Deployment Cost-Aware UAV and BS Collaboration in Cell-Free Integrated Aerial-Terrestrial Networks
To enable massive connectivity and connecting the unconnected, aerial communications are becoming critical to complement with the terrestrial infrastructure. Integrated aerial-terrestrial network (IATN) offers both line-of-sight (LoS) and non-LoS (NLoS) ...
Locally Private Set-Valued Data Analyses: Distribution and Heavy Hitters Estimation
- Shaowei Wang,
- Yuntong Li,
- Yusen Zhong,
- Kongyang Chen,
- Xianmin Wang,
- Zhili Zhou,
- Fei Peng,
- Yuqiu Qian,
- Jiachun Du,
- Wei Yang
In many mobile applications, user-generated data are presented as set-valued data. To tackle potential privacy threats in analyzing these valuable data, local differential privacy has been attracting substantial attention. However, existing approaches ...
Group Task Recommendation in Mobile Crowdsensing: An Attention-Based Neural Collaborative Approach
Collaborative tasks often require the cooperation of multiple individuals to be completed in mobile crowdsensing (MCS). However, previous task recommendations predominantly focused on individuals rather than groups, making them less effective for ...
Self-Supervised MAFENN for Classifying Low-Labeled Distorted Images Over Mobile Fading Channels
- Yang Li,
- Fanglei Sun,
- Jingchen Hu,
- Chang Liu,
- Fan Wu,
- Kai Li,
- Ying Wen,
- Zheng Tian,
- Yaodong Yang,
- Jiangcheng Zhu,
- Zhifeng Chen,
- Jun Wang,
- Yang Yang
Image distortion during wireless transmission presents a significant challenge for real-world artificial intelligence (AI) applications. Recent methods have attempted to address this issue by integrating neural networks into the wireless transmission ...
Blockchain-Secured Task Offloading and Resource Allocation for Cloud-Edge-End Cooperative Networks
Enhanced by blockchain and cloud-edge-end cooperation, an edge computing network is capable to provide IoT (Internet of Things) devices higher task processing performance and better security and privacy guarantee. However, the joint resource management ...
Taming Serverless Cold Start of Cloud Model Inference With Edge Computing
Serverless computing is envisioned as the de-facto standard for next-generation cloud computing. However, the cold start dilemma has impeded its adoption by delay-sensitive and burst applications. In this paper, we propose to tame serverless cold start in ...
Energy Efficient Task Offloading and Resource Allocation in Air-Ground Integrated MEC Systems: A Distributed Online Approach
In many remote areas lacking ground communication infrastructure support, such as wilderness, desert, ocean, etc., an integrated edge computing network in the air with edge computing nodes is an effective solution. It can provide over-the-air computing ...
Cooperative Deep Reinforcement Learning Enabled Power Allocation for Packet Duplication URLLC in Multi-Connectivity Vehicular Networks
Ultra reliable low latency communication (URLLC) in vehicular networks is crucial for safety-related vehicular applications. Mini-slot with a short packet that carries only a few symbols is used to reduce the transmission time interval and enable quick ...
Adaptive Swarm Intelligent Offloading Based on Digital Twin-assisted Prediction in VEC
Vehicular Edge Computing (VEC) is the transportation version of Mobile Edge Computing (MEC). In VEC, task offloading enables vehicles to offload computing tasks to nearby Roadside Units (RSUs), thereby reducing the computation cost. Recent trends in task ...
Time-Constrained Actor-Critic Reinforcement Learning for Concurrent Order Dispatch in On-Demand Delivery
On-demand delivery has experienced rapid growth in recent years, revolutionizing people's lifestyles with its timeliness and convenience. The order dispatch process in on-demand delivery is <italic>concurrent</italic>, wherein couriers continuously ...
Accuracy-Aware Cooperative Sensing and Computing for Connected Autonomous Vehicles
To maintain high perception performance among connected and autonomous vehicles (CAVs), in this paper, we propose an accuracy-aware and resource-efficient raw-level cooperative sensing and computing scheme among CAVs and road-side infrastructure. The ...
AdaPyramid: Adaptive Pyramid for Accelerating High-Resolution Object Detection on Edge Devices
Deep convolutional neural network (NN)-based object detectors are not appropriate for straightforward inference on high-resolution videos at edge devices, as maintaining high accuracy often brings about prohibitively long latency. Although existing ...
Time-Slotted Task Offloading and Resource Allocation for Cloud-Edge-End Cooperative Computing Networks
In time-slotted edge computing systems, task scheduling is conducted at the end of each time slot to make task offloading decisions and resource allocation for all the tasks pending for scheduling during the time slot. However, the existing works omitted ...
Federated Learning With Sparsified Model Perturbation: Improving Accuracy Under Client-Level Differential Privacy
Federated learning (FL) that enables edge devices to collaboratively learn a shared model while keeping their training data locally has received great attention recently and can protect privacy in comparison with the traditional centralized learning ...
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability
As location data have been increasingly adopted in location-based advertising (LBA), revealing locations to untrusted service providers has raised severe privacy concerns. Recent studies propose obfuscation mechanisms built upon geo-indistinguishability (...
DOFMS: DRL-Based Out-of-Order Friendly Multipath Scheduling in Mobile Heterogeneous Networks
Multipath transmission brings strong bandwidth aggregation capability for services in wireless networks. Nonetheless, the heterogeneous nature of paths and the motion of terminals results in varying transmission delays, leading to out-of-order (OFO) ...
Enabling Cross-Technology Coexistence for ZigBee Devices Through Payload Encoding
With the rapid growth of Internet of Things, the number of heterogeneous wireless devices working in the same frequency band increases dramatically, leading to severe cross-technology interference. To enable coexistence, researchers have proposed a large ...
ShuttleBus: Dense Packet Assembling With QUIC Stream Multiplexing for Massive IoT
In this paper, we investigate dense short packet forwarding for clustering-based massive Internet-of-Things (mIoT). The objective is to support the data forwarding with minimal communication overhead while satisfying the differentiated latency constraints ...
L3Geocast: Enabling P4-Based Customizable Network-Layer Geocast at the Network Edge
Geocast is a one-to-many communication paradigm that enables the transmission of data packets to a designated area rather than an IP address. The most common geocast solutions rely on the application-layer Geolocation-to-IP database. But these IP-based ...
EgoMUIL: Enhancing Spatio-Temporal User Identity Linkage in Location-Based Social Networks With Ego-Mo Hypergraph
Users tend to own multiple accounts on different location-based social network (LBSN) platforms, and they typically engage with diverse social circles on each platform within the same locations. Consequently, linking these accounts across separate ...
Caching User-Generated Content in Distributed Autonomous Networks via Contextual Bandit
The escalating proliferation of user generated contents such as videos and images are dominating the network traffic. The optimal strategy for mitigating backbone congestion and minimizing user request latency lies in prudent caching at edge stations ...
The Power of Precision: High-Resolution Backscatter Frequency Drift in RFID Identification
Physical-layer identification uses manufacturing variations to create unique identifiers for each device. A decade ago, this concept was applied to RFID tags using backscatter frequency drift (BFD), a specific kind of ‘fingerprint’ ...
Extending Beacon Lifetime by Predicting User Occupancy Using Deep Neural Networks
Bluetooth Low Energy (BLE) beacon network is one of the essential infrastructures for many IoT and smart city applications. However, the BLE beacon network usually suffers from poor reliability and high maintenance costs due to the short-lived battery ...
Supporting Flexible and Transparent User Interface Distribution Across Mobile Devices
The growing trend of multi-device ownerships creates opportunities to use applications across devices. However, the current methods of app development/usage remain in the single-device paradigm, which is far below user expectations. For example, it is ...
To Save Mobile Crowdsourcing From Cheap-Talk: A Game Theoretic Learning Approach
Today mobile crowdsourcing platforms invite users to provide anonymous reviews about service experiences, yet many reviews are found biased to be extremely positive or negative. The existing methods find it difficult to learn from biased reviews to infer ...
Lightweight Searchable and Equality-Testable Certificateless Authenticated Encryption for Encrypted Cloud Data
Public key encryption with equality test (PKE-ET) is a novel cryptosystem to deal with the problem of multi-public-key encrypted data computing. It can be used to verify if different ciphertexts are encryptions of same plaintext under different public ...
Robust WiFi Respiration Sensing in the Presence of Interfering Individual
WiFi-based respiration sensing technology has gained increasing attention due to its contactless sensing capabilities and utilization of existing WiFi devices. However, existing studies are limited to certain scenarios without addressing the motion ...
CDFi: Cross-Domain Action Recognition Using WiFi Signals
Contactless WiFi based human action recognition exhibits remarkable prospects in the fields such as human-computer interaction and smart home. However, domain dependency restricts its generalization into the real-world deployment. Since it is expensive to ...
Semantics-Enhanced Temporal Graph Networks for Content Popularity Prediction
The surging demand for high-definition video streaming services and large neural network models implies a tremendous explosion of Internet traffic. To mitigate the traffic pressure, architectures with in-network storage have been proposed to cache popular ...
EarSSR: Silent Speech Recognition via Earphones
As the most natural and convenient way to communicate with people, speech is always preferred in Human-Computer Interactions. However, voice-based interaction still has several limitations. It raises privacy concerns in some circumstances and the accuracy ...