactile NOMA-Based D2D Users Using Federated Learning 基于联邦学习的基于触觉noma的D2D用户机会能量收集方案
IF 10.9 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2025-10-22 DOI: 10.1109/TCE.2025.3624585
Ahmed Barnawi;Ishan Budhiraja;Neeraj Kumar;Haneef Khan;Hussein Zangoti
{"title":"An Opportunistic Energy Harvesting Scheme for Tactile NOMA-Based D2D Users Using Federated Learning","authors":"Ahmed Barnawi;Ishan Budhiraja;Neeraj Kumar;Haneef Khan;Hussein Zangoti","doi":"10.1109/TCE.2025.3624585","DOIUrl":"https://doi.org/10.1109/TCE.2025.3624585","url":null,"abstract":"The Internet of Things (IoT) has emerged as an innovative paradigm that interconnects a diverse array of devices and systems to enable uninterrupted communication and data transmission. Within this extensive architecture, device-to-device (D2D) communication is critical for facilitating direct interactions among linked devices. This aspect of IoT surpasses traditional modalities of engagement between humans and machines. It cultivates an interactive ecosystem wherein devices autonomously collaborate, share data, and perform designated functions. D2D communication offers a multitude of benefits, such as enabling short-range interactions, minimizing latency, enhancing scalability, and optimizing energy efficiency. Moreover, to promote widespread connectivity and exceptionally dependable low-latency performance within the fifth generation (5G) network, the adoption of non-orthogonal multiple access (NOMA) merits further exploration. In this regard, the impact of federated learning on NOMA-based D2D group users (DGUs) within wireless-powered communication frameworks is examined. Initially, the D2D transmitters (DDTs) harvest energy from the radio frequency signals emitted by the base station. Subsequently, the DDTs employ NOMA to establish communication with the D2D receivers (DDRs) by utilizing the energy they have accumulated. A stochastic optimization problem is formulated to enhance energy efficiency (EE) and minimize delay. This formulation incorporates both stochastic traffic arrivals and the time-varying conditions of the communication channel. By applying the Markov decision process, the non-convex optimization problem is transformed into a mathematical model that encapsulates decision-making scenarios. Furthermore, federated learning is implemented to achieve the objectives and accelerate the dissemination of local training data across the DGUs. Empirical results illustrate that the proposed methodology achieves performance metrics that are 8.47% and 66.10% superior to those of distributed and centralized schemes, respectively.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 4","pages":"12398-12417"},"PeriodicalIF":10.9,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Ensemble Learning Framework for Intrusion Detection in Consumer Connected and Autonomous Vehicles 面向消费者互联和自动驾驶汽车入侵检测的智能集成学习框架
IF 10.9 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2025-10-09 DOI: 10.1109/TCE.2025.3619781
Ishtiaq Ahmad;Umair Ahmad Mughal;Liang Yang;Yazeed Alkhrijah;Ahmad Almadhor;Mohamad A. Alawad;Chau Yuen
{"title":"Intelligent Ensemble Learning Framework for Intrusion Detection in Consumer Connected and Autonomous Vehicles","authors":"Ishtiaq Ahmad;Umair Ahmad Mughal;Liang Yang;Yazeed Alkhrijah;Ahmad Almadhor;Mohamad A. Alawad;Chau Yuen","doi":"10.1109/TCE.2025.3619781","DOIUrl":"https://doi.org/10.1109/TCE.2025.3619781","url":null,"abstract":"The rapid advancement of consumer connected and autonomous vehicle (CAV) technologies offers significant improvements in transportation efficiency, safety, and user convenience. However, these benefits come with substantial cybersecurity risks, as in-vehicle networks and cloud connectivity expose CAVs to increasingly sophisticated cyberattacks. Conventional intrusion detection systems (IDS) often fall short in this domain, as they are not adaptive and struggle to handle the dynamic and stealthy nature of modern attacks. To address these limitations, we propose a novel IDS framework based on a stacking ensemble architecture that integrates multiple machine learning algorithms, Random Forest (RF), Support Vector Machine (SVM), Adaptive Boosting (AdaBoost), and Extreme Gradient Boosting (XGBoost), as base learners. A Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) serves as the meta-learner to capture temporal dependencies and sequential patterns in network traffic. To enhance the model’s generalization capability, we incorporate a model-agnostic meta-learning (MAML) approach into the LSTM-RNN meta-learner. The MAML-enhanced set of capabilities enables more effective detection of evolving and previously unseen attack scenarios. Simulation results demonstrate that the proposed framework consistently outperforms standalone LSTM-RNN models, traditional ensemble methods, and individual base learners in detecting complex cyberattack patterns in consumer CAV environments. These findings highlight the potential of meta-learning-driven ensemble IDS frameworks for securing next-generation intelligent transportation systems.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 4","pages":"12437-12448"},"PeriodicalIF":10.9,"publicationDate":"2025-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GRIOT-FENCE: Multi-View Adaptive Intrusion Detection for Trustworthy Consumer IoT Cyber Threat Analysis GRIOT-FENCE:面向可信消费者物联网网络威胁分析的多视图自适应入侵检测
IF 10.9 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2025-10-06 DOI: 10.1109/TCE.2025.3618175
Muhammad Shafiq;Penghui Li;Lihua Yin;Nada Alasbali;Mohammad Mahtab Alam
{"title":"GRIOT-FENCE: Multi-View Adaptive Intrusion Detection for Trustworthy Consumer IoT Cyber Threat Analysis","authors":"Muhammad Shafiq;Penghui Li;Lihua Yin;Nada Alasbali;Mohammad Mahtab Alam","doi":"10.1109/TCE.2025.3618175","DOIUrl":"https://doi.org/10.1109/TCE.2025.3618175","url":null,"abstract":"The rapid proliferation of consumer IoT applications has embedded interconnected devices into daily life, creating highly dynamic and heterogeneous environments that pose significant security challenges. Diverse devices, protocols, and user-driven interactions complicate cyber threat analysis, while existing deep learning methods struggle with single-view models that fail to capture comprehensive behavioral patterns and multi-view approaches that suffer from ineffective feature fusion, leading to low generalization in dynamic scenarios. To address the problem, a novel technique named GRIOT-FENCE is first proposed. Then, based on GRIOT-FENCE, a new algorithm named DYNAMO-IoT is developed and designed. GRIOT-FENCE conducts comprehensive cyber threat analysis by modeling structural interactions, temporal dynamics, and statistical characteristics of network traffic across diverse consumer IoT devices, enhancing data security through robust threat detection. Its context-aware fusion module, FUSCONET, dynamically weights predictions based on device roles and network conditions, improving threat analysis transparency by highlighting critical behavioral features. The DYNAMO-IoT algorithm continuously monitors performance and triggers lightweight retraining of the fusion layer, ensuring adaptability to evolving cyber threats with minimal computational overhead, suitable for resource-constrained consumer environments. Experimental results demonstrate that GRIOT-FENCE achieves superior detection accuracy and robust threat analysis compared to state-of-the-art methods on benchmark IoT datasets, safeguarding consumer IoT applications and enhancing their trustworthiness through improved data security, system reliability, and transparent threat insights.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 4","pages":"12449-12463"},"PeriodicalIF":10.9,"publicationDate":"2025-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书