Review

Machine fault detection methods based on machine learning algorithms: A review

  • Preventive identification of mechanical parts failures has always played a crucial role in machine maintenance. Over time, as the processing cycles are repeated, the machinery in the production system is subject to wear with a consequent loss of technical efficiency compared to optimal conditions. These conditions can, in some cases, lead to the breakage of the elements with consequent stoppage of the production process pending the replacement of the element. This situation entails a large loss of turnover on the part of the company. For this reason, it is crucial to be able to predict failures in advance to try to replace the element before its wear can cause a reduction in machine performance. Several systems have recently been developed for the preventive faults detection that use a combination of low-cost sensors and algorithms based on machine learning. In this work the different methodologies for the identification of the most common mechanical failures are examined and the most widely applied algorithms based on machine learning are analyzed: Support Vector Machine (SVM) solutions, Artificial Neural Network (ANN) algorithms, Convolutional Neural Network (CNN) model, Recurrent Neural Network (RNN) applications, and Deep Generative Systems. These topics have been described in detail and the works most appreciated by the scientific community have been reviewed to highlight the strengths in identifying faults and to outline the directions for future challenges.

    Citation: Giuseppe Ciaburro. Machine fault detection methods based on machine learning algorithms: A review[J]. Mathematical Biosciences and Engineering, 2022, 19(11): 11453-11490. doi: 10.3934/mbe.2022534

    Related Papers:

    [1] Mohammed Alshehri . Blockchain-assisted cyber security in medical things using artificial intelligence. Electronic Research Archive, 2023, 31(2): 708-728. doi: 10.3934/era.2023035
    [2] Ge Wu, Longlong Cao, Hua Shen, Liquan Chen, Xitong Tan, Jinguang Han . Cloud auditing for outsourced storage service in healthcare systems with static data transfer. Electronic Research Archive, 2025, 33(4): 2577-2600. doi: 10.3934/era.2025115
    [3] Yunfei Tan, Shuyu Li, Zehua Li . A privacy preserving recommendation and fraud detection method based on graph convolution. Electronic Research Archive, 2023, 31(12): 7559-7577. doi: 10.3934/era.2023382
    [4] Youqun Long, Jianhui Zhang, Gaoli Wang, Jie Fu . Hierarchical federated learning with global differential privacy. Electronic Research Archive, 2023, 31(7): 3741-3758. doi: 10.3934/era.2023190
    [5] Seyha Ros, Prohim Tam, Inseok Song, Seungwoo Kang, Seokhoon Kim . A survey on state-of-the-art experimental simulations for privacy-preserving federated learning in intelligent networking. Electronic Research Archive, 2024, 32(2): 1333-1364. doi: 10.3934/era.2024062
    [6] Bochen Li, Ting Wang . Identification of a FIR system with binary-valued observation under data tampering attack and differential privacy preservation. Electronic Research Archive, 2025, 33(6): 3989-4013. doi: 10.3934/era.2025177
    [7] Qingjie Tan, Xujun Che, Shuhui Wu, Yaguan Qian, Yuanhong Tao . Privacy amplification for wireless federated learning with Rényi differential privacy and subsampling. Electronic Research Archive, 2023, 31(11): 7021-7039. doi: 10.3934/era.2023356
    [8] Sahar Badri . HO-CER: Hybrid-optimization-based convolutional ensemble random forest for data security in healthcare applications using blockchain technology. Electronic Research Archive, 2023, 31(9): 5466-5484. doi: 10.3934/era.2023278
    [9] Zhuang Wang, Renting Liu, Jie Xu, Yusheng Fu . FedSC: A federated learning algorithm based on client-side clustering. Electronic Research Archive, 2023, 31(9): 5226-5249. doi: 10.3934/era.2023266
    [10] Mengjie Xu, Nuerken Saireke, Jimin Wang . Privacy-preserving distributed optimization algorithm for directed networks via state decomposition and external input. Electronic Research Archive, 2025, 33(3): 1429-1445. doi: 10.3934/era.2025067
  • Preventive identification of mechanical parts failures has always played a crucial role in machine maintenance. Over time, as the processing cycles are repeated, the machinery in the production system is subject to wear with a consequent loss of technical efficiency compared to optimal conditions. These conditions can, in some cases, lead to the breakage of the elements with consequent stoppage of the production process pending the replacement of the element. This situation entails a large loss of turnover on the part of the company. For this reason, it is crucial to be able to predict failures in advance to try to replace the element before its wear can cause a reduction in machine performance. Several systems have recently been developed for the preventive faults detection that use a combination of low-cost sensors and algorithms based on machine learning. In this work the different methodologies for the identification of the most common mechanical failures are examined and the most widely applied algorithms based on machine learning are analyzed: Support Vector Machine (SVM) solutions, Artificial Neural Network (ANN) algorithms, Convolutional Neural Network (CNN) model, Recurrent Neural Network (RNN) applications, and Deep Generative Systems. These topics have been described in detail and the works most appreciated by the scientific community have been reviewed to highlight the strengths in identifying faults and to outline the directions for future challenges.



    Blockchain, as a type of decentralized and public computational paradigm using multi-party consensus, provides new solutions for data security and information sharing in many scenarios. Increasingly numerous assets have gradually appeared in the blockchain amid blockchain's wide application in various field such as the Internet of Things, smart grids and so on [1,2]. For example, many products' information is processed by blockchain for product traceability in the Internet of Things. Some blockchain-based data sharing schemes are also designed for sensitive information such as medical data and so on, that needs both privacy and some levels of data sharing[3,4,5]. Effective evaluation of privacy risk and ensuring privacy have always attracted broad attention[6,7,8,9]. In addition, many blockchain-based privacy preserving payment mechanisms for the Internet of Things have also been constructed to provide efficient and decentralized transactions[10,11]. Therefore, how to achieve privacy of transaction contents, making monetary assets and data assets hidden from observers, and how to achieve public verification of transactions to ensure monetary assets and data assets satisfy transaction rules are crucial and have been focused on.

    Traditional ledger-based transaction schemes in blockchain, such as Bitcoin, etc., lack of privacy. All transaction information, including transaction values that are permanently recorded on the blockchain is public, and it can be obtained by attackers for malicious using and spreading. Therefore, in order to hide transaction contents to make blockchain-based transactions more reliable, many cryptographic solutions have been used to offer privacy enhancing schemes in cryptocurrency which is based on the public blockchain. For example, Monero achieves hiding of transaction amounts by using Pedersen commitments. It also uses the homomorphic property of commitments and Bulletproofs to verify transactions. Zcash introduces one time encryption to protect transaction contents privacy and uses zero-knowledge Succinct Non-interactive ARgument of Knowledge (zk-SNARK) to ensure the transaction compliance. However, these solutions provide strong privacy guarantees that give users potential to circumvent regulatory controls, such as money laundering without authorities, evasion, fraud and many illicit activities that create many regulatory concerns. Enforcing reliable auditing in a blockchain-based transaction system is crucial[12], and especially in a system that offers privacy protection of transaction information, it is more challenging and essential.

    Therefore, there are many challenging concerns about blockchain transaction privacy, effective auditing and public verification, as we mentioned above. More concretely, in terms of data assets such as the quantity of goods in supply chains, and sensitive information of patients in medical data sharing, many schemes do not pay attention to the public verification for data compliance while preserving privacy. For monetary assets in the unspent transaction output (UTXO) model, there is a lack of flexible transaction schemes that can both preserve privacy and achieve auditing of a transaction amount for a single transaction. How to simultaneously preserve privacy, keep a public ledger and reliably audit is challenging. Also, as there are extra leger space requirements in the UTXO model with the generation of transaction outputs and deletion of transaction inputs, how to save storage space of ledger and achieve efficiency gains for the user should be taken into consideration. Aiming to address these challenges, we focus on designing and constructing an efficient blockchain-based privacy preserving transaction scheme with public verification and reliable auditing. The main contributions of our paper are summarized as follow shows:

    ● We propose a privacy-preserving transaction scheme in blockchain. Our scheme offers privacy preserving both for monetary assets and data assets based on homomorphic encryption. We decoupled transaction identity information from transaction contents for the convenience of combining with different blockchain identity privacy protection schemes, which is more flexible.

    ● We propose and design a multiplicative zero-knowledge proof to prove the encrypted values (C1,C2,C3) corresponding to (v1,v2,v3) satisfy multiplicative relationship v1v2=v3. It can be widely used in blockchain based financial applications, blockchain based supply chains and many other scenarios to achieve data compliance and preserve privacy. We give formal security analysis of the proposed multiplicative zero-knowledge proof.

    ● We achieve public verification of hidden transaction contents based on zero-knowledge proof in our privacy preserving transaction scheme. We define several types of verification rules. For monetary assets, it achieves the balance verification relied on the signature of knowledge. For data assets, it achieves multiplicative verification by applying the proposed multiplicative zero-knowledge proof, which can also be used to save transaction computation and storage cost in the specific scenario in UTXO model.

    ● We also achieve reliable auditing of hidden transaction contents. In our scheme, we introduce the auditor. It can audit transaction values of each transaction instead of total transaction amounts, which is different from many existing schemes. There is also a verification of the audit zero-knowledge proof to ensure the audit reliability.

    ● We give formal security analysis of our blockchain-based privacy preserving transaction scheme. We also aggregate the balance proofs and audit proofs to save the ledger space. We implement the proposed scheme and evaluate its performance, and then we make a functional comparison between our scheme and others.

    The rest of the paper is organized as follows. The related work is presented in Section 2. We give a brief introduction about background knowledge in Section 3. In Section 4, we present the proposed multiplicative zero-knowledge proof. We present our blockchain-based privacy-preserving transaction scheme in Section 5. Section 6 gives the security analysis of the proposed scheme. In Section 7, we give the performance analysis of the proposed scheme. Conclusions are drawn in Section 8.

    Blockchain is a new concept that involves a consensus mechanism and distributed data storage. It was put forward as Bitcoin[13] in 2008. All transactions in Bitcoin are public and transparent. It cannot satisfy the confidentiality requirement of some applications. In 2014, Monero[14], which is a cryptocurrency deriving from Bitcoin, was proposed. It uses linkable ring signature, stealth address and RingCT to hide sensitive information of transactions such as transaction contents and user identities. Other cryptocurrencies that focus on privacy protection are Zerocash[15] and Zerocoin[16]. Zerocash leverages encryption and zk-SNARKs[17] to achieve strong privacy guarantees of transactions. Zerocoin provides strong user anonymity and coin security based on RSA accumulators and non-interactive zero-knowledge proofs. Mimblewimble [18] is also a privacy-enhancing cryptocurrency using confidential transactions[19] which is based on the Pedersen commitments[20] to hide transaction amount. Though these solutions achieve privacy protection of blockchain, neither of them satisfies the auditability, which is not compatible with illegal behaviors and is essential in financial applications.

    In [21], the first distributed ledger system with auditing is proposed. In this system, commitments are used to hide transaction amount. They also provide a rough audit about the sums of transaction values. However, it needs some auditors to keep online and make queries to the system users to achieve audit, which leads auditors and all users to communicate with each other sequentially and significantly reduces the efficiency. In [22], the authors achieve an advance zero-knowledge ledger by proposing an efficient range-proof technique based on the improved inner product based zero-knowledge proofs. The reducing of proof size greatly improves the system efficiency. In [23], a private, authenticated and auditable blockchain is proposed. It achieves privacy protection and auditability in terms of user identity and transaction contents based on additive homomorphic encryption and BBS group signature. In [24], the authors propose a decentralized system framework using the blockchain and IPFS system to provide high security for sharing and exchanging the multimedia file system. They use the secure authentication protocol which is based on zero-knowledge proofs to guarantee multimedia data user privacy. In [25], the authors achieve anonymity of users and privacy of transaction amount. As for regulation, the system can regulate the total amount of transactions in a certain time. Also, there are some auditable solutions based on the account model[26,27,28].

    We give the analysis and functional comparison between our scheme and other comparable schemes in Table 1 in aspects of transaction model (TM), transaction confidentiality (TC), balance verification (BV), multiplicative verification decoupled user identity and transaction contents (DIC), audit reliability (AR) and audit of each transaction (AoET). In summary, as we can see in Table 1, the above papers provide various privacy protections in terms of both identity and transaction contents, and they rarely achieve precise auditing of transactions, which is essential in financial applications. In particular, they mainly focus on transfer transactions, as blockchain has been widely applied in supply chains, data sharing and many other fields; and it is also quite necessary to provide efficient verifications for those scenarios with both monetary assets and data assets, which has been ignored.

    Table 1.  Functional comparison between our scheme and others.
    Scheme TM TC BV MV DIC AR AoET
    [14] UTXO Yes Yes No No No No
    [15] UTXO Yes Yes No No No No
    [18] UTXO Yes Yes No Yes No No
    [23] UTXO Yes Yes No No Yes Yes
    [25] UTXO Yes Yes No No No No
    Ours UTXO, data assets Yes Yes Yes Yes Yes Yes

     | Show Table
    DownLoad: CSV

    In this section, we introduce some related techniques that are used in this paper.

    At present, there are many decentralized payment systems, such as Bitcoin, RSCoin[29], Fabcoin in Hyperledger fabric[30] and so on, that are based on the UTXO model, in which each transaction is formed by a set of inputs and a set of outputs. It is different from the traditional account model used by Ethereum, where the transaction value is specified and moved from one account to another. The UTXO model is shown in Figure 1. It represents some amount of monetary assets that have been authorized by one user to be spent by another. Details of monetary assets' flowS in transactions with the UTXO model are recorded in the blockchain ledger.

    Figure 1.  UTXO model.

    Pedersen commitment is used to achieve transaction confidentiality in Bitcoin. It can be described as follows.

    setup(1λ): This algorithm takes the security parameter λ as input, and it generates the cyclic group G with q order. G is the generator of group G. H is the random element of G. It outputs the public parameter pp={G,G,H,q}.

