Fluid-Shuttle: Efficient Cloud Data Transmission Based on Serverless Computing Compression
- Rong Gu,
- Shulin Wang,
- Haipeng Dai,
- Xiaofei Chen,
- Zhaokang Wang,
- Wenjie Bao,
- Jiaqi Zheng,
- Yaofeng Tu,
- Yihua Huang,
- Lianyong Qi,
- Xiaolong Xu,
- Wanchun Dou,
- Guihai Chen
Nowadays, there exists a lot of cross-region data transmission demand on the cloud. It is promising to use serverless computing for data compressing to save the total data size. However, it is challenging to estimate the data transmission time and ...
FPCA: Parasitic Coding Authentication for UAVs by FM Signals
De-authentication attack is one of the major threats to Unmanned Aerial Vehicle (UAV) communication, in which the attacker continuously sends de-authentication frames to disconnect the UAV communication link. Existing defense methods are based on ...
Polygon: A QUIC-Based CDN Server Selection System Supporting Multiple Resource Demands
CDN is a crucial Internet infrastructure ensuring quick access to Internet content. With the expansion of CDN scenarios, beyond delay, resource types like bandwidth and CPU are also important for CDN performance. Our measurements highlight the distinct ...
VERCEL: Verification and Rectification of Configuration Errors With Least Squares
We present Vercel, a network verification and automatic fault rectification tool that is based on a computationally tractable, algorithmically expressive, and mathematically aesthetic domain of linear algebra. Vercel works on abstracting out packet ...
Detection of Overshadowing Attack in 4G and 5G Networks
Despite the promises of current and future cellular networks to increase security, privacy, and robustness, 5G networks are designed to streamline discovery and initiate connections with limited computation and communication costs, leading to the ...
Online Task Scheduling and Termination With Throughput Constraint
We consider the task scheduling scenario where the controller activates one from K task types at each time. Each task induces a random completion time, and a reward is obtained only after the task is completed. The statistics of the completion time and ...
AutoTomo: Learning-Based Traffic Estimator Incorporating Network Tomography
Estimating the Traffic Matrix (TM) is a critical yet resource-intensive process in network management. With the advent of deep learning models, we now have the potential to learn the inverse mapping from link loads to origin-destination (OD) flows more ...
Optimizing Age of Information With Correlated Sources
We develop a simple model for the timely monitoring of correlated sources over a wireless network. Using this model, we study how to optimize weighted-sum average Age of Information (AoI) in the presence of correlation. First, we discuss how to find ...
Enhancing Low Latency Adaptive Live Streaming Through Precise Bandwidth Prediction
- Bo Wang,
- Muhan Su,
- Wufan Wang,
- Kefan Chen,
- Bingyang Liu,
- Fengyuan Ren,
- Mingwei Xu,
- Jiangchuan Liu,
- Jianping Wu
To ensure high performance for HTTP adaptive streaming (HAS), it is critical to provide accurate prediction of end-to-end network bandwidth. Low Latency Live Streaming (LLLS), which has been gaining popularity, faces even greater challenges in this ...
Deep Distributional Reinforcement Learning-Based Adaptive Routing With Guaranteed Delay Bounds
Real-time applications that require timely data delivery over wireless multi-hop networks within specified deadlines are growing increasingly. Effective routing protocols that can guarantee real-time QoS are crucial, yet challenging, due to the ...
AoI, Timely-Throughput, and Beyond: A Theory of Second-Order Wireless Network Optimization
This paper introduces a new theoretical framework for optimizing second-order behaviors of wireless networks. Unlike existing techniques for network utility maximization, which only consider first-order statistics, this framework models every random ...
Power Is Knowledge: Distributed and Throughput Optimal Power Control in Wireless Networks
Consider N devices that transmit packets for T time slots, where device n uses transmission power <inline-formula> <tex-math notation="LaTeX">$P_{n}\left ({{t}}\right)$ </tex-math></inline-formula> at time slot t. Independently at each time slot, a packet ...
Blind Tag-Based Physical-Layer Authentication
In comparison with upper-layer authentication mechanisms, the tag-based Physical-Layer Authentication (PLA) attracts many research interests because of high security and low complexity. This paper mainly concerns two problems in prior tag-based PLA ...
Re-Architecting Buffer Management in Lossless Ethernet
Converged Ethernet employs Priority-based Flow Control (PFC) to provide a lossless network. However, issues caused by PFC, including victim flow, congestion spreading, and deadlock, impede its large-scale deployment in production systems. The fine-grained ...
A Privacy-Preserving Incentive Scheme for Data Sensing in App-Assisted Mobile Edge Crowdsensing
Application (App)-assisted mobile edge crowd- sensing is a promising paradigm, in which Apps are in charge of tagging the location of the sensing tasks as point-of-interest (PoI) to assist the platform in recruiting users to participate in the sensing ...
Topologies for Blockchain Payment Channel Networks: Models and Constructions
Payment channel networks (PCNs), also known as off-chain networks, implement a common approach to deal with the scalability problem of blockchain networks. They enable users to execute payments without committing them to the blockchain by relying on ...
Analysis of Fork-Join Scheduling on Heterogeneous Parallel Servers
This paper investigates the <inline-formula> <tex-math notation="LaTeX">$(k,k)$ </tex-math></inline-formula> fork-join scheduling scheme on a system of n parallel servers comprising both slow and fast servers. Tasks arriving in the system are divided into ...
Scalable Scheduling for Industrial Time-Sensitive Networking: A Hyper-Flow Graph-Based Scheme
Industrial Time-Sensitive Networking (TSN) provides deterministic mechanisms for real-time and reliable flow transmission. Increasing attention has been paid to efficient scheduling for time-sensitive flows with stringent requirements such as ultra-low ...
Warmonger Attack: A Novel Attack Vector in Serverless Computing
We debut the Warmonger attack, a novel attack vector that can cause denial-of-service between a serverless computing platform and an external content server. The Warmonger attack exploits the fact that a serverless computing platform shares the same set ...
OBMA: Scalable Route Lookups With Fast and Zero-Interrupt Updates
Software-based IP route lookup is a key component for packet forwarding in Software Defined Networks. Running lookup algorithms on commodity CPUs is flexible and scalable, which shows advantages on cost and power consumption over the hardware-based ...
Game-Theoretic Bandits for Network Optimization With High-Probability Swap-Regret Upper Bounds
In this paper, we study a multi-agent bandit problem in an unknown general-sum game repeated for a number of rounds (i.e., learning in a black-box game with bandit feedback), where a set of agents have no information about the underlying game structure ...
EPIC: Traffic Engineering-Centric Path Programmability Recovery Under Controller Failures in SD-WANs
Software-Defined Wide Area Networks (SD-WANs) offer a promising opportunity to enhance the performance of Traffic Engineering (TE). With the help of Software-Defined Networking (SDN), TE can promptly respond to traffic changes and maintain network ...
Time-Efficient Blockchain-Based Federated Learning
Federated Learning (FL) is a distributed machine learning method that ensures the privacy and security of participants’ data by avoiding direct data upload to a central node for training. However, the traditional FL typically applies a star ...
Cross-Technology Federated Matching for Age of Information Minimization in Heterogeneous IoT
Heterogeneous Internet of Things (IoT) networks, which operate using various protocols and spectrum bands like WiFi, Bluetooth, Zigbee, and LoRa, bring many opportunities to collaborate and achieve timely data collection. However, several challenges must ...
Straggler-Aware Gradient Aggregation for Large-Scale Distributed Deep Learning System
Deep Neural Network (DNN) is a critical component of a wide range of applications. However, with the rapid growth of the training dataset and model size, communication becomes the bottleneck, resulting in low utilization of computing resources. To ...
De-RPOTA: Decentralized Learning With Resource Adaptation and Privacy Preservation Through Over-the-Air Computation
In this paper, we propose De-RPOTA, a novel algorithm designed for decentralized learning, equipped with mechanisms for resource adaptation and privacy protection through over-the-air computation. We theoretically analyze the combined effects of limited ...
Precise Wireless Charging in Complicated Environments
Wireless Rechargeable Sensor Networks (WRSNs) have become an important research issue as they can overcome the energy bottleneck problem of wireless sensor networks. However, inaccurate discretization methods and imprecise charging models yield a huge gap ...
Minimizing Buffer Utilization for Lossless Inter-DC Links
- Chengyuan Huang,
- Feiyang Xue,
- Peiwen Yu,
- Xiaoliang Wang,
- Yanqing Chen,
- Tao Wu,
- Lei Han,
- Zifa Han,
- Bingquan Wang,
- Xiangyu Gong,
- Chen Tian,
- Wanchun Dou,
- Guihai Chen,
- Hao Yin
RDMA over Converged Ethernet (RoCEv2) has been widely deployed to data centers (DCs) for its better compatibility with Ethernet/IP than Infiniband (IB). As cross-DC applications emerge, they also demand high throughput, low latency, and lossless network ...
Revisiting Wireless Breath and Crowd Inference Attacks With Defensive Deception
Breathing rates and crowd counting can be used to verify the human presence, especially the former one can disclose a person’s physiological status. Many studies have demonstrated success in applying channel state information (CSI) to estimate the ...
Risk-Averse Learning for Reliable mmWave Self-Backhauling
Wireless backhauling at millimeter-wave frequencies (mmWave) in static scenarios is a well-established practice in cellular networks. However, highly directional and adaptive beamforming in today’s mmWave systems have opened new possibilities for ...