Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperDecember 2024
Exploring Visual Explanations for Defending Federated Learning against Poisoning Attacks
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 1596–1598https://doi.org/10.1145/3636534.3697430This paper proposes a new visual explanation-based defense mechanism, namely, FedCAMAE, against model poisoning attacks on federated learning (FL), which integrates Layer Class Activation Mapping (LayerCAM) and autoencoder to offer a scientifically more ...
- research-articleSeptember 2024
Potential Game Based Distributed IoV Service Offloading With Graph Attention Networks in Mobile Edge Computing
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 9Pages 10912–10925https://doi.org/10.1109/TITS.2024.3369190Vehicular services aim to provide smart and timely services (e.g., collision warning) by taking the advantage of recent advances in artificial intelligence and employing task offloading techniques in mobile edge computing. In practice, the volume of ...
- research-articleApril 2024
Serverless Runtime / Database Co-Design With Asynchronous I/O
EdgeSys '24: Proceedings of the 7th International Workshop on Edge Systems, Analytics and NetworkingPages 49–54https://doi.org/10.1145/3642968.3654821Minimizing database access latency is crucial in serverless edge computing for many applications, but databases are predominantly deployed in cloud environments, resulting in costly network round-trips. Embedding an in-process database library such as ...
- research-articleNovember 2023
Where on Earth is the Spatial Name System?
HotNets '23: Proceedings of the 22nd ACM Workshop on Hot Topics in NetworksPages 79–86https://doi.org/10.1145/3626111.3628210The existing Internet architecture lacks support for naming locations and resolving them to the myriad addressing mechanisms we use beyond IP. We propose the Spatial Name System (SNS) that allows for the assignment of hierarchical location-based names ...
- research-articleMarch 2024
FedCOM: Efficient Personalized Federated Learning by Finding Your Best Peers
FedEdge '23: Proceedings of the 2nd ACM Workshop on Data Privacy and Federated Learning Technologies for Mobile Edge NetworkPages 107–112https://doi.org/10.1145/3615593.3615720Personalized federated learning aims to address two key challenges in federated systems: performance degradation of the global model, and the lack of specificity to individual clients. Both of them are caused by client heterogeneity. Previous solutions ...
-
- short-paperOctober 2023
Building an Intelligent Edge Environment to Provide Essential Services for Smart Cities
MobiArch '23: Proceedings of the 18th Workshop on Mobility in the Evolving Internet ArchitecturePages 13–18https://doi.org/10.1145/3615587.3615987Smart Cities will cause major societal change because they will provide a comprehensive set of key services including seamless communication, intelligent transport systems, advanced healthcare platforms, urban and infrastructure management, and digital ...
- research-articleSeptember 2023
Towards Smart Education through Internet of Things: A Survey
ACM Computing Surveys (CSUR), Volume 56, Issue 2Article No.: 26, Pages 1–33https://doi.org/10.1145/3610401IoT is a fundamental enabling technology for creating smart spaces, which can assist the effective face-to-face and online education systems. The transition to smart education (integrating IoT and AI into the education system) is appealing, which has a ...
- research-articleJuly 2023
Perspectives on Negative Research Results in Pervasive Computing
- Ella Peltonen,
- Nitinder Mohan,
- Peter Zdankin,
- Tanya Shreedhar,
- Tri Nguyen,
- Suzan Bayhan,
- Jon Crowcroft,
- Jussi Kangasharju,
- Daniela Nicklas
IEEE Pervasive Computing (IEEECS_PERVASIVE), Volume 22, Issue 3Pages 63–72https://doi.org/10.1109/MPRV.2023.3273718Not all research leads to fruitful results; trying new ways or methods may surpass state of the art, but sometimes the hypothesis is not proven, the improvement is insignificant, or the system fails because of a design error done years ago in previous ...
- proceedingDecember 2022
CoNEXT-SW '22: Proceedings of the 3rd International CoNEXT Student Workshop
Following the success of previous years, the main CoNEXT conference will be accompanied by this one-day Student Workshop providing a platform for graduate students in the area of computer networks and communications to learn from senior researchers in ...
- proceedingDecember 2022
DistributedML '22: Proceedings of the 3rd International Workshop on Distributed Machine Learning
Distributed ML is a rapidly evolving, interdisciplinary field bringing together techniques from distributed systems, networks and machine learning. The advent of deep learning and the pursuit of artificial intelligence has created previously unfathomable ...
- research-articleNovember 2022
Federated split GANs
- Pranvera Kortoçi,
- Yilei Liang,
- Pengyuan Zhou,
- Lik-Hang Lee,
- Abbas Mehrabi,
- Pan Hui,
- Sasu Tarkoma,
- Jon Crowcroft
FedEdge '22: Proceedings of the 1st ACM Workshop on Data Privacy and Federated Learning Technologies for Mobile Edge NetworkPages 25–30https://doi.org/10.1145/3556557.3557953Mobile devices and the immense amount and variety of data they generate are key enablers of machine learning (ML)-based applications. Traditional ML techniques have shifted toward new paradigms such as federated learning (FL) and split learning (SL) to ...
