Track Signal Intrusion Detection Method Based on Deep Learning in Cloud-Edge Collaborative Computing Environment

被引:3
|
作者
Zhong, Yaojun [1 ]
Zhong, Shuhai [2 ]
机构
[1] Guangzhou Railway Polytech, Locomot & Rolling Stock Coll, Guangzhou 510430, Guangdong, Peoples R China
[2] Guangzhou Railway Polytech, Informat Engn Coll, Guangzhou 510430, Guangdong, Peoples R China
关键词
IDe; cloud-edge collaboration; D-L; track signal; BiLSTM;
D O I
10.1142/S0218126623502675
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the low accuracy of the track signal intrusion detection (IDe) algorithm in the traditional cloud-side collaborative computing environment, this paper proposes a deep learning (D-L)-based track signal IDe method in the cloud edge collaborative computing environment. First, the main framework of the IDe method is constructed by comprehensively considering the backbone network, network transmission and ground equipment, and edge computing (EC) is introduced to cloud services. Then, the The CNN (Convolutional Neural Networks)-attention-based BiLSTM (Bi-directional Long Short-Term Memory) neural network is used in the cloud center layer of the system to train the historical data, a D-L method is proposed. Finally, a pooling layer and a dropout layer are introduced into the model to effectively prevent the overfitting of the model and achieve accurate detection of track signal intrusion. The purpose of introducing the pooling layer is to accelerate the model convergence, remove the redundancy and reduce the feature dimension, and the purpose of introducing the dropout layer is to prevent the overfitting of the model. Through simulation experiments, the proposed IDe method and the other three methods are compared and analyzed under the same conditions. The results show that the F1 value of the method proposed in this paper is optimal under four different types of sample data. The F1 value is the lowest of 0.948 and the highest of 0.963. The performance of the algorithm is better than the other three comparison algorithms. The method proposed in this paper is important for solving the IDe signal in the cloud-edge cooperative environment, and also provides a theoretical basis for tracking the signal IDe direction.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] An Orderly EV Charging Scheduling Method Based on Deep Learning in Cloud-Edge Collaborative Environment
    Zhong, Jiayong
    Xiong, Xiaofu
    ADVANCES IN CIVIL ENGINEERING, 2021, 2021
  • [2] Resource Allocation Strategy Using Deep Reinforcement Learning in Cloud-Edge Collaborative Computing Environment
    Cen, Junjie
    Li, Yongbo
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [3] PPVerifier: A Privacy-Preserving and Verifiable Federated Learning Method in Cloud-Edge Collaborative Computing Environment
    Lin, Li
    Zhang, Xiaoying
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) : 8878 - 8892
  • [4] Task Offloading in Cloud-Edge Collaborative Environment Based on Deep Reinforcement Learning and Fuzzy Logic
    Wu, Xiaojun
    Wang, Lulu
    Yuan, Sheng
    Chai, Wei
    2024 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND ARTIFICIAL INTELLIGENCE, SEAI 2024, 2024, : 301 - 308
  • [5] Vehicle edge server deployment based on reinforcement learning in cloud-edge collaborative environment
    Guo, Feiyan
    Tang, Bing
    Wang, Ying
    Luo, Xiaoqing
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14539 - 14556
  • [6] Security of federated learning for cloud-edge intelligence collaborative computing
    Yang, Jie
    Zheng, Jun
    Zhang, Zheng
    Chen, Q., I
    Wong, Duncan S.
    Li, Yuanzhang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (11) : 9290 - 9308
  • [7] Partial discharge defect recognition method of switchgear based on cloud-edge collaborative deep learning
    Jia, Zhijie
    Fan, Songhai
    Wang, Zhichuan
    Shao, Shuai
    He, Dameng
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [8] Horse Herd optimization with deep learning based intrusion detection in cloud computing environment
    Samineni Nagamani
    S. Arivalagan
    M. Senthil
    P. Sudhakar
    International Journal of Information Technology, 2025, 17 (1) : 387 - 393
  • [9] Collaborative Intrusion Detection as a Service in Cloud Computing Environment
    Liang, Hong
    Ge, Yufei
    Wang, Wenjiao
    Chen, Lin
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 476 - 480
  • [10] An Efficient Algorithm for Microservice Placement in Cloud-Edge Collaborative Computing Environment
    He, Xiang
    Xu, Hanchuan
    Xu, Xiaofei
    Chen, Yin
    Wang, Zhongjie
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (05) : 1983 - 1997