摘要:The super typhoon has always posed a serious threat to the stable operation of the power distribution system in coastal areas, and the disaster tolerance capability of the power distribution communication network has gradually become the key to ensuring the efficiency of post-disaster repair. However, when facing a super typhoon, the current coupling mechanism between the power grid and communication network in the power distribution system lacks precision, which complicates ensuring the economic viability of disaster tolerance planning for the power distribution communication network. Therefore, an economical disaster tolerance planning method for the power distribution communication network adapted to the super typhoon was proposed. By constructing a disaster tolerance planning system model based on redundant local emergency communications, a reliability assessment framework for distribution communication networks under super typhoon scenarios is established. With cost minimization as the optimization objective, efficient solutions are achieved through a hierarchical decoupling mechanism. Simulation analysis shows that the proposed method can significantly reduce deployment costs by optimizing the distribution of anchor points and emergency communication modules while ensuring the reliability of the target. The proposed method can effectively achieve cost-effective disaster recovery planning for power distribution communication networks that can withstand super typhoons.
关键词:disaster tolerance planning;economy;K-means;heuristic algorithm;super typhoon;power distribution communication network
摘要:The popularization of cloud storage and the growing demand for data ownership transfer have made remote data integrity verification with ownership transfer a key technology for safeguarding cloud data security. However, existing schemes were generally plagued by problems such as heavy computational burden on data owners, reliance on untrusted third-party auditors, high communication overhead, and lack of effective non-repudiation mechanisms. To address these challenges, a remote data integrity verification scheme with ownership transfer based on Trusted Execution Environment (TEE) is proposed in this paper. All critical computational tasks in the integrity verification and ownership transfer are securely offloaded to the TEE of the cloud service provider’s platform by our scheme. Formal security analysis is conducted based on a strong threat model where all entities except the isolation protection of TEE are untrusted, and a prototype system is developed using Intel SGX. Comparative experiments with various representative schemes are performed to evaluate its performance. The experimental results demonstrate that this scheme achieves superior computational efficiency in stages such as HVT (Homomorphic Verifiable Tag) generation compared to the benchmark schemes, with computational overhead reductions ranging from 10.1% to 86.4%. Additionally, it achieves zero communication overhead between cloud service providers and verifiers.
关键词:Remote Data Integrity Checking;ownership transfer;Trusted Execution Environment (TEE);Cloud Storage Security
摘要:Cyber range platforms serve as critical infrastructure for conducting cybersecurity exercises and enhancing operational readiness. This paper focuses on the enabling pathways and systematic methodologies for empowering such platforms through artificial intelligence (AI). To address the limitations of conventional platforms in dynamic evolution, scenario diversity, and evaluation dimensions, we integrate key technologies including multi-agent systems, reinforcement learning, and large language models. We propose a hierarchical and configurable platform architecture that incorporates intelligent attack simulation, adaptive defense decision-making, and automated evaluation and feedback. Furthermore, a layered intelligent agent training mechanism based on imitation learning and lifelong learning is designed.The proposed platform can dynamically generate high-fidelity attack chains, achieve cross-domain collaborative defense, and perform multi-dimensional quantitative evaluation, thereby significantly improving the realism and precision of cyber exercise training. Through scenario-specific configuration of strategy libraries, environment simulation, and evaluation systems, the architecture can be flexibly adapted to diverse application needs in education, scientific research, and industrial drills.This paper also examines key challenges faced by the platform, including model interpretability, simulation authenticity, data privacy, and ethical compliance. Future research directions are outlined, encompassing explainable AI, digital twins, privacy-preserving computation, and standardization collaboration. The study aims to provide theoretical support and practical guidance for building a next-generation adaptive and sustainably evolving cyber defense system.
