{"title":"GHPPFL: A Privacy Preserving Federated Learning Based on Gradient Compression and Homomorphic Encryption in Consumer App Security","authors":"Qiong Li;Rongsheng Cai;Yizhao Zhu","doi":"10.1109/TCE.2025.3562767","DOIUrl":"https://doi.org/10.1109/TCE.2025.3562767","url":null,"abstract":"As Artificial Intelligence (AI) progresses, the application of federated learning in areas such as consumer app security and intelligent transportation systems is increasing rapidly. Federated learning allows model training without necessitating the sharing of local data, yet security issues present obstacles to its advancement. This paper presents a federated learning method that merges gradient compression with homomorphic encryption. Firstly, a unique gradient compression technique is proposed to reduce data transfer by compressing the model parameters exchanged among clients. Then, homomorphic encryption is utilized to prevent breaches of gradient privacy. Experimental results demonstrate that our proposed approach has a minimal impact on the accuracy of the global model, while it reduces data transmission and improves the privacy and security of federated learning.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 2","pages":"5090-5099"},"PeriodicalIF":10.9,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10970749","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144867551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized EEG Multi-Noise Removal and Compression: Deploying a PbP-QLP Enhanced Autoencoder on STM32 Microcontroller","authors":"Deepak Kumar;Udit Satija","doi":"10.1109/TCE.2025.3562388","DOIUrl":"https://doi.org/10.1109/TCE.2025.3562388","url":null,"abstract":"Electroencephalograms (EEGs) are effective and patient-friendly for diagnosing, monitoring, and preventing mental disorders. However, due to their low voltage, EEG signals often contain noise that obscures critical features, risking misdiagnosis. Current denoising methods typically address one or two noise types and struggle with memory limitations on edge devices. To overcome these challenges, we introduce a quantization-based compressed denoising autoencoder (DAE) model using a PbP-QLP, a low-rank approximation (LRA) technique, for multi-noise removal (15 types, including power-line, baseline wander, ocular, muscle artifacts, and combinations) in EEGs on low-memory edge devices. Our compression technique reduces the model size from 8 to 1.51 MB, achieving 81% weight compression with minimal loss.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 2","pages":"3218-3228"},"PeriodicalIF":10.9,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144867810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection System for Electronic Health Record Sharing in Consumer-Centric Healthcare Devices Using Attribute-Based Encryption","authors":"Kamiya Pithode;Pushpinder Singh Patheja","doi":"10.1109/TCE.2025.3558351","DOIUrl":"https://doi.org/10.1109/TCE.2025.3558351","url":null,"abstract":"To address the challenges of inflexible privilege changes and vulnerability to collusion attacks in electronic health record (EHR) sharing, this paper proposes a multi-authority system designed to resist such attacks on consumer-centric healthcare devices. The system achieves attribute revocation through version control, where the attribute authority provides updated keys to non-revoked users and updates the ciphertext, ensuring that users without the updated keys can no longer access the data. To optimize data access efficiency, the scheme offloads most computations to the cloud server. Each attribute authority generates its own public-private key pair to prevent collusion attacks. Security analysis demonstrates that the scheme is secure against chosen plaintext attacks under the concrete cryptographic assumptions model. Experimental results show that the proposed scheme significantly reduces decryption overhead, achieving at least a 52.56% reduction compared to existing multi-authority schemes.