IEEE Systems Journal最新文献

筛选
英文 中文
IEEE Systems Council Information IEEE系统委员会信息
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2025-06-17 DOI: 10.1109/JSYST.2025.3564689
{"title":"IEEE Systems Council Information","authors":"","doi":"10.1109/JSYST.2025.3564689","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3564689","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"C3-C3"},"PeriodicalIF":4.0,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11038956","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems Journal Publication Information IEEE系统期刊出版信息
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2025-06-17 DOI: 10.1109/JSYST.2025.3564685
{"title":"IEEE Systems Journal Publication Information","authors":"","doi":"10.1109/JSYST.2025.3564685","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3564685","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"C2-C2"},"PeriodicalIF":4.0,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11038952","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems Journal Information for Authors IEEE系统期刊信息作者
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2025-06-17 DOI: 10.1109/JSYST.2025.3564691
{"title":"IEEE Systems Journal Information for Authors","authors":"","doi":"10.1109/JSYST.2025.3564691","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3564691","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"C4-C4"},"PeriodicalIF":4.0,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11039030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimize Communication Architecture in Dynamic Combat Environment via Online Learning 通过在线学习优化动态战斗环境下的通信体系结构
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2025-04-28 DOI: 10.1109/JSYST.2025.3553551
Hao Yuan;Tao Chen;Bangbang Ren;Mengmeng Zhang;Xueshan Luo
{"title":"Optimize Communication Architecture in Dynamic Combat Environment via Online Learning","authors":"Hao Yuan;Tao Chen;Bangbang Ren;Mengmeng Zhang;Xueshan Luo","doi":"10.1109/JSYST.2025.3553551","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3553551","url":null,"abstract":"The application of artificial intelligence, Big Data, and other advanced technologies has dramatically improved the intelligence level of the combat system-of-systems and accelerated the combat rhythm, which requires higher decision speed in the support of high-quality combat communication architecture. In reality, due to the poor infrastructure conditions on the battlefield, the communication services of the combat units are usually provided by the communication units with limited communication resources. Thus, figuring out an efficient method to share the scarce communication resources among massive combat units becomes crucial. However, it is challenging to efficiently construct the connection relationship and allocate communication resources to the operational units because of the differences in communication requirements and the randomness of location movement of combat units, i.e., unable to obtain battlefield environmental information in advance. In this article, we propose an online learning (OL)-based combat communication architecture construction method, which can estimate the current state of the battlefield environment by interacting with it and dynamically construct connection relationships and allocating communication resources according to the needs and locations of operational units, so as to maximize the QoE. The evaluation results demonstrate that our proposed OL-based approach is capable of constructing the combat communication architecture in a flexible and efficient manner, surpassing existing methods in terms of efficiency and fairness by significantly enhancing the total QoE up to twice as much compared to baseline methods.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"435-446"},"PeriodicalIF":4.0,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A High-Dimensional Dynamic Characteristics-Based Boundary Test Scenario Generation Method for UAVs in Dynamic Target Tracking 基于高维动态特性的无人机动态目标跟踪边界测试场景生成方法
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2025-04-24 DOI: 10.1109/JSYST.2025.3554840
Dezhen Yang;Yeyang Liu;Yi Ren;Xiaobin Li;Zili Wang
{"title":"A High-Dimensional Dynamic Characteristics-Based Boundary Test Scenario Generation Method for UAVs in Dynamic Target Tracking","authors":"Dezhen Yang;Yeyang Liu;Yi Ren;Xiaobin Li;Zili Wang","doi":"10.1109/JSYST.2025.3554840","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3554840","url":null,"abstract":"Effective boundary scenario generation methods are critical for dynamic target tracking when evaluating the performance of unmanned aerial vehicles. However, traditional methods primarily rely on exhaustive testing or random sampling and often assume that different contributing factors are independent. This results in the ineffective generation of boundary scenarios and a lack of realism. In this study, a novel high-dimensional dynamic characteristics-based boundary test scenario generation method is proposed using reinforcement learning (RL). Boundary test scenarios can be explored more purposive, by designing an appropriate reward function. First, an innovative scenario modeling method is developed to model the influence of environment, occlusion, and other interference. A joint distribution model of the key correlation factors, such as light intensity and clouds, is also established. This ensures scenario authenticity and test accuracy. Subsequently, a high-dimensional dynamic spatial Markov decision process (HDDS-MDP) model is constructed to facilitate the generation of boundary scenarios based on the scenario modeling. Ultimately, RL is employed to solve the HDDS-MDP model and generate boundary test scenario, thereby substantially improves the effectiveness of boundary test scenario generation. The simulation results indicate that the boundary test scenario generation effectiveness is improved by 91% over random sampling methods.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"553-564"},"PeriodicalIF":4.0,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Performance Analysis of User Pairs in Active Reconfigurable Intelligent Surface-Aided IoT Systems 主动可重构智能表面辅助物联网系统中用户对安全性能分析
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2025-04-23 DOI: 10.1109/JSYST.2025.3553818
Minh-Sang Van Nguyen;Dinh-Thuan Do;Phu Tran Tin;Alireza Vahid
{"title":"Secure Performance Analysis of User Pairs in Active Reconfigurable Intelligent Surface-Aided IoT Systems","authors":"Minh-Sang Van Nguyen;Dinh-Thuan Do;Phu Tran Tin;Alireza Vahid","doi":"10.1109/JSYST.2025.3553818","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3553818","url":null,"abstract":"We investigate the integration of an active reconfigurable intelligent surface (ARIS) with nonorthogonal multiple access (NOMA) to enhance the secrecy performance and the security capabilities in Internet of Things (IoT) systems. The system model incorporates ARIS and NOMA, allowing for improved power allocation and higher security. In particular, the physical-layer security of an ARIS-NOMA system is investigated when the system is subject to eavesdropping by a malicious user in a user pair group. To provide real-world impact, we examine the main system performance metrics, including the connection outage probability, the secrecy outage probability (SOP), and the strictly positive secrecy capacity, which are important guidelines in evaluating the system's reliability, security, and achievable secrecy rates. We evaluate the impact of distances between the ARIS, the eavesdropper, and the base station on the SOP. We derive the optimal power allocation factors in the NOMA scheme, which provides insights into the system design and parameter adjustment to achieve robust and secure operation. In comparison to a benchmark model using the orthogonal multiple access, we show ARIS-NOMA is a promising solution to further enhance security and secrecy in IoT networks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"370-381"},"PeriodicalIF":4.0,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentially Private Aperiodic Sampled-Data Consensus for Intelligent Interconnected Heterogeneous Vehicular Platoons 智能互联异构车辆队列的差分私有非周期采样数据一致性
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2025-04-21 DOI: 10.1109/JSYST.2025.3557729
Guoliang Chen;Wenqing Zhao;Jianwei Xia;Zhichuang Wang;Ju H. Park
{"title":"Differentially Private Aperiodic Sampled-Data Consensus for Intelligent Interconnected Heterogeneous Vehicular Platoons","authors":"Guoliang Chen;Wenqing Zhao;Jianwei Xia;Zhichuang Wang;Ju H. Park","doi":"10.1109/JSYST.2025.3557729","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3557729","url":null,"abstract":"In this article, the vehicular platoons under aperiodic sampled-data information exchange between connected neighbors are implemented with an average output consensus while achieving differential privacy protection. Initially, the complex vehicle dynamics system is simplified into a heterogeneous linear system interconnected through a communication graph. Subsequently, a distributed hybrid controller is deployed, specifically tailored for handling the intermittent sampled-data information, and is augmented with a dynamic noise generator. This framework restricts information exchange to a predefined neighborhood set of vehicles. To ensure differential privacy, design and incorporate random noise adhering to a Laplace distribution, where the decay index and control gain are adjustable parameters corresponding to the desired privacy level and system accuracy, respectively. This noise injection is guided by a differential privacy noise utilization algorithm. The controller design is then formulated and solved using a combination of the pole placement method and the generalized inverse concept, enabling effective networked control. Lastly, simulation examples are provided to rigorously validate the proposed theoretical framework, demonstrating its efficacy in maintaining platoon coherence while preserving the privacy of individual vehicle data.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"612-623"},"PeriodicalIF":4.0,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Leader–Followers Consensus for Nonlinear Multiagent Systems With Exogenous Disturbances via Dynamic Triggered Strategies 基于动态触发策略的非线性多智能体系统的鲁棒领导-追随者共识
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2025-04-11 DOI: 10.1109/JSYST.2025.3550132
Yuanshan Liu;Yude Xia
{"title":"Robust Leader–Followers Consensus for Nonlinear Multiagent Systems With Exogenous Disturbances via Dynamic Triggered Strategies","authors":"Yuanshan Liu;Yude Xia","doi":"10.1109/JSYST.2025.3550132","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3550132","url":null,"abstract":"The article investigates the leader–followers consensus problem of nonlinear multiagent systems with nonlinear dynamics and uncertain exogenous disturbances, employing dynamic triggered strategies (DTSs). An active disturbance rejection control is utilized to design a disturbance observer for estimating the disturbances in the input channel. To enhance communication efficiency and reduce energy consumption during information interaction between agents, the disturbances estimator is integrated into the consensus controller to suppress these disturbances. The convergence condition and lower bound of DTSs are derived. Finally, numerical simulations validate the effectiveness of the proposed algorithm. <p><i>Note to Practitioners—</i> The complete system composed of multiple controlled objects in industrial production, transportation, aerospace, and other fields is inevitably influenced by external uncertain signals to varying degrees. The disturbance observer-based control technique effectively addresses the robust consensus problem of MASs. This significantly enhances the stability of most controlled systems operating in complex environments. Simultaneously, the distributed DTSs efficiently reduce communication burden between devices, minimize microprocessor computing power requirements, and save substantial economic costs. Undoubtedly, this offers a novel approach for the development of MASs.</p>","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"682-689"},"PeriodicalIF":4.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovering Decision Manifolds to Assure Trusted Autonomous Systems 发现决策流形以保证可信自治系统
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2025-04-11 DOI: 10.1109/JSYST.2025.3554957
Matthew Litton;Doron Drusinsky;James Bret Michael
{"title":"Discovering Decision Manifolds to Assure Trusted Autonomous Systems","authors":"Matthew Litton;Doron Drusinsky;James Bret Michael","doi":"10.1109/JSYST.2025.3554957","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3554957","url":null,"abstract":"Developing and fielding complex systems requires proof that they are reliably correct with respect to their design and operating requirements. Especially for autonomous systems, which exhibit unanticipated emergent behavior, fully enumerating the range of possible correct and incorrect behaviors is intractable. Therefore, we propose an optimization-based search technique for generating high-quality, high-variance, and nontrivial data, which captures the range of correct and incorrect responses a system could exhibit. This manifold between desired and undesired behavior provides a more detailed understanding of system reliability than traditional testing or Monte Carlo simulations. After discovering data points along the manifold, we apply machine learning techniques to quantify the decision manifold's underlying mathematical function. Such models serve as correctness properties, which can be utilized to enable both verification during development and testing, as well as continuous assurance during operation, even amidst system adaptations and dynamic operating environments. This method can be applied in combination with a simulator in order to provide evidence of dependability to system designers and users, with the ultimate aim of establishing trust in the deployment of complex systems. In this proof-of-concept, we apply our method to a software-in-the-loop evaluation of an autonomous vehicle.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"413-424"},"PeriodicalIF":4.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Stealth of Load Redistribution Attacks: A Novel Cluster-Driven Approach 增强负载重分配攻击的隐蔽性:一种新的集群驱动方法
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2025-04-09 DOI: 10.1109/JSYST.2025.3554205
Rohini Haridas;Chenghong Gu;Satish Sharma;Rohit Bhakar
{"title":"Enhancing the Stealth of Load Redistribution Attacks: A Novel Cluster-Driven Approach","authors":"Rohini Haridas;Chenghong Gu;Satish Sharma;Rohit Bhakar","doi":"10.1109/JSYST.2025.3554205","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3554205","url":null,"abstract":"This letter proposes a novel cluster-driven bilevel Load Redistribution (LR) attack model in cyber physical power systems. The main goal is on overloading multiple transmission lines while maintaining a high level of stealth. The proposed model employs cluster-based approach to form distinct clusters, each representing different load patterns within the power system. This enables the design of attack vectors that seamlessly blend with these load patterns, thereby challenging advanced anomaly detection systems. The stealth of the attack is quantified by the Stealth Distance Index (SDI), ensuring that injected false data remain within the maximum permissible distance from the centroid of its corresponding cluster. The proposed model is validated on the modified IEEE 14-bus and 30-bus systems, demonstrating enhanced stealth capabilities in LR attacks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"712-715"},"PeriodicalIF":4.0,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信