Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 32, Issue 5Oct. 2024Current Issue
Reflects downloads up to 25 Dec 2024Bibliometrics
research-article
Social-Aware Clustered Federated Learning With Customized Privacy Preservation

A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) ...

research-article
Network Learning in Quadratic Games From Best-Response Dynamics

We investigate the capacity of an adversary to learn the underlying interaction network through repeated best response actions in linear-quadratic games. The adversary strategically perturbs the decisions of a set of action-compromised players and ...

research-article
Nous: Drop-Freeness and Duplicate-Freeness for Consistent Updating in SDN Multicast Routing

Consistent routing updates through Software-Defined Networking (SDN) can be difficult due to the asynchronous and distributed nature of the data plane. Recent studies have achieved consistent unicast routing updates. However, achieving consistent updates ...

research-article
Scheduling of Real-Time Wireless Flows: A Comparative Study of Centralized and Decentralized Reinforcement Learning Approaches

This paper addresses the problem of scheduling real-time wireless flows with general traffic patterns in dynamic network conditions. The main goal is to maximize the fraction of packets to be delivered within their deadlines, which is referred to as ...

research-article
Optimizing Task Placement and Online Scheduling for Distributed GNN Training Acceleration in Heterogeneous Systems

Training Graph Neural Networks (GNNs) on large graphs is resource-intensive and time-consuming, mainly due to the large graph data that cannot be fit into the memory of a single machine, but have to be fetched from distributed graph storage and processed ...

research-article
Per-Packet Traffic Measurement in Storage, Computation and Bandwidth Limited Data Plane

Packet level measurement in the data plane provides a microscopic view of the network’s state. Although advances in programmable switches and routers make it possible to measure the Sequence of Packet Lengths and Arrival Times (SPLT) in the data ...

research-article
Context-Aware Cross-Layer Congestion Control for Large-Scale Live Streaming

Live video streaming has come to dominate today’s Internet traffic. Content Delivery Network (CDN) providers, responsible for hosting outsourced live streaming services, are now striving to ensure an enhanced quality of experience (QoE) to meet the ...

research-article
Robust Data Inference and Cost-Effective Cell Selection for Sparse Mobile Crowdsensing

Sparse Mobile CrowdSensing (MCS) aims to reduce sensing cost while ensuring high task quality by intelligently selecting small regions for sensing and accurately inferring the remaining areas. Data inference and cell selection are crucial components in ...

research-article
Bamboo Filters: Make Resizing Smooth and Adaptive

The approximate membership query (AMQ) data structure is a kind of space-efficient probabilistic data structure. It can approximately indicate whether an element exists in a set. The AMQ data structure has been widely used in network measurements, network ...

research-article
LoPhy: A Resilient and Fast Covert Channel Over LoRa PHY

Covert channel, which can break the logical protections of the computer system and leak confidential or sensitive information, has long been considered a security issue in the network research community. However, recent research has shown that cooperative ...

research-article
HS-DCell: A Highly Scalable DCell-Based Server-Centric Topology for Data Center Networks

Topology design is vital to the high performance data center networks. Due to the limited scalability, many traditional server-centric data center networks are confronting the updating and upgrading hurdles. To address the issue, this paper proposes a ...

research-article
Timely Communications for Remote Inference

In this paper, we analyze the impact of data freshness on remote inference systems, where a pre-trained neural network infers a time-varying target (e.g., the locations of vehicles and pedestrians) based on features (e.g., video frames) observed at a ...

research-article
Dynamic Discrete Topology Design and Routing for Satellite-Terrestrial Integrated Networks

Satellite-terrestrial integrated networks (STNs) are considered a promising architecture for 6G networks due to their ability to provide ubiquitous, high-capacity coverage on a global scale by combining satellite and terrestrial network infrastructures. ...

research-article
DeviceRadar: Online IoT Device Fingerprinting in ISPs Using Programmable Switches

Device fingerprinting can be used by Internet Service Providers (ISPs) to identify vulnerable IoT devices for early prevention of threats. However, due to the wide deployment of middleboxes in ISP networks, some important data, e.g., 5-tuples and flow ...

research-article
<italic>AddrMiner</italic>: A Fast, Efficient, and Comprehensive Global Active IPv6 Address Detection System

Fast Internet-wide scanning is essential for network situational awareness and asset evaluation. However, the vast IPv6 address space makes brute-force scanning infeasible. Despite advancements in state-of-the-art methods, they do not work in seedless ...

research-article
Native WiFi Backscatter

WiFi backscatter has attracted intensive attention because the large population of WiFi radios can provide plenty of excitation signals. However, WiFi backscatter communication has imposed unwanted constraints on either exciters or receivers since its ...

research-article
Enhancing Fairness for Approximate Weighted Fair Queueing With a Single Queue

Weighted fair queueing (WFQ) is an essential strategy for enforcing bandwidth guarantee and isolation in high-speed networks. Unfortunately, implementing the original WFQ packet scheduling algorithm on today&#x2019;s commodity switch hardware is ...

research-article
FlowSail: Fine-Grained and Practical Flow Control for Datacenter Networks

As datacenter networks continue to support a wider range of applications and faster link speeds, they face the challenge of managing bursty traffic and transient congestion. End-to-end congestion controls (CCs) find it increasingly difficult to maintain ...

research-article
Correlation-Aware Neural Networks for DDoS Attack Detection in IoT Systems

We present a comprehensive study on applying machine learning to detect distributed Denial of service (DDoS) attacks using large-scale Internet of Things (IoT) systems. While prior works and existing DDoS attacks have largely focused on individual nodes ...

research-article
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic

Anomaly-based network intrusion detection systems (NIDSs) are essential for ensuring cybersecurity. However, the security communities realize some limitations when they put most existing proposals into practice. The challenges are mainly concerned with (i)...

research-article
DeepScaling: Autoscaling Microservices With Stable CPU Utilization for Large Scale Production Cloud Systems

Cloud service providers often provision excessive resources to meet the desired Service Level Objectives (SLOs), by setting lower CPU utilization targets. This can result in a waste of resources and a noticeable increase in power consumption in large-...

research-article
Personalized Pricing Through Strategic User Profiling in Social Networks

Traditional user profiling techniques rely on browsing history or purchase records to identify users&#x2019; willingness to pay. This enables sellers to offer personalized prices to profiled users while charging only a uniform price to non-profiled users. ...

research-article
Toward a Service Availability-Guaranteed Cloud Through VM Placement

In a multi-tenant cloud, the cloud service provider (CSP) leases physical resources to tenants in the form of virtual machines (VMs) with an agreed service level agreement (SLA). As the most important indicator of SLA, we should guarantee the service ...

research-article
An Imperceptible Eavesdropping Attack on WiFi Sensing Systems

Recent years have witnessed enormous research efforts on WiFi sensing to enable intelligent services of Internet of Things. However, due to the omni-directional broadcasting manner of WiFi signals, the activity semantic underlying the signals can be ...

research-article
Fast Online Learning of Vulnerabilities for Networks With Propagating Failures

In real-world networks, we regularly face the effect of propagating failures over networks, for example, rumors spread over social networks, outages spread over power networks, viruses spread over communication and biological networks. Often, these ...

research-article
Fast Software IPv6 Lookup With Neurotrie

IPv6 has shown notable growth in recent years, imposing the need for high-speed IPv6 lookup. As the forwarding rate of virtual switches continues increasing, software-based IPv6 lookup without using special hardware such as TCAM, GPU, and FPGA is of ...

research-article
Revisiting RFID Missing Tag Identification: Theoretical Foundation and Algorithm Design

We revisit the problem of missing tag identification in RFID networks by making three contributions. Firstly, we quantitatively compare and gauge the existing propositions spanning over a decade on missing tag identification. We show that the expected ...

research-article
The Freshness Game: Timely Communications in the Presence of an Adversary

We consider a communication system where a base station (BS) transmits update packets to N users, one user at a time, over a wireless channel. We investigate the age of this status updating system with an adversary that jams the update packets in the ...

research-article
A Distributed Co-Evolutionary Optimization Method With Motif for Large-Scale IoT Robustness

Fast-advancing mobile communication technologies have increased the scale of the Internet of Things (IoT) dramatically. However, this poses a tough challenge to the robustness of IoT networks when the network scale is large. In this paper, we present DAC-...

research-article
A Family of General Architectures Toward Interconnection Networks and Data Center Networks

Networks of large scales are an essential component in supercomputing systems as well as in data centers. As the network scale increases, the probability of processor/server failures also inevitably increases. It is therefore a worthwhile undertaking to ...

Subjects

Comments