关键词:artificial intelligence;cyber offense and defense platform;multi-agent system;adaptive defense;talent cultivation
摘要:The trusted data space is an important infrastructure for promoting data circulation and utilization, and fully releasing the value of data elements. The construction of trusted data spaces faces issues such as coordination among multiple participants including trusted data space operators, data custodians, data providers and data users; privacy protection in the process of data circulation through outsourcing; and the implementation of “the separation of three rights” (right to hold data resources, right to use and process data, right to operate data products) of data in trusted data spaces. To address the above issues, this paper proposes an attribute-based encryption (ABE)-based data security custody scheme for trusted data spaces. The scheme designs an authorization mechanism for trusted data operators to data custodians, and embeds the data custodian's authorization certificate into the access control process based on ABE, thereby realizing the authentication of data custodians during access control. In addition, on the basis of attribute-based access control, a permission-based access control structure is added to realize the separation of three rights in the trusted data space. Security analysis and experiments show that the proposed scheme has low implementation overhead, can provide security not lower than that of CP-ABE , and has good application value in trusted data spaces.
关键词:Data circulation;access control;Trusted data space;CP-ABE
摘要:The diversified service requirements of 5G networks drive the collaborative development of Ultra-Reliable Low-Latency Communications (URLLC) and Enhanced Mobile Broadband (eMBB), where QoS assurance and service scheduling play a central role in addressing heterogeneous resource competition. This paper provides a comprehensive review of the technical background, core principles, and standard framework of 5G QoS and service scheduling, with an in-depth analysis of both traditional scheduling algorithms and intelligent optimization approaches. By comparing representative scheduling schemes across different stages of evolution and linking them with 3GPP standards and real-world application scenarios, the study highlights the challenges and opportunities of deep reinforcement learning–driven dynamic resource allocation in domains such as industrial automation and intelligent transportation. Building upon this foundation, this paper redefines the taxonomy of radio resource scheduling from the perspective of the fundamental resource conflict between URLLC and eMBB. It systematically reviews the evolutionary trajectory—from conventional scheduling mechanisms and NR coexistence schemes to intelligent scheduling—and analyzes the pivotal impacts of 3GPP Releases 15 through 19 on service-oriented scheduling strategies. Finally, it outlines key research directions and formulates structured open problems for intelligent scheduling in the context of 6G.
摘要:In the context of accelerating digital transformation in the securities industry, intelligent operational maintenance is recognized as a critical support for ensuring financial system stability and business continuity. To address the shortcomings of traditional operational maintenance models—including knowledge silos, strong reliance on manual experience, and insufficient real-time responsiveness—an intelligent operational maintenance solution integrating large language models with retrieval-augmented generation technology was proposed. A four-tier architecture of "data-model-capability-application" was constructed: the data layer was designed to achieve standardized governance of multi-source heterogeneous operational data; the model layer was equipped with large language models to provide semantic understanding, logical reasoning, and content generation capabilities; the capability layer was encapsulated with five core modules: knowledge management, knowledge enhancement engine, intelligent Q&A, diagnostic analysis, and report generation; and the application layer was implemented through a unified workbench to provide operational services including knowledge retrieval, fault localization, and monitoring and alerting. Practical application demonstrated that the solution effectively enhanced the accuracy of knowledge-based Q&A, the efficiency of fault localization, and the timeliness of alerts, thereby providing a reusable technical framework and practical pathway for building secure and controllable intelligent operational maintenance platforms in the securities industry.
关键词:large language model;Retrieval-Augmented Generation;artificial intelligence;Intelligent Diagnosis;intelligent maintenance
ZHUGE Bin, LI Zuquan, PAN Tingting, CAI Xiaodan, ZHANG Zitian, DONG Ligang, JIANG Xian
DOI:10.11959/j.issn.1000-0801.003
摘要:A distributed multi-agent task allocation algorithm based on anonymous hedonic games was proposed, which integrated an automatic multi-objective weight adjustment strategy via Q-learning and a log-linear learning algorithm. This approach achieved adaptive task allocation among agents in scenarios with dynamically introduced tasks and time-varying rewards. By considering agents assigned to the same task as a coalition, the original task allocation problem was transformed into a coalition formation game. The objective was to identify an optimal coalition structure that maximized system utility while minimizing both the agents' travel distance and the time cost to complete tasks. Experimental results demonstrated that the proposed algorithm exhibited superior performance in multi-agent task allocation, achieving lower travel distance and reduced task completion time under tested conditions. Compared to classical task allocation algorithms, the performance improvement ranged between 5.85% and 19.14%. These findings preliminarily verify the superiority and stability of the proposed strategy in practical applications.
ZHENG Mingkun, LIU Tianle, PAN Peng, ZHENG Yawen, NIE Bairun, HE Tengjiao
DOI:10.11959/j.issn.1000-0801.071
摘要:By introducing a small number of active elements into conventional intelligent reflecting surfaces (IRSs), semi-passive IRSs can effectively alleviate the challenges of channel estimation, thereby enhancing the practical deployability of IRSs. However, existing studies have not systematically investigated the impact of active element deployment strategies on channel estimation, which makes it difficult in practice to jointly balance estimation accuracy, the number of active elements, algorithmic complexity, and pilot overhead. To address this issue, this paper exploits the low-rank prior of the channel matrix together with the Toeplitz structure of its covariance matrix, and proposes a low-pilot and low-complexity super-resolution channel estimation scheme for semi-passive IRS systems. Numerical results demonstrate that, by leveraging low-rank matrix completion theory and the structural properties of Toeplitz matrices in the sampling design, the proposed scheme can selectively configure the locations and number of active elements, thereby reducing pilot overhead and enabling super-resolution estimation of channel parameters, while significantly lowering the computational complexity compared with existing methods.
ZHANG Yue, XIE Renchao, WANG Yuan, WANG Fang, XIANG Zihao, TANG Qinqin, HUANG Tao
摘要:The Computing Power Network (CPN) deeply integrates originally dispersed and heterogeneous computing resources from the cloud, edge, and terminals, meeting the stringent requirements of emerging services for real-time data processing and efficient distribution. The identity resolution service serves as a fundamental prerequisite for enabling data storage and retrieval to support these functionalities. The key challenge lies in constructing an efficient data indexing mechanism to respond to data retrieval and storage requests, regardless of how data is cached within the CPN. Therefore, based on the coordinate indexing method CNR, a low-latency identifier resolution mechanism was proposed for computing power networks. By constructing a triangulation graph (DT) graph based on geographic routing, any query request from computing nodes was responded to within the virtual space maintained by CNR, significantly reducing the path length for cross-server data retrieval and thereby achieving efficient identifier resolution services. Experiments showed that compared to existing solutions, the identifier resolution mechanism using CNR reduced lookup path length by 41.61% and response time by 57.19%.
关键词:the computing power network;data sharing;low latency;computing power network identifier resolution
LI Ziyan, GU Xiaofei, LI Huixin, WANG Yapeng, AI Ming
DOI:10.11959/j.issn.1000-0801.DXKX260132
摘要:To realize the IMT‑2030 (6G) vision of ubiquitous intelligence, this paper proposes an AI‑native core network architecture featuring multi‑agent collaboration. Built upon a service‑based framework, the architecture introduces three core network functions: Intent Awareness (AIEF), Intelligent Control (ACF), and Resource Management (ARMF). To validate the architecture, an intent‑driven subnet generation task is selected as a representative use case, and a two‑stage multi‑agent collaborative mechanism coordinated by ACF is designed. Experiments conducted on a single RTX 4090D show that in the intent parsing stage, a large language model leverages commonsense reasoning to convert unstructured intents into standardized policy contracts, achieving an average inference latency of 1744.9 ms. In the subsequent subnet planning and generation stage, two AI agents collaboratively automate the subnet generation process, with an average latency of 185.7 ms. Across 1,000 diverse intents, the subnet generation success rate reaches 96.6%. The results confirm that the proposed architecture enables a closed loop from natural-language intent to subnet instance generation, validating the feasibility of embedding AI agents as native components in future networks.
关键词:6G;mobile communication network;intent-driven;subnet generation;AI agent
She Yuxuan, Zhou Kangyan, Dai Ao, Wei Zixiang, Zhou Jiaxi, Xiao Lixia
DOI:10.11959/j.issn.1000-0801.2026119
摘要:The continuous expansion of remote-sensing satellite constellations has significantly enhanced their comprehensive application capabilities in resource surveys, environmental monitoring, and emergency disaster response. However, the burgeoning scale of these constellations markedly increases the complexity of mission planning. While multi-agent reinforcement learning is an effective approach for large-scale mission planning, the surge in satellite numbers leads to the challenge of dimensionality explosion in the state space. To address this bottleneck, a multi-head graph attention driven feature aggregation (MGADFA) algorithm for mission planning in giant remote-sensing constellations was proposed. This method utilized multi-head graph-attention to capture dynamic interaction weights between satellites and employed a feature aggregation mechanism to transform complex multi-body interactions into individual-population associations. While preserving key cooperative features, this approach reduced the joint decision space from an exponential scale to a linear dimension. Simulation results demonstrated that the proposed algorithm exhibited superior performance in terms of task throughput and load balancing.
Hu Yuqing, Xiao Ninggui, Zhang Hua, Xin Pujie, Pan Peng
当前状态:一校优先
DOI:10.11959/j.issn.1000-0801.2026116
摘要:With the widespread deployment of unmanned aerial vehicles in urban environments, security threats caused by illegal intrusions have become increasingly prominent. Detecting such “low-altitude, slow, and small” targets in complex urban scenarios remains a challenging problem. Existing detection methods based on high-order cumulants are capable of suppressing Gaussian noise and characterizing non-Gaussian signal features; however, their detection performance degrades significantly when the transmitter-receiver separation is large or the target echo is weak. To address this limitation, a detection method based on two-dimensional slice spectrum analysis of high-order cumulants was proposed. Specifically, the high-order cumulant expansion function of the received signal was computed to preserve local structural features under different delay combinations. Two-dimensional slices were extracted for spectral analysis, and a frequency-domain energy-based threshold detector was constructed to enhance the separability between the target and background interference. Simulation results demonstrate that, in complex multipath and low signal-to-noise ratio scenarios, the proposed method can maintain a detection probability exceeding 60% within a 500 m500 m surveillance area, thereby validating its effectiveness and robustness for detecting weak UAV intrusion signals.
关键词:UAV detection;channel state information;high-order cumulant
YANG Zuyuan, WANG Ning, SHEN Lingfeng, ZHANG Qiankun, CHEN Renxiang, JIA Shaobo
当前状态:一校优先
DOI:10.11959/j.issn.1000-0801.2026097
摘要:The reconfigurable intelligent surface (RIS), as one of the key enabling technologies for the sixth-generation mobile communication systems, is employed to effectively enhance signal strength and communication quality, thereby improving the overall system performance. In practical applications, the 1‑bit discrete phase‑shift scheme is considered more suitable for engineering implementation due to its lower hardware complexity, however, the discrete‑phase constraint typically makes the beamforming problem difficult to solve directly. To address this challenge, an optimization method incorporating radar sensing was proposed. Firstly, environmental geometric information acquired by a radar module was used to construct a channel model. On this basis, a semidefinite programming problem was formulated with the objective of maximizing the received power. This formulation introduced a rank‑one constraint, which was then transformed into an efficiently solvable convex optimization form via convex relaxation. Moreover, a linear term was incorporated to push the solution toward extremal points, thereby satisfying the 1‑bit discrete‑phase requirement. Finally, an RIS‑assisted communication system experimental platform was established, and the feasibility and effectiveness of the proposed algorithm were verified, providing both theoretical and experimental support for the future engineering deployment of large‑scale RIS systems.
Tang Zhihua, Zhang Fang, Jiao Lingxiao, Yan Hong, Xu Xiaofan, Tong Jianfei, Sun Yi
当前状态:一校优先
DOI:10.11959/j.issn.1000-0801.2026112
摘要:By enhancing the terrestrial 5G new radio (NR) protocol to adapt to satellite communication scenarios, the 3rd Generation Partnership Project (3GPP) non-terrestrial networks (NTN) can fully integrate the advantages of terrestrial and non-terrestrial networks while with continuous evolution capability, which is therefore an essential technological direction to realize the integration of satellite and terrestrial network. To address the insufficient network resilience caused by the dependency on GNSS in existing NR NTN systems, a study item has been conducted as part of the Release 20 NR NTN standardization work. Based on this, the key technical challenges in enhancing GNSS resilience for NTN were first outlined. Then, the technical solutions and standardization progress involved in initial access procedure optimization, time and frequency synchronization enhancement in connected status, and network-assisted positioning were comprehensively introduced and analyzed. Furthermore, future technology evolution and system deployment were prospected.
关键词:NTN;GNSS resilience;uplink synchronization;differential delay;differential frequency offset
Gu Hongxing, Shangguan Mengxuan, Ding Meng, He Yilin, Ma Wanli
当前状态:一校优先
DOI:10.11959/j.issn.1000-0801.2026103
摘要:As widely applied identity recognition devices, fingerprint attendance machines store fingerprint data and attendance records, which possess significant evidentiary value in forensic science. However, the forensic extraction and analysis of this data were challenged by three primary issues: the limitations of conventional extraction methods, the difficulty in identifying fingerprint template data, and the lack of targeted correlation analysis methods. To address the aforementioned issues, a data forensic and analysis method specifically for fingerprint attendance machines was proposed. Firstly, based on the storage characteristics of the attendance machines, a direct-connect extraction method was developed, by which low-level data could be read directly from the storage chip. Secondly, corresponding identification methods were proposed for the three common types of fingerprint templates found in these machines. Finally, for the different types of data within the machines, a correlation analysis method for heterogeneous data was put forward. Experimental results demonstrated that interface limitations could be overcome by this method, and data extraction was achieved under complex conditions. For fingerprint template data, cross-device identification was realized. Building on this, the behavioral patterns of individuals involved could be discovered through correlation analysis. Consequently, new approaches and methodologies were provided for forensic science work.
关键词:data forensics and analysis;forensic science;forensic medium;fingerprint template;data correlation
Liu Zhiguo, Jin Xiaoyong, Wang Lin, Pan Chengsheng
DOI:10.11959/j.issn.1000-0801.2026124
摘要:Satellite edge computing is proposed to make up for limited coverage of the terrestrial network,it can provide high-quality service for users in sparse network environment. However, limited resources of satellite edge servers and diverse demands of users make it difficult to formulate flexible and effective task offloading methods. Aiming at the problems of high offloading delays and excessive energy consumption caused by unreasonable heterogeneous task offloading strategy, a heterogeneous task offloading method based on the convolutional asynchronous advantage Actor-Critic (CA3C) algorithm was proposed based on the system model of satellite-ground edge computing network (SGECN) architecture combined with software defined network (SDN). Delay and energy consumption weights were adaptively adjusted according to task characteristics by introducing a dynamic weight distribution mechanism, and a convolutional neural network was used to improve the network structure of A3C, the problems of diverse demands of heterogeneous task and slow convergence speed of the algorithm were solved. Simulation results show that the CA3C method performed better in effectively reducing the offloading time delay and energy consumption of heterogeneous task.
