836 results on '"Dutkiewicz, E"'
Search Results
52. Low-Resolution Hybrid Beamforming in Millimeter-wave Multi-user Systems
- Author
-
Yu, H., primary, Tuan, H. D., additional, Dutkiewicz, E., additional, Poor, H. V., additional, and Hanzo, L., additional
- Published
- 2023
- Full Text
- View/download PDF
53. RIS-Aided Multiple-Input Multiple-Output Broadcast Channel Capacity
- Author
-
Tuan, H. D., primary, Nasir, A. A., additional, Dutkiewicz, E., additional, Poor, H. V., additional, and Hanzo, L., additional
- Published
- 2023
- Full Text
- View/download PDF
54. Low-Complexity Pareto-Optimal 3D Beamforming for the Full-Dimensional Multi-User Massive MIMO Downlink
- Author
-
Zhu, W., primary, Tuan, H. D., additional, Dutkiewicz, E., additional, Fang, Y., additional, and Hanzo, L., additional
- Published
- 2023
- Full Text
- View/download PDF
55. Maximization of Geometric Mean of Secrecy Rates in RIS-aided Communications Networks
- Author
-
Nguyen, Ngoc-Tan, primary, Yu, H., additional, Tuan, H. D., additional, Nguyen, Diep N., additional, and Dutkiewicz, E., additional
- Published
- 2022
- Full Text
- View/download PDF
56. Low-Resolution RIS-Aided Multiuser MIMO Signaling
- Author
-
Nasir, A. A., primary, Tuan, H. D., additional, Dutkiewicz, E., additional, Poor, H. V., additional, and Hanzo, L., additional
- Published
- 2022
- Full Text
- View/download PDF
57. Scalable User Rate and Energy-Efficiency Optimization in Cell-Free Massive MIMO
- Author
-
Tuan, H. D., primary, Nasir, A. A., additional, Ngo, H. Q., additional, Dutkiewicz, E., additional, and Poor, H. V., additional
- Published
- 2022
- Full Text
- View/download PDF
58. Radionuclides in Bones of Wild, Herbivorous Animals from North-Eastern Poland
- Author
-
Mietelski, J. W., Gaca, P., Tomczak, M., Zalewski, M., Dutkiewicz, E. M., Szeglowski, Z., Jasińska, M., Zagrodzki, P., Kozak, K., Frontasyeva, Marina V., editor, Perelygin, Vladimir P., editor, and Vater, Peter, editor
- Published
- 2001
- Full Text
- View/download PDF
59. An ensemble approach to deep-learning-based wireless indoor localization
- Author
-
Wisanmongkol, J, Taparugssanagorn, A, Tran, LC, Le, AT, Huang, X, Ritz, C, Dutkiewicz, E, and Phung, SL
- Subjects
0801 Artificial Intelligence and Image Processing, 0805 Distributed Computing - Abstract
The authors investigate the use of deep learning in wireless indoor localization to address the shortcomings of the existing range-based (e.g. trilateration and triangulation) and range-free (e.g. fingerprinting) localization. Instead of relying on geometric models and hand-picked features, deep learning can automatically extract the relationship between the observed data and the target's location. Nevertheless, a deep neural network (DNN) model providing a satisfactory accuracy might perform differently when it is retrained in the deployment. To mitigate this issue, the authors propose an ensemble method where DNN models obtained from multiple training sessions are combined to locate the target. In the authors' evaluation, several DNN models are trained on the data, which consists of the received signal strength (RSS), angle of arrival (AOA), and channel state information (CSI), used in the existing hybrid RSS/AOA and RSS/CSI fingerprinting, and their root-mean-square error (RMSE) values are compared accordingly. The results show that the proposed method achieves the lower RMSE than the existing methods, and the RMSE can be lowered by up to 1.47 m compared with the ones obtained from a single model. Moreover, for some DNN models, the RMSE values are even lower than the minimum RMSE obtained by their single-model counterparts.