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 2","pages":"5942-5949"},"PeriodicalIF":10.9,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144867775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Coordinated Scheduling of Electric Vehicles and Battery Energy Storage Systems","authors":"Xiao-Ju Shang;Yateendra Mishra;Yin Yang;Jin-Long Liu;Zu-Guo Yu;Yu-Chu Tian","doi":"10.1109/TCE.2025.3561845","DOIUrl":"https://doi.org/10.1109/TCE.2025.3561845","url":null,"abstract":"Electric vehicles (EVs) and battery energy storage systems (BESS) are rapidly gaining adoption worldwide as emerging consumer electronics products, playing an important role in the transition to sustainable energy. While their integration into power grids offers significant benefits when managed appropriately, it also introduces challenges related to grid stability and efficiency, such as increased peak demand and voltage fluctuations. Effective management of these challenges demands coordinated scheduling of EVs and BESS for both charging from the grid and discharging back into it. Various optimization approaches, including mixed-integer nonlinear programming (MINLP), have been proposed to tackle this problem. However, these approaches often involve numerous binary decision variables, which result in increased computational complexity or even make the computation practically infeasible in large-scale scenarios. To address this issue, this paper formulates the coordinated scheduling of EVs and BESS as a nonconvex constrained optimization problem with significantly fewer decision variables. A Modified Jacobi Proximal Alternating Direction Method of Multipliers (M-ProxJADMM) is proposed to efficiently solve the problem, with guaranteed convergence. Case studies are conducted to validate the effectiveness of the M-ProxJADMM algorithm in optimizing the coordinated scheduling of EVs and BESS.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 2","pages":"2944-2954"},"PeriodicalIF":10.9,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144868032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Time-Driven UAV Deployment and Content Caching Approach for Multi-UAV-Enabled Consumer Electronics Network","authors":"Jianshan Zhang;Xu Yang;Rui Ming;Haibo Luo;Xiaoding Wang;Md. Jalil Piran","doi":"10.1109/TCE.2025.3560129","DOIUrl":"https://doi.org/10.1109/TCE.2025.3560129","url":null,"abstract":"To address the problem of high delay due to the explosive growth of mobile data traffic in consumer electronics network (CEN), in this paper, we investigate the multiple-unmanned aerial vehicle (UAV)-enabled CEN content caching problem, focusing on minimizing content access delay by jointly optimizing UAV deployment, ground user (GU) access, and content caching while satisfying other resource constraints. We propose an algorithm based on alternating optimization for the scenario where multiple UAVs and base station (BS) collaborate to provide caching services. The algorithm attains a sub-optimal solution with a convergence guarantee by iteratively solving the three sub-problems derived from the decomposition of the target problem. First, a convex difference-based algorithm solves the UAV deployment sub-problem. Second, a greedy-based algorithm is used to solve the content caching sub-problem. Then, a continuous convex approximation algorithm based on the penalty function is used to solve the user access sub-problem. Finally, the above procedure is repeated to obtain a sub-optimal solution to the target problem. The proposed joint optimization algorithm is shown to outperform the benchmark algorithms in terms of average content access delay and cache hit ratio, as evidenced by numerical results.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 2","pages":"3941-3951"},"PeriodicalIF":10.9,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144867602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoying Zhang;Yihang Huang;Jiaxuan Li;Guifeng Zheng;Kai Shao;Tengfei Li;Xiaojie Wang;Zhaolong Ning
{"title":"AI-Empowered Task Intent Prediction and Path Planning for Cooperative AAV Swarms in Consumer Internet of Vehicles","authors":"Xiaoying Zhang;Yihang Huang;Jiaxuan Li;Guifeng Zheng;Kai Shao;Tengfei Li;Xiaojie Wang;Zhaolong Ning","doi":"10.1109/TCE.2025.3560642","DOIUrl":"https://doi.org/10.1109/TCE.2025.3560642","url":null,"abstract":"The integration of Autonomous aerial vehicles (AAV) significantly expands the operational scope of the Consumer Internet of Vehicles (CIoV), enhancing its potential applications. In this paper, a AAV swarm task intent prediction and path recommendation framework is proposed to effectively address the challenges of resource utilization associated with spatially distributed consumer electronic services. Employing fuzzy theory, the framework integrates multi-sensor AAV data using Neural Network (NN)-based membership functions and fuzzy rules. These elements facilitate automatic optimization and historical scenario analysis to infer task intent, represented as spatial task distribution. Additionally, the predicted intent and environmental features are combined in a Long Short-Term Memory (LSTM) network to predict bid prices in an auction algorithm, thereby enhancing path recommendation capabilities. The framework is validated on the developed semi-physical platform supporting real-time AAV swarm control and inter-AAV communication, demonstrating superior performance in system throughput and service percentage compared to existing methods.