Welcome to the IKCEST
Journal
IEEE Transactions on Consumer Electronics

IEEE Transactions on Consumer Electronics

Archives Papers: 489
IEEE Xplore
Please choose volume & issue:
Guest Editorial Special Section on “User Behavior Modeling for Trustworthy Recommendation over Consumer Electronics Products”
Honghao GaoMohammad S. ObaidatWalayat HussainRamón J. Durán Barroso
Keywords:Special issues and sectionsConsumer behaviorTrusted computingRecommender systemsConsumer electronicsMarket researchCustomer satisfactionElectronic ProductsConsumer ElectronicsConsumer Electronic ProductsPrivacyConsumer BehaviorData SecurityRecommender SystemsUser SatisfactionRoamingFederated LearningMusic ProductionRecommendation ModelTask OffloadingBlockchain Technology
Affinity Similarity-Based Contrastive Loss for Unsupervised Visual Representation Learning
Zheng JiangZhou ZhouQuan ZhouYongan GuoJing YangWeihua Ou
Keywords:TrainingContrastive learningVisualizationRepresentation learningConsumer electronicsUnsupervised learningData modelsData augmentationAttention mechanismsFeature extractionUnsupervised LearningRepresentation LearningVisual LearningContrastive LossUnsupervised RepresentationUnsupervised Representation LearningVisual Representation LearningUnsupervised Visual Representation LearningHigh SimilarityLearning FrameworkData AugmentationTraining ImagesSelf-supervised LearningImageNet DatasetFeature EncoderTraining PairsPositive TrainingAugmented VersionLoss FunctionTeacher NetworkTop-1 AccuracyStudent NetworkFeature RepresentationVision TransformerBatch Of ImagesAttention MechanismDiscriminative Feature RepresentationRandom Horizontal FlippingContrastive learningunsupervised visual learningpositive and negative pairsaffinity similarity module
Abstracts:Contrastive loss and its variants are very popular for visual representation learning in an unsupervised scenario, where positive and negative pairs are produced to train a feature encoder based on data augmentation. However, treating only the original image and its augmented versions as positive pairs may lead to problems, since two training images that share the same object category may be misclassified as negative pairs. To address this issue, this paper introduces a plug-in-play affinity similarity module (ASM) used in any contrastive learning framework for unsupervised visual representation learning. In this approach, positive and negative pairs are determined not only based on data augmentation, but also according to the similarity of their feature embeddings. The core idea is that two training samples with higher feature similarities are likely to belong to the same object category, suggesting that they should be classified as a positive pair with high probability, and vice versa for negative pairs. Accordingly, we have also developed an improved affinity similarity-based contrastive loss (ASCL) that leverages the newly generated positive and negative training pairs produced by the ASM. To demonstrate the effectiveness of our method, we extensively evaluate its performance on the ImageNet dataset, showing that it achieves satisfactory results.
IoT-UAV-Enabled Intelligent Resource Management in Low-Carbon Smart Agriculture Using Federated Reinforcement Learning
Nada AlasbaliFahad MasoodNoha AlnazzawiWad GhabanAbdulwahab AlazebShadi BasurraFaisal Saeed
Keywords:Consumer electronicsTemperature sensorsAutonomous aerial vehiclesInternet of ThingsSmart agricultureResource managementSoil moistureCropsConvolutional neural networksReinforcement learningResource ManagementPrecision AgricultureIntelligent Resource ManagementFederated Reinforcement LearningEnergy ConsumptionResource AllocationEnergy EfficiencySoil MoistureGlobal ModelCrop GrowthInternet Of ThingsUnmanned Aerial VehiclesSoil TemperatureResource EfficiencyAnomaly DetectionInternet Of Things DevicesConsumer ElectronicsFederated LearningLow ValuesConvolutional Neural NetworkInternet Of Things NodesLocal TrainingInternet Of Things SensorsMobile Edge ComputingMarkov Decision ProcessGround Penetrating RadarReal-time Data CollectionEdge ServerUpdated ModelReal-time DataFederated reinforcement learningIoTUAVenergy efficiencyagriculture consumer electronics
Abstracts:The Internet of Things (IoT) and unmanned aerial vehicles (UAVs) continue to advance the low-carbon smart agriculture technologies for next-generation consumer electronics and unlock more informed agricultural practices. Reinforcement learning (RL), federated learning (FL), and federated reinforcement learning (FRL) have demonstrated notable achievements in resolving complex problems, including resource allocation, energy efficiency, anomaly detection, and bandwidth utilization for multimodal tasks. This research explores multimodal data analysis and resource optimization using FRL for agricultural consumer electronics. The proposed framework employs IoT devices to monitor temperature, humidity, soil temperature, and soil moisture in real time, while UAVs provide aerial imagery for soil moisture, crop growth, and pest identification across three fields. This framework supports distributed learning, which trains local RL models on each node and combines them into the global model. The proposed FRL model demonstrated significant enhancements, including a 17% reduction in energy consumption for IoT devices and a 15% reduction for UAVs compared to non-FRL methods. This research emphasizes the effectiveness of FRL in integrating IoT and UAV for efficient resource allocation, energy efficiency, and reduced carbon emissions for low-carbon agricultural consumer electronics.
Guest Editorial Quantum in Consumer Technology: Opportunities and Challenges
Ahmed FaroukJingbo WangRafael Sotelo
Keywords:Special issues and sectionsQuantum computingQuantum mechanicsConsumer electronicsConsumer TechnologyQuantum ComputingSmart CityConsumer ElectronicsIntrusion DetectionQuantum TechnologiesClassical ComputerQuantum Key DistributionQuantum Error Correction
Abstracts:Quantum computers leverage the principles of quantum mechanics, including superposition and entanglement, allowing them to execute specific computations significantly faster than classical computers. The gate model is a common way to implement quantum algorithms, where the algorithms are broken down into a sequence of simple gates that operate on one or more quantum bits. This manipulation of a quantum computer involves a succession of unitary transformations that affect the different components of the superposition simultaneously, enabling significant parallel data processing and reducing the time of execution. As a result of these capabilities, quantum technology is expected to provide abilities and performance that are currently unattainable by classical methods. However, quantum hardware is under development and is prone to errors, which can negatively impact the performance of quantum methods. To address this challenge, error mitigation techniques are developed to reduce the impact of errors on the final outcomes. By leveraging the speedup offered by quantum hardware and using effective error mitigation techniques, quantum computing holds the promise of outperforming classical methods in various consumer applications (CA).
Forecasting Currency Exchange Rate Through a Hybrid Time-Series Analysis
Usman UllahZhensheng Huang
Keywords:Predictive modelsBiological system modelingExchange ratesForecastingData modelsAccuracyTime series analysisLong short term memoryCurrenciesAnalytical modelsTime SeriesExchange RateTime Series AnalysisNeural NetworkMean Square ErrorPrediction AccuracyModel PerformanceConvolutional Neural NetworkMacroeconomicMean Absolute ErrorLong Short-term MemoryAttention MechanismMonetary PolicyFinancial DataInflation RateForecast AccuracyLong Short-term Memory NetworkFeature EngineeringShort-term Memory NetworkFinancial AnalystsMean Absolute Percentage ErrorMulti-head Attention MechanismLong Short-term Memory ModelAutoregressive Integrated Moving Average ModelTime Series PredictionSingular Spectrum AnalysisFinancial SeriesPartial SequencesFinancial Time SeriesGated Recurrent UnitForecastingtime series analysispredictionmachine learningdeep learning
Abstracts:Accurate exchange rate prediction plays a crucial role in promoting global economic stability and growth. Exchange rates being volatile have an impact on trade balance, inflation rates and monetary policies and have an impact on global economies as well as the domestic economy. This ability to analyze and predict such changes enables the policy-makers, economists, financial analysts and the national banks draw better policies. However, it is hard to forecast exchange rate because of the complexity of the financial systems and the overwhelming number of factors that constitutes an indicator to the exchange rates. Traditional models often struggle to capture non-linear relationship and high volatility prevailing into the financial data. Problems related to variability and the existence of a large number of economic indicators make analysis with these models less accurate. Moreover, they fail at incorporating macro-economic aspects and other market indicators effectively into your plans which leads to more often than not incomplete and sometimes even incorrect prognoses. To tackle these challenges, this research presents the F-CER (Forecasting Currency Exchange Rates) model which utilizes more advanced features like Convolutional Neural Networks (CNNs), Long Short-Term Memory networks (LSTMs), Multi-Head Attention, and Reinforcement learning (RL). By using the analysis of the historical rate of exchange of Chinese Yuan and U.S. Dollar from 2000 to June 2023, and by incorporating relevant macroeconomic and market factors, F-CER successfully overcomes the shortcomings of the above models. The F-CER model applies advanced techniques for feature engineering as well as Principal Component Analysis and adaptive normalization to overcome the data dimensionality and variability issues. It finds significant shapes in noisy and massive time series and focuses on key variables that contribute to the enhanced accuracy of forecasts. Experimental results indicate that F-CER model perform well, and achieving a Mean Squared Error (MSE) of 0.005, Test Mean Absolute Error (MAE) of 0.089, Demonstrating its advanced predictive capabilities.
A Domain Adaptation Framework By Aligning the Inverse Gram Matrices for Cross-Subject Motor Imagery Classification
Cunhang FanFan YangJingjing ZhangJingpeng SunHao CheSu HuZhengqi WenZhao Lv
Keywords:ElectroencephalographyBrain modelingFeature extractionAdaptation modelsConvolutionAccuracyDecodingData modelsCovariance matricesTrainingInvertibleDomain AdaptationMotor ImageryGram MatrixMotor Imagery ClassificationTime SeriesDistribution CharacteristicsMultilayer PerceptronEEG SignalsForward ModelTarget DomainSource DomainBackward ModelEEG Time SeriesClassification AccuracyClassification PerformanceConvolutional LayersFeature RepresentationSingular ValueSingular Value DecompositionMultilayer Perceptron LayerSteady-state Visual Evoked PotentialMotor Imagery TasksDomain Adaptation MethodsTarget Domain DataSource CharacteristicsFeature AlignmentNuclear NormSelf-supervised LearningSpatiotemporal CharacteristicsMotor imagerybrain–computer interfaceelectroencephalographydomain adaptationinverse Gram matricesEEGBiMambaKAN
Abstracts:Motor imagery (MI)-based brain-computer interfaces (BCIs) using electroencephalography (EEG) have been widely adopted due to their portability and safety. However, the non-stationary nature of EEG signals introduces significant variability between individuals, making it difficult to directly use data from other subjects (source domain) to decode the intentions of a new subject (target domain). To tackle this issue, this paper proposes a domain adaptation framework by aligning the inverse Gram matrices for cross-subject motor imagery classification (DAIG), which consists of a feature extraction module and the aligns the inverse Gram matrices module. Specifically, in the feature extraction module, EEGBiMamba is proposed to capture the temporal dependencies in one-dimensional EEG time-series representations with a bidirectional (forward and backward) modeling. For the extracted EEG features from both domains, the model aligns their inverse Gram matrices from the perspectives of angle and scale, effectively minimizing the differences in feature distributions. Furthermore, the multilayer perceptron (MLP) layer is replaced with a Kolmogorov-Arnold Network (KAN) to generate an M-dimensional vector for classification, improving the model’s expressiveness and adaptability. The proposed method is evaluated on two public datasets, BCI IV IIa and BCI IV IIb, along with the AMI_MD dataset collected in our laboratory. The results show that the proposed method achieved average cross-subject decoding accuracies of 68.58%, 86.72%, and 81.65% across different datasets, representing remarkable performance improvements of 17.06%, 13.6%, and 15.76% over baseline methods, respectively.
Data-Driven Decentralized Resilient Control for Large-Scale Systems Under DoS Attacks
Lijuan ZhaJinzhao MiaoJinliang LiuEngang TianChen Peng
Keywords:Decentralized controlUncertaintyOptimal controlLarge-scale systemsAdaptation modelsSystem dynamicsStability analysisScalabilityOptimizationHeuristic algorithmsControl SystemLarge-scale SystemsDenial Of ServiceResilient ControlControl Of Large-scale SystemsControl StrategySuperior PerformanceOptimal ControlPower SystemDynamic EnvironmentControl ProblemOptimal PolicySettling TimeOptimal Control StrategyGlobal Asymptotic StabilityOptimal Control PolicyDifferential GameControl MethodControl InputLocal ControlUnknown UncertaintiesAlgebraic Riccati EquationDecentralized ControlPresence Of UncertaintySubsystem DynamicsMechanical PowerRotor AngleOptimal Control InputPresence Of AttacksOptimal Control TheoryLarge-scale systemsdecentralized controldata-drivenDoS attacks
Abstracts:This paper investigates the data-driven decentralized resilient control problem for large-scale systems (LSS) under randomly occurring Denial-of-Service (DoS) attacks. A min-max optimization criterion is established based on zero-sum differential game theory, and the corresponding optimal control strategy is derived. Global asymptotic stability of the closed-loop LSS is theoretically guaranteed under the proposed control scheme. A two-stage adaptive dynamic programming (ADP) algorithm, integrating reinforcement learning techniques with local state feedback, is proposed to derive the optimal control policy without requiring prior knowledge of the system model. Simulations are conducted in MATLAB on a multimachine power system benchmark. In particular, the two-stage ADP controller shortens the settling time by up to 7.7% and reduces overshooting by over 14.5% compared to the existing methods, thereby validating its robustness and superior performance in dynamic and adversarial environments.
Holographic Counterpart Computation Offloading via Reconfigurable Intelligent Surfaces in VEC Consumer Electronics
Miaojiang ChenHuali XieXiaotian WangWenjing XiaoAhmed FaroukZhiquan LiuMin ChenHoubing Herbert Song
Keywords:Reconfigurable intelligent surfacesResource managementOptimizationVehicle dynamicsComputational efficiencyWireless communicationHeuristic algorithmsDelaysServersReal-time systemsReconfigurable Intelligent SurfaceComputation OffloadingVehicular Edge ComputingDeep LearningResource AllocationComputational EfficiencyPhase ShiftCommunication LinksJoint OptimizationWireless Power TransferDeep Reinforcement LearningEdge ComputingOptimal Resource AllocationReliable CommunicationVehicular NetworksTask OffloadingOffloading StrategyPhase Shift MatrixDeep Neural NetworkComputational ResourcesMobile Edge ComputingOffloading DecisionEdge ServerDeep Q-networkDynamic AdjustmentChannel GainTime-varying ChannelBinary DecisionEnergy HarvestingUnmanned Aerial VehiclesVehicular edge computing (VEC)reconfigurable intelligent surface (RIS)wireless powered transfer (WPT)holographic counterpartresource allocation
Abstracts:In vehicular edge computing (VEC) Consumer Electronics networks, the integration of holographic counterpart technology presents significant challenges due to its stringent requirements for high data transmission rates and communication reliability. Traditional task offloading methods, constrained by suboptimal communication link quality and energy limitations, are inadequate to meet these demands. This paper introduces a groundbreaking system that synergistically combines wireless power transfer (WPT) and reconfigurable intelligent surfaces (RIS) to significantly enhance both communication performance and computational efficiency. Leveraging deep reinforcement learning (DRL), our system achieves joint optimization of task offloading strategies and resource allocation. Departing from conventional dynamic RIS designs, we implement a fixed phase shift matrix approach, which not only simplifies system implementation but also reduces computational complexity, thereby enhancing both task offloading efficiency and system stability. Extensive simulation results demonstrate that our optimized RIS-assisted approach achieves a remarkable 38.30% improvement in computational rates compared to non-RIS schemes and a 4.83% enhancement over random-phase RIS configurations. These substantial improvements highlight the transformative potential of RIS in boosting computation rates and providing robust solutions for high-demand task offloading scenarios. Our innovative system design represents a significant advancement in intelligent vehicular networks and edge computing technologies, offering substantial application potential for holographic projection task offloading in next-generation vehicular systems.
Federated Learning With Small and Large Models With Privacy-Preserving Data Space for Holographic Internet of Things in Consumer Electronics
Taher M. GhazalMohammad Kamrul HasanAbdelrahman H. HusseinBishwajeet Kumar PandeyMunir AhmadNurhizam SafieLucia Cascone
Keywords:Internet of ThingsSecurityData privacyPrivacyFederated learningHomomorphic encryptionCloud computingAuthenticationTrainingData modelsInternet Of ThingsData SpaceConsumer ElectronicsFederated LearningPrivacy-preserving DataVirtuallyInternet Of Things PlatformThird-party ApplicationsPrivacy Of DataData PrivacyData SecuritySensitive DataInternet Of Things DevicesData HandlingSecret KeyInternet Of Things ApplicationsFiltering MechanismInternet Of Things SystemsInternet Of Things NetworksInternet Of Things DataUnauthorized AccessEncryption ProcessHolographic ModelPrivacy PreservationBlockchainPrivacy BreachesLarge-scale DeploymentMulti-party ComputationProcessing OverheadHolographic IoThomomorphic encryptionprivacy-preservingternary operation
Abstracts:Holographic Internet of Things (IoT) aggregates virtual and augmented reality to provide real-time modeling that improves the user experience of consumer electronic products and applications. The incorporated technologies support third-party applications for which heterogeneous privacy-preserving features are required. Considering this factor, a Modeling Space Privacy (MSP) is introduced in this article using ternary homomorphic encryption (THE). The proposed privacy scheme encourages space and component privacy using independent hashes using HE. Privacy is retained using the ternary operation between the components and space to ensure maximum security of IoT model representations. Third-party applications, components, and spaces need to follow a unison between the IoT platforms to improve security. The components/space elements are discarded from the holographic representations to prevent anonymous access/views to the actual models. The federated learning process in the proposed scheme differs from the ternary process. Therefore, the proposed scheme is reliable in employing conditional HE to improve the privacy of holographic IoT platforms irrespective of multi-party inclusions. From the comparative values, the proposed scheme is optimal in reducing the latency by 13.412% and privacy process complexity by 12.664% for the maximum devices considered.
AI-Enhanced Differential Privacy Architecture for Securing Consumer Internet of Things (CIoT) Data
Waqas AliMuhammad AminFawaz Khaled AlarfajYasser D. Al-OtaibiSajid Anwar
Keywords:Data privacyInternet of ThingsInformation integrityInformation filteringPrivacyDifferential privacyAccuracyUncertaintyNoiseEncryptionInternet Of ThingsDifferential PrivacyConsumer Internet Of ThingsData PrivacyStochastic Gradient DescentPrivacy RisksStrong PrivacyEvaluation Of FunctionPersonal DataPrivacy ProtectionUse Of DatasetsInternet Of Things DevicesSuitable ValueUtility ValueLow EntropySensitive RegionAttribute ValuesProperties Of The DatasetSensitive AttributesPrivacy LevelUtility LossLoss Of PrivacyAmbiguous RegionsInternet Of Things DataPrivacy GuaranteeConsumer PrivacyCombined Loss FunctionCompound Annual Growth RateLower Entropy ValuesEntropy ValuesDifferential privacyanonymizationconsumer Internet of Thingssecurityprivacy preservation
Abstracts:Consumer Internet of Things (CIoT) refers to the network of connected devices used by individuals in their daily lives. These devices offer benefits such as convenience, efficiency and quality of life but also create major privacy risks with the data they collect. These devices collect personal information, from daily routines to health data. Such data is a prime target for cyber-attacks as well as unauthorized access. The interconnected nature of CIoT devices amplifies the risk, as a breach in one device can compromise the entire network. Strong privacy measures such as anonymization is essential to protect users’ private data and at the same time maintaining its utility. In this context, utility refers to the preservation of data accuracy after anonymization, ensuring that the anonymized dataset remains suitable for meaningful analysis. In this article, an architecture for anonymization of data collected from CIoT devices using three-way decisions to avoid ambiguity and ensuring anonymization using differential privacy is presented. Further, two-way decisions are also explored, and their results are compared with three-way decisions, demonstrating how the latter provides a more effective solution to the privacy-utility trade-off. Finally, Stochastic Gradient Descent (SGD) is employed to determine the privacy budget $(\epsilon)$ parameter of differential privacy. The results show that using SGD to determine epsilon provided a better balance between data privacy and utility.
Hot Journals