- Published
- 2022
60. Scalable User Rate and Energy-Efficiency Optimization in Cell-Free Massive MIMO
- Author
-
Tuan, HD, Nasir, AA, Ngo, HQ, Dutkiewicz, E, Poor, HV, Tuan, HD, Nasir, AA, Ngo, HQ, Dutkiewicz, E, and Poor, HV
- Abstract
This paper considers a cell-free massive multiple-input multiple-output network (cfm-MIMO) with a massive number of access points (APs) distributed across an area to deliver information to multiple users. Based on only local channel state information, conjugate beamforming is used under both proper and improper Gaussian signalings. To accomplish the mission of cfm-MIMO in providing fair service to all users, the problem of power allocation to maximize the geometric mean (GM) of users' rates (GM-rate) is considered. A new scalable algorithm, which iterates linear-complex closed-form expressions and thus is practical regardless of the scale of the network, is developed for its solution. The problem of quality-of-service (QoS) aware network energy-efficiency is also addressed via maximizing the ratio of the GM-rate and the total power consumption, which is also addressed by iterating linear-complex closed-form expressions. Intensive simulations are provided to demonstrate the ability of the GM-rate based optimization to achieve multiple targets such as a uniform QoS, a good sum rate, and a fair power allocation to the APs.
- Published
- 2022
61. Maximizing the Geometric Mean of User-Rates to Improve Rate-Fairness: Proper vs. Improper Gaussian Signaling
- Author
-
Yu, H, Tuan, HD, Dutkiewicz, E, Poor, HV, Hanzo, L, Yu, H, Tuan, HD, Dutkiewicz, E, Poor, HV, and Hanzo, L
- Abstract
This paper considers a reconfigurable intelligent surface (RIS)-aided network, which relies on a multiple antenna array aided base station (BS) and an RIS for serving multiple single antenna downlink users. To provide reliable links to all users over the same bandwidth and same time-slot, the paper proposes the joint design of linear transmit beamformers and the programmable reflecting coefficients of an RIS to maximize the geometric mean (GM) of the users' rates. A new computationally efficient alternating descent algorithm is developed, which is based on closed-forms only for generating improved feasible points of this nonconvex problem. We also consider the joint design of widely linear transmit beamformers and the programmable reflecting coefficients to further improve the GM of the users' rates. Hence another alternating descent algorithm is developed for its solution, which is also based on closed forms only for generating improved feasible points. Numerical examples are provided to demonstrate the efficiency of the proposed approach.
- Published
- 2022
62. Low-Resolution RIS-Aided Multiuser MIMO Signaling
- Author
-
Nasir, AA, Tuan, HD, Dutkiewicz, E, Poor, HV, Hanzo, L, Nasir, AA, Tuan, HD, Dutkiewicz, E, Poor, HV, and Hanzo, L
- Abstract
A multi-antenna aided base station (BS) supporting several multi-antenna downlink users with the aid of a reconfigurable intelligent surface (RIS) of programmable reflecting elements (PREs) is considered. Low-resolution PREs constrained by a set of sparse discrete values are used for reasons of cost-efficiency. Our challenging objective is to jointly design the beamformers at the BS and the RIS's PREs for improving the throughput of all users by maximizing their geometric-mean, under a variety of different access schemes. This constitutes a computationally challenging problem of mixed continuous-discrete optimization, because each user's throughput is a complicated function of both the continuous-valued beamformer weights and of the discrete-valued PREs. We develop low-complexity algorithms, which iterate by directly evaluating low-complexity closed-form expressions. Our simulation results show the advantages of non-orthogonal multiple access-aided signaling, which allows the users to decode a part of the multi-user interference for enhancing their throughput.
- Published
- 2022
63. Maximization of Geometric Mean of Secrecy Rates in RIS-aided Communications Networks
- Author
-
Nguyen, NT, Yu, H, Tuan, HD, Nguyen, DN, Dutkiewicz, E, Nguyen, NT, Yu, H, Tuan, HD, Nguyen, DN, and Dutkiewicz, E
- Abstract
In this paper, we study a secure communications network in which a multiple-antenna access point (AP) with the assistance of a reconfigurable intelligent surface (RIS) serves multiple single-antenna legitimate users (UEs) with the presence of an eavesdropper (EV). Specifically, the RIS, which can tune/control/alter the phase shift of reflected signals (onto it), is deployed to prevent potential information leaked (to the EV). To secure the downlinks from the AP to the UEs via the RIS, we consider the joint design of linear transmit beamformers at the AP and programmable reflecting coefficients of the RIS to maximize the geometric mean (GM) of all users' secrecy rates. Then, an efficient algorithm, called RIS-aided secure beamforming (RaSB) algorithm, which invokes a closed-form expression at each iteration, is proposed to solve this non-convex problem. Numerical results reveal that the performance of the proposed RaSB algorithm outperforms the one without phase optimization. Simulations are also performed to investigate the impact of the EV's position on the GM of secrecy rates.
