Abstract
Deep learning techniques have shown significant success in cyber-physical-social systems (CPSS). As an instance of deep learning models, generative adversarial nets (GAN) model enables powerful and flexible image augmentation, image generation, and classification, thus can be applied to real-world CPSS settings. GAN model training needs a large collection of cyber-physical-social data originating from various CPSS devices. Numerous prevailing GAN models depend on a tacit assumption that several cyber-physical-social data providers present a reliable source to collect training data, which is seldom the case in real CPSS. The existing GAN models also fail to consider multi-dimensional latent structure. In our work, we put forward a novel blockchain-enabled tensor-based conditional deep convolutional GAN (TCDC-GAN) model for cyber-physical-social systems. The blockchain is employed to develop a decentralized and reliable cyber-physical-social data-sharing platform between numerous cyber-physical-social data providers, such that the training data and the model are documented on a ledger that is distributed. Furthermore, a tensor-based generator and a tensor-based discriminator are well designed by employing the tensor model. The results of extensive simulation experiments show the efficacy of the proposed TCDC-GAN model. Compared with the state-of-the-art models, our model gains superior estimation performance.
- Shubhani Aggarwal, Rajat Chaudhary, Gagangeet Singh Aujla, Neeraj Kumar, Kim-Kwang Raymond Choo, and Albert Y. Zomaya. 2019. Blockchain for smart communities: Applications, challenges and opportunities. J. Netw. Comput. Applic. (2019), DOI:10.1016/j.jnca.2019.06.018Google Scholar
Digital Library
- Martin Arjovsky, Soumith Chintala, and Léon Bottou. 2017. Wasserstein GAN. arXiv preprint arXiv:1701.07875 (2017).Google Scholar
- Kim-Kwang Raymond Choo, Zheng Yan, and Weizhi Meng. 2020. Blockchain in industrial IoT applications: Security and privacy advances, challenges and opportunities. IEEE Trans. Industr. Inf. 16, 6 (2020), 4119–4121.Google Scholar
Cross Ref
- Konstantinos Christidis and Michael Devetsikiotis. 2016. Blockchains and smart contracts for the internet of things. IEEE Access 4 (2016), 2292–2303.Google Scholar
Cross Ref
- Zihan Ding, Xiaoyang Liu, Miao Yin, Wei Liu, and Linghe Kong. 2019. TGAN: Deep tensor generative adversarial nets for large image generation. arXiv preprint arXiv:1901.09953 (2019).Google Scholar
- Jun Feng, Laurence T. Yang, Nicholaus J. Gati, Xia Xie, and Benard S. Gavuna. 2020. Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives. Inf. Sci. 527 (2020), 341–355.Google Scholar
Cross Ref
- Jun Feng, Laurence T. Yang, and Ronghao Zhang. 2019. Practical privacy-preserving high-order Bi-Lanczos in integrated edge-fog-cloud architecture for cyber-physical-social systems. ACM Trans. Internet Technol. 19, 2 (2019), 1–18. Google Scholar
Digital Library
- Jun Feng, Laurence T. Yang, Ronghao Zhang, and Benard Safari Gavuna. 2020. Privacy preserving Tucker train decomposition over blockchain-based encrypted industrial IoT data. IEEE Trans. Industr. Inf. (2020), DOI:10.1109/TII.2020.2968923Google Scholar
Cross Ref
- Jun Feng, Laurence T. Yang, Ronghao Zhang, Weizhong Qiang, and Jinjun Chen. 2020. Privacy preserving high-order Bi-Lanczos in cloud-fog computing for industrial applications. IEEE Trans. Industr. Inf. (2020), DOI:10.1109/TII.2020.2998086Google Scholar
Cross Ref
- Wei Feng and Zheng Yan. 2019. MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain. Fut. Gen. Comput. Syst. 95 (2019), 649–666.Google Scholar
Cross Ref
- Ugo Fiore, Alfredo De Santis, Francesca Perla, Paolo Zanetti, and Francesco Palmieri. 2019. Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Inf. Sci. 479 (2019), 448–455.Google Scholar
Cross Ref
- Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Proceedings of the International Conference on Advances in Neural Information Processing Systems. 2672–2680. Google Scholar
Digital Library
- Mohamed Tahar Hammi, Badis Hammi, Patrick Bellot, and Ahmed Serhrouchni. 2018. Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Comput. Sec. 78 (2018), 126–142.Google Scholar
Cross Ref
- Anish Jindal, Gagangeet Singh Singh Aujla, Neeraj Kumar, and Massimo Villari. 2019. GUARDIAN: Blockchain-based secure demand response management in smart grid system. IEEE Trans. Serv. Comput. (2019), DOI:10.1109/TSC.2019.2962677Google Scholar
- Nir Kshetri. 2017. Can blockchain strengthen the internet of things?IT Prof. 19, 4 (2017), 68–72.Google Scholar
- Jay Lee, Moslem Azamfar, and Jaskaran Singh. 2019. A blockchain enabled cyber-physical system architecture for industry 4.0 manufacturing systems. Manuf. Lett. 20 (2019), 34–39.Google Scholar
Cross Ref
- Ao Lei, Haitham Cruickshank, Yue Cao, Philip Asuquo, Chibueze P. Anyigor Ogah, and Zhili Sun. 2017. Blockchain-based dynamic key-management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4, 6 (2017), 1832–1843.Google Scholar
Cross Ref
- Liangzhi Li, Kaoru Ota, and Mianxiong Dong. 2018. Sustainable CNN for robotic: An offloading game in the 3D vision computation. IEEE Trans. Sustain. Comput. 4, 1 (2018), 67–76.Google Scholar
Cross Ref
- Gaoqi Liang, Steven R. Weller, Fengji Luo, Junhua Zhao, and Zhao Yang Dong. 2018. Distributed blockchain-based data protection framework for modern power systems against cyber atacks. IEEE Trans. Smart Grid 10, 3 (2018), 3162–3173.Google Scholar
Cross Ref
- Chao Lin, Debiao He, Xinyi Huang, Xiang Xie, and Kim-Kwang Raymond Choo. 2018. Blockchain-based system for secure outsourcing of bilinear pairings. Inf. Sci. (2018), DOI:10.1016/j.ins.2018.12.043Google Scholar
- Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. 2015. Deep learning face attributes in the wild. In Proceedings of the IEEE International Conference on Computer Vision. 3730–3738. Google Scholar
Digital Library
- Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, and Xiang Xie. 2020. An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain. IEEE Trans. Depend. Sec. Comput. (2020), DOI:10.1109/TDSC.2020.2969418Google Scholar
Digital Library
- Dennis Miller. 2018. Blockchain and the internet of things in the industrial sector. IT Prof. 20, 3 (2018), 15–18.Google Scholar
Digital Library
- Kaoru Ota, Minhson Dao, Vasileios Mezaris, and Francesco G. B. De Natale. 2017. Deep learning for mobile multimedia: A survey. ACM Trans. Multimedia Comput., Commun., Applic. 13, 3 (2017), 34. Google Scholar
Digital Library
- Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015).Google Scholar
- Md Abdur Rahman, Md Mamunur Rashid, M. Shamim Hossain, Elham Hassanain, Mohammed F. Alhamid, and Mohsen Guizani. 2019. Blockchain and IoT-based cognitive edge framework for sharing economy services in a smart city. IEEE Access 7 (2019), 18611–18621.Google Scholar
Cross Ref
- Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized anonymous payments from bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy. 459–474. Google Scholar
Digital Library
- Rafał Skowroński. 2019. The open blockchain-aided multi-agent symbiotic cyber physical systems. Fut. Gen. Comput. Syst. 94 (2019), 430–443.Google Scholar
Cross Ref
- Qingquan Song, Hancheng Ge, James Caverlee, and Xia Hu. 2019. Tensor completion algorithms in big data analytics. ACM Trans. Knowl. Discov. Data 13, 1 (2019), 1–48. Google Scholar
Digital Library
- Jinjun Tang, Xiaolu Wang, Fang Zong, and Zheng Hu. 2020. Uncovering spatio-temporal travel patterns using a tensor-based model from metro smart card data in Shenzhen, China. Sustainability 12, 4 (2020), 1475.Google Scholar