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 2","pages":"3837-3848"},"PeriodicalIF":10.9,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144868053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time GPS Spoofing Detection in Consumer Drones Through Multi-Sensor Data Fusion and TimesNet","authors":"Jialiang Wang;Liuyang Nie;Zhaojun Gu;Jingyu Wang;Rui Tan;Saru Kumari","doi":"10.1109/TCE.2025.3560264","DOIUrl":"https://doi.org/10.1109/TCE.2025.3560264","url":null,"abstract":"To address the threat of GPS spoofing attacks on consumer drones, this paper proposes a real-time detection method based on multi-sensor data fusion and TimesNet. By integrating data from multi-source heterogeneous sensors such as the Inertial Measurement Unit (IMU), magnetometer, and barometer, a spatiotemporal feature cross-validation mechanism is constructed, overcoming the limitations of traditional single-sensor detection. Innovatively, the TimesNet deep temporal network is introduced, leveraging key frequency-domain period extraction and multi-scale feature reorganization techniques to achieve the second-level real-time detection response. A dynamic adversarial GPS spoofing sample generation algorithm is proposed to simulate multi-dimensional position offset attacks in complex battlefield environments, constructing an adversarial sample library covering eight typical flight trajectories. Experimental results demonstrate that the proposed method achieves an average detection accuracy of 99.57% and an F1-score of 99.30% across complex trajectories such as straight lines, curves, and spirals, with a detection response time controlled within 0.35-0.70 seconds. Compared to existing visual matching and single-sensor solutions, this method requires no additional hardware and can be deployed on embedded platforms with only 1.2M parameters, providing a lightweight solution for drone navigation security.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 2","pages":"5569-5583"},"PeriodicalIF":10.9,"publicationDate":"2025-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144868249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synergistic Integration of 5G-Enabled Cloud Native Infrastructures With Advanced Technologies for Urban Safety Enhancement","authors":"Ashutosh Sharma;Amit Sharma;Kola Narasimha Raju;Ismail Keshta;Kai Guo","doi":"10.1109/TCE.2025.3560133","DOIUrl":"https://doi.org/10.1109/TCE.2025.3560133","url":null,"abstract":"Urban safety remains an important concern in modern cities, which makes it necessary for advanced approaches to address the progressing challenge such as fire risk assessment and security enhancement. This study explores the important integration of 5G-enabled cloud-native infrastructures with the Internet of Things (IoT), and Artificial Intelligence (AI) algorithm for empowering urban safety. Kubernetes is used as an essential component of the Cloud Native Computing Foundation (CNCF) ecosystem, for managing scalable and resilient infrastructures. This integration of 5G-enabled systems to cloud-native infrastructures proposes an efficient solution that offers high-speed connectivity, low latency, and the scalability required for real-time data processing and communication. In the proposed work, IoT devices are strategically deployed across urban areas to achieve comprehensive coverage and facilitate real-time data collection and monitoring, ideally integrated with Kubernetes-managed clusters to ensure data transmission and processing. Machine Learning (ML) and Deep Learning (DL) based model is trained on the collected data from the field, using Kubernetes for scalable and automated deployment providing real-time data analysis, accurate prediction, and decision-making. The proposed 5G integrated framework provides proactive risk management and enhanced emergency response strategies. The integration of 5G-enabled systems led to a significant reduction in latency, typically to 20 milliseconds, enhancing real-time performance and decision-making processes. This study introduces a framework designed to reduce latency to 20 ms and improve data transmission rates by 25%. Real-world applications, including fire detection and traffic management, demonstrated the system’s effectiveness, achieving sensitivity and recall rates of 97% and 96%, respectively. These results underscore the potential of the proposed framework to enhance urban safety while addressing scalability and integration challenges for future implementations.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 2","pages":"5321-5334"},"PeriodicalIF":10.9,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144868153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Udara Jayasinghe;Thanuj Fernando;Yasith Ganearachchi;Prabhath Samarathunga;Anil Fernando
