Lightweight decentralized learning-based automatic modulation classification method

被引:0
|
作者
Yang J. [1 ]
Dong B. [1 ]
Fu X. [1 ]
Wang Y. [1 ]
Gui G. [1 ]
机构
[1] College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing
来源
关键词
automatic modulation classification; decentralized learning; deep learning; lightweight network;
D O I
10.11959/j.issn.1000-436x.2022145
中图分类号
学科分类号
摘要
In order to solve the problems in centralized learning, a lightweight decentralized learning-based AMC method was proposed. By the proposed decentralized learning, a global model was trained through local training and model weight sharing, which made full use of the dataset of each communication nodes and avoided the user data leakage. The proposed lightweight network was stacked by a number of different lightweight neural network blocks with a relatively low space complexity and time complexity, and achieved a higher recognition accuracy compared with traditional DL models, which could effectively solve the problems of computing power and storage space limitation of edge devices and high communication overhead in decentralized learning based AMC method. The experimental results show that the classification accuracy of the proposed method is 62.41% based on RadioML.2016.10 A. Compared with centralized learning, the training efficiency is nearly 5 times higher with a slight classification accuracy loss (0.68%). In addition, the experimental results also prove that the deployment of lightweight models can effectively reduce communication overhead in decentralized learning. © 2022 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:134 / 142
页数:8
相关论文
共 20 条
  • [1] HUA C Q., A survey of security detection and protection for Internet of things, Journal of Shanghai Jiao Tong University, 52, 10, pp. 1307-1313, (2018)
  • [2] POPOOLA S I, ANDE R, ADEBISI B, Et al., Federated deep learning for zero-day botnet attack detection in IoT-edge devices, IEEE Internet of Things Journal, 9, 5, pp. 3930-3944, (2022)
  • [3] HUO T C., Research and design of malware detection of terminal devices in IoT networks, (2021)
  • [4] PENG A N, ZHOU W, JIA Y, Et al., Survey of the Internet of things operating system security, Journal on Communications, 39, 3, pp. 22-34, (2018)
  • [5] STOYANOVA M, NIKOLOUDAKIS Y, PANAGIOTAKIS S, Et al., A survey on the Internet of things (IoT) forensics: challenges, approaches, and open issues, IEEE Communications Surveys & Tutorials, 22, 2, pp. 1191-1221, (2020)
  • [6] ZHANG Y Q, ZHOU W, PENG A N., Survey of Internet of things security, Journal of Computer Research and Development, 54, 10, pp. 2130-2143, (2017)
  • [7] LIANG H R, WU J, ZHAO C C, Et al., Leveraging edge learning and game theory for intrusion detection in Internet of things, Chinese Journal on Internet of Things, 5, 2, pp. 37-47, (2021)
  • [8] LIN C, YAN W J, ZHANG L M, Et al., An overview of communication signals modulation recognition, Journal of China Academy of Electronics and Information Technology, 16, 11, pp. 1074-1085, (2021)
  • [9] DAI A, ZHANG H J, SUN H., Digital modulations automatic classification using the combination of several features extracted from time and time-frequence domain, Journal of Signal Processing, 32, 11, pp. 1283-1292, (2016)
  • [10] XIANG J, GAO Y., Automatic modulation recognition based on GRU-CNN parallel neural network, Telecommunication Engineering, 61, 11, pp. 1339-1343, (2021)