    Cm(pp,v): This algorithm takes the public parameter pp, commitment c, the value v and the blind element r as input. It computes c=rG+vH as the commitment of v.

    Open(pp,c,v,r): This algorithm takes the public parameter pp, commitment c, the value v and the blind element r as input. It checks whether c=rG+vH holds or not.

    Definition 1. (Discrete logarithm (DL) problem). Let G be a cyclic group. Given a random instance (P,aP), where PG, and aZp, computation of a is computationally hard by a polynomial time algorithm. The probability that a polynomial time algorithm A can solve the DL problem is defined as AdvDLA(λ).

    Definition 2. (Discrete logarithm assumption). For any probabilistic polynomial time algorithm A, AdvDLA(λ) is negligible; that is, AdvDLA(λ)ϵ, for some negligible function ϵ.

    There is a homomorphic encryption based on ElGamal encryption called twisted ElGamal[28], which is zero-knowledge friendly. Given a cyclic group G with order q, let P and H be two random generators of G. So, pp={G,P,H,q}. Then, it consists of the following algorithms:

    keygen: It takes pp as input and randomly chooses xZq as secret key. It computes public key Y=xP, and then it outputs (X,Y).

    enc: It takes the public key Y and message m as input. It randomly chooses sZq, computes C1=sP, C2=mH+sP and outputs C={C1,C2}.

    dec: It takes the ciphtertext C and secret key as input. It computes mH=C2x1C1 to obtain m.

    A non-interactive zero-knowledge (NIZK) proof[31] is a protocol that the prover can use to convince the verifier that it indeed has the knowledge of a secret value by some public information without revealing the secret value. The non-interactive zero-knowledge proof has properties of completeness, soundness, and zero-knowledge[32]. We introduce a non-interactive zero-knowledge proof that is the signature of knowledge of the discrete logarithm (SKDL)[33,34]. Let G be a cyclic group. P,GG. A pair (c,s){0,1}k×Zn satisfying c=H0(P,Y,sP+cY) is a signature of the knowledge of the discrete logarithm of YG to the base P. It is denoted as SKDL{(a)Y=aP}. It is as follows:

    (1) The prover randomly chooses rZq, then it computes T=rP, c=H0(P,Y,T) and s=rca. The prover sends (c,s) to the verifier.

    (2) The verifier verifies whether c=H0(P,Y,sP+cY) holds. If the equation holds, it means that the prover knows the knowledge of the discrete logarithm of Y to the base P.

    Our proposed multiplicative zero-knowledge proof aims to convince the verifier that v3 encrypted in C3 is actually the product of v1 and v2, encrypted respectively in C1 and C2, i.e., v1v2=v3. It mainly contains three steps that are as follows:

    setup: Let G be a cyclic group with q order, where q is λ bits. P and H are two random generators of G. Then, the public parameter is pp={G,P,H,q}.

    prove: The prover randomly chooses s1,s2,s3Zq, and then it computes C1=v1H+s1P, C2=v2H+s2P and C3=v3H+s3P. The prover randomly chooses y1,y2,y3,s1,s2,s3Zq, and then it computes d1=y1H+s1P, d2=y2H+s2P, d3=y3H+s3P and d4=y2C21+s4P. The prover sends the generated C1, C2, C3, d1, d2, d3, d4 to the verifier. The verifier randomly chooses a challenge cZq and returns it to the prover. Then, the prover computes u1=y1+v1c, u2=y2+v2c, u3=y3+v3c, θ1=s1+s1c, θ2=s2+s2c, θ3=s3+s3c and θ4=s4+(s3s1v2)c. The prover sends the generated u1, u2, u3, θ1, θ2, θ3, θ4 to the verifier.

    verify: The verifier computes d1=θ1P+u1HcC1, d2=θ2P+u2HcC2, d3=θ3P+u3HcC3, d4=θ4P+u2C1cC3, and then it checks whether d1=d1, d2=d2, d3=d3 and d4=d4 holds. If the above equations hold, it outputs 1. Otherwise, it outputs 0.

    According to the above steps, the prover proves that C1,C2,C3 are encrypted values of v1,v2,v3 satisfying v1v2=v3. In addition, the above proof can turn to be non-interactive by applying the Fiat-Shamir heuristic[35]. Particularly, there are some applications in blockchain for the proposed multiplicative zero-knowledge proof to be used in variants of scenarios, no matter for monetary assets and data assets. We give explanations about it in Section 7.

    Theorem 1. The proposed multiplicative proof is a zero-knowledge proof under the Discrete logarithm assumption, which means that it satisfies correctness, zero knowledge (can be simulated) and a proof of knowledge (has an extractor).

    We prove it through Lemmas 1–3.

    Lemma 1. The proposed multiplicative zero-knowledge proof satisfies correctness.

    Proof of Lemma 1. If the prover follows the computation steps specified for it, we have the following.

    d1=(s1+s1c)P+(y1+v1c)Hc(v1H+s1P)=y1H+s1P=d1 (4.1)
    d2=(s2+s2c)P+(y2+v2c)Hc(v2H+s2P)=y2H+s2P=d2 (4.2)
    d3=(s3+s3c)P+(y3+v3c)Hc(v3H+s3P)=y3H+s3P=d3 (4.3)
    d4=y2C1+v2cC1+(s4+(s3s1v2))Pc(v3H+s3P)=y2C1+s4P+(v1v2cHv3cH)+(v2s1cPv2s1cP)+(s3cPs3cP)=d4 (4.4)

    As we can see from the above equations, Eqs (4.1)–(4.4) hold. Therefore, the verifier always accepts the proof, and then the proposed multiplicative zero-knowledge proof satisfies correctness.

    Lemma 2. The proposed multiplicative zero-knowledge proof can be simulated under the Discrete logarithm assumption.

    Proof of Lemma 2. We describe a simulator that can outputs the proof. It randomly chooses a set of values v1,v2,v3 and computes C1=v1H+s1P, C2=v2H+s2P, C3=v3H+s3P. The distribution of these values generated by the simulator is indistinguishable from the distribution output by the prover. In the remainder of the simulation, it does not assume knowledge of v1,v2,v3.

    The simulator randomly chooses a challenge cZq and u1, u2, u3, θ1, θ2, θ3, θ4. It computes d1=θ1P+u1HcC1, d2=θ2P+u2HcC2, d3=θ3P+u3HcC3 and d4=u2C1+θ4PcC3 that satisfy Eqs (4.1)–(4.4). Moreover, these values have the same distribution as those in the real proof. The simulator outputs c, u1, u2, u3, θ1, θ2, θ3, θ4, d1, d2, d3, d4 that are indistinguishable from the real proof in the multiplicative proof. Therefore, the proposed multiplicative zero-knowledge proof can be simulated under the Discrete logarithm assumption.

    Lemma 3. The proposed multiplicative zero-knowledge proof has an extractor.

    Proof of Lemma 3. Suppose there exits an extractor that enables one to rewind a prover in the multiplicative proof we proposed above to the point before it generates c. To the challenge value c, there is (u1,u2,u3,θ1,θ2,θ3,θ4). For challenge value cc, the prover responds with (u1,u2,u3,θ1,θ2,θ3,θ4). If the prover is convincing, then all Eqs (4.1)–(4.4) hold.

    So, we have Δc=cc, Δu1=u1u1, and Δu2, Δu3, Δθ1, Δθ2, Δθ3, Δθ4 are similar with Δu1. Considering Eq (4.1), we have ΔcC1=Δθ1P+Δu1H, so let v1=Δu1/Δc and let s1=Δθ1/Δc. Similarly, from Eqs (4.2)–(4.4), we obtain v2, s2, v3, s3 and s=Δθ4/Δc. We have (v1v2v3)H=(s3sv2s1)P. Therefore, the extractor obtains a Discrete logarithm problem solution logPH=(s3sv2s1)/(v1v2v3). Therefore, the proposed multiplicative zero-knowledge proof has an extractor.

    We propose a blockchain-based transaction scheme with privacy-preserving that enables reliable auditing and different verification rules. There are four roles in our scheme that are described as follows:

    ● Trusted Center: It initializes the whole scheme.

    ● Users: It includes payer and payee that involves in the blockchain based transactions. It also contains users that transact, share and store data assets through blockchain.

    ● Validator: It verifies whether proposed encrypted transactions satisfy verification rules.

    ● Auditor: It audits encrypted transactions in the scheme.

    As we can see in Figure 3, the transaction overflow of our privacy preserving transaction scheme is summarized as follows:

    (1) Setup: The trusted center makes an initialization and generates an audit key pair for auditor.

    (2) Transact: Users generate transactions, and they send transactions to validators.

    (3) Verify: Validators receive transaction and verify whether it satisfies verification rules and audit reliability.

    (4) Aggregate: Balance and audit zero-knowledge proofs in transaction are aggregated and sent to committing nodes.

    (5) Chain: committing nodes make verifications of the aggregated information. If they pass verifications, transactions are committed to the blockchain.

    (6) Audit: The auditor audit transaction contents. It does not need to be online all the time and can achieves audit transaction contents of each transaction.

    Notations in our paper are summarized in Table 2. In our scheme, transaction tx is used to record the encrypted payment process between payers and payees for monetary assets, and it is used to record the encrypted data transaction for data assets. Transactions are finally recorded in the ledger of the blockchain. The structure of transaction tx is tx={tx.in,tx.out,tx.data,πbl,πrp,πpro,πau}. tx.in is the encrypted inputs of the transaction, and tx.out is the encrypted outputs of the transaction. tx.data is the encrypted data of data assets. πbl is the balance proof generated by users for balance verification. πrp is the range proof to prove the transaction value is in a certain range [0,vmax], where vmax is a system parameter. πpro is the multiplicative proof that can prove transaction values satisfy product relationship, and πau is the audit proof to prove the auditor can reliably audit the transaction.

    Table 2.  Notations.
    Symbols Descriptions
    λ Security parameter
    pp Public parameters
    G A cyclic group
    tx Transaction
    tx.in Transaction encrypted inputs
    tx.out Transaction encrypted outputs
    tx.data Transaction encrypted data
    Cini,Coutj Encrypted inputs and outputs
    C1,C2,C3 Encrypted data assets

     | Show Table
    DownLoad: CSV

    More concretely, tx.in includes n inputs of a transaction such that tx.in={CiniCini={Cin1i,Cin2i},i[1,n]}. The value of each input Cini is vini. tx.out includes n outputs of a transaction and the change Cc, which can be presented as tx.out={Coutj,CcCoutj={Cout1j,Cout2j},j[1,n],Cc={C1c,C2c}. The value of each output Coutj is voutj, and the change value is vc. tx.out includes encrypted data tx.data={C1={C11,C21},C2={C12,C22},C3={C13,C23},...}, where C1,C2,C3 are encrypted data of some values v1,v2,v3.

    Our scheme is designed to satisfy the security requirements of transaction confidentiality, public verification and audit reliability.

    Definition 3. (Transaction confidentiality). Transaction confidentiality means the plaintext of transaction contents such as payment value or data assets cannot be obtained by an attacker in our system.

    We define the transaction confidentiality of our scheme by the following transaction confidentiality experiment. The adversary A is a user in the system, and it has the UTXO that belongs to him.

    |Pr[ppsetup(1λ); (X,Y)keygen(pp);({ptx.rmdr0,ptx.rmdr1})A1(pp,Y);b=b:bR{0,1};tx.outtx(pp,ptx.rmdr.Y)πauau(pp,ptx.out,πpau,Y);bAO2(tx.out,πau)]12|negl(λ),

    in which the definitions of the oracles Opre and OGenCT are as follows:

    Opre: On input ((Cini,vini,sini),vρ), run ptxpretx(pp,Cini,vini,sini,vρ,Y) and store {(Cini,vini,sini),vρ,Y,ptx} into the list L.

    OGenCT: On input (ptx.rmdr), search L, run tx.outtx(pp,ptx.rmdr,Y) and πauau(pp,ptx.out,πpau,Y), and then return tx.out and πau.

    Public verification means that transactions in our scheme can be publicly verified by validators to satisfy various verification rules. We design two types of verification rules, and they are transaction balance and transaction multiplicative relationship that are defined as follows.

    Definition 4. (Transaction balance). For monetary assets, it satisfies balance verification such that the sum of inputs' values is equal to the sum of outputs' values.

    We define the transaction balance of our scheme by the following transaction balance experiment. The adversary A is a user in the system, and it has the UTXO that belongs to him.

    Pr[ppsetup(1λ); veribl(pp,πbl)=1(X,Y)keygen(pp);n1vininj=1voutj+voutc:(tx.in,tx.out,vini,πbl)AO(pp,Y)]negl(λ),

    in which the definitions of the oracles Opre and Obal are as follows:

    Opre: On input ((Cini,vini,sini),vρ), run ptxpretx(pp,Cini,vini,sini,vρ,Y) and store {(Cini,vini,sini),vρ,Y,ptx} into the list L.

    Obal: On input ptx.rmdr, run tx.outtx(pp,ptx.rmdr,Y), search L to find the corresponding πpbp and Pb, then run πblbl(pp,πpbp,Pb), and return tx.out and πbl.

    Definition 5. (Transaction multiplicative relationship). For data assets, the validator can publicly verify whether some values v1,v2,v3 satisfy multiplicative relationship such as v1v2=v3.

    We define the transaction multiplicative relationship of our scheme by the following transaction multiplicative relationship experiment. The adversary A is a user in the system.

    Pr[ppsetup(1λ); veripro(pp,πpro,C1,C2,C3)=1(X,Y)keygen(pp);v3v1v2:(v1,v2,v3,C1,C2,C3,πpro)AO(pp,Y)]negl(λ),

    in which the definitions of the oracles Opro are as follows:

    Opro: On input v1,v2,v3, run (C1,C2,C3)tx(pp,v1,v2,v3,Y) and πpropro(pp,v1,v2,v3,C21,C22,C23), and return C1,C2,C3 and πpro.

