Just Accepted

Just Accepted Papers are peer-reviewed and accepted for publication. They will soon (normally in 1–3 weeks) transform into Typeset Proofs when initial checks such as language editing and reference cross-validation are completed and typesettings of the papers are done. Note that for both types of papers under this directory, they are posted online prior to technical editing and author proofing. Please use with caution.
Display Method:

Coming soon.....

Balancing Efficiency and Personalization in Federated Learning via Blockwise Knowledge Distillation
Bayanbayev Ilyas, Shi Hongjian, Ma Ruhui
, Available online  , doi: 10.23919/cje.2023.00.424
Abstract(13) HTML (7) PDF(3)
Abstract:
Machine unlearning enables systems to forget specific training data, vital in Federated Learning (FL) for privacy. Our paper presents the FedBW framework, merging machine unlearning with FL challenges. By employing Federated Blockwise Distillation, it enhances privacy and efficiency, allowing tailored learning for clients while upholding the ‘right to be forgotten.’ Utilizing logits from unlabeled datasets, FedBW manages model heterogeneity without exposing sensitive data. Experimental results on CIFAR-10 and CIFAR-100 with VGG16 show improved accuracy and training efficiency, setting a precedent for future privacy-preserving machine learning applications.
Meet-in-the-Middle Key Recovery Attacks on Rocca Using Differential and Integral Properties
Song Chan, Wu Wenling, Zhang Lei
, Available online  , doi: 10.23919/cje.2024.00.032
Abstract(26) HTML (13) PDF(2)
Abstract:
Rocca is an AES-based authentication encryption scheme proposed in 2021 for beyond 5G/6G systems. The latest version of Rocca injects the key into the initialization, which makes the key recovery attack on its original version no longer valid here. In this paper, we propose new key recovery attacks based on the idea of meet-in-the-middle. Benefiting from the design of the round function, we can treat each 128-bit block as a unit and then write the expressions of the internal states in terms of the initial state and the final state, respectively. Among them, we focus on the state blocks with relatively concise expressions, which have poor diffusion, and then explore their differential and integral properties. Next, in the key recovery attacks, we first guess a part of the key to calculate the specific values of state blocks at the middle matching positions, and then use the differential or integral properties on these blocks to validate the key guesses. Uniquely, in our integral cryptanalysis, we impose appropriate conditions to constrain the propagation of nonce, which corresponds to the weak keys. Consequently, we present the 9 and 10 rounds of meet-in-the-middle key recovery attacks on Rocca, as well as the weak key recovery attack for the 11-round Rocca based on integral properties, with four sets of weak keys with 2224 keys each.
Unintended Interference Suppression Based on Decision Feedback Adaptive Cancellation for DSSS Satellite Communication
LIU Jiancheng, ZHANG Jingtao, LI Tian, ZHOU Yu, WANG Yanpeng
, Available online  , doi: 10.23919/cje.2023.00.398
Abstract(75) HTML (37) PDF(6)
Abstract:
Considering the non-spread spectrum interference with overlapping frequency domain for direct-sequence spread spectrum satellite communication, the unintended strong interference suppression method based on adaptive cancellation with decision feedback is proposed. Firstly, the model of adaptive cancellation with decision feedback is built by making the best of interference modulation mode and bandwidth. Secondly, the adaptive cancellation based on polynomial nonlinear reconstruction model is analyzed in theory, and the mathematical expression of interference suppression ratio is derived. Finally, the proposed method is simulated under different parameters. The theory analysis and simulation results both show that this method can achieve more than 4.5dB transmission link processing gain to efficiently suppress the overlapping unintended interference.