{"title":"Quantum Communication-Based Image Transmission With Transmit and Receive Diversity in MIMO Communication Systems","authors":"Udara Jayasinghe;Thanuj Fernando;Yasith Ganearachchi;Prabhath Samarathunga;Anil Fernando","doi":"10.1109/TCE.2025.3559634","DOIUrl":"https://doi.org/10.1109/TCE.2025.3559634","url":null,"abstract":"Quantum communication systems have the potential to revolutionize media transmission technologies with unparalleled efficiency and reliability. However, practical and scalable implementations are challenged by issues such as channel fading and interference. To address these, we propose a novel approach combining quantum superposition with transmit and receive diversity schemes in Multiple-Input Multiple-Output (MIMO) systems, designed to mitigate the effects of fading for enhanced image transmission. In our simulations, images in JPEG and HEIF formats are channel encoded with rate 1/2 polar coding, converted into qubit superposition states, and transmitted through a 2x2 MIMO system with varied diversity schemes. At the receiver, a quantum decoder reconstructs the classical information, followed by polar decoding to retrieve the original image data. Our approach achieves notable improvements in image quality, with Peak Signal-to-Noise Ratio (PSNR) up to 58.27 dB for JPEG and 64.72 dB for HEIF, and Structural Similarity Index Measure (SSIM) up to 0.9994 for JPEG and 0.9999 for HEIF, outperforming classical systems, especially under low Signal-to-Noise Ratio (SNR) conditions, demonstrating the system’s enhanced ability to maintain image quality in noisy channels. These findings highlight the promise of quantum superposition-based media transmission to set new standards in reliable, high-fidelity communication for next-generation systems.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 2","pages":"2500-2507"},"PeriodicalIF":10.9,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144868308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 1st-Order NS-SAR⋅ADC With DCMS Switching Scheme for Smart Consumer Electronics Device","authors":"Xin Xin;Yuchen Li;Shimei Zhao;Dingyu Sun;Xingyuan Tong","doi":"10.1109/TCE.2025.3559687","DOIUrl":"https://doi.org/10.1109/TCE.2025.3559687","url":null,"abstract":"A novel Dual-Capacitor Merge-and-Split (DCMS) capacitor switching scheme is proposed for a Noise-Shaping (NS) Successive-Approximation-Register Analog-to-Digital-Converter (SAR ADC) for smart consumer electronics device. In comparison to the <inline-formula> <tex-math>$V_{mathrm { cm}}$ </tex-math></inline-formula>-based method, the proposed DCMS scheme significantly decreases the average switching energy by 93.7%, while optimizing integral and differential non-linearity by factors of <inline-formula> <tex-math>$surd 3$ </tex-math></inline-formula>/<inline-formula> <tex-math>$4times $ </tex-math></inline-formula> and <inline-formula> <tex-math>$surd 1$ </tex-math></inline-formula>/<inline-formula> <tex-math>$2times $ </tex-math></inline-formula>, respectively. By employing only <inline-formula> <tex-math>$V_{mathrm { cm}}$ </tex-math></inline-formula> reference, the DCMS scheme can avoid the <inline-formula> <tex-math>$V_{ref}$ </tex-math></inline-formula> generation circuit and mismatch between the <inline-formula> <tex-math>$V_{ref}$ </tex-math></inline-formula> and <inline-formula> <tex-math>$V_{mathrm { cm}}$ </tex-math></inline-formula> compared to the tri-level or multiple-level switching schemes. Moreover, it maintains a stable common-mode output voltage, simplifying comparator design by aiding in dynamic offset suppression. A <inline-formula> <tex-math>$1{^{text {st}}}$ </tex-math></inline-formula>-order NS-SAR ADC is implemented with the proposed DCMS scheme in a 0.18-<inline-formula> <tex-math>$mu $ </tex-math></inline-formula>m CMOS process. Measurement results indicate it can achieve a Signal-to-Noise-and-Distortion Ratio (SNDR) of 66.5 dB with a power consumption of <inline-formula> <tex-math>$19.22~mu $ </tex-math></inline-formula>W from a 1-V supply, at a sampling rate of 1 MS/s. This yields a Schreier Figure-of-Merit (FoMs) of 161.6 dB and a Walden Figure-of-Merit (FoMw) of 89.28 fJ/conversion-step.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 1","pages":"1298-1306"},"PeriodicalIF":4.3,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144322946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}