    Definition 6. (Audit reliability). Audit reliability means they can be reliably audited by the auditor.

    We define the audit reliability of our scheme by the following audit reliability experiment. The adversary A is a user in the system and it has the UTXO that belongs to him.

    Pr[ppsetup(1λ); veriau(pp,πau,Cforge)=1:(Cforge)A(pp,vf,outj,Yf);]negl(λ)

    It consists of six phases, including Setup, Transact, Verify, Aggregate, Chain and Audit.

    Setup: In the setup phase, the trusted center generates public parameters and audit key pair. First, it executes the setup(1λ) algorithm, where λ is the security parameter. G is a cyclic group which is q order, where q is λ bits. P and H are two random generators of G. H0, H1, H2 and H3 are hash functions that satisfy H0:=G×GZq, H1:=G×G×G×GZq, H2:G×G×G×G×G×G×GZq, H3:=G×......2n+2×GZq. Second, it executes the keygen(pp) algorithm. It randomly chooses xZq as the audit secret key X, and then it computes the audit public key Y=xP. At last, the trusted center outputs the audit public key Y and the public parameters pp={G,P,H,q,H0,H1,H2,H3}.

    Transact: In the transact phase, the payee and the payer generate transaction that preserves privacy of the transaction contents that can be audited by the auditor. In addition, they also generate proofs to ensure the transaction satisfy verification rules and reliable audit. In this phase, they provide balance proof that ensures the sum of outputs is equal to the sum of inputs, range proof that ensures the transaction value is greater than zero, multiplicative proof that ensures that some transaction data satisfies the multiplicative relationship and audit proof that guarantees the audit reliability. In this phase, there are five algorithms that are described as follows:

    (1) The pretx(pp,Cini, vini,sini,vρ,Y) algorithm is executed by the payer. It takes as input the public parameters pp, transaction inputs Cini, value vini, randomness sini, transfer value vρ and the audit public key Y. It outputs the pre-transaction ptx as the following shows:

    ● The payer selects n inputs Cini of total value v=ni=1vinivρ. Let pre-transaction input be ptx.in={Cinii[1,n]}. It generates n outputs of total value vρ=nj=1voutj. Let the pre-transaction remainder be ptx.rmdr={voutjj[1,n]}.

    ● The payer computes the change value voutc=vvρ. Let the change value be ptx.chg=voutc. It randomly selects randomness of the change value soutcZq. It computes Cout1c=soutcY and Cout2c=soutcP+voutcH. Let Coutc={Cout1c,Cout2c}, and it stores Coutc in tx.out.

    ● The payer generates the pre-transaction balance proof πpbp. It randomly chooses raZq and computes sins=ni=1sini+soutc. It computes Xa=sinsP, Ra=raP, ea=H0(Ra,Xa) and σa=ra+esins. So, the pre-transaction balance proof πpbp={σa,ea,Ra,Xa}.

    ● The payer computes the pre-transaction audit proof πpau. The proof can be described as SKDL{(voutc,soutc):Cout1c=soutcYCout2c=soutcP+voutcH}, which ensures that this transaction can be reliably audited. It randomly chooses soutcZq and voutcZq, then it computes R1c=soutcY, R2c=soutcP+voutcH, ˜cp=H1(R1c,R2c,Coutc), σc,1=soutc+˜cpsoutc and σc,2=voutc+˜cpvoutc. So the pre-transaction audit proof is πpau={σc,1,σc,2,R1c,R2c,˜cp}.

    The payer outputs the generated pre-transaction ptx={ptx.in,ptx.out,πpbp,πpau}, where ptx.out={ptx.chg,ptx.rmdr}.

    (2) The tx(pp,ptx.rmdr,Y) algorithm is executed by the payee. It takes as input the public parameters pp, pre-transaction remainder ptx.rmdr and the audit public key Y. It generates the transaction outputs tx.out, balance randomness Pb and range proof πrp as the following shows: The payee checks whether ni=1vini=nj=1voutj+voutc holds. If it does not hold, it aborts. Otherwise, the payee executes the txenc(pp,vini,Y) algorithm, which is twisted ElGamal encryption. This algorithm randomly chooses soutjZq and computes Cout1j=soutjY and Cout2j=soutjP+voutjH, and then it stores them to tx.out. The payee computes souts=nj=1soutj and the balance randomness Pb=soutsP, and then the payee executes the Bulletproofs[36] to generate range proof πrp={πrpc,πrpjj[1,n]}. For data assets such as v1,v2,v3(v3=v1v2), it generates C1,C2,C3 by txenc(pp,v1,v2,v3,Y) in the same way, and it stores them in tx.data={C1,C2,C3}.

    (3) The bl(pp,πpbp,Pb) algorithm is executed by the payer and payee. It takes as input the public parameters pp, pre-transaction balance proof πpbp and balance randomness Pb. It generates balance proof πbl as the following shows:

    ● The payee computes ea=H0(Ra,Xa), and then it verifies whether σaP=Ra+eaXa holds. If it does not hold, the payee aborts. Otherwise, the payee randomly chooses rbZa, computes Rb=rbP, R=Ra+Rb and ˉX=Xa+Pb. It calculates e=H0(R,ˉX) and computes σB=rb+esouts. The payee sends these generated σB and Pb to the payer.

    ● The payer computes R=Ra+Rb, ˉX=Xa+Pb=xsP, e=H0(R,ˉX), σA=ra+esins and σ=σA+σB. Therefore, the generated balance proof is πbl={σ,e,R,ˉX}.

    (4) The pro(pp,v1,v2,v3,C21,C22,C23) algorithm is executed by the user. It proves that some encrypted transaction values v1,v2,v3 satisfy the product relationship v1v2=v3. It takes as input the public parameters pp, C21=v1H+s1P, C22=v2H+s2P and C23=v3H+s3P that are encrypted values of v1, v2, v3. It generates multiplicative proof πpro as the following shows:

    ● The user randomly chooses y1,y2,y3,s1,s2,s3Zq, and then it computes d1=y1H+s1P, d2=y2H+s2P, d3=y3H+s3P and d4=y2C21+s3H. It computes c=H2(d1,d2,d3,d4,C21,C22,C23).

    ● It computes u1=y1+v1c, u2=y2+v2c, u3=y3+v3c, θ1=s1+s1c, θ2=s2+s2c, θ3=s3+s3c and θ4=s3+(s3s1v2)c. So, the multiplicative proof πpro is πpro={c,u1,u2,u3,θ1,θ2,θ3,θ4}.

    (5) The au(pp,ptx.out,πpau,Y) algorithm is run by the payee. It takes as input public parameters pp, a remainder ptx.rmdr, the pre-transaction audit proof πpau and the audit public key Y. It outputs the audit proof πau as the following shows:

    ● The payee randomly chooses soutjZq and computes R1=R1c+nj=1R1j=R1c+n1jsoutjY, and then it randomly selects voutjZq and computes R2=R2c+n2jR2j=R2c+n2j(soutjP+voutjH).

    ● It calculates ˜c=H3(R1,R2,tx.out) and σj,1=soutj+˜csoutj, σj,2=voutj+˜cvoutj, where voutj is the output value, and soutj is the random number.

    ● It computes ˉσ=σc,1+nj=1σj,1 and σ=σc,2+nj=2σj,2. So, the audit proof πau is πau={ˉσ,σ,R1,R2,˜c}.

    Finally, the payee sends the transaction to the validating nodes.

    Verify: In the verify phase, validating nodes are responsible for verifying whether the transaction meets some requirements that we defined. There are four verifying algorithms that are described as the following shows:

    (1) The verirp(pp,tx.out,πrp) algorithm takes as input the public parameters pp, transaction output tx.out and the range proof πrp. It uses the Bulletproofs[36] to verify whether the transaction output is in a certain range [0,vmax]. The detailed Bulletproofs can be seen in [36].

    (2) The veribl(pp,πbl) algorithm takes as input the public parameters pp and balance proof πbl. It verifies whether the transaction satisfies the balance property as the following shows: It computes e=H0(R,ˉX), and then it checks whether e=e and σP=R+eˉX hold. If they hold, it outputs true which means that the transaction satisfies balance property.

    (3) The veripro(pp,πpro) algorithm takes as input the public parameters pp and the multiplicative proof πpro. It verifies whether these encrypted transaction values satisfy product relationship v1v2=v3. It computes d1=θ1P+u1HcC21, d2=θ2P+u2HcC22, d3=θ3P+u3HcC23, d4=θ4P+u2C21cC23 and c=H2(d1,d2,d3,d4,C21,C22,C23), and then it checks whether c=c holds. If it holds, it outputs true which means that these encrypted transaction values satisfy product relationship.

    (4) The veriau(pp,πau) algorithm takes as input the public parameters pp and audit proof πau. It verifies whether the transaction can be reliably audited as the following shows: It computes R1=ˉσY˜cCout1cnj=1˜cCout1j, R2=σH+ˉσP˜cCout2cnj=1˜cCout2j and ˜c=H3(R1,R2,tx.out). It checks whether ˜c=˜c holds. If this equation holds, it outputs true, which means that the transaction can be reliably audited.

    Aggregate(σk,R,σk,ˉσk,R1k,R2k): In the aggregate phase, the ordering nodes takes as input the balance signature σk, balance randomness R, audit signature σk,ˉσk, and audit randomness R1k,R2k, it aggregates m transactions' balance signature and audit signature, where km. The ordering nodes compute σAgg=m1σk, RAgg=m1Rk, σAgg=m1σ, ˉσAgg=m1ˉσk, R1Agg=m1R1k and R2Agg=m1R2k. Therefore, the aggregated message is infoAgg={σAgg,RAgg,σAgg,ˉσAgg,R1Agg,R2Agg}.

    Chain(infoAgg,ˉXk,tx.outk,ek,˜ck): In the chain phase, the committing nodes take as input the aggregated message infoAgg, public randomness ˉXk, transaction outputs tx.outk, hash value ek corresponding to each transaction and balance challenge value ˜ck. They verify the correctness of the aggregated message infoAgg by checking whether σAggP=RAgg+kekˉXk, ˉσAggP=R1Agg+˜ckCout1c+nj=1˜ckCout1j and σAggH+ˉσAggP=R2Agg+˜ckCout2c+nj=1˜ckCout2j hold. If these two equations hold, it outputs true, then committing nodes add transactions that have been verified onto the ledger and the updated ledger is Λ.

    Audit(pp,X,tx.out): In the audit phase, the auditor takes as input the public parameters pp, audit secret key X and transaction outputs tx.out, and it computes voutjH=Cout2jX1˙Cout1j and auditing transaction by comparing voutjH with the pre-computed bH, where b[0,vmax).

    Theorem 2 (Transaction confidentiality). Our scheme satisfies transaction confidentiality, if the twisted ElGamal algorithm is IND-CPA secure, and the audit proof πau is zero-knowledge.

    Proof of Theorem 2. We prove it via the following games. Let Wini denote the probability that the adversary A wins the Gamei.

    Game0: We proceed with the transaction confidentiality experiment defined in Section 5.2. The challenger C and the adversary A interact as the following shows:

    (1) C computes ppsetup(λ) and (X,Y)keygen. It returns the generated pp and Y to A.

    (2) A queries OPre and OGenCT. C answers these queries. On input ((Cini,vini,sini),vρ), run ptxpretx(pp,Cini,vini,sini,vρ,Y) and store {(Cini,vini,sini),vρ,Y,ptx} into the list L. On input (ptx.rmdr), search L, run tx.outtx(pp,ptx.rmdr,Y) and πauau(pp,ptx.out,πpau,Y), and then return tx.out and πau.

    (3) A chooses {ptx.rmdr0,ptx.rmdr1}. C randomly selects b[0,1] and computes tx.outtx(pp,ptx.rmdrb,Y), πauau(pp,ptx.rmdrb,ptx.chg,πpau,Y). It returns the generated {tx.out,πau} to A.

    (4) A generates the guess b of b. If b=b, it wins the experiment.

    Therefore, we have AdvA(λ)=Pr[Win0]12.

    Game1: Game1 is similar to Game0 except that the audit proof πau is generated by simulator S=(S1,S2). S1 generates the trapdoor τ, and then S2 takes τ as input without any proof. It outputs the simulated proof πau. Therefore, the proof generated by S2 is the same as the proof computed in Game1. The probability that A wins Game1 satisfies

    |Pr[Win1]Pr[Win0]|negl(λ). (6.1)

    As we can see in Lemma 1, we have Pr[Win1]negl(λ).

    Lemma 4. If the twisted ElGamal algorithm is IND-CPA secure, then for all PPT adversary A, we have Pr[Win1]negl(λ).

    Proof of Lemma 4. Suppose that there is a PPT adversary A that wins Game1 with non-negligible advantage, and then we can contruct algorithm B that can break the IND-CPA secure property of the twisted ElGamal algorithm. B simulates Game1 as the following shows:

    (1) B computes ppsetup(λ) and (X,Y)keygen(pp). It uses S1 to generate the trapdoor τ, and then it returns them to A.

    (2) A queries the oracle OPre and the oracle OGenCT. The challenger C answers these queries.

    OPre: A makes this query with (Cini,vini,sini,vρ). C receives this query, and then it executes ptxpretx(Cini,vini,sini,vρ,Y). It stores (Cini,vini,sini,vρ,Y,ptx) in the list L.

    OGenCT: A makes this query with (ptx.rmdr). C receives this query, and then it executes tx.outtx(pp,ptx.rmdr,Y). It takes the trapdoor τ generated by S2, and it outputs simulated πtr. It returns tx.out and πtr to A.