- Published
- 2022
64. RIS-Aided Zero-Forcing and Regularized Zero-Forcing Beamforming in Integrated Information and Energy Delivery
- Author
-
Yu, H, Tuan, HD, Dutkiewicz, E, Poor, HV, Hanzo, L, Yu, H, Tuan, HD, Dutkiewicz, E, Poor, HV, and Hanzo, L
- Abstract
This paper considers a network of a multi-antenna array base station (BS) and a reconfigurable intelligent surface (RIS) to deliver both information to information users (IUs) and power to energy users (EUs). The RIS links the connection between the IUs and the BS as there is no direct path between the former and the latter. The EUs are located nearby the BS in order to effectively harvest energy from the high-power signal from the BS, while the much weaker signal reflected from the RIS hardly contributes to the EUs' harvested energy. To provide reliable links for all users over the same time-slot, we adopt the transmit time-switching (transmit-TS) approach, under which information and energy are delivered over different time-slot fractions. This allows us to rely on conjugate beamforming for energy links and zero-forcing/regularized zero-forcing beamforming (ZFB/RZFB) and on the programmable reflecting coefficients (PRCs) of the RIS for information links. We show that ZFB/RZFB and PRCs can be still separately optimized in their joint design, where PRC optimization is based on iterative closed-form expressions. We then develop a path-following algorithm for solving the max-min IU throughput optimization problem subject to a realistic constraint on the quality-of-energy-service in terms of the EUs' harvested energy thresholds. We also propose a new RZFB for substantially improving the IUs' throughput.
- Published
- 2022
65. Finite-Resolution Digital Beamforming for Multi-User Millimeter-Wave Networks
- Author
-
Nasir, AA, Tuan, HD, Dutkiewicz, E, Hanzo, L, Nasir, AA, Tuan, HD, Dutkiewicz, E, and Hanzo, L
- Abstract
Recent studies have shown that low-resolution analog-to-digital-converters and digital-to-analog-converters (ADCs and DACs) can make fully-digital beamforming more power efficient than its analog or hybrid beamforming counterpart over wide-band millimeter-wave (mmWave) channels. Inspired by this, we propose a computationally efficient fully-digital beamformer relying on low-resolution ADCs/DACs for multi-user mmWave communication networks. Both a generalized (unstructured) beamformer (GB) and a structured zero-forcing beamformer (ZFB) are proposed. For maintaining fairness among all users in the network, specifically tailored objective functions are considered under sum-power constraints, namely that of maximizing the geometric mean (GM) of users' rate and their max-min rate. These computationally challenging beamforming design problems are tackled by developing computationally efficient steep ascent algorithms, which have the radical benefit of relying on a closed-form solution at each iteration. Moreover, to facilitate the employment of low-cost amplifiers at each antenna, the GB design problem subject to the equal-gain transmission constraint is considered, which assigns equal transmit power to each transmit antenna. The proposed algorithms promise a user-rate distribution having a reduced deviation among the user-rates, i.e., improved rate-fairness. Our extensive simulation results show an approximately upto 45% reduction for the GM-rate of a 2-bit ADC (4-bin quantization) compared to the $\infty$-resolution ADC.
- Published
- 2022
66. Balanced Twin Auto-Encoder for IoT Intrusion Detection
- Author
-
Dinh, PV, Nguyen, DN, Hoang, DT, Uy, NQ, Bao, SP, Dutkiewicz, E, Dinh, PV, Nguyen, DN, Hoang, DT, Uy, NQ, Bao, SP, and Dutkiewicz, E
- Abstract
Intrusion detection systems (IDSs) provide an ef-fective solution for protecting loT systems. However, due to the massive number of loT devices (in billions) and their heterogeneity, IDSs face challenges posed by the complexity of loT data such as correlation-based features, high dimensions, and imbalance. To address these problems, this paper proposes a novel neural network architecture, called Balanced Twin Auto-Encoder (BTAE) which consists of three components, i.e., an encoder, a hermaphrodite, and a decoder. The encoder of BTAE first aims to transfer the input data into the latent space before data samples (pre-images) are translated into this space by different translation vectors. In addition, the data of the skewed labels are also generated in the latent space to address the problem of imbalanced data in which the number of attack samples is often significantly lower than those of the benign samples. Second, the hermaphrodite component serves as a bridge to move the data from the encoder to the decoder. Third, the decoder tries to copy the distribution of the samples in the latent space. BTAE is trained by a supervised learning technique, and its data representation extracted from the decoder can well distinguish the attack from the normal data. The experiments on five loT botnet datasets show that BTAE outperforms three existing groups of methods, e.g., the typical supervised learning, the well-known sampling, and the state-of-the-art representation learning. In addition, the false alarm rate (FAR) of BTAE applied for loT intrusion detection is less than equal to 1.2%.
- Published
- 2022
67. Collaborative Beamforming Aided Fog Radio Access Networks
- Author
-
Zhu, W, Tuan, HD, Dutkiewicz, E, Hanzo, L, Zhu, W, Tuan, HD, Dutkiewicz, E, and Hanzo, L
- Abstract
The success of fog radio access networks (F-RANs) is critically dependent on the potential quality of service (QoS) that they can offer to users in the face of capacity-constrained fronthaul links and limited caches at their remote radio heads (RRHs). In this context, the collaborative beamforming design is very challenging, since it constitutes a large-dimensional nonlinearly constrained optimization problem. The paper develops a new technique for tackling these critical challenges in fog computing. We show that all the associated constraints can be efficiently dealt with maximizing the geometric mean (GM) of the user throughputs (GM-throughput) subject to the affordable total transmit power constraints. To elaborate, the GM-throughput maximization judiciously exploits the fronthaul links and the RRHs' caches by relying on our novel algorithm, which evaluates low-complexity closed-form expressions in each of its iterations. The problem of F-RAN energy-efficiency is also addressed while maintaining the target throughput. Numerical examples are provided for quantifying the efficiency of the proposed algorithms.
- Published
- 2022
68. Deep Generative Learning Models for Cloud Intrusion Detection Systems.
- Author
-
Vu, L, Nguyen, QU, Nguyen, DN, Hoang, DT, Dutkiewicz, E, Vu, L, Nguyen, QU, Nguyen, DN, Hoang, DT, and Dutkiewicz, E
- Abstract
Intrusion detection (ID) on the cloud environment has received paramount interest over the last few years. Among the latest approaches, machine learning-based ID methods allow us to discover unknown attacks. However, due to the lack of malicious samples and the rapid evolution of diverse attacks, constructing a cloud ID system (IDS) that is robust to a wide range of unknown attacks remains challenging. In this article, we propose a novel solution to enable robust cloud IDSs using deep neural networks. Specifically, we develop two deep generative models to synthesize malicious samples on the cloud systems. The first model, conditional denoising adversarial autoencoder (CDAAE), is used to generate specific types of malicious samples. The second model (CDAEE-KNN) is a hybrid of CDAAE and the K-nearest neighbor algorithm to generate malicious borderline samples that further improve the accuracy of a cloud IDS. The synthesized samples are merged with the original samples to form the augmented datasets. Three machine learning algorithms are trained on the augmented datasets and their effectiveness is analyzed. The experiments conducted on four popular IDS datasets show that our proposed techniques significantly improve the accuracy of the cloud IDSs compared with the baseline technique and the state-of-the-art approaches. Moreover, our models also enhance the accuracy of machine learning algorithms in detecting some currently challenging distributed denial of service (DDoS) attacks, including low-rate DDoS attacks and application layer DDoS attacks.
- Published
- 2022
69. Relay-Aided Multi-User OFDM Relying on Joint Wireless Power Transfer and Self-Interference Recycling
- Author
-
Nasir, AA, Tuan, HD, Dutkiewicz, E, Poor, HV, Hanzo, L, Nasir, AA, Tuan, HD, Dutkiewicz, E, Poor, HV, and Hanzo, L
- Abstract
Relay-aided multi-user OFDM is investigated under which multiple sources transmit their signals to a multi-antenna relay during the first relaying stage and then the relay amplifies and forwards the composite signal to all destinations during the second stage. The signal transmission of both stages experience frequency selectivity. The relay is powered both by an energy source through the wireless power transfer as well as by the energy recycled from its own self-interference during the second stage. Accordingly, we jointly design the power allocations both at the multiple source nodes and at a common relay node for maximizing the network's sum-throughput, which poses a large-scale nonconvex problem, regardless whether proper Gaussian signaling (PGS) or improper Gaussian signaling (IGS) is used for signal transmission to the relay. We develop new alternating descent procedures for solving our joint optimization problems, which are based on closed-forms and thus are of very low computational complexity even for large numbers of subcarriers. The results show the superiority of IGS over PGS in terms of both its sum-rate and individual user-rate. Another benefit of IGS over PGS is that the former promises fairer rate distribution across the subcarriers. Moreover, the recycled self-interference also provides a beneficial complementary energy source.
- Published
- 2022
70. Elastic Resource Allocation for Coded Distributed Computing over Heterogeneous Wireless Edge Networks
- Author
-
Nguyen, CT, Nguyen, DN, Hoang, DT, Phan, KT, Niyato, D, Pham, HA, Dutkiewicz, E, Nguyen, CT, Nguyen, DN, Hoang, DT, Phan, KT, Niyato, D, Pham, HA, and Dutkiewicz, E
- Abstract
Coded distributed computing (CDC) has recently emerged to be a promising solution to address the straggling effects in conventional distributed computing systems. By assigning redundant workloads to the computing nodes, CDC can significantly enhance the performance of the whole system. However, since the core idea of CDC is to introduce redundancies to compensate for uncertainties, it may lead to a large amount of wasted energy at the edge nodes. It can be observed that the more redundant workload added, the less impact the straggling effects have on the system. However, at the same time, the more energy is needed to perform redundant tasks. In this work, we develop a novel framework, namely CERA, to elastically allocate computing resources for CDC processes. Particularly, CERA consists of two stages. In the first stage, we model a joint coding and node selection optimization problem to minimize the expected processing time for a CDC task. Since the problem is NP-hard, we propose a linearization approach and a hybrid algorithm to quickly obtain the optimal solutions. In the second stage, we develop a smart online approach based on Lyapunov optimization to dynamically turn off straggling nodes based on their actual performance. As a result, wasteful energy consumption can be significantly reduced with minimal impact on the total processing time. Simulations using real-world datasets have shown that our proposed approach can reduce the system’s total processing time by more than 200% compared to that of the state-of-the-art approach, even when the nodes’ actual performance is not known in advance. Moreover, the results have shown that CERA’s online optimization stage can reduce the energy consumption by up to 37.14% without affecting the total processing time.
- Published
- 2022
71. Regularized Zero-Forcing Aided Hybrid Beamforming for Millimeter-Wave Multi-user MIMO Systems
- Author
-
Yu, H, Tuan, HD, Dutkiewicz, E, Poor, HV, Hanzo, L, Yu, H, Tuan, HD, Dutkiewicz, E, Poor, HV, and Hanzo, L
- Abstract
This paper considers hybrid beamforming consisting of analog beamforming (ABF) coupled with digital baseband beamforming (DBF) which is designed for multi-user (MU) multiple input multiple output (MIMO) millimeter-wave (mmWave) communications. ABF uses a limited number of radio frequency (RF) chains and finite-resolution phase-shifters to alleviate the power consumption at the base station (BS), while DBF uses either zero-forcing beamforming (ZFB) or regularized zero forcing beamforming (RZFB) to restrain MU interference. The joint design of ABF and DBF constitutes a computationally challenging mixed discrete continuous optimization problem. The paper develops efficient algorithms for its solution, which iterate scalable-complex expressions. Furthermore, we conceive a new class of MU RZFB for attaining higher rates. Simulations are provided to demonstrate the viability of the proposed algorithms and the advantages of the conceived RZFB.
- Published
- 2022
72. Open issues and future research directions
- Author
-
Nguyen, NT, Xuan Vu, T, Hoang, DT, Nguyen, DN, Dutkiewicz, E, Nguyen, NT, Xuan Vu, T, Hoang, DT, Nguyen, DN, and Dutkiewicz, E
- Published
- 2022
73. Two-Way Waveguide Diplexer and Its Application to Diplexing In-Band Full-Duplex Antenna
- Author
-
Lin, JY, Yang, Y, Wong, SW, Li, X, Wang, L, Dutkiewicz, E, Lin, JY, Yang, Y, Wong, SW, Li, X, Wang, L, and Dutkiewicz, E
- Abstract
A design of a diplexing in-band full-duplex (IBFD) slot antenna based on the quadruple-mode resonator (QMR) is presented for the first time. First, a two-way waveguide diplexer integration using QMR is designed. Four waveguide modes, namely, TE
$_{011}$ $_{101}$ $_{\mathrm{210,}}$ $_{120}$ $_{011}$ $_{101}$ $_{210}$ $_{120}$ $K)$ $Q_{{\text{e}}})$ - Published
- 2022
74. Cooperative Friendly Jamming in Swarm UAV-assisted Communications with Wireless Energy Harvesting
- Author
-
Dang-Ngoc, H, Nguyen, DN, Hoang, DT, Ho-Van, K, Dutkiewicz, E, Dang-Ngoc, H, Nguyen, DN, Hoang, DT, Ho-Van, K, and Dutkiewicz, E
- Abstract
This article proposes a cooperative friendly jamming framework for swarm unmanned aerial vehicle (UAV)-assisted amplify-and-forward (AF) relaying networks with wireless energy harvesting. We consider a swarm of hovering UAVs that relays information from a terrestrial source to a distant mobile user and simultaneously generates jamming signals to obfuscate an eavesdropper. Due to the limited energy of the UAVs, we develop a collaborative time-switching relaying protocol that allows the UAVs to collaborate to harvest wireless energy, relay information, and jam the eavesdropper. To evaluate the secrecy rate, we derive the expressions of the secrecy outage probability (SOP) in the integral form for two popular detection techniques used by the eavesdropper, i.e., selection combining and maximum-ratio combining in high signal-to-noise ratio regime. Monte Carlo simulations validate the derived SOP and show that the proposed framework outperforms the conventional AF relaying system, in terms of SOP. The insights from SOP and analysis in this work sheds light on optimizing the energy harvesting time, the number of UAVs in the swarm as well as their placements, to achieve the required secrecy protection level.
- Published
- 2022
75. MetaChain: A Novel Blockchain-based Framework for Metaverse Applications
- Author
-
Nguyen, CT, Hoang, DT, Nguyen, DN, Dutkiewicz, E, Nguyen, CT, Hoang, DT, Nguyen, DN, and Dutkiewicz, E
- Abstract
Metaverse has recently attracted paramount attention due to its potential for future Internet. However, to fully realize such potential, Metaverse applications have to overcome various challenges such as massive resource demands, interoperability among applications, and security and privacy concerns. In this paper, we propose MetaChain, a novel blockchain-based framework to address emerging challenges for the development of Metaverse applications. In particular, by utilizing the smart contract mechanism, MetaChain can effectively manage and automate complex interactions among the Metaverse Service Provider (MSP) and the Metaverse users (MUs). In addition, to allow the MSP to efficiently allocate its resources for Metaverse applications and MUs’ demands, we design a novel sharding scheme to improve the underlying blockchain’s scalability. Moreover, to leverage MUs’ resources as well as to attract more MUs to support Metaverse operations, we develop an incentive mechanism using the Stackelberg game theory that rewards MUs’ contributions to the Metaverse. Through numerical experiments, we clearly show the impacts of the MUs’ behaviors and how the incentive mechanism can attract more MUs and resources to the Metaverse.
- Published
- 2022
76. Optimal Privacy Preserving in Wireless Federated Learning System over Mobile Edge Computing
- Author
-
Nguyen, HM, Chu, NH, Nguyen, DN, Hoang, DT, Ha, MH, Dutkiewicz, E, Nguyen, HM, Chu, NH, Nguyen, DN, Hoang, DT, Ha, MH, and Dutkiewicz, E
- Published
- 2022
77. Secure Swarm UAV-assisted Communications with Cooperative Friendly Jamming
- Author
-
Dang-Ngoc, H, Nguyen, DN, Ho-Van, K, Hoang, DT, Dutkiewicz, E, Pham, QV, Hwang, WJ, Dang-Ngoc, H, Nguyen, DN, Ho-Van, K, Hoang, DT, Dutkiewicz, E, Pham, QV, and Hwang, WJ
- Abstract
This article proposes a cooperative friendly jamming framework for swarm unmanned aerial vehicle (UAV)-assisted amplify-and-forward (AF) relaying networks with wireless energy harvesting. In particular, we consider a swarm of hovering UAVs that relays information from a terrestrial base station to a distant mobile user and simultaneously generates friendly jamming signals to interfere/obfuscate an eavesdropper. Due to the limited energy of the UAVs, we develop a collaborative time-switching relaying protocol that allows the UAVs to collaborate in harvesting wireless energy, relay information, and jam the eavesdropper. To evaluate the performance, we derive the secrecy outage probability (SOP) for two popular detection techniques at the eavesdropper, i.e., selection combining and maximum-ratio combining. Monte Carlo simulations are then used to validate the theoretical SOP derivation. Using the derived SOP, one can obtain engineering insights to optimize the energy harvesting time and the number of UAVs in the swarm to achieve a given secrecy protection level. Furthermore, simulations show the effectiveness of the proposed framework in terms of SOP compared to the conventional AF relaying system. The analytical SOP derived in this work can also be helpful in future UAV secure-communications optimizations (e.g., trajectory, locations of UAVs). As an example, we present a case study to find the optimal corridor to locate the swarm so as to minimize the system SOP. Our proposed framework helps secure communications for various applications that require large coverage, e.g., industrial IoT, smart city, intelligent transportation systems, and critical IoT infrastructures like energy and water.
- Published
- 2022
78. Energy-based Proportional Fairness for Task Offloading and Resource Allocation in Edge Computing
- Author
-
Vu, TT, Hoang, DT, Phan, KT, Nguyen, DN, Dutkiewicz, E, Vu, TT, Hoang, DT, Phan, KT, Nguyen, DN, and Dutkiewicz, E
- Abstract
By executing offloaded tasks from mobile users, edge computing augments mobile devices with computing/communications resources from edge nodes (ENs), enabling new services/applications (e.g., real-time gaming, virtual/augmented reality). However, despite being more resourceful than mobile devices, allocating ENs’ computing/communications resources to given favorable sets of users may block other devices from their service. This is often the case for most existing task offloading and resource allocation approaches that only aim to maximize the network social welfare (e.g., minimizing the total energy consumption) but not consider the computing/battery status of each mobile device. This work develops a proportional fair task offloading and resource allocation framework for a multi-layer cooperative edge computing network to serve all user equipment (UEs) while considering both their service requirements and individual energy/battery levels. The resulting optimization involves both binary (offloading decisions) and real variables (resource allocations), making it NP-hard. To tackle it, we leverage the fact that the relaxed problem is convex and propose a distributed algorithm, namely the dynamic branchand-bound Benders decomposition (DBBD). DBBD decomposes the original problem into a master problem (MP) for the offloading decision and subproblems (SPs) for resource allocation. The SPs can either find their closed-form solutions or be solved in parallel at ENs, thus help reduce the complexity. The numerical results show that the DBBD returns the optimal solution of the problem maximizing the fairness between UEs. The DBBD has higher fairness indexes, i.e., Jain’s index and min-max ratio, in comparing with the existing ones that minimize the total consumed energy.
- Published
- 2022
79. In-network Computation for Large-scale Federated Learning over Wireless Edge Networks
- Author
-
Dinh, TQ, Nguyen, DN, Hoang, DT, Pham, TV, Dutkiewicz, E, Dinh, TQ, Nguyen, DN, Hoang, DT, Pham, TV, and Dutkiewicz, E
- Abstract
Most conventional Federated Learning (FL) models are using a star network topology where all users aggregate their local models at a single server (e.g., a cloud server). That causes significant overhead in terms of both communications and computing at the server, delaying the training process, especially for large scale FL systems with straggling nodes. This paper proposes a novel edge network architecture that enables decentralizing the model aggregation process at the server, thereby significantly reducing the training delay for the whole FL network. Specifically, we design a highly-effective in-network computation framework (INC) consisting of a user scheduling mechanism, an in-network aggregation process (INA) which is designed for both primal- and primal-dual methods in distributed machine learning problems, and a network routing algorithm with theoretical performance bounds. The in-network aggregation process, which is implemented at edge nodes and cloud node, can adapt two typical methods to allow edge networks to effectively solve the distributed machine learning problems. Under the proposed INA, we then formulate a joint routing and resource optimization problem, aiming to minimize the aggregation latency. The problem turns out to be NP-hard, and thus we propose a polynomial time routing algorithm which can achieve near optimal performance with a theoretical bound. Simulation results showed that the proposed algorithm can achieve more than 99
of the optimal solution and reduce the FL training latency, up to 5.6 times w.r.t other baselines. The proposed INC framework can not only help reduce the FL training latency but also significantly decrease cloud’s traffic and computing overhead. By embedding the computing/aggregation tasks at the edge nodes and leveraging the multi-layer edge-network architecture, the INC framework can liberate FL from the star topology to enable large-scale F$\%$ - Published
- 2022
80. In-Network Caching and Learning Optimization for Federated Learning in Mobile Edge Networks
- Author
-
Saputra, YM, Nguyen, DN, Hoang, DT, Dutkiewicz, E, Saputra, YM, Nguyen, DN, Hoang, DT, and Dutkiewicz, E
- Abstract
In this paper, we develop a novel privacy-aware framework to address straggling problem in a federated learning (FL)-based mobile edge network through maximizing profit for the mobile service provider (MSP). In particular, unlike the conventional FL process when participating mobile users (MUs) have to train their all data locally, we propose a highly-effective solution that allows MUs to encrypt parts of local data and upload/cache the encrypted data to nearby mobile edge nodes (MENs) and/or a cloud server (CS) to perform additional training processes. In this way, we can not only mitigate the straggling problem caused by limited computing/communications resources at MUs but also enhance the usage efficiency of learning data from all MUs in the FL process. To optimize portions of encrypted data cached and trained at MENs/CS given constraints from MUs and the MSP while considering data privacy and training costs, we first formulate the profit maximization problem for the MSP as an optimal in-network encrypted data caching and learning optimization. We then prove that the objective function is concave, and thus an interior-point method algorithm can be effectively adopted to quickly find the optimal solution. The numerical results demonstrate that our proposed framework can enhance the profit of the MSP up to 5.39 times compared with other FL methods.
- Published
- 2022
81. Optimize Coding and Node Selection for Coded Distributed Computing over Wireless Edge Networks
- Author
-
Nguyen, CT, Nguyen, DN, Hoang, DT, Pham, H-A, Dutkiewicz, E, Nguyen, CT, Nguyen, DN, Hoang, DT, Pham, H-A, and Dutkiewicz, E
- Abstract
This paper aims to develop a highly-effective framework to significantly enhance the efficiency in using coded computing techniques for distributed computing tasks over heterogeneous wireless edge networks. In particular, we first formulate a joint coding and node selection optimization problem to minimize the expected total processing time for computing tasks, taking into account the heterogeneity in the nodes' computing resources and communication links. The problem is shown to be NP-hard. To circumvent it, we leverage the unique characteristic of the problem to develop a linearization approach and a hybrid algorithm based on binary search and branch-and-bound (BB) algorithms. This hybrid algorithm can not only guarantee to find the optimal solution, but also significantly reduce the computational complexity of the BB algorithm. Simulations based on real-world datasets show that the proposed approach can reduce the total processing time up to 2.4 times compared with that of state-of-the-art approach, even without perfect knowledge regarding the node's performance and their straggling parameters.
- Published
- 2022
82. Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks
- Author
-
Khoa, TV, Hoang, DT, Trung, NL, Nguyen, CT, Quynh, TTT, Nguyen, DN, Ha, NV, Dutkiewicz, E, Khoa, TV, Hoang, DT, Trung, NL, Nguyen, CT, