Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 29 Jan 2025Bibliometrics
research-article
Fluid-Shuttle: Efficient Cloud Data Transmission Based on Serverless Computing Compression

Nowadays, there exists a lot of cross-region data transmission demand on the cloud. It is promising to use serverless computing for data compressing to save the total data size. However, it is challenging to estimate the data transmission time and ...

research-article
FPCA: Parasitic Coding Authentication for UAVs by FM Signals

De-authentication attack is one of the major threats to Unmanned Aerial Vehicle (UAV) communication, in which the attacker continuously sends de-authentication frames to disconnect the UAV communication link. Existing defense methods are based on ...

research-article
Polygon: A QUIC-Based CDN Server Selection System Supporting Multiple Resource Demands

CDN is a crucial Internet infrastructure ensuring quick access to Internet content. With the expansion of CDN scenarios, beyond delay, resource types like bandwidth and CPU are also important for CDN performance. Our measurements highlight the distinct ...

research-article
VERCEL: Verification and Rectification of Configuration Errors With Least Squares

We present Vercel, a network verification and automatic fault rectification tool that is based on a computationally tractable, algorithmically expressive, and mathematically aesthetic domain of linear algebra. Vercel works on abstracting out packet ...

research-article
Detection of Overshadowing Attack in 4G and 5G Networks

Despite the promises of current and future cellular networks to increase security, privacy, and robustness, 5G networks are designed to streamline discovery and initiate connections with limited computation and communication costs, leading to the ...

research-article
Online Task Scheduling and Termination With Throughput Constraint

We consider the task scheduling scenario where the controller activates one from K task types at each time. Each task induces a random completion time, and a reward is obtained only after the task is completed. The statistics of the completion time and ...

research-article
AutoTomo: Learning-Based Traffic Estimator Incorporating Network Tomography

Estimating the Traffic Matrix (TM) is a critical yet resource-intensive process in network management. With the advent of deep learning models, we now have the potential to learn the inverse mapping from link loads to origin-destination (OD) flows more ...

research-article
Optimizing Age of Information With Correlated Sources

We develop a simple model for the timely monitoring of correlated sources over a wireless network. Using this model, we study how to optimize weighted-sum average Age of Information (AoI) in the presence of correlation. First, we discuss how to find ...

research-article
Enhancing Low Latency Adaptive Live Streaming Through Precise Bandwidth Prediction

To ensure high performance for HTTP adaptive streaming (HAS), it is critical to provide accurate prediction of end-to-end network bandwidth. Low Latency Live Streaming (LLLS), which has been gaining popularity, faces even greater challenges in this ...

research-article
Deep Distributional Reinforcement Learning-Based Adaptive Routing With Guaranteed Delay Bounds

Real-time applications that require timely data delivery over wireless multi-hop networks within specified deadlines are growing increasingly. Effective routing protocols that can guarantee real-time QoS are crucial, yet challenging, due to the ...

research-article
AoI, Timely-Throughput, and Beyond: A Theory of Second-Order Wireless Network Optimization

This paper introduces a new theoretical framework for optimizing second-order behaviors of wireless networks. Unlike existing techniques for network utility maximization, which only consider first-order statistics, this framework models every random ...

research-article
Power Is Knowledge: Distributed and Throughput Optimal Power Control in Wireless Networks

Consider N devices that transmit packets for T time slots, where device n uses transmission power <inline-formula> <tex-math notation="LaTeX">$P_{n}\left ({{t}}\right)$ </tex-math></inline-formula> at time slot t. Independently at each time slot, a packet ...

research-article
Blind Tag-Based Physical-Layer Authentication

In comparison with upper-layer authentication mechanisms, the tag-based Physical-Layer Authentication (PLA) attracts many research interests because of high security and low complexity. This paper mainly concerns two problems in prior tag-based PLA ...

research-article
Re-Architecting Buffer Management in Lossless Ethernet

Converged Ethernet employs Priority-based Flow Control (PFC) to provide a lossless network. However, issues caused by PFC, including victim flow, congestion spreading, and deadlock, impede its large-scale deployment in production systems. The fine-grained ...

research-article
A Privacy-Preserving Incentive Scheme for Data Sensing in App-Assisted Mobile Edge Crowdsensing

Application (App)-assisted mobile edge crowd- sensing is a promising paradigm, in which Apps are in charge of tagging the location of the sensing tasks as point-of-interest (PoI) to assist the platform in recruiting users to participate in the sensing ...

research-article
Topologies for Blockchain Payment Channel Networks: Models and Constructions

Payment channel networks (PCNs), also known as off-chain networks, implement a common approach to deal with the scalability problem of blockchain networks. They enable users to execute payments without committing them to the blockchain by relying on ...

research-article
Analysis of Fork-Join Scheduling on Heterogeneous Parallel Servers

This paper investigates the <inline-formula> <tex-math notation="LaTeX">$(k,k)$ </tex-math></inline-formula> fork-join scheduling scheme on a system of n parallel servers comprising both slow and fast servers. Tasks arriving in the system are divided into ...

research-article
Scalable Scheduling for Industrial Time-Sensitive Networking: A Hyper-Flow Graph-Based Scheme

Industrial Time-Sensitive Networking (TSN) provides deterministic mechanisms for real-time and reliable flow transmission. Increasing attention has been paid to efficient scheduling for time-sensitive flows with stringent requirements such as ultra-low ...

research-article
Warmonger Attack: A Novel Attack Vector in Serverless Computing

We debut the Warmonger attack, a novel attack vector that can cause denial-of-service between a serverless computing platform and an external content server. The Warmonger attack exploits the fact that a serverless computing platform shares the same set ...

research-article
OBMA: Scalable Route Lookups With Fast and Zero-Interrupt Updates

Software-based IP route lookup is a key component for packet forwarding in Software Defined Networks. Running lookup algorithms on commodity CPUs is flexible and scalable, which shows advantages on cost and power consumption over the hardware-based ...

research-article
Game-Theoretic Bandits for Network Optimization With High-Probability Swap-Regret Upper Bounds

In this paper, we study a multi-agent bandit problem in an unknown general-sum game repeated for a number of rounds (i.e., learning in a black-box game with bandit feedback), where a set of agents have no information about the underlying game structure ...

research-article
EPIC: Traffic Engineering-Centric Path Programmability Recovery Under Controller Failures in SD-WANs

Software-Defined Wide Area Networks (SD-WANs) offer a promising opportunity to enhance the performance of Traffic Engineering (TE). With the help of Software-Defined Networking (SDN), TE can promptly respond to traffic changes and maintain network ...

research-article
Time-Efficient Blockchain-Based Federated Learning

Federated Learning (FL) is a distributed machine learning method that ensures the privacy and security of participants&#x2019; data by avoiding direct data upload to a central node for training. However, the traditional FL typically applies a star ...

research-article
Cross-Technology Federated Matching for Age of Information Minimization in Heterogeneous IoT

Heterogeneous Internet of Things (IoT) networks, which operate using various protocols and spectrum bands like WiFi, Bluetooth, Zigbee, and LoRa, bring many opportunities to collaborate and achieve timely data collection. However, several challenges must ...

research-article
Straggler-Aware Gradient Aggregation for Large-Scale Distributed Deep Learning System

Deep Neural Network (DNN) is a critical component of a wide range of applications. However, with the rapid growth of the training dataset and model size, communication becomes the bottleneck, resulting in low utilization of computing resources. To ...

research-article
De-RPOTA: Decentralized Learning With Resource Adaptation and Privacy Preservation Through Over-the-Air Computation

In this paper, we propose De-RPOTA, a novel algorithm designed for decentralized learning, equipped with mechanisms for resource adaptation and privacy protection through over-the-air computation. We theoretically analyze the combined effects of limited ...

research-article
Precise Wireless Charging in Complicated Environments

Wireless Rechargeable Sensor Networks (WRSNs) have become an important research issue as they can overcome the energy bottleneck problem of wireless sensor networks. However, inaccurate discretization methods and imprecise charging models yield a huge gap ...

research-article
Minimizing Buffer Utilization for Lossless Inter-DC Links

RDMA over Converged Ethernet (RoCEv2) has been widely deployed to data centers (DCs) for its better compatibility with Ethernet/IP than Infiniband (IB). As cross-DC applications emerge, they also demand high throughput, low latency, and lossless network ...

research-article
Revisiting Wireless Breath and Crowd Inference Attacks With Defensive Deception

Breathing rates and crowd counting can be used to verify the human presence, especially the former one can disclose a person&#x2019;s physiological status. Many studies have demonstrated success in applying channel state information (CSI) to estimate the ...

research-article
Risk-Averse Learning for Reliable mmWave Self-Backhauling

Wireless backhauling at millimeter-wave frequencies (mmWave) in static scenarios is a well-established practice in cellular networks. However, highly directional and adaptive beamforming in today&#x2019;s mmWave systems have opened new possibilities for ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.