    (3) A selects two pre-transaction remainders {ptx.rmdr0,ptx.rmdr1}. B sends {ptx.rmdr0,ptx.rmdr1} to its challenger C. B receives Coutj={Cout1j,Cout1j}, where Coutj is the encrypted value that is obtained by encrypting ptx.rmdrb using audit public key Y. Let tx.out={Coutj}. B takes the trapdoor τ as input. It outputs the simulated audit proof πtr. B returns tx.out and πtr to A as challenge.

    (4) A generates b as the guess of b, then B returns the guess generated by A.

    We can see that B successfully simulates the Game1, so it can break the IND-CPA secure property of twisted ElGamal algorithm with the same advantage. We prove the Lemma 4.

    To sum up, we prove that if the twisted ElGamal algorithm is IND-CPA secure, and the audit proof πau is zero-knowledge, our scheme satisfies transaction confidentiality.

    Theorem 3 (Balance verification). Our scheme enables transaction balance verification, which means that outputs of the transaction and the inputs of the transaction are equal, if the Discrete logarithm assumption holds.

    Proof of Theorem 3. Suppose that there is a PPT adversary A that wins the transaction balance experiment we defined in Section 3 with non-negligible advantage, and then we can construct algorithm B that can solve the Discrete logarithm problem with the same advantage. Let pp=(G,P,H,q,H0). (P,H) is the instance of B's Discrete logarithm problem, where P and H are two random generators of G. B simulates the experiment as the following shows:

    (1) B computes ppsetup(λ) and (X,Y)keygen(pp). It returns the generated public parameters pp and the public key Y to A.

    (2) A queries oracles OPre and OGenBal. These oracles answer these queries.

    OPre: A makes this query with (Cini,vini,sini,vρ). C computes (ptx)pretx(pp,Cini,vini,sini,vρ,Y), and then it stores (Cini,vini,sini,vρ,Y,ptx) into the list L.

    OGenBal: A makes this query with (ptx.rmdr). C receives this query and computes tx.outtr(pp,ptx.rmdr,Y). It selects L to find the corresponding (πpbp,Pb), and then it computes πbpbl(pp,πpbp,Pb). It returns tx.out and πbp to A.

    (3) A obtains complete transaction information that includes transaction inputs tx.in={Cini|Cini={Cin1i,Cin2i,i[1,n]}}, transaction outputs tx.out={Coutj,Coutc|Coutj={Cout1j,Cout2j},j=[1,n],Coutc={Cout1c,Cout2c}} and transaction balance information πbl={σ,e,,ˉX}. B rewinds e2 and σ2. Therefore, we have:

    Yσe(Cout1c+nj=1Cout1jni=1Cini) (6.2)
    =Yσ2e2(Cout1c+nj=1Cout1jni=1Cini)e(Cout2c+nj=1Cout2jni=1Cin2i)σP=e2(Cout2c+nj=1Cout2jni=1Cin2i)σ2P (6.3)

    Let xs=(σσ2)/(ee2), and then ¯X=xsG can be regarded as the transaction public balance excess value. We have

    xsY=Cout1c+nj=1Cout1jni=1Cin1i (6.4)
    xsG=¯X=Cout2c+nj=1Cout2jni=1Cin2i (6.5)

    If ni=1vininj=1voutj+voutc, then we have

    xsG=¯X=Cout2c+nj=1Cout2jni=1Cin2i=(ni=1vinivoutcnj=1voutj)H+(soutssins)G (6.6)

    So, we have (ni=1vinivoutcnj=1voutj)H=(soutssinsxs)P. Therefore, B can take logPH=(soutssinsxs)/(ni=1vinivoutcnj=1voutj) as the solution of the Discrete logarithm problem.

    Thus, if the Discrete logarithm problem is hard to solve, our scheme satisfy the transaction balance property.

    Theorem 4 (Multiplicative verification). Our scheme enables multiplicative verification, which means that our scheme is able to prove and verify some encrypted values v1,v2,v3 satisfy product relationship v1v2=v3, if the Discrete logarithm assumption holds.

    Proof of Theorem 4. Suppose that there exists a PPT adversary A that can break the multiplicative verification property with non-negligible advantage, and then we can construct algorithm B that can solve the Discrete logarithm problem with the same advantage. Let pp=(G,P,H,q,H0). (P,H) is the instance of B's Discrete logarithm problem, where P and H are two random generators of G. B simulates the experiment as the following shows:

    (1) B computes ppsetup(λ) and (X,Y)keygen(pp). It returns the generated public parameters pp and the public key Y to A.

    (2) A queries the Opro oracle with (v1,v2,v3,C21,C22,C23). C computes πpropro(pp,v1,v2,v3,C21,C22,C23). It returns πpro to the adversary A.

    (3) A obtains the transaction information (C21,C22,C23) and multiplicative proofs πpro={c,u1,u2,u3,θ1,θ2,θ3,θ4}. B rewinds c, u1, u2, u3, θ1, θ2, θ3 and θ4. Therefore, we have

    θ1P+u1HcC21=θ1P+u1HcC21 (6.7)
    θ2P+u2HcC22=θ2P+u2HcC22 (6.8)
    θ3P+u3HcC23=θ3P+u3HcC23 (6.9)
    u2C21+θ4PcC23=u2C21+θ4PcC23 (6.10)

    Let v1=(u1u1)/(cc), s1=(θ1θ1)/(cc), v2=(u2u2)/(cc), s2=(θ2θ2)/(cc), v3=(u3u3)/(cc), s3=(θ3θ3)/(cc) and s=(θ4θ4)/(cc). Then, we have v3H+s3P=v1v2H+(v2s1+s)P. If v1v2v3, we have (v1v2v3)H=(s3sv2s1)P. B can take logPH=(s3sv2s1)/(v1v2v3) as the solution of the Discrete logarithm problem.

    Thus, if the Discrete logarithm problem is hard to solve, our scheme satisfies multiplicative verification.

    Theorem 5 (Reliable audit). Transactions in our privacy-preserving transaction scheme can be reliably audited.

    Proof of Theorem 5. Suppose that trading parties (payee and payer) may construct a fake to escape audit. The adversary's malicious actions can be roughly summarized as the following two types:

    (1) The adversary A randomly chooses YG,YY to generate encrypted transaction outputs instead of using audit public key Y. It computes Cout1j=soutjY, Coutj={Cout1j,Cout2j}. Therefore, validating nodes can verify it as the following shows:

    R1=ˉσY˜cCout1c˜cnj=1Cout1j=soutcY+nj=1soutjY+˜csoutcY+˜cnj=1soutjY˜csoutcY˜cnj=1soutjY. (6.11)

    We can see that YY, so R1soutcY+nj=1soutjY and R1soutcY+nj=1soutjY. Therefore, we have R1R1. Besides, hash functions are collision-resistant, so we get ˜c˜c.

    (2) The adversary A randomly chooses voutjvoutj to generate encrypted transaction outputs instead of using the real transaction value voutj. It computes Cout2j=soutjP+voutjH,Coutj={Cout1j,Cout2j}. Therefore, validating nodes can verify it as the following shows:

    R2=σH+ˉσP˜cCout2c˜cnj=1Cout2j=voutcH+soutcP+nj=1voutjH+nj=1soutjP+˜cnj=1voutjH˜cnj=1voutjH=R2c+nj=1voutjH+nj=1soutjP+˜cHnn=1(voutjvoutj) (6.12)

    We can see that voutjvoutj, so R2R2c+nj=1voutjH+nj=1soutjP that is R2R2. Therefore, we get ˜c˜c.

    In summary, the probability of the audit proof information forged by the adversary A that can pass the verification is negligible. Therefore, our scheme satisfies transaction auditability.

    In order to evaluate the performance of our proposed scheme, we implement the prototype of the proposed privacy preserving transaction scheme which mainly focuses on the transaction layer without considering the differences of consensus mechanisms. This makes our privacy preserving transaction scheme more feasible for different blockchain systems. Our implementation is in Golang language on a laptop with 8GB of RAM, an Intel Core i7-8500U 2.00GHz. The elliptic curve we used is secp256k1, and the hash function is sha256.

    According to Table 3, we give an evaluation of the computation time about each step of the main phase in our proposed privacy preserving transaction scheme. We take the most frequently used 2 inputs-1 outputs as instance. As we can see from Table 3, computation times in each phase such as setup, transact, verify and audit are all in milliseconds. The total time is approximate 7.65 ms. It is practical and feasible for low frequency transaction scenarios.

    Table 3.  Computation time of the main phase of our proposed scheme in milliseconds.
    Phase Step Time (ms)
    Setup Setup 0.232
    Transact Generate encrypted outputs 0.439
    Generate balance proofs 0.877
    Generate multiplicative proofs 1.308
    Generate Audit proofs 0.953
    Verify Balance proofs verification 0.349
    Multiplicative relationship verification 1.810
    Audit proofs verification 1.244
    Audit Audit 0.438

     | Show Table
    DownLoad: CSV

    In Figures 3 and 4, we also evaluate our privacy preserving transaction scheme's time costs in transact, verify and audit phases with increasing inputs and outputs. According to Figure 3, as the number of inputs and outputs grows from 2-2 to 12-12 in one transaction, the balance zero-knowledge prove time and audit zero-knowledge prove time are approximately 0.9 and 1.0 ms with no obvious increasing. In Figure 4, the balance zero-knowledge proofs verification time requirements is kept approximate 0.4 ms as the number of inputs and outputs increasing from 2-2 to 12-12. Though the time of generating encrypted values grows from 0.8 to 4.9 ms in Figure 3, and the time of verifying audit zero-knowledge proofs and auditing time are increasing from 1.6 to 5.4 ms and 0.9 to 5.1 ms respectively in Figure 4, they are still within milliseconds.

    Figure 2.  Overview of our scheme.
    Figure 3.  Computation time comparison in transact phase with increasing inputs and outputs.

    Figure 5 presents the verification time comparison before and after aggregation, and Figure 6 presents the block size comparison before and after aggregation. According to Figure 5, the verification time linearly grows from 4.9 to 21.0 ms as the number of inputs and outputs is set to be 2-2, 4-4, 6-6, 8-8, 10-10, 12-12 respectively when there is no aggregation of balance proofs and audit proofs. However, in our proposed privacy preserving transaction scheme, we aggregate the balance proofs and audit proofs, which greatly shortens the verification time, as it approximately grows 3.8 to 7.5 ms when the number of inputs and outputs is set to be 2-2, 4-4, 6-6, 8-8, 10-10, 12-12, respectively. For the reason that we replace the multiplication operation with the faster add operation of group in our aggregation algorithm, the verification time has no obvious growth. Therefore, our aggregation algorithm makes the transaction verification more efficient. As we can see in Figure 6, the growth rate of block size has been significantly slowed as the number of transactions in a block after we make aggregation of the audit proofs and balance proofs. Thus, the aggregation technique reduces the storage size of proof at least 50% of the size before optimization. It effectively saves the ledger space.

    Figure 4.  Computation time comparison in verify and audit phase with increasing inputs and outputs.
    Figure 5.  Verification time comparison before and after aggregation.
    Figure 6.  Block size comparison before and after aggregation.

    Our scheme has functional advantages. In particular, there are several applications in blockchain for the proposed multiplicative zero-knowledge proof to be used in some specific scenarios. For monetary assets in UTXO model, if there are k outputs with the same value v for a user and the total amount of them is sum=vk, it needs to computes k encrypted values that C1={C11=s1Y,C21=vH+s1P},...,Ck={C1k=skY,C2k=vH+skP}, and it needs to store k encrypted values C1,C2,...,Ck in the leger. However, by using the proposed multiplicative zero-knowledge proof, it only needs to compute two encrypted values Cv,Ck and only stores these two ciphertexts in the leger without influencing the transaction balance and reliable audit. It is obvious that using the proposed multiplicative zero-knowledge proof achieves space savings of ledger and efficiency gains for the user. For data assets such as those in supply chain, suppose that the quantity of goods is r, the unit price of goods is v, and the total amount is t=vr. r, v and tneed to record in chain with privacy preserving. We can compute Cv={C1v=svY,C2v=vH+svP}, Cr={C1r=srY,C2r=rH+srP}, and Ct={C1t=stY,C2t=tH+stP}. This hides the transaction information, and then the multiplicative zero-knowledge proof ensures t=vr to be public verified by validators in blockchain without revealing t, r and v.

    In this paper, we propose a privacy preserving transaction scheme with public verification and reliable audit in blockchain. Our scheme not only provides confidentiality for transaction contents in a more flexible way by decoupling user identity and transaction contents, but also defines several verification rules that makes full use of validators in blockchain. It enables balance verification for monetary assets, and then we design a multiplicative zero-knowledge proof with security analysis, which can be potentially used in blockchain based financial applications, supply chains and so on. Then, validators can optionally multiplicative verification of data assets to ensure the data compliance by applying the proposed multiplicative proof. In addition, our proposal enables the auditor to make precise audit of each transaction which audit reliability is guaranteed by publicly verifying the audit proof. Security analysis shows that the proposed scheme satisfies the security requirements we defined. Performance analysis indicates that its computation cost is in milliseconds, and the aggregation effectively saves the storage space. Also, how to construct a more efficient range-proof is still to be taken into consideration.

    This paper was supported by National Natural Science Foundation of China (Grant no. U21A20463).

    The authors declare there is no conflicts of interest.



