Social-Aware Clustered Federated Learning With Customized Privacy Preservation
A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) ...
Network Learning in Quadratic Games From Best-Response Dynamics
We investigate the capacity of an adversary to learn the underlying interaction network through repeated best response actions in linear-quadratic games. The adversary strategically perturbs the decisions of a set of action-compromised players and ...
Nous: Drop-Freeness and Duplicate-Freeness for Consistent Updating in SDN Multicast Routing
Consistent routing updates through Software-Defined Networking (SDN) can be difficult due to the asynchronous and distributed nature of the data plane. Recent studies have achieved consistent unicast routing updates. However, achieving consistent updates ...
Scheduling of Real-Time Wireless Flows: A Comparative Study of Centralized and Decentralized Reinforcement Learning Approaches
This paper addresses the problem of scheduling real-time wireless flows with general traffic patterns in dynamic network conditions. The main goal is to maximize the fraction of packets to be delivered within their deadlines, which is referred to as ...
Optimizing Task Placement and Online Scheduling for Distributed GNN Training Acceleration in Heterogeneous Systems
Training Graph Neural Networks (GNNs) on large graphs is resource-intensive and time-consuming, mainly due to the large graph data that cannot be fit into the memory of a single machine, but have to be fetched from distributed graph storage and processed ...
Per-Packet Traffic Measurement in Storage, Computation and Bandwidth Limited Data Plane
Packet level measurement in the data plane provides a microscopic view of the network’s state. Although advances in programmable switches and routers make it possible to measure the Sequence of Packet Lengths and Arrival Times (SPLT) in the data ...
Context-Aware Cross-Layer Congestion Control for Large-Scale Live Streaming
- Danfu Yuan,
- Weizhan Zhang,
- Yubing Qiu,
- Haiyu Huang,
- Mingliang Yang,
- Peng Chen,
- Kai Xiao,
- Hongfei Yan,
- Yaming He,
- Yiping Zhang
Live video streaming has come to dominate today’s Internet traffic. Content Delivery Network (CDN) providers, responsible for hosting outsourced live streaming services, are now striving to ensure an enhanced quality of experience (QoE) to meet the ...
Robust Data Inference and Cost-Effective Cell Selection for Sparse Mobile Crowdsensing
Sparse Mobile CrowdSensing (MCS) aims to reduce sensing cost while ensuring high task quality by intelligently selecting small regions for sensing and accurately inferring the remaining areas. Data inference and cell selection are crucial components in ...
Bamboo Filters: Make Resizing Smooth and Adaptive
- Hancheng Wang,
- Haipeng Dai,
- Shusen Chen,
- Meng Li,
- Rong Gu,
- Huayi Chai,
- Jiaqi Zheng,
- Zhiyuan Chen,
- Shuaituan Li,
- Xianjun Deng,
- Guihai Chen
The approximate membership query (AMQ) data structure is a kind of space-efficient probabilistic data structure. It can approximately indicate whether an element exists in a set. The AMQ data structure has been widely used in network measurements, network ...
LoPhy: A Resilient and Fast Covert Channel Over LoRa PHY
Covert channel, which can break the logical protections of the computer system and leak confidential or sensitive information, has long been considered a security issue in the network research community. However, recent research has shown that cooperative ...
HS-DCell: A Highly Scalable DCell-Based Server-Centric Topology for Data Center Networks
Topology design is vital to the high performance data center networks. Due to the limited scalability, many traditional server-centric data center networks are confronting the updating and upgrading hurdles. To address the issue, this paper proposes a ...
Timely Communications for Remote Inference
In this paper, we analyze the impact of data freshness on remote inference systems, where a pre-trained neural network infers a time-varying target (e.g., the locations of vehicles and pedestrians) based on features (e.g., video frames) observed at a ...
Dynamic Discrete Topology Design and Routing for Satellite-Terrestrial Integrated Networks
Satellite-terrestrial integrated networks (STNs) are considered a promising architecture for 6G networks due to their ability to provide ubiquitous, high-capacity coverage on a global scale by combining satellite and terrestrial network infrastructures. ...
DeviceRadar: Online IoT Device Fingerprinting in ISPs Using Programmable Switches
Device fingerprinting can be used by Internet Service Providers (ISPs) to identify vulnerable IoT devices for early prevention of threats. However, due to the wide deployment of middleboxes in ISP networks, some important data, e.g., 5-tuples and flow ...
<italic>AddrMiner</italic>: A Fast, Efficient, and Comprehensive Global Active IPv6 Address Detection System
- Guanglei Song,
- Lin He,
- Feiyu Zhu,
- Jinlei Lin,
- Wenjian Zhang,
- Linna Fan,
- Chenglong Li,
- Zhiliang Wang,
- Jiahai Yang
Fast Internet-wide scanning is essential for network situational awareness and asset evaluation. However, the vast IPv6 address space makes brute-force scanning infeasible. Despite advancements in state-of-the-art methods, they do not work in seedless ...
Native WiFi Backscatter
WiFi backscatter has attracted intensive attention because the large population of WiFi radios can provide plenty of excitation signals. However, WiFi backscatter communication has imposed unwanted constraints on either exciters or receivers since its ...
Enhancing Fairness for Approximate Weighted Fair Queueing With a Single Queue
Weighted fair queueing (WFQ) is an essential strategy for enforcing bandwidth guarantee and isolation in high-speed networks. Unfortunately, implementing the original WFQ packet scheduling algorithm on today’s commodity switch hardware is ...
FlowSail: Fine-Grained and Practical Flow Control for Datacenter Networks
As datacenter networks continue to support a wider range of applications and faster link speeds, they face the challenge of managing bursty traffic and transient congestion. End-to-end congestion controls (CCs) find it increasingly difficult to maintain ...
Correlation-Aware Neural Networks for DDoS Attack Detection in IoT Systems
We present a comprehensive study on applying machine learning to detect distributed Denial of service (DDoS) attacks using large-scale Internet of Things (IoT) systems. While prior works and existing DDoS attacks have largely focused on individual nodes ...
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic
- Ziming Zhao,
- Zhaoxuan Li,
- Xiaofei Xie,
- Jiongchi Yu,
- Fan Zhang,
- Rui Zhang,
- Binbin Chen,
- Xiangyang Luo,
- Ming Hu,
- Wenrui Ma
Anomaly-based network intrusion detection systems (NIDSs) are essential for ensuring cybersecurity. However, the security communities realize some limitations when they put most existing proposals into practice. The challenges are mainly concerned with (i)...
DeepScaling: Autoscaling Microservices With Stable CPU Utilization for Large Scale Production Cloud Systems
Cloud service providers often provision excessive resources to meet the desired Service Level Objectives (SLOs), by setting lower CPU utilization targets. This can result in a waste of resources and a noticeable increase in power consumption in large-...
Personalized Pricing Through Strategic User Profiling in Social Networks
Traditional user profiling techniques rely on browsing history or purchase records to identify users’ willingness to pay. This enables sellers to offer personalized prices to profiled users while charging only a uniform price to non-profiled users. ...
Toward a Service Availability-Guaranteed Cloud Through VM Placement
In a multi-tenant cloud, the cloud service provider (CSP) leases physical resources to tenants in the form of virtual machines (VMs) with an agreed service level agreement (SLA). As the most important indicator of SLA, we should guarantee the service ...
An Imperceptible Eavesdropping Attack on WiFi Sensing Systems
Recent years have witnessed enormous research efforts on WiFi sensing to enable intelligent services of Internet of Things. However, due to the omni-directional broadcasting manner of WiFi signals, the activity semantic underlying the signals can be ...
Fast Online Learning of Vulnerabilities for Networks With Propagating Failures
In real-world networks, we regularly face the effect of propagating failures over networks, for example, rumors spread over social networks, outages spread over power networks, viruses spread over communication and biological networks. Often, these ...
Fast Software IPv6 Lookup With Neurotrie
IPv6 has shown notable growth in recent years, imposing the need for high-speed IPv6 lookup. As the forwarding rate of virtual switches continues increasing, software-based IPv6 lookup without using special hardware such as TCAM, GPU, and FPGA is of ...
Revisiting RFID Missing Tag Identification: Theoretical Foundation and Algorithm Design
We revisit the problem of missing tag identification in RFID networks by making three contributions. Firstly, we quantitatively compare and gauge the existing propositions spanning over a decade on missing tag identification. We show that the expected ...
The Freshness Game: Timely Communications in the Presence of an Adversary
We consider a communication system where a base station (BS) transmits update packets to N users, one user at a time, over a wireless channel. We investigate the age of this status updating system with an adversary that jams the update packets in the ...
A Distributed Co-Evolutionary Optimization Method With Motif for Large-Scale IoT Robustness
Fast-advancing mobile communication technologies have increased the scale of the Internet of Things (IoT) dramatically. However, this poses a tough challenge to the robustness of IoT networks when the network scale is large. In this paper, we present DAC-...
A Family of General Architectures Toward Interconnection Networks and Data Center Networks
Networks of large scales are an essential component in supercomputing systems as well as in data centers. As the network scale increases, the probability of processor/server failures also inevitably increases. It is therefore a worthwhile undertaking to ...