关键词:satellite edge computing;software defined network;heterogeneous task offloading;deep reinforcement learning
摘要:To address the challenges of differentiated user link demands and dynamic resource management in unmanned aerial vehicle (UAV) communication networks assisted by multiple reconfigurable intelligent surfaces (RIS), a user-centric cooperative transmission mechanism based on deep reinforcement learning was proposed. A mixed integer nonlinear programming (MINLP) model was formulated to jointly optimize UAV flight trajectory, transmissiont power, RIS reflection unit allocation, and phase shift control, aiming to maximize system energy efficiency while satisfying differentiated quality of service (QoS) requirements. To address the issues of high computational complexity and the limited adaptability to dynamic environments, a multi-stage optimization framework was designed. In the first stage, a coalition game-based algorithm was introduced to dynamically allocate RIS elements, and a user autonomous switching mechanism was introduced to mitigate co-channel interference. In the second stage, the twin delayed deep deterministic policy gradient (TD3) algorithm was adopted to jointly optimize resource allocation and UAV trajectory planning. Simulation results demonstrated that the proposed scheme consistently outperforms all benchmark methods in terms of system energy efficiency, achieving a 19% improvement compared to SAC algorithms, thereby effectively verifying its robustness in dynamic environments and its capability to guarantee differentiated QoS for users.
关键词:RIS;UAV communication network;user-centric;coalition game;TD3
Zhang Yajuan, Li Guangqiu, Gao Jie, Zhang Xu, Wang Zhikang
当前状态:一校优先
DOI:10.11959/j.issn.1000-0801.2026096
摘要:In response to the poor performance of physical layer security (PLS) in the existing modify and forward (MF) wireless systems and the limitations of their channel modeling, a PLS model for relay selection MF wireless systems with maximal ratio combining (MRC) diversity reception at all nodes over Nakagami fading channels was proposed in this paper. Considering the worst scenario of passive colluding eavesdroppers with MRC, closed form expressions for secrecy outage probability (SOP), asymptotic SOP, and probability of non-zero secrecy capacity (PNSC) of the MF systems were derived for three relay selection schemes. The simulation results of the MF wireless systems verify the correctness of their theoretical analysis, which also show that for the same relay selection scheme, the SOP and PNSC performance of the MF wireless systems outperform those of the corresponding decode and forward wireless systems. The results indicate that the security diversity gain of relay selection scheme I equals the product of the number of relay nodes, the number of relay receive antennas, and the fading parameter of the source-relay link, and the security diversity gains of relay selection schemes II and III are related to the number of relay nodes, the number of receiving antennas at the relays or destination, and the fading parameters of the source-relay, source-destination, and relay-destination links.
摘要:Low-coherence sequences with low peak-to-average power ratio (PAPR) are widely applied in multicarrier communication systems such as orthogonal frequency division multiple access (OFDMA). To address the issues that the existing low-coherence sequence design algorithm (LOCEDA) based on a geometric collision model lacked adaptive sensing capability for optimization status and suffered from slow convergence speed and unsatisfactory performance under complex constraints, an adaptive low-coherence sequence design algorithm based on fuzzy logic control (FLC-LOCEDA) was proposed. Based on the existing LOCEDA, a fuzzy logic controller (FLC) was introduced to construct a parameter adaptive adjustment mechanism. The sequence updating step size and collision resolution rounds were calculated in real-time by the FLC according to the correlation improvement rate and PAPR violation degree during the iterative process, and the balance between global search and local optimization was automatically adjusted under the premise of strictly satisfying PAPR constraints. It was verified through simulations that, compared with the existing LOCEDA, the convergence speed was significantly improved and the time complexity was greatly reduced by FLC-LOCEDA. In particular, under low PAPR constraints, the number of iterations required for convergence was reduced by approximately 63.1%, and the optimal cross-correlation was further decreased by about 12.6%. The effectiveness and robustness of the FLC-LOCEDA algorithm in solving multi-objective constraint sequence design problems were demonstrated.
关键词:sequence design;low-coherence;peak-to-average power ratio;fuzzy logic control;adaptive algorithm