    [1] A. Muller, A. C. Marquez, B. Iung, On the concept of e-maintenance: Review and current research, Reliab. Eng. Syst. Saf., 93 (2008), 1165–1187. https://doi.org/10.1016/j.ress.2007.08.006 doi: 10.1016/j.ress.2007.08.006
    [2] K. Gandhi, A. H. Ng, Machine maintenance decision support system: a systematic literature review, in Advances in Manufacturing Technology XXXⅡ: Proceedings of the 16th International Conference on Manufacturing Research, incorporating the 33rd National Conference on Manufacturing Research, September 11–13, University of Skö vde, IOS Press, Sweden, 8 (2018), 349.
    [3] A. Garg, S. G. Deshmukh, Maintenance management: literature review and directions, J. Qual. Maint. Eng., 12 (2006), 205–238. https://doi.org/10.1108/13552510610685075 doi: 10.1108/13552510610685075
    [4] D. Sherwin, A review of overall models for maintenance management, J. Qual. Maint. Eng., 6 (2000), 138–164. https://doi.org/10.1108/13552510010341171 doi: 10.1108/13552510010341171
    [5] K. C. Ng, G. G. G. Goh, U. C. Eze, Critical success factors of total productive maintenance implementation: a review, in 2011 IEEE international conference on industrial engineering and engineering management, IEEE, Singapore, 269–273. https://doi.org/10.1109/IEEM.2011.6117920
    [6] E. Sisinni, A. Saifullah, S. Han, U. Jennehag, M. Gidlund, Industrial internet of things: Challenges, opportunities, and directions, IEEE Trans. Ind. Inf., 14 (2018), 4724–4734. https://doi.org/10.1109/TⅡ.2018.2852491 doi: 10.1109/TⅡ.2018.2852491
    [7] H. Boyes, B. Hallaq, J. Cunningham, T. Watson, The industrial internet of things (ⅡoT): An analysis framework, Comput. Ind., 101 (2018), 1–12. https://doi.org/10.1016/j.compind.2018.04.015 doi: 10.1016/j.compind.2018.04.015
    [8] J. Wan, S. Tang, Z. Shu, D. Li, S. Wang, M. Imran, et al., Software-defined industrial internet of things in the context of industry 4.0, IEEE Sens. J., 16 (2016), 7373–7380. https://doi.org/10.1109/JSEN.2016.2565621 doi: 10.1109/JSEN.2016.2565621
    [9] Y. Liao, E. D. F. R. Loures, F. Deschamps, Industrial Internet of Things: A systematic literature review and insights, IEEE Internet Things J., 5 (2018), 4515–4525. https://doi.org/10.1109/JIOT.2018.2834151 doi: 10.1109/JIOT.2018.2834151
    [10] M. Hartmann, B. Halecker, Management of innovation in the industrial internet of things, in The International Society for Professional Innovation Management ISPIM Conference Proceedings, 2015.
    [11] M. Mohri, A. Rostamizadeh, A. Talwalkar, Foundations of Machine Learning, MIT press, 2018.
    [12] C. Sammut, G. I. Webb, Encyclopedia of Machine Learning, Springer Science & Business Media, 2011.
    [13] G. Carleo, I. Cirac, K. Cranmer, L. Daudet, M. Schuld, N. Tishby, et al., Machine learning and the physical sciences, Rev. Mod. Phys., 91 (2019), 045002. https://doi.org/10.1103/RevModPhys.91.045002 doi: 10.1103/RevModPhys.91.045002
    [14] M. Du, N. Liu, X. Hu, Techniques for interpretable machine learning, Commun. ACM, 63 (2019), 68–77. https://doi.org/10.1145/3359786 doi: 10.1145/3359786
    [15] H. Sahli, An introduction to machine learning, in TORUS 1-Toward an Open Resource Using Services: Cloud Computing for Environmental Data, (2020), 61–74. https://doi.org/10.1002/9781119720492.ch7
    [16] R. H. P. M. Arts, G. M. Knapp, L. Mann, Some aspects of measuring maintenance performance in the process industry, J. Qual. Maint. Eng., 4 (1998) 6–11. https://doi.org/10.1108/13552519810201520 doi: 10.1108/13552519810201520
    [17] C. Stenströ m, P. Norrbin, A. Parida, U. Kumar, Preventive and corrective maintenance-cost comparison and cost-benefit analysis, Struct. Infrastruct. Eng., 12 (2016), 603–617. https://doi.org/10.1080/15732479.2015.1032983 doi: 10.1080/15732479.2015.1032983
    [18] H. P. Bahrick, L. K. Hall, Preventive and corrective maintenance of access to knowledge, Appl. Cognit. Psychol., 5 (1991), 1–18. https://doi.org/10.1002/acp.2350050102 doi: 10.1002/acp.2350050102
    [19] J. Shin, H. Jun, On condition based maintenance policy, J. Comput. Des. Eng., 2 (2015), 119–127. https://doi.org/10.1016/j.jcde.2014.12.006 doi: 10.1016/j.jcde.2014.12.006
    [20] R. Ahmad, S. Kamaruddin, An overview of time-based and condition-based maintenance in industrial application, Comput. Ind. Eng., 63 (2012), 135–149. https://doi.org/10.1016/j.cie.2012.02.002 doi: 10.1016/j.cie.2012.02.002
    [21] J. H. Williams, A. Davies, P. R. Drake, Condition-Based Maintenance and Machine Diagnostics, Springer Science & Business Media, 1994.
    [22] R. K. Mobley, An Introduction to Predictive Maintenance, 2nd edition, Elsevier, 2002. https://doi.org/10.1016/B978-0-7506-7531-4.X5000-3
    [23] C. Scheffer, P. Girdhar, Practical Machinery Vibration Analysis and Predictive Maintenance, Elsevier, 2004.
    [24] K. Efthymiou, N. Papakostas, D. Mourtzis, G. Chryssolouris, On a predictive maintenance platform for production systems, Procedia CIRP, 3 (2012), 221–226. https://doi.org/10.1016/j.procir.2012.07.039 doi: 10.1016/j.procir.2012.07.039
    [25] G. A. Susto, A. Schirru, S. Pampuri, S. McLoone, A. Beghi, Machine learning for predictive maintenance: A multiple classifier approach, IEEE Trans. Ind. Inf., 11 (2014), 812–820. https://doi.org/10.1109/TⅡ.2014.2349359 doi: 10.1109/TⅡ.2014.2349359
    [26] R. Isermann, Fault-Diagnosis Systems: An Introduction from Fault Detection to Fault Tolerance, Springer Science & Business Media, 2005.
    [27] Z. Gao, C. Cecati, S. X. Ding, A survey of fault diagnosis and fault-tolerant techniques—Part I: Fault diagnosis with model-based and signal-based approaches, IEEE Trans. Ind. Electron., 62 (2015), 3757–3767. https://doi.org/10.1109/TIE.2015.2417501 doi: 10.1109/TIE.2015.2417501
    [28] S. Leonhardt, M. Ayoubi, Methods of fault diagnosis, Control Eng. Pract., 5 (1997), 683–692. https://doi.org/10.1016/S0967-0661(97)00050-6 doi: 10.1016/S0967-0661(97)00050-6
    [29] R. J. Patton, P. M. Frank, R. N Clark, Issues of Fault Diagnosis for Dynamic Systems, Springer Science & Business Media, 2013.
    [30] M. I. Jordan, T. M. Mitchell, Machine learning: Trends, perspectives, and prospects, Science, 349 (2015), 255–260. https://doi.org/10.1126/science.aaa8415 doi: 10.1126/science.aaa8415
    [31] U. S. Shanthamallu, A. Spanias, C. Tepedelenlioglu, M. Stanley, A brief survey of machine learning methods and their sensor and IoT applications, in 2017 8th International Conference on Information, Intelligence, Systems & Applications (ⅡSA), IEEE, (2017), 1–8. https://doi.org/10.1109/ⅡSA.2017.8316459
    [32] D. A. Pisner, D. M. Schnyer, Support vector machine, in Machine Learning, Academic Press, (2020), 101–121. https://doi.org/10.1016/B978-0-12-815739-8.00006-7
    [33] W. S. Noble, What is a support vector machine, Nat. Biotechnol., 24 (2006), 1565–1567. https://doi.org/10.1038/nbt1206-1565 doi: 10.1038/nbt1206-1565
    [34] L. Wang, Support Vector Machines: Theory and Applications, Springer Science & Business Media, 2005. https://doi.org/10.1007/b95439
    [35] S. I. Amari, S. Wu, Improving support vector machine classifiers by modifying kernel functions, Neural Networks, 12 (1999), 783–789. https://doi.org/10.1016/S0893-6080(99)00032-5 doi: 10.1016/S0893-6080(99)00032-5
    [36] O. L. Mangasarian, D. R. Musicant, Lagrangian support vector machines, J. Mach. Learn. Res., 1 (2001), 161–177.
    [37] A. Widodo, B. S. Yang, Support vector machine in machine condition monitoring and fault diagnosis, Mech. Syst. Sig. Process., 21 (2007), 2560–2574. https://doi.org/10.1016/j.ymssp.2006.12.007 doi: 10.1016/j.ymssp.2006.12.007
    [38] S. W. Fei, X. B. Zhang, Fault diagnosis of power transformer based on support vector machine with genetic algorithm, Expert Syst. Appl., 36 (2009), 11352–11357. https://doi.org/10.1016/j.eswa.2009.03.022 doi: 10.1016/j.eswa.2009.03.022
    [39] S. D. Wu, P. H. Wu, C. W. Wu, J. J. Ding, C. C. Wang, Bearing fault diagnosis based on multiscale permutation entropy and support vector machine, Entropy, 14 (2012), 1343–1356. https://doi.org/10.3390/e14081343 doi: 10.3390/e14081343
    [40] W. Aziz, M. Arif, Multiscale permutation entropy of physiological time series, in 2005 Pakistan Section Multitopic Conference, IEEE, (2005), 1–6. https://doi.org/10.1109/INMIC.2005.334494
    [41] B. Tang, T. Song, F. Li, L. Deng, Fault diagnosis for a wind turbine transmission system based on manifold learning and Shannon wavelet support vector machine, Renewable Energy, 62 (2014), 1–9. https://doi.org/10.1016/j.renene.2013.06.025 doi: 10.1016/j.renene.2013.06.025
    [42] Z. Wang, L. Yao, Y. Cai, J. Zhang, Mahalanobis semi-supervised mapping and beetle antennae search based support vector machine for wind turbine rolling bearings fault diagnosis, Renewable Energy, 155 (2020), 1312–1327. https://doi.org/10.1016/j.renene.2020.04.041 doi: 10.1016/j.renene.2020.04.041
    [43] L. Yao, Z. Fang, Y. Xiao, J. Hou, Z. Fu, An intelligent fault diagnosis method for lithium battery systems based on grid search support vector machine, Energy, 214 (2021), 118866. https://doi.org/10.1016/j.energy.2020.118866 doi: 10.1016/j.energy.2020.118866
    [44] Y. P. Zhao, J. J. Wang, X. Y. Li, G. J. Peng, Z. Yang, Extended least squares support vector machine with applications to fault diagnosis of aircraft engine, ISA Trans., 97 (2020), 189–201. https://doi.org/10.1016/j.isatra.2019.08.036 doi: 10.1016/j.isatra.2019.08.036
    [45] F. Marini, B. Walczak, Particle swarm optimization (PSO). A tutorial, Chemom. Intell. Lab. Syst., 149 (2015), 153–165. https://doi.org/10.1016/j.chemolab.2015.08.020 doi: 10.1016/j.chemolab.2015.08.020
    [46] M. Van, D. T. Hoang, H. J. Kang, Bearing fault diagnosis using a particle swarm optimization-least squares wavelet support vector machine classifier, Sensors, 20 (2020), 3422. https://doi.org/10.3390/s20123422 doi: 10.3390/s20123422
    [47] X. Li, S. Wu, X. Li, H. Yuan, D. Zhao, Particle swarm optimization-support vector machine model for machinery fault diagnoses in high-voltage circuit breakers, Chin. J. Mech. Eng., 33 (2020), 1–10. https://doi.org/10.1186/s10033-019-0428-5 doi: 10.1186/s10033-019-0428-5
    [48] Y. Fan, C. Zhang, Y. Xue, J. Wang, F. Gu, A bearing fault diagnosis using a support vector machine optimised by the self-regulating particle swarm, Shock Vib., 2020 (2020). https://doi.org/10.1155/2020/9096852 doi: 10.1155/2020/9096852
    [49] E. Mirakhorli, Fault diagnosis in a distillation column using a support vector machine based classifier, Int. J. Smart Electr. Eng., 8 (2020), 105–113.
    [50] S. Gao, C. Zhou, Z. Zhang, J. Geng, R. He, Q. Yin, C. Xing, Mechanical fault diagnosis of an on-load tap changer by applying cuckoo search algorithm-based fuzzy weighted least squares support vector machine, Math. Probl. Eng., 2020 (2020). https://doi.org/10.1155/2020/3432409 doi: 10.1155/2020/3432409
    [51] X. Huang, X. Huang, B. Wang, Z. Xie, Fault diagnosis of transformer based on modified grey wolf optimization algorithm and support vector machine, IEEJ Trans. Electr. Electron. Eng., 15 (2020), 409–417. https://doi.org/10.1002/tee.23069 doi: 10.1002/tee.23069
    [52] Y. Zhang, J. Li, X. Fan, J. Liu, H. Zhang, Moisture prediction of transformer oil-immersed polymer insulation by applying a support vector machine combined with a genetic algorithm, Polymers, 12 (2020), 1579. https://doi.org/10.3390/polym12071579 doi: 10.3390/polym12071579
    [53] Y. Liu, H. Chen, L. Zhang, X. Wu, X. J. Wang, Energy consumption prediction and diagnosis of public buildings based on support vector machine learning: A case study in China, J. Cleaner Prod., 272 (2020), 122542. https://doi.org/10.1016/j.jclepro.2020.122542 doi: 10.1016/j.jclepro.2020.122542