- research-articleNovember 2022
Efficient federated learning under non-IID conditions with attackers
FedEdge '22: Proceedings of the 1st ACM Workshop on Data Privacy and Federated Learning Technologies for Mobile Edge NetworkPages 13–18https://doi.org/10.1145/3556557.3557951Federated learning (FL) has recently attracted much attention due to its advantages for data privacy. But every coin has two sides: protecting users' data (not requiring users to send their data) also makes FL more vulnerable to some types of attacks, ...
- ArticleSeptember 2022
SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries
AbstractModern foundational electronic IDentity (eID) systems commonly rely on biometric authentication so as to reduce both their deployment costs and the need for cryptographically capable end-user devices (e.g., smartcards, smartphones). However, this ...
- short-paperSeptember 2022
Statement: Hard lessons for ICN from IP multicast
ICN '22: Proceedings of the 9th ACM Conference on Information-Centric NetworkingPages 148–149https://doi.org/10.1145/3517212.3558086In this brief statement, we trace the line of thought from Internet Multicast through to Information Centric Networking, and use this to outline what we think should have been the priorities in ICN work from the start.
- research-articleAugust 2022
A value-added IoT service for cellular networks using federated learning
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 213, Issue Chttps://doi.org/10.1016/j.comnet.2022.109094AbstractThe number of Internet-of-Things (IoT) devices is expected to reach 64 billion by 2025. These IoT devices will mostly use cellular networks for transferring a huge amount of IoT data to the cloud for machine learning (ML) based ...
- research-articleJune 2022
Recommendations for designing hybrid conferences
- Vaibhav Bajpai,
- Oliver Hohlfeld,
- Jon Crowcroft,
- Srinivasan Keshav,
- Henning Schulzrinne,
- Jörg Ott,
- Simone Ferlin,
- Georg Carle,
- Andrew Hines,
- Alexander Raake
ACM SIGCOMM Computer Communication Review (SIGCOMM-CCR), Volume 52, Issue 2Pages 63–69https://doi.org/10.1145/3544912.3544920During the COVID-19 pandemic, many smaller conferences have moved entirely online and larger ones are being held as hybrid events. Even beyond the pandemic, hybrid events reduce the carbon footprint of conference travel and makes events more accessible ...
- articleJune 2022
Message from the Chairs of the WAIN workshop 2021
ACM SIGMETRICS Performance Evaluation Review (SIGMETRICS), Volume 49, Issue 4Page 92https://doi.org/10.1145/3543146.3543167We are pleased towelcome you to the 3rd InternationalWorkshop on AI in Networks and Distributed Systems (WAIN). The workshop aims to present high-quality researches leveraging machine learning and data analysis solutions to take full advantage of ...
- research-articleMay 2022
JADE: Data-Driven Automated Jammer Detection Framework for Operational Mobile Networks
IEEE INFOCOM 2022 - IEEE Conference on Computer CommunicationsPages 1139–1148https://doi.org/10.1109/INFOCOM48880.2022.9796674Wireless jammer activity from malicious or malfunctioning devices cause significant disruption to mobile network services and user QoE degradation. In practice, detection of such activity is manually intensive and costly, taking days and weeks after the ...
- research-articleDecember 2021
SCDP: Systematic Rateless Coding for Efficient Data Transport in Data Centers
IEEE/ACM Transactions on Networking (TON), Volume 29, Issue 6Pages 2723–2736https://doi.org/10.1109/TNET.2021.3098386In this paper we propose SCDP, a general-purpose data transport protocol for data centres that, in contrast to all other protocols proposed to date, supports efficient one-to-many and many-to-one communication, which is extremely common in modern data ...
- research-articleNovember 2021
Statistical QoS guarantees of a device‐to‐device link assisted by a full‐duplex relay
- Syed Waqas Haider Shah,
- Rongpeng Li,
- Muhammad Mahboob Ur Rahman,
- Adnan Noor Mian,
- Waqas Aman,
- Jon Crowcroft
Transactions on Emerging Telecommunications Technologies (TETT), Volume 32, Issue 11https://doi.org/10.1002/ett.4339AbstractDevice‐to‐device (D2D) communication is a promising technique to enhance the spectral efficiency for 5G and beyond cellular networks. Traditionally, D2D communication was considered solely as communication directly between two closely‐located ...
This work aims to determine the statistical quality‐of‐service (QoS) guarantees of a D2D link assisted by a full‐duplex relay. We provide a closed form expression for the effective service capacity of the relay‐assisted D2D communication, in which both ...