{"title":"IEEE Systems Council Information","authors":"","doi":"10.1109/JSYST.2025.3564689","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3564689","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"C3-C3"},"PeriodicalIF":4.0,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11038956","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Systems Journal Publication Information","authors":"","doi":"10.1109/JSYST.2025.3564685","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3564685","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"C2-C2"},"PeriodicalIF":4.0,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11038952","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Systems Journal Information for Authors","authors":"","doi":"10.1109/JSYST.2025.3564691","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3564691","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"C4-C4"},"PeriodicalIF":4.0,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11039030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao Yuan;Tao Chen;Bangbang Ren;Mengmeng Zhang;Xueshan Luo
{"title":"Optimize Communication Architecture in Dynamic Combat Environment via Online Learning","authors":"Hao Yuan;Tao Chen;Bangbang Ren;Mengmeng Zhang;Xueshan Luo","doi":"10.1109/JSYST.2025.3553551","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3553551","url":null,"abstract":"The application of artificial intelligence, Big Data, and other advanced technologies has dramatically improved the intelligence level of the combat system-of-systems and accelerated the combat rhythm, which requires higher decision speed in the support of high-quality combat communication architecture. In reality, due to the poor infrastructure conditions on the battlefield, the communication services of the combat units are usually provided by the communication units with limited communication resources. Thus, figuring out an efficient method to share the scarce communication resources among massive combat units becomes crucial. However, it is challenging to efficiently construct the connection relationship and allocate communication resources to the operational units because of the differences in communication requirements and the randomness of location movement of combat units, i.e., unable to obtain battlefield environmental information in advance. In this article, we propose an online learning (OL)-based combat communication architecture construction method, which can estimate the current state of the battlefield environment by interacting with it and dynamically construct connection relationships and allocating communication resources according to the needs and locations of operational units, so as to maximize the QoE. The evaluation results demonstrate that our proposed OL-based approach is capable of constructing the combat communication architecture in a flexible and efficient manner, surpassing existing methods in terms of efficiency and fairness by significantly enhancing the total QoE up to twice as much compared to baseline methods.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"435-446"},"PeriodicalIF":4.0,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dezhen Yang;Yeyang Liu;Yi Ren;Xiaobin Li;Zili Wang
{"title":"A High-Dimensional Dynamic Characteristics-Based Boundary Test Scenario Generation Method for UAVs in Dynamic Target Tracking","authors":"Dezhen Yang;Yeyang Liu;Yi Ren;Xiaobin Li;Zili Wang","doi":"10.1109/JSYST.2025.3554840","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3554840","url":null,"abstract":"Effective boundary scenario generation methods are critical for dynamic target tracking when evaluating the performance of unmanned aerial vehicles. However, traditional methods primarily rely on exhaustive testing or random sampling and often assume that different contributing factors are independent. This results in the ineffective generation of boundary scenarios and a lack of realism. In this study, a novel high-dimensional dynamic characteristics-based boundary test scenario generation method is proposed using reinforcement learning (RL). Boundary test scenarios can be explored more purposive, by designing an appropriate reward function. First, an innovative scenario modeling method is developed to model the influence of environment, occlusion, and other interference. A joint distribution model of the key correlation factors, such as light intensity and clouds, is also established. This ensures scenario authenticity and test accuracy. Subsequently, a high-dimensional dynamic spatial Markov decision process (HDDS-MDP) model is constructed to facilitate the generation of boundary scenarios based on the scenario modeling. Ultimately, RL is employed to solve the HDDS-MDP model and generate boundary test scenario, thereby substantially improves the effectiveness of boundary test scenario generation. The simulation results indicate that the boundary test scenario generation effectiveness is improved by 91% over random sampling methods.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"553-564"},"PeriodicalIF":4.0,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Minh-Sang Van Nguyen;Dinh-Thuan Do;Phu Tran Tin;Alireza Vahid
{"title":"Secure Performance Analysis of User Pairs in Active Reconfigurable Intelligent Surface-Aided IoT Systems","authors":"Minh-Sang Van Nguyen;Dinh-Thuan Do;Phu Tran Tin;Alireza Vahid","doi":"10.1109/JSYST.2025.3553818","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3553818","url":null,"abstract":"We investigate the integration of an active reconfigurable intelligent surface (ARIS) with nonorthogonal multiple access (NOMA) to enhance the secrecy performance and the security capabilities in Internet of Things (IoT) systems. The system model incorporates ARIS and NOMA, allowing for improved power allocation and higher security. In particular, the physical-layer security of an ARIS-NOMA system is investigated when the system is subject to eavesdropping by a malicious user in a user pair group. To provide real-world impact, we examine the main system performance metrics, including the connection outage probability, the secrecy outage probability (SOP), and the strictly positive secrecy capacity, which are important guidelines in evaluating the system's reliability, security, and achievable secrecy rates. We evaluate the impact of distances between the ARIS, the eavesdropper, and the base station on the SOP. We derive the optimal power allocation factors in the NOMA scheme, which provides insights into the system design and parameter adjustment to achieve robust and secure operation. In comparison to a benchmark model using the orthogonal multiple access, we show ARIS-NOMA is a promising solution to further enhance security and secrecy in IoT networks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"370-381"},"PeriodicalIF":4.0,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guoliang Chen;Wenqing Zhao;Jianwei Xia;Zhichuang Wang;Ju H. Park
{"title":"Differentially Private Aperiodic Sampled-Data Consensus for Intelligent Interconnected Heterogeneous Vehicular Platoons","authors":"Guoliang Chen;Wenqing Zhao;Jianwei Xia;Zhichuang Wang;Ju H. Park","doi":"10.1109/JSYST.2025.3557729","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3557729","url":null,"abstract":"In this article, the vehicular platoons under aperiodic sampled-data information exchange between connected neighbors are implemented with an average output consensus while achieving differential privacy protection. Initially, the complex vehicle dynamics system is simplified into a heterogeneous linear system interconnected through a communication graph. Subsequently, a distributed hybrid controller is deployed, specifically tailored for handling the intermittent sampled-data information, and is augmented with a dynamic noise generator. This framework restricts information exchange to a predefined neighborhood set of vehicles. To ensure differential privacy, design and incorporate random noise adhering to a Laplace distribution, where the decay index and control gain are adjustable parameters corresponding to the desired privacy level and system accuracy, respectively. This noise injection is guided by a differential privacy noise utilization algorithm. The controller design is then formulated and solved using a combination of the pole placement method and the generalized inverse concept, enabling effective networked control. Lastly, simulation examples are provided to rigorously validate the proposed theoretical framework, demonstrating its efficacy in maintaining platoon coherence while preserving the privacy of individual vehicle data.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"612-623"},"PeriodicalIF":4.0,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Leader–Followers Consensus for Nonlinear Multiagent Systems With Exogenous Disturbances via Dynamic Triggered Strategies","authors":"Yuanshan Liu;Yude Xia","doi":"10.1109/JSYST.2025.3550132","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3550132","url":null,"abstract":"The article investigates the leader–followers consensus problem of nonlinear multiagent systems with nonlinear dynamics and uncertain exogenous disturbances, employing dynamic triggered strategies (DTSs). An active disturbance rejection control is utilized to design a disturbance observer for estimating the disturbances in the input channel. To enhance communication efficiency and reduce energy consumption during information interaction between agents, the disturbances estimator is integrated into the consensus controller to suppress these disturbances. The convergence condition and lower bound of DTSs are derived. Finally, numerical simulations validate the effectiveness of the proposed algorithm. <p><i>Note to Practitioners—</i> The complete system composed of multiple controlled objects in industrial production, transportation, aerospace, and other fields is inevitably influenced by external uncertain signals to varying degrees. The disturbance observer-based control technique effectively addresses the robust consensus problem of MASs. This significantly enhances the stability of most controlled systems operating in complex environments. Simultaneously, the distributed DTSs efficiently reduce communication burden between devices, minimize microprocessor computing power requirements, and save substantial economic costs. Undoubtedly, this offers a novel approach for the development of MASs.</p>","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"682-689"},"PeriodicalIF":4.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering Decision Manifolds to Assure Trusted Autonomous Systems","authors":"Matthew Litton;Doron Drusinsky;James Bret Michael","doi":"10.1109/JSYST.2025.3554957","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3554957","url":null,"abstract":"Developing and fielding complex systems requires proof that they are reliably correct with respect to their design and operating requirements. Especially for autonomous systems, which exhibit unanticipated emergent behavior, fully enumerating the range of possible correct and incorrect behaviors is intractable. Therefore, we propose an optimization-based search technique for generating high-quality, high-variance, and nontrivial data, which captures the range of correct and incorrect responses a system could exhibit. This manifold between desired and undesired behavior provides a more detailed understanding of system reliability than traditional testing or Monte Carlo simulations. After discovering data points along the manifold, we apply machine learning techniques to quantify the decision manifold's underlying mathematical function. Such models serve as correctness properties, which can be utilized to enable both verification during development and testing, as well as continuous assurance during operation, even amidst system adaptations and dynamic operating environments. This method can be applied in combination with a simulator in order to provide evidence of dependability to system designers and users, with the ultimate aim of establishing trust in the deployment of complex systems. In this proof-of-concept, we apply our method to a software-in-the-loop evaluation of an autonomous vehicle.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"413-424"},"PeriodicalIF":4.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing the Stealth of Load Redistribution Attacks: A Novel Cluster-Driven Approach","authors":"Rohini Haridas;Chenghong Gu;Satish Sharma;Rohit Bhakar","doi":"10.1109/JSYST.2025.3554205","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3554205","url":null,"abstract":"This letter proposes a novel cluster-driven bilevel Load Redistribution (LR) attack model in cyber physical power systems. The main goal is on overloading multiple transmission lines while maintaining a high level of stealth. The proposed model employs cluster-based approach to form distinct clusters, each representing different load patterns within the power system. This enables the design of attack vectors that seamlessly blend with these load patterns, thereby challenging advanced anomaly detection systems. The stealth of the attack is quantified by the Stealth Distance Index (SDI), ensuring that injected false data remain within the maximum permissible distance from the centroid of its corresponding cluster. The proposed model is validated on the modified IEEE 14-bus and 30-bus systems, demonstrating enhanced stealth capabilities in LR attacks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"712-715"},"PeriodicalIF":4.0,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}