    [54] S. K. Ibrahim, A. Ahmed, M. A. E. Zeidan, I. E. Ziedan, Machine learning techniques for satellite fault diagnosis, Ain Shams Eng. J., 11 (2020), 45–56. https://doi.org/10.1016/j.asej.2019.08.006 doi: 10.1016/j.asej.2019.08.006
    [55] Y. P. Zhao, G. Huang, Q. K. Hu, B. Li, An improved weighted one class support vector machine for turboshaft engine fault detection, Eng. Appl. Artif. Intell., 94 (2020), 103796. https://doi.org/10.1016/j.engappai.2020.103796 doi: 10.1016/j.engappai.2020.103796
    [56] M. Guo, L. Xie, S. Q. Wang, J. M. Zhang, Research on an integrated ICA-SVM based framework for fault diagnosis, in SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme-System Security and Assurance (Cat. No. 03CH37483), IEEE, 3 (2003), 2710–2715. https://doi.org/10.1109/ICSMC.2003.1244294
    [57] S. Poyhonen, P. Jover, H. Hyotyniemi, Signal processing of vibrations for condition monitoring of an induction motor, in First International Symposium on Control, Communications and Signal Processing, IEEE, Tunisia, (2004), 499–502. https://doi.org/10.1109/ISCCSP.2004.1296338
    [58] M. C. Moura, E. Zio, I. D. Lins, E. Droguett, Failure and reliability prediction by support vector machines regression of time series data, Reliab. Eng. Syst. Saf., 96 (2011), 1527–1534. https://doi.org/10.1016/j.ress.2011.06.006 doi: 10.1016/j.ress.2011.06.006
    [59] K. Y. Chen, L. S. Chen, M. C. Chen, C. L. Lee, Using SVM based method for equipment fault detection in a thermal power plant, Comput. Ind., 62 (2011), 42–50. https://doi.org/10.1016/j.compind.2010.05.013 doi: 10.1016/j.compind.2010.05.013
    [60] K. He, X. Li, A quantitative estimation technique for welding quality using local mean decomposition and support vector machine, J. Intell. Manuf., 27 (2016), 525–533. https://doi.org/10.1007/s10845-014-0885-8 doi: 10.1007/s10845-014-0885-8
    [61] K. Yan, C. Zhong, Z. Ji, J. Huang, Semi-supervised learning for early detection and diagnosis of various air handling unit faults, Energy Build., 181 (2018), 75–83. https://doi.org/10.1016/j.enbuild.2018.10.016 doi: 10.1016/j.enbuild.2018.10.016
    [62] Z. Yin, J. Hou, Recent advances on SVM based fault diagnosis and process monitoring in complicated industrial processes, Neurocomputing, 174 (2016), 643–650. https://doi.org/10.1016/j.neucom.2015.09.081 doi: 10.1016/j.neucom.2015.09.081
    [63] M. M. Islam, J. M. Kim, Reliable multiple combined fault diagnosis of bearings using heterogeneous feature models and multiclass support vector Machines, Reliab. Eng. Syst. Saf., 184 (2019), 55–66. https://doi.org/10.1016/j.ress.2018.02.012 doi: 10.1016/j.ress.2018.02.012
    [64] R. P. Monteiro, M. Cerrada, D. R. Cabrera, R. V. Sánchez, C. J. Bastos-Filho, Using a support vector machine based decision stage to improve the fault diagnosis on gearboxes, Comput. Intell. Neurosci., 2019 (2019). https://doi.org/10.1155/2019/1383752 doi: 10.1155/2019/1383752
    [65] D. Yang, J. Miao, F. Zhang, J. Tao, G. Wang, Y. Shen, Bearing fault diagnosis using a support vector machine optimized by an improved ant lion optimizer, Shock Vib., 2019 (2019). https://doi.org/10.1155/2019/9303676 doi: 10.1155/2019/9303676
    [66] S. Mirjalili, The ant lion optimizer, Adv. Eng. Software, 83 (2015), 80–98. https://doi.org/10.1016/j.advengsoft.2015.01.010 doi: 10.1016/j.advengsoft.2015.01.010
    [67] L. You, W. Fan, Z. Li, Y. Liang, M. Fang, J. Wang, A fault diagnosis model for rotating machinery using VWC and MSFLA-SVM based on vibration signal analysis, Shock Vib., 2019 (2019). https://doi.org/10.1155/2019/1908485 doi: 10.1155/2019/1908485
    [68] A. Kumar, R. Kumar, Time-frequency analysis and support vector machine in automatic detection of defect from vibration signal of centrifugal pump, Measurement, 108 (2017), 119–133. https://doi.org/10.1016/j.measurement.2017.04.041 doi: 10.1016/j.measurement.2017.04.041
    [69] Z. Chen, F. Zhao, J. Zhou, P. Huang, X. Zhang, Fault diagnosis of loader gearbox based on an Ica and SVM algorithm, Int. J. Environ. Res. Public Health, 16 (2019), 4868. https://doi.org/10.3390/ijerph16234868 doi: 10.3390/ijerph16234868
    [70] T. W. Lee, Independent component analysis, in Independent Component Analysis, Springer, Boston, (1998), 27–66. https://doi.org/10.1007/978-1-4757-2851-4_2
    [71] W. Liu, Z. Wang, J. Han, G. Wang, Wind turbine fault diagnosis method based on diagonal spectrum and clustering binary tree SVM, Renewable Energy, 50 (2013), 1–6. https://doi.org/10.1016/j.renene.2012.06.013 doi: 10.1016/j.renene.2012.06.013
    [72] M. A. Djeziri, O. Djedidi, N. Morati, J. L. Seguin, M. Bendahan, T. Contaret, A temporal-based SVM approach for the detection and identification of pollutant gases in a gas mixture, Appl. Intell., 52 (2022), 6065–6078. https://doi.org/10.1007/s10489-021-02761-0 doi: 10.1007/s10489-021-02761-0
    [73] G. Ciaburro, G. Iannace, J. Passaro, A. Bifulco, D. Marano, M. Guida, et al., Artificial neural network-based models for predicting the sound absorption coefficient of electrospun poly (vinyl pyrrolidone)/silica composite, Appl. Acoust., 169 (2020), 107472. https://doi.org/10.1016/j.apacoust.2020.107472 doi: 10.1016/j.apacoust.2020.107472
    [74] S. Agatonovic-Kustrin, R. Beresford, Basic concepts of artificial neural network (ANN) modeling and its application in pharmaceutical research, J. Pharm. Biomed. Anal., 22 (2000), 717–727. https://doi.org/10.1016/S0731-7085(99)00272-1 doi: 10.1016/S0731-7085(99)00272-1
    [75] G. Ciaburro, G. Iannace, M. Ali, A. Alabdulkarem, A. Nuhait, An artificial neural network approach to modelling absorbent asphalts acoustic properties, J. King Saud Univ. Eng. Sci., 33 (2021), 213–220. https://doi.org/10.1016/j.jksues.2020.07.002 doi: 10.1016/j.jksues.2020.07.002
    [76] J. Misra, I. Saha, Artificial neural networks in hardware: A survey of two decades of progress, Neurocomputing, 74 (2010), 239–255. https://doi.org/10.1016/j.neucom.2010.03.021 doi: 10.1016/j.neucom.2010.03.021
    [77] Z. Zhang, K. Friedrich, Artificial neural networks applied to polymer composites: a review, Compos. Sci. Technol., 63 (2003), 2029–2044. https://doi.org/10.1016/S0266-3538(03)00106-4 doi: 10.1016/S0266-3538(03)00106-4
    [78] G. Iannace, G. Ciaburro, A. Trematerra, Modelling sound absorption properties of broom fibers using artificial neural networks, Appl. Acoust., 163 (2020), 107239. https://doi.org/10.1016/j.apacoust.2020.107239 doi: 10.1016/j.apacoust.2020.107239
    [79] K. P. Singh, A. Basant, A. Malik, G. Jain, Artificial neural network modeling of the river water quality—a case study, Ecol. Modell., 220 (2009), 888–895. https://doi.org/10.1016/j.ecolmodel.2009.01.004 doi: 10.1016/j.ecolmodel.2009.01.004
    [80] H. Zhu, X. Li, Q. Sun, L. Nie, J. Yao, G. Zhao, A power prediction method for photovoltaic power plant based on wavelet decomposition and artificial neural networks, Energies, 9 (2015), 1–15. https://doi.org/10.3390/en9010011 doi: 10.3390/en9010011
    [81] V. P. Romero, L. Maffei, G. Brambilla, G. Ciaburro, Modelling the soundscape quality of urban waterfronts by artificial neural networks, Appl. Acoust., 111 (2016), 121–128. https://doi.org/10.1016/j.apacoust.2016.04.019 doi: 10.1016/j.apacoust.2016.04.019
    [82] S. Fabio, D. N. Giovanni, P. Mariano, Airborne sound insulation prediction of masonry walls using artificial neural networks, Build. Acoust., 28 (2021), 391–409. https://doi.org/10.1177/1351010X21994462 doi: 10.1177/1351010X21994462
    [83] Y. Zhang, X. Ding, Y. Liu, P. J. Griffin, An artificial neural network approach to transformer fault diagnosis, IEEE Trans. Power Delivery, 11 (1996), 1836–1841. https://doi.org/10.1109/61.544265 doi: 10.1109/61.544265
    [84] J. C. Hoskins, K. M. Kaliyur, D. M. Himmelblau, Fault diagnosis in complex chemical plants using artificial neural networks, AIChE J., 37 (1991), 137–141. https://doi.org/10.1002/aic.690370112 doi: 10.1002/aic.690370112
    [85] J. B. Ali, N. Fnaiech, L. Saidi, B. Chebel-Morello, F. Fnaiech, Application of empirical mode decomposition and artificial neural network for automatic bearing fault diagnosis based on vibration signals, Appl. Acoust., 89 (2015), 16–27. https://doi.org/10.1016/j.apacoust.2014.08.016 doi: 10.1016/j.apacoust.2014.08.016
    [86] T. Sorsa, H. N. Koivo, Application of artificial neural networks in process fault diagnosis, Automatica, 29 (1993), 843–849. https://doi.org/10.1016/0005-1098(93)90090-G doi: 10.1016/0005-1098(93)90090-G
    [87] N. Saravanan, K. I. Ramachandran, Incipient gear box fault diagnosis using discrete wavelet transform (DWT) for feature extraction and classification using artificial neural network (ANN), Expert Syst. Appl., 37 (2010), 4168–4181. https://doi.org/10.1016/j.eswa.2009.11.006 doi: 10.1016/j.eswa.2009.11.006
    [88] W. Chine, A. Mellit, V. Lughi, A. Malek, G. Sulligoi, A. M. Pavan, A novel fault diagnosis technique for photovoltaic systems based on artificial neural networks, Renewable Energy, 90 (2016), 501–512. https://doi.org/10.1016/j.renene.2016.01.036 doi: 10.1016/j.renene.2016.01.036
    [89] B. Li, M. Y. Chow, Y. Tipsuwan, J. C. Hung, Neural-network-based motor rolling bearing fault diagnosis, IEEE Trans. Ind. Electron., 47 (2000), 1060–1069. https://doi.org/10.1109/41.873214 doi: 10.1109/41.873214
    [90] B. Samanta, K. R. Al-Balushi, S. A. Al-Araimi, Artificial neural networks and genetic algorithm for bearing fault detection, Soft Comput., 10 (2006), 264–271. https://doi.org/10.1007/s00500-005-0481-0 doi: 10.1007/s00500-005-0481-0
    [91] T. Han, B. S. Yang, W. H. Choi, J. S. Kim, Fault diagnosis system of induction motors based on neural network and genetic algorithm using stator current signals, Int. J. Rotating Mach., 2006 (2006). https://doi.org/10.1155/IJRM/2006/61690 doi: 10.1155/IJRM/2006/61690
    [92] H. Wang, P. Chen, Intelligent diagnosis method for rolling element bearing faults using possibility theory and neural network, Comput. Ind. Eng., 60 (2011), 511–518. https://doi.org/10.1016/j.cie.2010.12.004 doi: 10.1016/j.cie.2010.12.004
    [93] M. A. Hashim, M. H. Nasef, A. E. Kabeel, N. M. Ghazaly, Combustion fault detection technique of spark ignition engine based on wavelet packet transform and artificial neural network, Alexandria Eng. J., 59 (2020), 3687–3697. https://doi.org/10.1016/j.aej.2020.06.023 doi: 10.1016/j.aej.2020.06.023
    [94] G. Iannace, G. Ciaburro, A. Trematerra, Fault diagnosis for UAV blades using artificial neural network, Robotics, 8 (2019), 59. https://doi.org/10.3390/robotics8030059 doi: 10.3390/robotics8030059
    [95] M. Kordestani, M. F. Samadi, M. Saif, K. Khorasani, A new fault diagnosis of multifunctional spoiler system using integrated artificial neural network and discrete wavelet transform methods, IEEE Sens. J., 18 (2018), 4990–5001. https://doi.org/10.1109/JSEN.2018.2829345 doi: 10.1109/JSEN.2018.2829345
    [96] S. Shi, G. Li, H. Chen, J. Liu, Y. Hu, L. Xing, et al., Refrigerant charge fault diagnosis in the VRF system using Bayesian artificial neural network combined with ReliefF filter, Appl. Therm. Eng., 112 (2017), 698–706. https://doi.org/10.1016/j.applthermaleng.2016.10.043 doi: 10.1016/j.applthermaleng.2016.10.043
    [97] X. Xu, D. Cao, Y. Zhou, J. Gao, Application of neural network algorithm in fault diagnosis of mechanical intelligence, Mech. Syst. Sig. Process., 141 (2020), 106625. https://doi.org/10.1016/j.ymssp.2020.106625 doi: 10.1016/j.ymssp.2020.106625
    [98] A. Viveros-Wacher, J. E. Rayas-Sánchez, Analog fault identification in RF circuits using artificial neural networks and constrained parameter extraction, in 2018 IEEE MTT-S International Conference on Numerical Electromagnetic and Multiphysics Modeling and Optimization (NEMO), IEEE, (2018), 1–3. https://doi.org/10.1109/NEMO.2018.8503117
    [99] S. Heo, J. H. Lee, Fault detection and classification using artificial neural networks, IFAC-PapersOnLine, 51 (2018), 470–475. https://doi.org/10.1016/j.ifacol.2018.09.380 doi: 10.1016/j.ifacol.2018.09.380
    [100] P. Agrawal, P. Jayaswal, Diagnosis and classifications of bearing faults using artificial neural network and support vector machine, J. Inst. Eng. (India): Ser. C, 101 (2020), 61–72. https://doi.org/10.1007/s40032-019-00519-9 doi: 10.1007/s40032-019-00519-9
    [101] Y. LeCun, B. E. Boser, J. S. Denker, D. Henderson, R. E. Howard, W. E. Hubbard, et al., Handwritten digit recognition with a back-propagation network, in Advances in Neural Information Processing Systems, (1990), 396–404.
    [102] T. Chen, Y. Sun, T. H. Li, A semi-parametric estimation method for the quantile spectrum with an application to earthquake classification using convolutional neural network, Comput. Stat. Data Anal., 154 (2021), 107069. https://doi.org/10.1016/j.csda.2020.107069 doi: 10.1016/j.csda.2020.107069
    [103] F. Perla, R. Richman, S. Scognamiglio, M. V. Wüthrich, Time-series forecasting of mortality rates using deep learning, Scand. Actuarial J., 2021 (2021), 1–27. https://doi.org/10.1080/03461238.2020.1867232 doi: 10.1080/03461238.2020.1867232
    [104] G. Ciaburro, G. Iannace, V. Puyana-Romero, A. Trematerra, A comparison between numerical simulation models for the prediction of acoustic behavior of giant reeds shredded, Appl. Sci., 10 (2020), 6881. https://doi.org/10.3390/app10196881 doi: 10.3390/app10196881
    [105] C. Yildiz, H. Acikgoz, D. Korkmaz, U. Budak, An improved residual-based convolutional neural network for very short-term wind power forecasting, Energy Convers. Manage., 228 (2021), 113731. https://doi.org/10.1016/j.enconman.2020.113731 doi: 10.1016/j.enconman.2020.113731
    [106] G. Ciaburro, Sound event detection in underground parking garage using convolutional neural network, Big Data Cognit. Comput., 4 (2020), 20. https://doi.org/10.3390/bdcc4030020 doi: 10.3390/bdcc4030020
    [107] R. Ye, Q. Dai, Implementing transfer learning across different datasets for time series forecasting, Pattern Recognit., 109 (2021), 107617. https://doi.org/10.1016/j.patcog.2020.107617 doi: 10.1016/j.patcog.2020.107617
    [108] J. Han, L. Shi, Q. Yang, K. Huang, Y. Zha, J. Yu, Real-time detection of rice phenology through convolutional neural network using handheld camera images, Precis. Agric., 22 (2021), 154–178. https://doi.org/10.1016/j.patcog.2020.107617 doi: 10.1016/j.patcog.2020.107617
    [109] G. Ciaburro, G. Iannace, Improving smart cities safety using sound events detection based on deep neural network algorithms, Informatics, 7 (2020), 23. https://doi.org/10.3390/informatics7030023 doi: 10.3390/informatics7030023
    [110] L. Wen, X. Li, L. Gao, Y. Zhang, A new convolutional neural network-based data-driven fault diagnosis method, IEEE Trans. Ind. Electron., 65 (2017), 5990–5998. https://doi.org/10.1109/TIE.2017.2774777 doi: 10.1109/TIE.2017.2774777
    [111] Y. LeCun, LeNet-5, Convolutional Neural Networks, 2015, Available from: http://yann.lecun.com/exdb/lenet/, Accessed date: 28 April 2022.
    [112] H. Wu, J. Zhao, Deep convolutional neural network model based chemical process fault diagnosis, Comput. Chem. Eng., 115 (2018), 185–197. https://doi.org/10.1016/j.compchemeng.2018.04.009 doi: 10.1016/j.compchemeng.2018.04.009
    [113] W. Zhang, C. Li, G. Peng, Y. Chen, Z. Zhang, A deep convolutional neural network with new training methods for bearing fault diagnosis under noisy environment and different working load, Mech. Syst. Sig. Process., 100 (2018), 439–453. https://doi.org/10.1016/j.ymssp.2017.06.022 doi: 10.1016/j.ymssp.2017.06.022
    [114] L. Jing, M. Zhao, P. Li, X. Xu, A convolutional neural network based feature learning and fault diagnosis method for the condition monitoring of gearbox, Measurement, 111 (2017), 1–10. https://doi.org/10.1016/j.measurement.2017.07.017 doi: 10.1016/j.measurement.2017.07.017
    [115] Z. Chen, C. Li, R. V. Sanchez, Gearbox fault identification and classification with convolutional neural networks, Shock Vib., 2015 (2015). https://doi.org/10.1155/2015/390134 doi: 10.1155/2015/390134
    [116] X. Guo, L. Chen, C. Shen, Hierarchical adaptive deep convolution neural network and its application to bearing fault diagnosis, Measurement, 93 (2016), 490–502. https://doi.org/10.1016/j.measurement.2016.07.054 doi: 10.1016/j.measurement.2016.07.054
    [117] O. Janssens, V. Slavkovikj, B. Vervisch, K. Stockman, M. Loccufier, S. Verstockt, et al., Convolutional neural network based fault detection for rotating machinery, J. Sound Vib., 377 (2016), 331–345. https://doi.org/10.1016/j.jsv.2016.05.027 doi: 10.1016/j.jsv.2016.05.027
    [118] W. Zhang, G. Peng, C. Li, Y. Chen, Z. Zhang, A new deep learning model for fault diagnosis with good anti-noise and domain adaptation ability on raw vibration signals, Sensors, 17 (2017), 425. https://doi.org/10.3390/s17020425 doi: 10.3390/s17020425
    [119] Y. Li, N. Wang, J. Shi, X. Hou, J. Liu, Adaptive batch normalization for practical domain adaptation, Pattern Recognit., 80 (2018), 109–117. https://doi.org/10.1016/j.patcog.2018.03.005 doi: 10.1016/j.patcog.2018.03.005
    [120] T. Ince, S. Kiranyaz, L. Eren, M. Askar, M. Gabbouj, Real-time motor fault detection by 1-D convolutional neural networks, IEEE Trans. Ind. Electron., 63 (2016), 7067–7075. https://doi.org/10.1109/TIE.2016.2582729 doi: 10.1109/TIE.2016.2582729
    [121] Y. Zhang, K. Xing, R. Bai, D. Sun, Z. Meng, An enhanced convolutional neural network for bearing fault diagnosis based on time-frequency image, Measurement, 157 (2020), 107667. https://doi.org/10.1016/j.measurement.2020.107667 doi: 10.1016/j.measurement.2020.107667
    [122] M. Azamfar, J. Singh, I. Bravo-Imaz, J. Lee, . Multisensor data fusion for gearbox fault diagnosis using 2-D convolutional neural network and motor current signature analysis, Mech. Syst. Sig. Process., 144 (2020), 106861. https://doi.org/10.1016/j.ymssp.2020.106861 doi: 10.1016/j.ymssp.2020.106861
    [123] Q. Zhou, Y. Li, Y. Tian, L. Jiang, A novel method based on nonlinear auto-regression neural network and convolutional neural network for imbalanced fault diagnosis of rotating machinery, Measurement, 161 (2020), 107880. https://doi.org/10.1016/j.measurement.2020.107880 doi: 10.1016/j.measurement.2020.107880
    [124] K. Zhang, J. Chen, T. Zhang, Z. Zhou, A compact convolutional neural network augmented with multiscale feature extraction of acquired monitoring data for mechanical intelligent fault diagnosis, J. Manuf. Syst., 55 (2020), 273–284. https://doi.org/10.1016/j.jmsy.2020.04.016 doi: 10.1016/j.jmsy.2020.04.016
    [125] Y. Li, X. Du, F. Wan, X. Wang, H. Yu, Rotating machinery fault diagnosis based on convolutional neural network and infrared thermal imaging, Chin. J. Aeronaut., 33 (2020), 427–438. https://doi.org/10.1016/j.cja.2019.08.014 doi: 10.1016/j.cja.2019.08.014
    [126] Z. Chen, A. Mauricio, W. Li, K. Gryllias, A deep learning method for bearing fault diagnosis based on cyclic spectral coherence and convolutional neural networks, Mech. Syst. Sig. Process., 140 (2020), 106683. https://doi.org/10.1016/j.ymssp.2020.106683 doi: 10.1016/j.ymssp.2020.106683
    [127] J. Antoni, Cyclic spectral analysis in practice, Mech. Syst. Sig. Process., 21 (2007), 597–630. https://doi.org/10.1016/j.ymssp.2006.08.007 doi: 10.1016/j.ymssp.2006.08.007
    [128] D. Zhou, Q. Yao, H. Wu, S. Ma, H. Zhang, Fault diagnosis of gas turbine based on partly interpretable convolutional neural networks, Energy, 200 (2020), 117467. https://doi.org/10.1016/j.energy.2020.117467 doi: 10.1016/j.energy.2020.117467
    [129] T. Chen, T. He, M. Benesty, V. Khotilovich, Y. Tang, H. Cho, Xgboost: extreme gradient boosting, R package version 0.4-2, 1 (2015), 1–4.
    [130] X. Li, J. Zheng, M. Li, W. Ma, Y. Hu, Frequency-domain fusing convolutional neural network: A unified architecture improving effect of domain adaptation for fault diagnosis, Sensors, 21 (2021), 450. https://doi.org/10.3390/s21020450 doi: 10.3390/s21020450
    [131] C. C. Chen, Z. Liu, G. Yang, C. C. Wu, Q. Ye, An improved fault diagnosis using 1D-convolutional neural network model, electronics, 10 (2021), 59. https://doi.org/10.3390/electronics10010059
    [132] Y. Liu, Y. Yang, T. Feng, Y. Sun, X. Zhang, Research on rotating machinery fault diagnosis method based on energy spectrum matrix and adaptive convolutional neural network, Processes, 9 (2021), 69. https://doi.org/10.3390/pr9010069 doi: 10.3390/pr9010069
    [133] D. T. Hoang, X. T. Tran, M. Van, H. J. Kang, A deep neural network-based feature fusion for bearing fault diagnosis, Sensors, 21 (2021), 244. https://doi.org/10.3390/s21010244 doi: 10.3390/s21010244
    [134] T. Mikolov, M. Karafiát, L. Burget, J. Černocký, S. Khudanpur, Recurrent neural network based language model, in Eleventh Annual Conference of the International Speech Communication Association, 2010.
    [135] K. Gregor, I. Danihelka, A. Graves, D. Rezende, D. Wierstra, Draw: A recurrent neural network for image generation, in International Conference on Machine Learning (PMLR), 37 (2015), 1462–1471.
    [136] T. Mikolov, G. Zweig, Context dependent recurrent neural network language model, in 2012 IEEE Spoken Language Technology Workshop (SLT), IEEE, (2012), 234–239. https://doi.org/10.1109/SLT.2012.6424228
    [137] G. Ciaburro, Time series data analysis using deep learning methods for smart cities monitoring, in Big Data Intelligence for Smart Applications, Springer, Cham, (2022), 93–116. https://doi.org/10.1007/978-3-030-87954-9_4
    [138] H. Sak, A. W. Senior, F. Beaufays, Long short-term memory recurrent neural network architectures for large scale acoustic modeling, Interspeech, (2014), 338–342. https://doi.org/10.21437/Interspeech.2014-80 doi: 10.21437/Interspeech.2014-80
    [139] J. Kim, J. Kim, H. L. T. Thu, H. Kim, Long short term memory recurrent neural network classifier for intrusion detection, in 2016 International Conference on Platform Technology and Service (PlatCon), IEEE, (2016), 1–5. https://doi.org/10.1109/PlatCon.2016.7456805
    [140] Y. Tian, L. Pan, Predicting short-term traffic flow by long short-term memory recurrent neural network, in 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), IEEE, (2015), 153–158. https://doi.org/10.1109/SmartCity.2015.63
    [141] H. Jiang, X. Li, H. Shao, K. Zhao, Intelligent fault diagnosis of rolling bearings using an improved deep recurrent neural network, Meas. Sci. Technol., 29 (2018), 065107. https://doi.org/10.1088/1361-6501/aab945 doi: 10.1088/1361-6501/aab945
    [142] T. De Bruin, K. Verbert, R. Babuška, Railway track circuit fault diagnosis using recurrent neural networks, IEEE Trans. Neural Networks Learn. Syst., 28 (2016), 523–533. https://doi.org/10.1109/TNNLS.2016.2551940 doi: 10.1109/TNNLS.2016.2551940
    [143] R. Yang, M. Huang, Q. Lu, M. Zhong, Rotating machinery fault diagnosis using long-short-term memory recurrent neural network, IFAC-PapersOnLine, 51 (2018), 228–232. https://doi.org/10.1016/j.ifacol.2018.09.582 doi: 10.1016/j.ifacol.2018.09.582
    [144] H. A. Talebi, K. Khorasani, S. Tafazoli, A recurrent neural-network-based sensor and actuator fault detection and isolation for nonlinear systems with application to the satellite's attitude control subsystem, IEEE Trans. Neural Networks, 20 (2008), 45–60. https://doi.org/10.1109/TNN.2008.2004373 doi: 10.1109/TNN.2008.2004373
    [145] S. Zhang, K. Bi, T. Qiu, Bidirectional recurrent neural network-based chemical process fault diagnosis, Ind. Eng. Chem. Res., 59 (2019), 824–834. https://doi.org/10.1021/acs.iecr.9b05885 doi: 10.1021/acs.iecr.9b05885
    [146] Z. An, S. Li, J. Wang, X. Jiang, A novel bearing intelligent fault diagnosis framework under time-varying working conditions using recurrent neural network, ISA Trans., 100 (2020), 155–170. https://doi.org/10.1016/j.isatra.2019.11.010 doi: 10.1016/j.isatra.2019.11.010
