Android Malware Detection Using Complex-Flows
This paper proposes a new technique to detect mobile malware based on information flow analysis. Our approach examines the structure of information flows to identify patterns of behavior present in them and which flows are related, those that share ...
Cross-Layer Energy Efficient Resource Allocation in PD-NOMA Based H-CRANs: Implementation via GPU
In this paper, we propose a cross layer energy efficient resource allocation and remote radio head (RRH) selection algorithm for heterogeneous traffic in power domain—non-orthogonal multiple access (PD-NOMA) based heterogeneous cloud radio access networks ...
Enhanced Mathematical Modeling of Aggregation-Enabled WLANs with Compressed BlockACK
Aggregation-enabled wireless local area networks (WLANs) have an automatic repeat-request (ARQ) mechanism called a block acknowledgement window (BAW), which has a significant impact on frame aggregation size, throughput, and delay under noisy channel ...
Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting
We consider the problem of data collection from a network of energy harvesting sensors, applied to tracking mobile assets in rural environments. Our application constraints favor a fair and energy-aware solution, with heavily duty-cycled sensor nodes ...
FooDNet: Toward an Optimized Food Delivery Network Based on Spatial Crowdsourcing
This paper builds a Food Delivery Network (FooDNet in short) using spatial crowdsourcing (SC). It investigates the participation of urban taxis to support on demand take-out food delivery. Unlike existing SC-enabled service sharing systems (e.g., ...
Low Cost Video Streaming through Mobile Edge Caching: Modelling and Optimization
Caching content at the edge of mobile networks is considered as a promising way to deal with the data tsunami. In addition to caching at fixed base stations or user devices, it has been recently proposed that an architecture with public or private ...
Network Coding Based Evolutionary Network Formation for Dynamic Wireless Networks
In this paper, we aim to find a robust network formation strategy that can adaptively evolve the network topology against network dynamics in a distributed manner. We consider a network coding deployed wireless ad hoc network where source nodes are ...
Personalized Privacy-Preserving Task Allocation for Mobile Crowdsensing
Location information of workers are usually required for optimal task allocation in mobile crowdsensing, which however raises severe concerns of location privacy leakage. Although many approaches have been proposed to protect the locations of users, the ...
Precise Power Delay Profiling with Commodity Wi-Fi
Power delay profiles characterize multipath channel features, which are widely used in motion- or localization-based applications. The performance of power delay profile obtained using commodity Wi-Fi devices is limited by two dominating factors. The ...
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server
The continuous publication of aggregate statistics over crowd-sourced data to the public has enabled many data mining applications (e.g., real-time traffic analysis). Existing systems usually rely on a trusted server to aggregate the spatio-temporal crowd-...
Radio over Cloud (RoC): Cloud-Assisted Distributed Beamforming for Multi-Class Traffic
Cloud has yet to be applied to computationally intensive radio signal processing, due to closely coupled computing tasks resulting from interference. This paper presents a new cloud-assisted joint beamforming architecture, where computations are decoupled ...
RoArray: Towards More Robust Indoor Localization Using Sparse Recovery with Commodity WiFi
With the multi-antenna design of WiFi interfaces, phased array has become a promising mechanism for accurate WiFi localization. State-of-the-art WiFi-based solutions using Angle-of-Arrival (AoA), however, face a number of critical challenges. First, their ...
Seamless Resource Sharing in Wearable Networks by Application Function Virtualization
The prevalence of smart wearable devices is increasing exponentially and we are witnessing a wide variety of fascinating new services that leverage the capabilities of these wearables. Wearables are truly changing the way mobile computing is deployed and ...
Server-Side Traffic Analysis Reveals Mobile Location Information over the Internet
Users can attempt to thwart third-party services from discovering their location by disabling location services on their mobile device. In this paper, we show that web services can use throughput information to reveal the path taken by the phone and its ...
Strategic Social Team Crowdsourcing: Forming a Team of Truthful Workers for Crowdsourcing in Social Networks
With the increasing complexity of tasks that are crowdsourced, requesters need to form teams of professional workers that can satisfy complex task skill requirements. Team crowdsourcing in social networks (SNs) provides a promising solution for complex ...
Trading Routing Diversity for Better Network Performance
Most sensor networks employ distributed and dynamic routing protocols. The flexibility that each node can choose the best forwarder from a diverse candidate set could offer excellent routing performance when the network is highly dynamic. However, it ...
uStash: A Novel Mobile Content Delivery System for Improving User QoE in Public Transport
Mobile data traffic is growing exponentially and it is even more challenging to distribute content efficiently while users are “on the move” such as in public transport. The use of mobile devices for accessing content (e.g., videos) while commuting are ...
ViNav: A Vision-Based Indoor Navigation System for Smartphones
Smartphone-based indoor navigation services are desperately needed in indoor environments. However, the adoption of them has been relatively slow, due to the lack of fine-grained and up-to-date indoor maps, or the potentially high deployment and ...