Cross Ref
- Yuxuan Wang, Fengji Luo, Zhaoyang Dong, Ziyuan Tong, and Yichen Qiao. 2019. Distributed meter data aggregation framework based on blockchain and homomorphic encryption. IET Cyber-phys. Syst.: Theor. Applic. 4, 1 (2019), 30–37.Google Scholar
Cross Ref
- Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, and Wu Yang. 2020. Application-aware consensus management for software-defined intelligent blockchain in IoT. IEEE Netw. 34, 1 (2020), 69–75.Google Scholar
Cross Ref
- Wenjie Yang, Xingang Liu, Lan Zhang, and Laurence T. Yang. 2013. Big data real-time processing based on storm. In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’13). 1784–1787. Google Scholar
Digital Library
- Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Qi Zhang, and Kim-Kwang Raymond Choo. 2020. An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Trans. Serv. Comput. (2020), DOI:10.1109/TSC.2020.2966970Google Scholar
Cross Ref
- Yong Yu, Yannan Li, Junfeng Tian, and Jianwei Liu. 2018. Blockchain-based solutions to security and privacy issues in the internet of things. IEEE Wirel. Commun. 25, 6 (2018), 12–18. Google Scholar
Digital Library
- Jing Zeng, Laurence T. Yang, Man Lin, Huansheng Ning, and Jianhua Ma. 2020. A survey: Cyber-physical-social systems and their system-level design methodology. Fut. Gen. Comput. Syst. 105 (2020), 1028–1042.Google Scholar
Cross Ref
- Qingchen Zhang, Laurence T. Yang, Zhikui Chen, and Peng Li. 2017. PPHOPCM: Privacy-preserving high-order possibilistic c-means algorithm for big data clustering with cloud computing. IEEE Trans. Big Data (2017), DOI:10.1109/TBDATA.2017.2701816Google Scholar
- Ming Zheng, Tong Li, Rui Zhu, Yahui Tang, Mingjing Tang, Leilei Lin, and Zifei Ma. 2020. Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification. Inf. Sci. 512 (2020), 1009–1023.Google Scholar
Digital Library
- Zhenyu Zhou, Bingchen Wang, Mianxiong Dong, and Kaoru Ota. 2020. Secure and efficient vehicle-to-grid energy trading in cyber physical systems: Integration of blockchain and edge computing. IEEE Trans. Syst., Man, Cyber.: Syst. 50, 1 (2020), 43–57.Google Scholar
Cross Ref
- Chunsheng Zhu, Joel J. P. C. Rodrigues, Victor C. M. Leung, Lei Shu, and Laurence T. Yang. 2018. Trust-based communication for the industrial internet of things. IEEE Commun. Mag. 56, 2 (2018), 16–22. Google Scholar
Digital Library
Index Terms
Blockchain-enabled Tensor-based Conditional Deep Convolutional GAN for Cyber-physical-Social Systems
Recommendations
Triple discriminators - equipped GAN for Denoising of Chinese calligraphic tablet images
AbstractDenoising of Chinese calligraphic tablet images is of great importance in regard to the study of both content and character shapes in these images. Formerly GAN (generative adversarial network) based image denoising methods model the noise in the ...
Data fusion in cyber-physical-social systems: State-of-the-art and perspectives
Highlights- This paper analyzes data collection and representation in CPSS and proposes to use tensors to represent CPSS data.
AbstractCyber-Physical-Social systems (CPSSs) are the extension of Cyber-Physical systems (CPS), which seamlessly integrate cyber space, physical space and social space. CPSSs promote the information resource from single space to tri-space, so ...
Data augmentation with conditional GAN for automatic modulation classification
WiseML '20: Proceedings of the 2nd ACM Workshop on Wireless Security and Machine LearningDeep learning has great potential for automatic modulation classification (AMC). However, its performance largely hinges upon the availability of sufficient high-quality labeled data. In this paper, we propose data augmentation with conditional ...






Comments