首页 > 最新文献

信息工程最新文献

英文 中文
IF:
Life cycle assessment of metal powder production: a Bayesian stochastic Kriging model-based autonomous estimation 金属粉末生产的生命周期评估:基于贝叶斯随机克里金模型的自主估算
Pub Date : 2024-10-17 DOI: 10.1007/s43684-024-00079-5
Haibo Xiao, Baoyun Gao, Shoukang Yu, Bin Liu, Sheng Cao, Shitong Peng

Metal powder contributes to the environmental burdens of additive manufacturing (AM) substantially. Current life cycle assessments (LCAs) of metal powders present considerable variations of lifecycle environmental inventory due to process divergence, spatial heterogeneity, or temporal fluctuation. Most importantly, the amounts of LCA studies on metal powder are limited and primarily confined to partial material types. To this end, based on the data surveyed from a metal powder supplier, this study conducted an LCA of titanium and nickel alloy produced by electrode-inducted and vacuum-inducted melting gas atomization, respectively. Given that energy consumption dominates the environmental burden of powder production and is influenced by metal materials’ physical properties, we proposed a Bayesian stochastic Kriging model to estimate the energy consumption during the gas atomization process. This model considered the inherent uncertainties of training data and adaptively updated the parameters of interest when new environmental data on gas atomization were available. With the predicted energy use information of specific powder, the corresponding lifecycle environmental impacts can be further autonomously estimated in conjunction with the other surveyed powder production stages. Results indicated the environmental impact of titanium alloy powder is slightly higher than that of nickel alloy powder and their lifecycle carbon emissions are around 20 kg CO2 equivalency. The proposed Bayesian stochastic Kriging model showed more accurate predictions of energy consumption compared with conventional Kriging and stochastic Kriging models. This study enables data imputation of energy consumption during gas atomization given the physical properties and producing technique of powder materials.

金属粉末在很大程度上加重了增材制造(AM)的环境负担。目前对金属粉末进行的生命周期评估(LCA)显示,由于工艺不同、空间异质性或时间波动,生命周期环境清单存在相当大的差异。最重要的是,有关金属粉末的生命周期评估研究数量有限,而且主要局限于部分材料类型。为此,本研究根据从一家金属粉末供应商处获得的数据,分别对通过电感应和真空感应熔化气体雾化法生产的钛合金和镍合金进行了生命周期评估。鉴于能耗在粉末生产的环境负担中占主导地位,且受金属材料物理性质的影响,我们提出了贝叶斯随机克里金模型来估算气体雾化过程中的能耗。该模型考虑了训练数据固有的不确定性,并在获得新的气体雾化环境数据时对相关参数进行自适应更新。有了特定粉末的预测能源使用信息,就可以结合其他调查的粉末生产阶段,进一步自主估算相应的生命周期环境影响。结果表明,钛合金粉末的环境影响略高于镍合金粉末,其生命周期碳排放量约为 20 千克二氧化碳当量。与传统克里金模型和随机克里金模型相比,所提出的贝叶斯随机克里金模型对能耗的预测更为准确。根据粉末材料的物理性质和生产技术,这项研究可以对气体雾化过程中的能耗进行数据推算。
{"title":"Life cycle assessment of metal powder production: a Bayesian stochastic Kriging model-based autonomous estimation","authors":"Haibo Xiao,&nbsp;Baoyun Gao,&nbsp;Shoukang Yu,&nbsp;Bin Liu,&nbsp;Sheng Cao,&nbsp;Shitong Peng","doi":"10.1007/s43684-024-00079-5","DOIUrl":"10.1007/s43684-024-00079-5","url":null,"abstract":"<div><p>Metal powder contributes to the environmental burdens of additive manufacturing (AM) substantially. Current life cycle assessments (LCAs) of metal powders present considerable variations of lifecycle environmental inventory due to process divergence, spatial heterogeneity, or temporal fluctuation. Most importantly, the amounts of LCA studies on metal powder are limited and primarily confined to partial material types. To this end, based on the data surveyed from a metal powder supplier, this study conducted an LCA of titanium and nickel alloy produced by electrode-inducted and vacuum-inducted melting gas atomization, respectively. Given that energy consumption dominates the environmental burden of powder production and is influenced by metal materials’ physical properties, we proposed a Bayesian stochastic Kriging model to estimate the energy consumption during the gas atomization process. This model considered the inherent uncertainties of training data and adaptively updated the parameters of interest when new environmental data on gas atomization were available. With the predicted energy use information of specific powder, the corresponding lifecycle environmental impacts can be further autonomously estimated in conjunction with the other surveyed powder production stages. Results indicated the environmental impact of titanium alloy powder is slightly higher than that of nickel alloy powder and their lifecycle carbon emissions are around 20 kg CO<sub>2</sub> equivalency. The proposed Bayesian stochastic Kriging model showed more accurate predictions of energy consumption compared with conventional Kriging and stochastic Kriging models. This study enables data imputation of energy consumption during gas atomization given the physical properties and producing technique of powder materials.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00079-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142443184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lessons for biosecurity education from the International Nuclear Security Education Network 国际核安全教育网络为生物安全教育提供的经验教训
Q1 Social Sciences Pub Date : 2024-10-04 DOI: 10.1016/j.jobb.2024.09.002
With the rapid advances in technology and life science, biological security is now at a defining moment. The mandate of the 2022 Biological and Toxin Weapons Convention 9th Review Conference emphasised the urgent need for new tools to strengthen the Convention. In this paper, we review the development and efforts of the International Nuclear Security Education Network (INSEN) to provide examples of best practice for implementation of the newly founded International Biological Security Education Network (IBSEN). Learning from the lessons of the INSEN, the sustainability of the network through continuous engagement of its members is essential for the further development of global biosecurity education.
随着技术和生命科学的飞速发展,生物安全正处于决定性时刻。2022 年《生物和毒素武器公约》第九次审议大会的任务强调,迫切需要新的工具来加强《公约》。在本文中,我们回顾了国际核安全教育网络(INSEN)的发展和努力,为新成立的国际生物安全教育网络(IBSEN)的实施提供最佳实践范例。汲取国际核安全教育网络的经验教训,通过其成员的持续参与实现该网络的可持续性对于进一步发展全球生物安全教育至关重要。
{"title":"Lessons for biosecurity education from the International Nuclear Security Education Network","authors":"","doi":"10.1016/j.jobb.2024.09.002","DOIUrl":"10.1016/j.jobb.2024.09.002","url":null,"abstract":"<div><div>With the rapid advances in technology and life science, biological security is now at a defining moment. The mandate of the 2022 Biological and Toxin Weapons Convention 9th Review Conference emphasised the urgent need for new tools to strengthen the Convention. In this paper, we review the development and efforts of the International Nuclear Security Education Network (INSEN) to provide examples of best practice for implementation of the newly founded International Biological Security Education Network (IBSEN). Learning from the lessons of the INSEN, the sustainability of the network through continuous engagement of its members is essential for the further development of global biosecurity education.</div></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142445180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging multi-output modelling for CIELAB using colour difference formula towards sustainable textile dyeing 利用色差公式为 CIELAB 建立多输出模型,实现可持续纺织品染色
Pub Date : 2024-09-26 DOI: 10.1007/s43684-024-00076-8
Zheyuan Chen, Jian Liu, Jian Li, Mukun Yuan, Guangping Yu

Textile dyeing requires optimizing combinations of ingredients and process parameters to achieve target colour properties. Modelling the complex relationships between these factors and the resulting colour is challenging. In this case, a physics-informed approach for multi-output regression to model CIELAB colour values from dyeing ingredient and process inputs is proposed. Leveraging attention mechanisms and multi-task learning, the model outperforms baseline methods at predicting multiple colour outputs jointly. Specifically, the Transformer model’s attention mechanism captures the complex interactions between dyeing ingredients and process parameters, while the multi-task learning framework exploits the intrinsic correlations among the L*, a*, and b* dimensions of the CIELAB colour space. In addition, the incorporation of physical knowledge through a physics-informed loss function integrates the CMC colour difference formula. This loss function, along with the attention mechanisms, enables the model to learn the nuanced relationships between the dyeing process variables and the final colour output, thereby improving the overall prediction accuracy. This reduces trial-and-error costs and resource waste, contributing to environmental sustainability by minimizing water and energy consumption and chemical emissions.

纺织品染色需要优化成分组合和工艺参数,以实现目标颜色特性。对这些因素与最终颜色之间的复杂关系进行建模具有挑战性。在这种情况下,我们提出了一种物理信息多输出回归方法,根据染色成分和工艺输入建立 CIELAB 颜色值模型。利用注意力机制和多任务学习,该模型在联合预测多种颜色输出方面优于基准方法。具体来说,Transformer 模型的注意机制捕捉到了染色成分和工艺参数之间复杂的相互作用,而多任务学习框架则利用了 CIELAB 色彩空间的 L*、a* 和 b* 维度之间的内在相关性。此外,还通过物理信息损失函数将物理知识与 CMC 色差公式结合起来。该损失函数与注意机制一起,使模型能够学习染色过程变量与最终颜色输出之间的细微关系,从而提高整体预测精度。这降低了试错成本和资源浪费,通过最大限度地减少水和能源消耗以及化学品排放,促进了环境的可持续发展。
{"title":"Leveraging multi-output modelling for CIELAB using colour difference formula towards sustainable textile dyeing","authors":"Zheyuan Chen,&nbsp;Jian Liu,&nbsp;Jian Li,&nbsp;Mukun Yuan,&nbsp;Guangping Yu","doi":"10.1007/s43684-024-00076-8","DOIUrl":"10.1007/s43684-024-00076-8","url":null,"abstract":"<div><p>Textile dyeing requires optimizing combinations of ingredients and process parameters to achieve target colour properties. Modelling the complex relationships between these factors and the resulting colour is challenging. In this case, a physics-informed approach for multi-output regression to model CIELAB colour values from dyeing ingredient and process inputs is proposed. Leveraging attention mechanisms and multi-task learning, the model outperforms baseline methods at predicting multiple colour outputs jointly. Specifically, the Transformer model’s attention mechanism captures the complex interactions between dyeing ingredients and process parameters, while the multi-task learning framework exploits the intrinsic correlations among the L*, a*, and b* dimensions of the CIELAB colour space. In addition, the incorporation of physical knowledge through a physics-informed loss function integrates the CMC colour difference formula. This loss function, along with the attention mechanisms, enables the model to learn the nuanced relationships between the dyeing process variables and the final colour output, thereby improving the overall prediction accuracy. This reduces trial-and-error costs and resource waste, contributing to environmental sustainability by minimizing water and energy consumption and chemical emissions.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00076-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142413919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved vision-only localization method for mobile robots in indoor environments 改进的室内环境移动机器人纯视觉定位方法
Pub Date : 2024-09-18 DOI: 10.1007/s43684-024-00075-9
Gang Huang, Liangzhu Lu, Yifan Zhang, Gangfu Cao, Zhe Zhou

To solve the problem of mobile robots needing to adjust their pose for accurate operation after reaching the target point in the indoor environment, a localization method based on scene modeling and recognition has been designed. Firstly, the offline scene model is created by both handcrafted feature and semantic feature. Then, the scene recognition and location calculation are performed online based on the offline scene model. To improve the accuracy of recognition and location calculation, this paper proposes a method that integrates both semantic features matching and handcrafted features matching. Based on the results of scene recognition, the accurate location is obtained through metric calculation with 3D information. The experimental results show that the accuracy of scene recognition is over 90%, and the average localization error is less than 1 meter. Experimental results demonstrate that the localization has a better performance after using the proposed improved method.

为了解决移动机器人在室内环境中到达目标点后需要调整姿态以便准确操作的问题,我们设计了一种基于场景建模和识别的定位方法。首先,通过手工特征和语义特征创建离线场景模型。然后,根据离线场景模型进行在线场景识别和定位计算。为了提高识别和位置计算的准确性,本文提出了一种集成语义特征匹配和手工特征匹配的方法。在场景识别结果的基础上,通过三维信息的度量计算获得准确的位置。实验结果表明,场景识别的准确率超过 90%,平均定位误差小于 1 米。实验结果表明,使用改进方法后,定位效果更好。
{"title":"Improved vision-only localization method for mobile robots in indoor environments","authors":"Gang Huang,&nbsp;Liangzhu Lu,&nbsp;Yifan Zhang,&nbsp;Gangfu Cao,&nbsp;Zhe Zhou","doi":"10.1007/s43684-024-00075-9","DOIUrl":"10.1007/s43684-024-00075-9","url":null,"abstract":"<div><p>To solve the problem of mobile robots needing to adjust their pose for accurate operation after reaching the target point in the indoor environment, a localization method based on scene modeling and recognition has been designed. Firstly, the offline scene model is created by both handcrafted feature and semantic feature. Then, the scene recognition and location calculation are performed online based on the offline scene model. To improve the accuracy of recognition and location calculation, this paper proposes a method that integrates both semantic features matching and handcrafted features matching. Based on the results of scene recognition, the accurate location is obtained through metric calculation with 3D information. The experimental results show that the accuracy of scene recognition is over 90%, and the average localization error is less than 1 meter. Experimental results demonstrate that the localization has a better performance after using the proposed improved method.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00075-9.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142412349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical simulations of a two-strain dengue model to investigate the efficacy of the deployment of Wolbachia-carrying mosquitoes and vaccination for reducing the incidence of dengue infections 对双菌株登革热模型进行数值模拟,研究部署携带沃尔巴克氏体的蚊子和接种疫苗对降低登革热感染率的功效
Q1 Social Sciences Pub Date : 2024-09-05 DOI: 10.1016/j.jobb.2024.08.003

This study investigated the usefulness of a two-serotype dengue mathematical model to gain insights into the effects of antibody-dependent enhancement and temperature on dengue transmission dynamics in the presence of vaccination and Wolbachia-carrying mosquitoes. In particular, the effects of temperature on the mosquito death and maturation rates in secondary infections were examined. A deterministic mathematical model was formulated and analysed to address this problem. The results suggest that controlling the population of aquatic mosquitoes is appropriate for reducing the incidence of secondary infections. Furthermore, the wAu Wolbachia strain was more effective in reducing secondary infections.

这项研究调查了登革热双倍型数学模型的实用性,以深入了解在接种疫苗和携带沃尔巴克氏体蚊子的情况下,抗体依赖性增强和温度对登革热传播动态的影响。特别是,研究了温度对二次感染中蚊子死亡率和成熟率的影响。为解决这一问题,建立并分析了一个确定性数学模型。结果表明,控制水生蚊子的数量可减少二次感染的发生率。此外,wAu Wolbachia 菌株在减少二次感染方面更为有效。
{"title":"Numerical simulations of a two-strain dengue model to investigate the efficacy of the deployment of Wolbachia-carrying mosquitoes and vaccination for reducing the incidence of dengue infections","authors":"","doi":"10.1016/j.jobb.2024.08.003","DOIUrl":"10.1016/j.jobb.2024.08.003","url":null,"abstract":"<div><p>This study investigated the usefulness of a two-serotype dengue mathematical model to gain insights into the effects of antibody-dependent enhancement and temperature on dengue transmission dynamics in the presence of vaccination and <em>Wolbachia</em>-carrying mosquitoes. In particular, the effects of temperature on the mosquito death and maturation rates in secondary infections were examined. A deterministic mathematical model was formulated and analysed to address this problem. The results suggest that controlling the population of aquatic mosquitoes is appropriate for reducing the incidence of secondary infections. Furthermore, the <em>wAu Wolbachia</em> strain was more effective in reducing secondary infections.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000487/pdfft?md5=c755ea23a43690b6930ae1a984285d28&pid=1-s2.0-S2588933824000487-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142271983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A stochastic epidemic model with time delays and unreported cases based on Markovian switching 基于马尔可夫转换的具有时间延迟和未报告病例的随机流行病模型
Q1 Social Sciences Pub Date : 2024-09-05 DOI: 10.1016/j.jobb.2024.08.002

Disease dynamics are influenced by changes in the environment. In this study, unreported cases (U), environmental perturbations, and exogenous events are included in the epidemic Susceptible–Exposed–Infectious–Unreported–Removed model with time delays. We examine the process of switching from one regime to another at random. Ergodicity and stationary distribution criteria are discussed. A Lyapunov function is used to determine several conditions for disease extinction. The spread of a disease is affected when transitioning from one random regime to another via sudden external events, such as hurricanes. The model and theoretical results are validated using numerical simulations.

疾病动态受环境变化的影响。在本研究中,未报告病例(U)、环境扰动和外生事件被纳入带有时间延迟的流行病易感-暴露-感染-未报告-移出模型中。我们研究了从一种机制随机切换到另一种机制的过程。讨论了遍历性和静态分布标准。利用 Lyapunov 函数确定了疾病灭绝的几个条件。从一种随机状态过渡到另一种随机状态时,疾病的传播会受到突发性外部事件(如飓风)的影响。通过数值模拟验证了模型和理论结果。
{"title":"A stochastic epidemic model with time delays and unreported cases based on Markovian switching","authors":"","doi":"10.1016/j.jobb.2024.08.002","DOIUrl":"10.1016/j.jobb.2024.08.002","url":null,"abstract":"<div><p>Disease dynamics are influenced by changes in the environment. In this study, unreported cases (U), environmental perturbations, and exogenous events are included in the epidemic Susceptible–Exposed–Infectious–Unreported–Removed model with time delays. We examine the process of switching from one regime to another at random. Ergodicity and stationary distribution criteria are discussed. A Lyapunov function is used to determine several conditions for disease extinction. The spread of a disease is affected when transitioning from one random regime to another via sudden external events, such as hurricanes. The model and theoretical results are validated using numerical simulations.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000475/pdfft?md5=f82949cbd4a1b36883019913a7b759e8&pid=1-s2.0-S2588933824000475-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142230135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-blockchain based multi-layer grouping federated learning scheme for heterogeneous data in industrial IoT 基于双区块链的工业物联网异构数据多层分组联合学习方案
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100195

Federated learning (FL) allows data owners to train neural networks together without sharing local data, allowing the industrial Internet of Things (IIoT) to share a variety of data. However, traditional FL frameworks suffer from data heterogeneity and outdated models. To address these issues, this paper proposes a dual-blockchain based multi-layer grouping federated learning (BMFL) architecture. BMFL divides the participant groups based on the training tasks, then realizes the model training by combining synchronous and asynchronous FL through the multi-layer grouping structure, and uses the model blockchain to record the characteristic tags of the global model, allowing group-manners to extract the model based on the feature requirements and solving the problem of data heterogeneity. In addition, to protect the privacy of the model gradient parameters and manage the key, the global model is stored in ciphertext, and the chameleon hash algorithm is used to perform the modification and management of the encrypted key on the key blockchain while keeping the block header hash unchanged. Finally, we evaluate the performance of BMFL on different public datasets and verify the practicality of the scheme with real fault datasets. The experimental results show that the proposed BMFL exhibits more stable and accurate convergence behavior than the classic FL algorithm, and the key revocation overhead time is reasonable.

联盟学习(FL)允许数据所有者在不共享本地数据的情况下共同训练神经网络,从而使工业物联网(IIoT)能够共享各种数据。然而,传统的联邦学习框架存在数据异构和模型过时的问题。为了解决这些问题,本文提出了一种基于双区块链的多层分组联合学习(BMFL)架构。BMFL 根据训练任务划分参与组,然后通过多层分组结构实现同步和异步 FL 相结合的模型训练,并利用模型区块链记录全局模型的特征标签,允许组员根据特征需求提取模型,解决了数据异构的问题。此外,为了保护模型梯度参数的隐私和管理密钥,全局模型以密文形式存储,并使用变色龙哈希算法对密钥区块链上的加密密钥进行修改和管理,同时保持区块头哈希值不变。最后,我们评估了 BMFL 在不同公共数据集上的性能,并通过真实故障数据集验证了该方案的实用性。实验结果表明,与经典的 FL 算法相比,所提出的 BMFL 表现出更稳定、更准确的收敛行为,而且密钥撤销开销时间合理。
{"title":"Dual-blockchain based multi-layer grouping federated learning scheme for heterogeneous data in industrial IoT","authors":"","doi":"10.1016/j.bcra.2024.100195","DOIUrl":"10.1016/j.bcra.2024.100195","url":null,"abstract":"<div><p>Federated learning (FL) allows data owners to train neural networks together without sharing local data, allowing the industrial Internet of Things (IIoT) to share a variety of data. However, traditional FL frameworks suffer from data heterogeneity and outdated models. To address these issues, this paper proposes a dual-blockchain based multi-layer grouping federated learning (BMFL) architecture. BMFL divides the participant groups based on the training tasks, then realizes the model training by combining synchronous and asynchronous FL through the multi-layer grouping structure, and uses the model blockchain to record the characteristic tags of the global model, allowing group-manners to extract the model based on the feature requirements and solving the problem of data heterogeneity. In addition, to protect the privacy of the model gradient parameters and manage the key, the global model is stored in ciphertext, and the chameleon hash algorithm is used to perform the modification and management of the encrypted key on the key blockchain while keeping the block header hash unchanged. Finally, we evaluate the performance of BMFL on different public datasets and verify the practicality of the scheme with real fault datasets. The experimental results show that the proposed BMFL exhibits more stable and accurate convergence behavior than the classic FL algorithm, and the key revocation overhead time is reasonable.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000083/pdfft?md5=17c58876f9db0cb915d1b0b20cbe64c3&pid=1-s2.0-S2096720924000083-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140468200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An interpretable model for large-scale smart contract vulnerability detection 大规模智能合约漏洞检测的可解释模型
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100209
Smart contracts hold billions of dollars in digital currency, and their security vulnerabilities have drawn a lot of attention in recent years. Traditional methods for detecting smart contract vulnerabilities rely primarily on symbol execution, which makes them time-consuming with high false positive rates. Recently, deep learning approaches have alleviated these issues but still face several major limitations, such as lack of interpretability and susceptibility to evasion techniques. In this paper, we propose a feature selection method for uplifting modeling. The fundamental concept of this method is a feature selection algorithm, utilizing interpretation outcomes to select critical features, thereby reducing the scales of features. The learning process could be accelerated significantly because of the reduction of the feature size. The experiment shows that our proposed model performs well in six types of vulnerability detection. The accuracy of each type is higher than 93% and the average detection time of each smart contract is less than 1 ms. Notably, through our proposed feature selection algorithm, the training time of each type of vulnerability is reduced by nearly 80% compared with that of its original.
智能合约持有数十亿美元的数字货币,其安全漏洞近年来引起了广泛关注。检测智能合约漏洞的传统方法主要依赖于符号执行,因此耗时长、误报率高。最近,深度学习方法缓解了这些问题,但仍面临几个主要限制,如缺乏可解释性和易受规避技术影响。在本文中,我们提出了一种用于上行建模的特征选择方法。该方法的基本概念是一种特征选择算法,利用解释结果来选择关键特征,从而减少特征的规模。由于特征规模的缩小,学习过程可以大大加快。实验表明,我们提出的模型在六种类型的漏洞检测中表现良好。每种类型的准确率都高于 93%,每个智能合约的平均检测时间小于 1 毫秒。值得注意的是,通过我们提出的特征选择算法,每种类型漏洞的训练时间都比原来减少了近 80%。
{"title":"An interpretable model for large-scale smart contract vulnerability detection","authors":"","doi":"10.1016/j.bcra.2024.100209","DOIUrl":"10.1016/j.bcra.2024.100209","url":null,"abstract":"<div><div>Smart contracts hold billions of dollars in digital currency, and their security vulnerabilities have drawn a lot of attention in recent years. Traditional methods for detecting smart contract vulnerabilities rely primarily on symbol execution, which makes them time-consuming with high false positive rates. Recently, deep learning approaches have alleviated these issues but still face several major limitations, such as lack of interpretability and susceptibility to evasion techniques. In this paper, we propose a feature selection method for uplifting modeling. The fundamental concept of this method is a feature selection algorithm, utilizing interpretation outcomes to select critical features, thereby reducing the scales of features. The learning process could be accelerated significantly because of the reduction of the feature size. The experiment shows that our proposed model performs well in six types of vulnerability detection. The accuracy of each type is higher than 93% and the average detection time of each smart contract is less than 1 ms. Notably, through our proposed feature selection algorithm, the training time of each type of vulnerability is reduced by nearly 80% compared with that of its original.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141390225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis 利用机器学习分类器和可解释性分析检测区块链交易中的异常情况
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100207
As the use of blockchain for digital payments continues to rise, it becomes susceptible to various malicious attacks. Successfully detecting anomalies within blockchain transactions is essential for bolstering trust in digital payments. However, the task of anomaly detection in blockchain transaction data is challenging due to the infrequent occurrence of illicit transactions. Although several studies have been conducted in the field, a limitation persists: the lack of explanations for the model's predictions. This study seeks to overcome this limitation by integrating explainable artificial intelligence (XAI) techniques and anomaly rules into tree-based ensemble classifiers for detecting anomalous Bitcoin transactions. The shapley additive explanation (SHAP) method is employed to measure the contribution of each feature, and it is compatible with ensemble models. Moreover, we present rules for interpreting whether a Bitcoin transaction is anomalous or not. Additionally, we introduce an under-sampling algorithm named XGBCLUS, designed to balance anomalous and non-anomalous transaction data. This algorithm is compared against other commonly used under-sampling and over-sampling techniques. Finally, the outcomes of various tree-based single classifiers are compared with those of stacking and voting ensemble classifiers. Our experimental results demonstrate that: (i) XGBCLUS enhances true positive rate (TPR) and receiver operating characteristic-area under curve (ROC-AUC) scores compared to state-of-the-art under-sampling and over-sampling techniques, and (ii) our proposed ensemble classifiers outperform traditional single tree-based machine learning classifiers in terms of accuracy, TPR, and false positive rate (FPR) scores.
随着区块链在数字支付领域的应用不断增加,它也容易受到各种恶意攻击。成功检测区块链交易中的异常情况对于增强数字支付的信任度至关重要。然而,由于非法交易很少发生,在区块链交易数据中进行异常检测是一项具有挑战性的任务。虽然该领域已开展了多项研究,但仍存在一个局限性:缺乏对模型预测的解释。本研究试图通过将可解释人工智能(XAI)技术和异常规则整合到基于树的集合分类器中来克服这一局限,以检测异常比特币交易。我们采用夏普利加法解释(SHAP)方法来衡量每个特征的贡献,该方法与集合模型兼容。此外,我们还提出了解释比特币交易是否异常的规则。此外,我们还引入了一种名为 XGBCLUS 的低采样算法,旨在平衡异常和非异常交易数据。我们将该算法与其他常用的低采样和高采样技术进行了比较。最后,将各种基于树的单一分类器的结果与堆叠和投票集合分类器的结果进行了比较。实验结果表明(i) 与最先进的欠采样和过采样技术相比,XGBCLUS 提高了真阳性率(TPR)和接收者操作特征曲线下面积(ROC-AUC)分数;(ii) 我们提出的集合分类器在准确率、TPR 和假阳性率(FPR)分数方面优于传统的基于树的单一机器学习分类器。
{"title":"Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis","authors":"","doi":"10.1016/j.bcra.2024.100207","DOIUrl":"10.1016/j.bcra.2024.100207","url":null,"abstract":"<div><div>As the use of blockchain for digital payments continues to rise, it becomes susceptible to various malicious attacks. Successfully detecting anomalies within blockchain transactions is essential for bolstering trust in digital payments. However, the task of anomaly detection in blockchain transaction data is challenging due to the infrequent occurrence of illicit transactions. Although several studies have been conducted in the field, a limitation persists: the lack of explanations for the model's predictions. This study seeks to overcome this limitation by integrating explainable artificial intelligence (XAI) techniques and anomaly rules into tree-based ensemble classifiers for detecting anomalous Bitcoin transactions. The shapley additive explanation (SHAP) method is employed to measure the contribution of each feature, and it is compatible with ensemble models. Moreover, we present rules for interpreting whether a Bitcoin transaction is anomalous or not. Additionally, we introduce an under-sampling algorithm named XGBCLUS, designed to balance anomalous and non-anomalous transaction data. This algorithm is compared against other commonly used under-sampling and over-sampling techniques. Finally, the outcomes of various tree-based single classifiers are compared with those of stacking and voting ensemble classifiers. Our experimental results demonstrate that: (i) XGBCLUS enhances true positive rate (TPR) and receiver operating characteristic-area under curve (ROC-AUC) scores compared to state-of-the-art under-sampling and over-sampling techniques, and (ii) our proposed ensemble classifiers outperform traditional single tree-based machine learning classifiers in terms of accuracy, TPR, and false positive rate (FPR) scores.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142320259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How can the holder trust the verifier? A CP-ABPRE-based solution to control the access to claims in a Self-Sovereign-Identity scenario 持有人如何信任验证者?一种基于 CP-ABPRE 的解决方案,用于控制自我主权身份情况下对权利主张的访问
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100196

The interest in Self-Sovereign Identity (SSI) in research, industry, and governments is rapidly increasing. SSI is a paradigm where users hold their identity and credentials issued by authorized entities. SSI is revolutionizing the concept of digital identity and enabling the definition of a trust framework wherein a service provider (verifier) validates the claims presented by a user (holder) for accessing services. However, current SSI solutions primarily focus on the presentation and verification of claims, overlooking a dual aspect: ensuring that the verifier is authorized to access the holder's claims. Addressing this gap, this paper introduces an innovative SSI-based solution that integrates decentralized wallets with Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE). This combination effectively addresses the challenge of verifier authorization. Our solution, implemented on the Ethereum platform, enhances accountability by notarizing key operations through a smart contract. This paper also offers a prototype demonstrating the practicality of the proposed approach. Furthermore, it provides an extensive evaluation of the solution's performance, emphasizing its feasibility and efficiency in real-world applications.

研究、工业和政府对自主身份(SSI)的兴趣正在迅速增长。SSI 是一种用户持有其身份和授权实体颁发的凭证的模式。SSI 正在彻底改变数字身份的概念,并使信任框架的定义成为可能,在这种框架中,服务提供商(验证者)验证用户(持有者)为获取服务而提出的要求。然而,目前的 SSI 解决方案主要关注的是提交和验证主张,忽略了一个双重方面:确保验证者有权访问持有者的主张。针对这一缺陷,本文介绍了一种基于 SSI 的创新解决方案,它将分散式钱包与基于属性的代理重加密(CP-ABPRE)集成在一起。这种组合有效地解决了验证者授权的难题。我们的解决方案在以太坊平台上实施,通过智能合约公证密钥操作,增强了问责制。本文还提供了一个原型,展示了所提方法的实用性。此外,本文还对解决方案的性能进行了广泛评估,强调了其在现实世界应用中的可行性和效率。
{"title":"How can the holder trust the verifier? A CP-ABPRE-based solution to control the access to claims in a Self-Sovereign-Identity scenario","authors":"","doi":"10.1016/j.bcra.2024.100196","DOIUrl":"10.1016/j.bcra.2024.100196","url":null,"abstract":"<div><p>The interest in Self-Sovereign Identity (SSI) in research, industry, and governments is rapidly increasing. SSI is a paradigm where users hold their identity and credentials issued by authorized entities. SSI is revolutionizing the concept of digital identity and enabling the definition of a trust framework wherein a service provider (verifier) validates the claims presented by a user (holder) for accessing services. However, current SSI solutions primarily focus on the presentation and verification of claims, overlooking a dual aspect: ensuring that the verifier is authorized to access the holder's claims. Addressing this gap, this paper introduces an innovative SSI-based solution that integrates decentralized wallets with Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE). This combination effectively addresses the challenge of verifier authorization. Our solution, implemented on the Ethereum platform, enhances accountability by notarizing key operations through a smart contract. This paper also offers a prototype demonstrating the practicality of the proposed approach. Furthermore, it provides an extensive evaluation of the solution's performance, emphasizing its feasibility and efficiency in real-world applications.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000095/pdfft?md5=670501a0e4d21da648399fb2a95be292&pid=1-s2.0-S2096720924000095-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140763959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 科技通报 计算机与应用化学 电子工业专用设备 河北工业科技 Journal of Applied Sciences 中国科学技术大学学报 印制电路信息 Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 华南理工大学学报(自然科学版) 中国图象图形学报 雷达学报 信息与控制 数据采集与处理 机器人 西北工业大学学报 High Technology Letters Journal of Cybersecurity 中国科学:信息科学 Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art Qinghua Daxue Xuebao/Journal of Tsinghua University 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 信息通信技术 数据分析和信息处理(英文)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1