Multi-level Queue Security in Switches: Adversarial Inference and Differential Privacy Protection in SDN
DONG Xuewen, XUE Lingtao, ZHANG Tao, YOU Zhichao, LI Guangxia, SHEN Yulong
, Available online  , doi: 10.23919/cje.2022.00.373
Abstract(86) HTML (43) PDF(8)
Abstract:
Network switches are critical elements in any network infrastructure for traffic forwarding and packet priority scheduling, which naturally become a target of network adversaries. Most attacks on switches focus on purposely forwarding packets to the wrong network nodes or generating flooding. However, potential privacy leakage in the multi-level priority queue of switches has not been considered. In this paper, we are the first to discuss the multi-level priority queue security and privacy protection problem in switches. Observing that packet leaving order from a queue is strongly correlated to its priority, we introduce a policy inference attack that exploits specific priority-mapping rules between different packet priorities and priority sub-queues in the multi-level queues. Next, based on the policy inference result and the built-in traffic shaping strategy, a capacity inference attack with the error probability decaying exponentially in the number of attacks is presented. In addition, we propose a differentially private priority scheduling mechanism to defend against the above attacks in OpenFlow Switches. Theoretical analysis proves that our proposed mechanism can satisfy ?-differential privacy. Extensive evaluation results show that our mechanism can defend against inference attacks well and achieves up to 2.7 times priority process efficiency than a random priority scheduling strategy.
Threshold-bad-scenario-set Robust Energy Trading Decisions for Interconnected Microgrids under Uncertain Electricity Price
WANG Xiaozhi, WANG Bing, HU Hengdu, QI Baomin, PAN Quanke
, Available online  , doi: 10.23919/cje.2023.00.364
Abstract(117) HTML (58) PDF(5)
Abstract:
Microgrids can be cost-effective by reducing transmission and distribution losses, and enabling energy trading between microgrids can further optimize economic benefits. This paper discusses the energy trading decision problem of interconnected microgrids under uncertain electricity price between any microgrid and the main grid. The uncertain energy trading price is described by discrete scenarios. The interests of individual microgrids and the share benefits generated from the cooperation among microgrids are considered. Based on the threshold-bad-scenario (TBS) set concept proposed by our previous work, we propose a robust energy trading model. The TBS-set robust energy trading problem actually consists of a family of robust energy trading problems. Each robust energy trading problem is decomposed into two subproblems of social robust cost minimization and trading payment. The alternating direction method of multipliers (ADMM) is applied to develop a distributed algorithm to solve the problem. The computational results show that the robust energy trading strategy could reduce the total cost of the society by 8.89% and the robust cost of individual microgrid can be reduced by 12.34% at most. The proposed robust energy trading model could obtain various robust solutions with different degrees of tradeoff between robustness and optimality. The robustness prices of robust solutions obtained are discussed to indicate that the impact of the values of threshold on the robustness prices.
Research Article
New Coefficient Grouping for Complex Affine Layers
Qiao Wenxiao, Sun Siwei, Chen Ying, Hu Lei
, Available online  , doi: 10.23919/cje.2023.00.373
Abstract(46) HTML (23) PDF(12)
Abstract:
Recently, designing symmetric primitives for applications in cryptographic protocols including MPC (Multi-Party Computation), FHE (Fully Homomorphic Encryption), and ZK (Zero-Knowledge) proofs has become an important research topic. Among many such new symmetric schemes, a power function over a large finite field $ \mathbb{F}_q $ is commonly used. In this paper, we revisit the algebraic degree’s growth for an SPN cipher over $ \mathbb{F}_{2^n} $ $ (n\ge3) $, whose S-box is defined as a composition of a power function $ P(x)=x^{2^d+1} $ where $ d\ge1 $ with a polynomial $ A(x)=a_0+ $$ \sum_{w=1}^Wa_wx^{2^{\beta_w}} $ where $ a_i\in\mathbb{F}_{2^n} $ for $ 0\le i\le W $ and $ a_w\neq0 $ for $ 1\le w\le W $. We propose a new coefficient grouping technique, which is based on our new description of the monomials that will probably appear in the state. Specifically, we propose (i) a new measure to find proper $ (\beta_1,\dots,\beta_W) $ for the algebraic degree’s fastest growth. (ii) a new method to compute the algebraic degree’s upper bound for arbitrary $ A(x) $. Especially, for the Chaghri (CCS 2022), we obtain a tighter upper bound of the algebraic degree.
Multi-path Reasoning for Multi-hop Question An-swering over Knowledge Graph
Lyu Yana, Qin Xutong, Du Xiuli, Zhao Niujie, Qiu Shaoming
, Available online  , doi: 10.23919/cje.2023.00.044
Abstract(46) HTML (23) PDF(2)
Abstract:
Multi-hop Question Answering over Knowledge Graph (KGQA) aims to find the answer entities that are multiple hops away from the entities in the question called seed entities in the Knowledge Graph (KG). The main methods include rule and template based methods and deep learning based methods. At present, deep learning based methods is in the mainstream, with the advantages of good portability and high utilization of KG information. A significant challenge is the lack of information on intermediate entities along the reasoning path. However, most deep learning models are unable to learn the correct reasoning path. To address this challenge, we propose a multi-path reasoning model, which selects the correct reasoning path by constraining the consistency of multiple paths from the seed entity to the answer entity. Then, a teacher-student network is adopted for model compression, where the teacher model relies on the proposed multi-path reasoning model. To demonstrate our model’s effectiveness on the KGQA task, we compared our model with four baselines on two benchmark datasets. The experimental results revealed that the Hits@1 values of the model reached 77.8, and 60.2% on WebQSP, and CWQ datasets, respectively.
Robust Path Planning for Multiple UAVs Considering Position Uncertainty
Xu Liang, Cao Xianbin, Du Wenbo, Li Yumeng
, Available online  , doi: 10.23919/cje.2024.00.015
Abstract(59) HTML (29) PDF(13)
Abstract:
With the widespread application of unmanned aerial vehicles (UAVs), the issue of path planning has become increasingly significant in search of suitable paths for UAVs. However, positioning errors may exist in the system carried by the UAV in practical situations, leading to the suboptimal or even unsafe path execution. In view of this, we construct the multi-UAV robust path planning model under position uncertainty by incorporating several important considerations. This can be expressed as a complicated robust optimization problem, aiming to obtain a robust optimal path for each UAV in the presence of positioning errors. Based on this, we introduce the corresponding overall cost function and its expected expression for robust evaluation. Then, we propose a novel robust particle swarm optimization (PSO) algorithm, which employs the scale-free topology to characterize the individual interactions in the swarm. And an improved explicit sampling technique is developed by introducing a sampling coefficient, where the number of samples increases proportional to the degree value for a particle in PSO, allowing effective robustness evaluation for each solution. The proposed algorithm, denoted as RSFPSO_PC, shows great advantages on benchmark functions, compared with some other robust PSO algorithms. Further, we present the specific implementation of the multi-UAV robust path planning method based on RSFPSO_PC. Finally, simulation experiments on various path planning scenarios and comparison results indicate the superiority of the developed method, which can plan a robust and effective path for each UAV.
Non-stationarity Characteristics in Dynamic Vehicular ISAC Channels at 28 GHz
Zhang Zhengyu, He Ruisi, Yang Mi, Zhang Xuejian, Qi Ziyi, Mi Hang, Sun Guiqi, Yang Jingya, Ai Bo
, Available online  , doi: 10.23919/cje.2024.00.003
Abstract(178) HTML (88) PDF(29)
Abstract:
Integrated sensing and communications (ISAC) is a potential technology of 6G, aiming to enable end-to-end information processing ability and native perception capability for future communication systems. As an important part of the ISAC application scenarios, ISAC aided vehicle-to-everything (V2X) can improve the traffic efficiency and safety through intercommunication and synchronous perception. It is necessary to carry out measurement, characterization, and modeling for vehicular ISAC channels as the basic theoretical support for system design. In this paper, dynamic vehicular ISAC channel measurements at 28 GHz are carried out and provide data for the characterization of non-stationarity characteristics. Based on the actual measurements, this paper analyzes the time-varying PDPs, RMSDS and non-stationarity characteristics of front, lower front, left and right perception directions in a complicated V2X scenarios. The research in this paper can enrich the investigation of vehicular ISAC channels and enable the analysis and design of vehicular ISAC systems.
High-resolution ISAR Imaging for Detection of Micro Damages on Spacecraft Thermal Protection System
Zhang Yi-Hang, Wang Xiao
, Available online  , doi: 10.23919/cje.2023.00.339
Abstract(100) HTML (43) PDF(24)
Abstract:
The thermal protection system (TPS) is an essential component that guarantees the safe flight of high-speed spacecraft. However, the TPS is bound to suffer various level of damages during flight missions, among which the micro damages are difficult to distinguish from optical images. In this paper, we propose a novel approach to detect tiny surface damages of TPS for spacecraft by using ISAR imaging. To accomplish this, the procedure consists of three components, electromagnetic scattering simulation, 2-D ISAR imaging, and damage detection and identification. Different types of common TPS surface micro-damages such as debonding, cracks, holes and warpage are simulated. The obtained high-precision 2-D images prominently display the structure and morphology of micro damages. Finally, the relative entropy-based damage detection and identification is proposed using the established damage characteristics database. The experimental results have demonstrated that by comparing the difference of the statistical characteristics between the damaged and undamaged models, the monitoring and identification of the micro damages can be successfully realized. Overall, the proposed approach offers a promising solution for monitoring the status of TPS in real-time and enhancing the safety of high-speed spacecraft during flight missions.
Modeling and Simulation Research on Conducted Immunity of Function Module of the Digital Control Circuit Based on RFI
Xiao Yang, Zhou Zhongyuan, Wang Haichun, Liu Shikuan
, Available online  , doi: 10.23919/cje.2023.00.350
Abstract(127) HTML (64) PDF(21)
Abstract:
The research status of the digital control circuit chip level and system level electromagnetic immunity is analyzed in this article firstly. Secondly, a set of device for the digital control circuit based on ARM is developed. The impedance of the components on the coupling path of the modules is extracted and the equivalent circuit is established. Based on the integrated circuits immunity model-conducted immunity (ICIM-CI), the behavior level modeling and simulation of the power module and IO module are carried out in IC-EMC. The direct power injection (DPI) method based on radio frequency interference (RFI) is used to test the interference immunity of the modules, and the failure mode and sensitivity threshold of the digital control circuit is obtained. The RFI based immunity modeling and simulation models for the power module and IO module are validated through simulation and testing comparison using the “board level-chip level” modeling and simulation method. The immunity of the power module is not only related to the LDO power chip, but also to the peripheral circuit of the power module. The simulation research of IO module immunity considers the actual working mode of IO chip pins and calculates the IO pin response under actual working conditions. The method has a certain value to study the coupling mechanism of the conducted interference.
String Stability of Vehicle Platoon with Packet Loss in NR-V2X
NING Ruirui, LIN Siyu, WANG Xi, ZHANG Xiaokang, FENG Weiyang, ZHANG Ning
, Available online  , doi: 10.23919/cje.2023.00.273
Abstract(33) HTML (16) PDF(9)
Abstract:
The vehicle platoon refers to the dynamic formation of a group of vehicles to drive with a certain spacing between vehicles, which is an important enhanced application scenario of cellular vehicle-to-everything (C-V2X). Through the C-V2X technology, the real-time interaction of vehicle motion status information and driving strategy of the vehicle platoon can be realized. In addition, benefit from vehicle-to-vehicle (V2V) communication, vehicle platoon can reduce the headway and expand the road capacity. However, in the process of vehicle-to-everything communication, packet loss is inevitable, which affect the stable operation of vehicle platoon and make it a challenge to the design of efficient vehicle platoon strategy. In response to the above challenge, this paper proposes an analytical framework that investigates the influence of the packet loss in NR-V2X mode 2 on the string stability of the vehicle platoon. Firstly, the packet loss in NR-V2X mode 2 is analyzed, and an analytical model is presented to depict the relationship between the packet delivery probability and the intra-platoon spacing with the aid of stochastic geometry. Then, the influence of packet loss in NR-V2X mode 2 on the string stability of the vehicle platoon is depicted, and the time headway boundary value under the condition of ensuring the string stability is deduced when the number of connected predecessors varies. Theoretical analysis and simulation verification of the proposed model are carried out. Design insights are given for efficient platoon strategy by increasing the number of connected predecessors and improving packet delivery probability to achieve short time headway and thus high road capacity.
Deformable Perfect Vortex Wave-Front Modulation Based on Geometric Metasurface in Microwave Regime
Yueyi YUAN, Wenjie ZHOU, Mengnuo FAN, Qun WU, Kuang ZHANG
, Available online  , doi: 10.23919/cje.2023.00.416
Abstract(94) HTML (48) PDF(1)
Abstract:
Perfect vortex (PV) beam, as a novel paradigm to carry orbital angular momentum (OAM), owns constant radius of energy intensity and infinite mode of helical patterns, which overcomes the divergence performances of conventional vortex beam. However, common approaches for PV beam generations requires optical cascading systems that constitutes of various lenses and components with bulk volume and high alignment standards, also cannot realize PV customization. Thus, in this paper, we propose a general scheme based on compact platform of geometric metasurface to achieve PV beams generations and deformable wave-front modulations. The adopted unit cell is designed with “ABA”-shaped configuration, which can high-efficiently transform circular polarization incident wave into its cross-polarized states and impose required PV phase patterns. Here, we construct series of metasurface lenses to achieve PVs with eight different OAM modes at operating frequency 10 GHz, and additionally conduct quasi-elliptical energy-ring intensities and fractional modals of PVs by introducing asymmetric periodicity and extra singularities. By exploiting compact metasurface platform, this general scheme for PV beam generation and modulation would provide a theoretical foundation for the electromagnetic waves controlling in modern wireless communication systems.
Multi-Type GNSS User Classification Using RANSAC-K-means Clustering
LI Kun, CHEN Shuailong, ZHENG Shuaiyong, WANG Xuanwen, LIU Jixi, YANG Peng, GAO Mengzhi, JIN Xiaoqin
, Available online  , doi: 10.23919/cje.2024.00.041
Abstract(140) HTML (70) PDF(13)
Abstract:
The BeiDou Navigation Satellite system (BDS-3) has provided Positioning, Navigation and Timing (PNT) services to global users across land, maritime, and aviation. However, how to classify these three users with complex movement patterns poses great challenges to the work of monitoring and evaluating of PNT system. To accurately classify multi-type Global Navigation Satellite System (GNSS) users, this paper proposes a method that combines Random Sample Consensus (RANSAC) and K-means clustering to track the movements of massive users and classify them based on their dynamic characteristics in different areas, which is noted as RANSAC-K-means. The simulated massive user data show that the recognition rate of the proposed algorithm exceeds 83.22%, compared with the conventional method, the proposed RANSAC-K-means method improved the recognition rate by 11.16%. The RANSAC-K-means method can provide more accurate clustering results under the situations where multi-type users present dynamic characteristics with significant differences, showing significant stability and robustness. The proposed method is more suitable for monitoring and evaluating the service performance of satellite navigation systems.
TE101 Substrate Integrated Waveguide Filter With Wide Stopband Up to TE10(2n-1) and Coplanar Ports
CHU Peng, FENG Jianguo, GUO Lei, ZHU Fang, KONG Wei-Bin, LIU Leilei, LUO Guo Qing, WU Ke
, Available online  , doi: 10.23919/cje.2023.00.225
Abstract(135) HTML (68) PDF(17)
Abstract:
This article presents a new method for substrate integrated waveguide (SIW) filters to achieve wide stopbands. Using the proposed staggered inter-coupling structures, double-layer SIW filters working at the fundamental mode TE101 (f0) can have wide stopbands up to TE10(2n-1), where n is the order of the filter. They can break the upper limit of the stopband extension and have coplanar ports suitable for planar circuits and systems in comparison to their multilayer counterparts, and they can further extend the stopbands and have shielding structures suitable for high-performance and high-frequency applications in comparison to their hybrid counterparts. Three examples are provided. The measured results show that they respectively achieve wide stopbands up to 3.97 f0, 5.22 f0, and 6.53 f0. The proposed technique should be effective for developing wide stopband SIW filters for microwave circuits and systems.
Poisson Multi-Bernoulli Mixture Filter for Heavy-tailed Process and Measurement Noises
ZHU Jiangbo, XIE Wexin, LIU Zongxiang, WANG Xiaoli
, Available online  , doi: 10.23919/cje.2022.00.325
Abstract(202) HTML (99) PDF(20)
Abstract:
A novel Poisson multi-Bernoulli mixture (PMBM) filter is proposed to track multiple targets in the presence of heavy-tailed process and measurement noises. Unlike the standard PMBM filter that requires the Gaussian process and measurement noises, the proposed filter uses the Student’s t distribution to model the heavy-tailed noise feature. It propagates Student’s t-based PMBM posterior in the closed-form recursion. The introduction of the moment matching method enables the proposed filter to deal with the process and measurement noises with different heavy-tailed degrees to some extent. Simulation results demonstrate that the overall performance of the proposed filter is better than the existing heavy-tailed noise filters in various scenarios.
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
WANG Zhiwei, ZHU Qiuchi, ZHANG Zhenqi
, Available online  , doi: 10.23919/cje.2022.00.257
Abstract(434) HTML (213) PDF(23)
Abstract:
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a WiFi fingerprint localization system based on Paillier encryption, which is claimed to protect both client $C$’s location privacy and service provider $S$’s database privacy. However, Yang et al. presented a practical data privacy attack in INFOCOM'18, which allows a polynomial time attacker to obtain $S$’s database. In this paper, we propose a novel WiFi fingerprint localization system based on CL encryption, which has a trustless setup and is efficient due to the excellent properties of CL encryption. To prevent Yang et al.’s attack, the system requires that $S$ selects only the locations from its database that can receive the nonzero signals from all the available APs in $C$’s nonzero fingerprint in order to determine $C$’s location. Security analysis shows that our scheme is secure under Li et al.’s threat model. Furthermore, to enhance the security level of PriWFLCL, we propose a secure and efficient zero-knowledge proof protocol for the discrete logarithm relations in $C$’s encrypted localization queries.
Review Article
Solid-State Terahertz Circuits and Communication Systems for 6G: A Review
Niu Zhongqian, Zhang Bo, Zhang Yihan, Feng Yinian, Chen Zhi, Su Yihong, Fan Yong, Guo Yongxin
, Available online  , doi: 10.23919/cje.2023.00.279
Abstract(213) HTML (106) PDF(21)
Abstract:
Terahertz communication is anticipated to play a pivotal role in applications like super-capacity data retrieval, ultra-high-speed short-distance transmission, holographic communication, and micro-sized communication. Emerging scenarios such as 6G, integrated sensing and communication, the metaverse, and autonomous agent networking are also poised to benefit. Additionally, it promises high-precision positioning and high-resolution perceptual imaging for networks and terminal devices. This paper provides a comprehensive overview of the current performance, developmental trends, and measurement techniques associated with solid-state terahertz circuits and communication systems. Regarding circuits, the research and development of single-function circuits in the terahertz band have reached maturity. Traditional single-function circuits continue to evolve towards higher frequency bands (exceeding 1THz), with reduced loss and improved efficiency. Concurrently, building upon these traditional circuits, researchers have introduced innovative integrated circuit designs and layout techniques to minimize system volume. Solid-state terahertz communication systems are also progressing towards elevated carrier frequencies, faster communication rates, phased arrays, and full-duplex communication. Through collaborative efforts, the global academic and industrial communities are intensifying their focus on terahertz key technologies and prototype system validation, aiming to bolster industrial growth and ecosystem development.