    [147] W. Liu, P. Guo, L. Ye, A low-delay lightweight recurrent neural network (LLRNN) for rotating machinery fault diagnosis, Sensors, 19 (2019), 3109. https://doi.org/10.3390/s19143109 doi: 10.3390/s19143109
    [148] K. Liang, N. Qin, D. Huang, Y. Fu, Convolutional recurrent neural network for fault diagnosis of high-speed train bogie, Complexity, 2018 (2018). https://doi.org/10.1155/2018/4501952 doi: 10.1155/2018/4501952
    [149] D. Huang, Y. Fu, N. Qin, S. Gao, Fault diagnosis of high-speed train bogie based on LSTM neural network, Sci. Chin. Inf. Sci., 64 (2021), 1–3. https://doi.org/10.1007/s11432-018-9543-8 doi: 10.1007/s11432-018-9543-8
    [150] H. Shahnazari, P. Mhaskar, J. M. House, T. I. Salsbury, Modeling and fault diagnosis design for HVAC systems using recurrent neural networks, Comput. Chem. Eng., 126 (2019), 189–203. https://doi.org/10.1016/j.compchemeng.2019.04.011 doi: 10.1016/j.compchemeng.2019.04.011
    [151] H. Shahnazari, Fault diagnosis of nonlinear systems using recurrent neural networks, Chem. Eng. Res. Des., 153 (2020), 233–245. https://doi.org/10.1016/j.cherd.2019.09.026 doi: 10.1016/j.cherd.2019.09.026
    [152] L. Guo, N. Li, F. Jia, Y. Lei, J. Lin, A recurrent neural network based health indicator for remaining useful life prediction of bearings, Neurocomputing, 240 (2017), 98–109. https://doi.org/10.1016/j.neucom.2017.02.045 doi: 10.1016/j.neucom.2017.02.045
    [153] M. Yuan, Y. Wu, L. Lin, Fault diagnosis and remaining useful life estimation of aero engine using LSTM neural network, in 2016 IEEE international conference on aircraft utility systems (AUS), IEEE, (2016), 135–140. https://doi.org/10.1109/AUS.2016.7748035
    [154] Z. Wu, H. Jiang, K. Zhao, X. Li, An adaptive deep transfer learning method for bearing fault diagnosis, Measurement, 151 (2020), 107227. https://doi.org/10.1016/j.measurement.2019.107227 doi: 10.1016/j.measurement.2019.107227
    [155] A. Yin, Y. Yan, Z. Zhang, C. Li, R. V. Sánchez, Fault diagnosis of wind turbine gearbox based on the optimized LSTM neural network with cosine loss, Sensors, 20 (2020), 2339. https://doi.org/10.3390/s20082339 doi: 10.3390/s20082339
    [156] M. Xia, X. Zheng, M. Imran, M. Shoaib, Data-driven prognosis method using hybrid deep recurrent neural network, Appl. Soft Comput., 93 (2020), 106351. https://doi.org/10.1016/j.asoc.2020.106351 doi: 10.1016/j.asoc.2020.106351
    [157] Z. Wang, Y. Dong, W. Liu, Z. Ma, A novel fault diagnosis approach for chillers based on 1-D convolutional neural network and gated recurrent unit, Sensors, 20 (2020), 2458. https://doi.org/10.3390/s20092458 doi: 10.3390/s20092458
    [158] R. Salakhutdinov, Learning deep generative models, Annu. Rev. Stat. Appl., 2 (2015), 361–385. https://doi.org/10.1146/annurev-statistics-010814-020120 doi: 10.1146/annurev-statistics-010814-020120
    [159] A. Gupta, A. Agarwal, P. Singh, P. Rai, A deep generative framework for paraphrase generation, in Proceedings of the AAAI Conference on Artificial Intelligence, 32 (2018). https://doi.org/10.1609/aaai.v32i1.11956
    [160] I. J. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, et al., Generative adversarial networks, 2014, preprint, arXiv: 1406.2661.
    [161] L. Metz, B. Poole, D. Pfau, J. Sohl-Dickstein, Unrolled generative adversarial networks, 2016, preprint, arXiv: 1611.02163.
    [162] G. Ciaburro, Security systems for smart cities based on acoustic sensors and machine learning applications, in Machine Intelligence and Data Analytics for Sustainable Future Smart Cities, Springer, Cham, (2021), 369–393. https://doi.org/10.1007/978-3-030-72065-0_20
    [163] X. Hou, L. Shen, K. Sun, G. Qiu, Deep feature consistent variational autoencoder, in 2017 IEEE Winter Conference on Applications of Computer Vision (WACV), IEEE, (2017), 1133–1141. https://doi.org/10.1109/WACV.2017.131
    [164] M. J. Kusner, B. Paige, J. M. Hernández-Lobato, Grammar variational autoencoder, in International Conference on Machine Learning (PMLR), 70 (2017), 1945–1954.
    [165] Y. Pu, Z. Gan, R. Henao, X. Yuan, C. Li, A. Stevens, et al., Variational autoencoder for deep learning of images, labels and captions, 2016, preprint, arXiv: 1609.08976.
    [166] A. Makhzani, J. Shlens, N. Jaitly, I. Goodfellow, B. Frey, Adversarial autoencoders, 2015, preprint, arXiv: 1511.05644.
    [167] Z. Zhang, Y. Song, H. Qi, Age progression/regression by conditional adversarial autoencoder, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, (2017), 5810–5818. https://doi.org/10.1109/CVPR.2017.463
    [168] H. Liu, J. Zhou, Y. Xu, Y. Zheng, X. Peng, W. Jiang, Unsupervised fault diagnosis of rolling bearings using a deep neural network based on generative adversarial networks, Neurocomputing, 315 (2018), 412–424. https://doi.org/10.1016/j.neucom.2018.07.034 doi: 10.1016/j.neucom.2018.07.034
    [169] S. Shao, P. Wang, R. Yan, Generative adversarial networks for data augmentation in machine fault diagnosis, Comput. Ind., 106 (2019), 85–93. https://doi.org/10.1016/j.compind.2019.01.001 doi: 10.1016/j.compind.2019.01.001
    [170] W. Zhang, X. Li, X. D. Jia, H. Ma, Z. Luo, X. Li, Machinery fault diagnosis with imbalanced data using deep generative adversarial networks, Measurement, 152 (2020), 107377. https://doi.org/10.1016/j.measurement.2019.107377 doi: 10.1016/j.measurement.2019.107377
    [171] Z. Wang, J. Wang, Y. Wang, An intelligent diagnosis scheme based on generative adversarial learning deep neural networks and its application to planetary gearbox fault pattern recognition, Neurocomputing, 310 (2018), 213–222. https://doi.org/10.1016/j.neucom.2018.05.024 doi: 10.1016/j.neucom.2018.05.024
    [172] P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, P. A. Manzagol, L. Bottou, Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion, J. Mach. Learn. Res., 11 (2010), 3371–3408.
    [173] Q. Li, L. Chen, C. Shen, B. Yang, Z. Zhu, Enhanced generative adversarial networks for fault diagnosis of rotating machinery with imbalanced data, Meas. Sci. Technol., 30 (2019), 115005. https://doi.org/10.1088/1361-6501/ab3072 doi: 10.1088/1361-6501/ab3072
    [174] J. Wang, S. Li, B. Han, Z. An, H. Bao, S. Ji, Generalization of deep neural networks for imbalanced fault classification of machinery using generative adversarial networks, IEEE Access, 7 (2019), 111168–111180. https://doi.org/10.1109/ACCESS.2019.2924003 doi: 10.1109/ACCESS.2019.2924003
    [175] Y. Xie, T. Zhang, Imbalanced learning for fault diagnosis problem of rotating machinery based on generative adversarial networks, in 2018 37th Chinese Control Conference (CCC), IEEE, (2018), 6017–6022. https://doi.org/10.23919/ChiCC.2018.8483334
    [176] C. Zhong, K. Yan, Y. Dai, N. Jin, B. Lou, Energy efficiency solutions for buildings: Automated fault diagnosis of air handling units using generative adversarial networks, Energies, 12 (2019), 527. https://doi.org/10.3390/en12030527 doi: 10.3390/en12030527
    [177] D. Zhao, S. Liu, D. Gu, X. Sun, L. Wang, Y. Wei, et al., Enhanced data-driven fault diagnosis for machines with small and unbalanced data based on variational auto-encoder, Meas. Sci. Technol., 31 (2019), 035004. https://doi.org/10.1088/1361-6501/ab55f8 doi: 10.1088/1361-6501/ab55f8
    [178] J. An, S. Cho, Variational autoencoder based anomaly detection using reconstruction probability, Spec. Lect. IE, 2 (2015), 1–18.
    [179] G. San Martin, E. López Droguett, V. Meruane, M. das Chagas Moura, Deep variational auto-encoders: A promising tool for dimensionality reduction and ball bearing elements fault diagnosis, Struct. Health Monit., 18 (2019), 1092–1128. https://doi.org/10.1177/1475921718788299 doi: 10.1177/1475921718788299
    [180] Y. Kawachi, Y. Koizumi, N. Harada, Complementary set variational autoencoder for supervised anomaly detection, in 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, (2018), 2366–2370. https://doi.org/10.1109/ICASSP.2018.8462181
    [181] D. Park, Y. Hoshi, C. C. Kemp, A multimodal anomaly detector for robot-assisted feeding using an LSTM-based variational autoencoder, IEEE Rob. Autom. Lett., 3 (2018), 1544–1551. https://doi.org/10.1109/LRA.2018.2801475 doi: 10.1109/LRA.2018.2801475
    [182] S. Lee, M. Kwak, K. L. Tsui, S. B. Kim, Process monitoring using variational autoencoder for high-dimensional nonlinear processes, Eng. Appl. Artif. Intell., 83 (2019), 13–27. https://doi.org/10.1016/j.engappai.2019.04.013 doi: 10.1016/j.engappai.2019.04.013
    [183] K. Wang, M. G. Forbes, B. Gopaluni, J. Chen, Z. Song, Systematic development of a new variational autoencoder model based on uncertain data for monitoring nonlinear processes, IEEE Access, 7 (2019), 22554–22565. https://doi.org/10.1109/ACCESS.2019.2894764 doi: 10.1109/ACCESS.2019.2894764
    [184] G. Ping, J. Chen, T. Pan, J. Pan, Degradation feature extraction using multi-source monitoring data via logarithmic normal distribution based variational auto-encoder, Comput. Ind., 109 (2019), 72–82. https://doi.org/10.1016/j.compind.2019.04.013 doi: 10.1016/j.compind.2019.04.013
    [185] J. Wu, Z. Zhao, C. Sun, R. Yan, X. Chen, Fault-attention generative probabilistic adversarial autoencoder for machine anomaly detection, IEEE Trans. Ind. Inf., 16 (2020), 7479–7488. https://doi.org/10.1109/TⅡ.2020.2976752 doi: 10.1109/TⅡ.2020.2976752
    [186] G. Ciaburro, An ensemble classifier approach for thyroid disease diagnosis using the AdaBoostM algorithm, in Machine Learning, Big Data, and IoT for Medical Informatics, Academic Press, (2021), 365–387. https://doi.org/10.1016/B978-0-12-821777-1.00002-1
    [187] Z. Gao, C. Cecati, S. X. Ding, A survey of fault diagnosis and fault-tolerant techniques—Part I: fault diagnosis with model-based and signal-based approaches, IEEE Trans. Ind. Electron., 62 (2015), 3757–3767. https://doi.org/10.1109/TIE.2015.2417501 doi: 10.1109/TIE.2015.2417501
    [188] M. Djeziri, O. Djedidi, S. Benmoussa, M. Bendahan, J. L. Seguin, Failure prognosis based on relevant measurements identification and data-driven trend-modeling: Application to a fuel cell system, Processes, 9 (2021), 328. https://doi.org/10.3390/pr9020328 doi: 10.3390/pr9020328
    [189] M. Aliramezani, C. R. Koch, M. Shahbakhti, Modeling, diagnostics, optimization, and control of internal combustion engines via modern machine learning techniques: A review and future directions, Prog. Energy Combust. Sci., 88 (2022), 100967. https://doi.org/10.1016/j.pecs.2021.100967 doi: 10.1016/j.pecs.2021.100967
    [190] D. Passos, P. Mishra, A tutorial on automatic hyperparameter tuning of deep spectral modelling for regression and classification tasks, Chemom. Intell. Lab. Syst., 233 (2022), 104520. https://doi.org/10.1016/j.chemolab.2022.104520 doi: 10.1016/j.chemolab.2022.104520
    [191] A. Zakaria, F. B. Ismail, M. H. Lipu, M. A. Hannan, Uncertainty models for stochastic optimization in renewable energy applications, Renewable Energy, 145 (2020), 1543–1571. https://doi.org/10.1016/j.renene.2019.07.081 doi: 10.1016/j.renene.2019.07.081
    [192] M. H. Lin, J. F. Tsai, C. S. Yu, A review of deterministic optimization methods in engineering and management, Math. Probl. Eng., 2012 (2012). https://doi.org/10.1155/2012/756023 doi: 10.1155/2012/756023
  • This article has been cited by:

    1. Yifan Wu, Xupeng Zhang, 2024, Validity Verification of Encrypted Transaction Amounts in Blockchain, 979-8-3315-3981-8, 396, 10.1109/IIoTBDSC64371.2024.00078
    2. Mochamad Daffa Fahrezy, Rudy Tjahyadi, Heny Kurniawati, 2025, Blockchain Adoption in Financial Audit: A Review, 979-8-3315-1332-0, 1, 10.1109/ICADEIS65852.2025.10933126
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(11719) PDF downloads(1342) Cited by(39)

Figures and Tables

Figures(7)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog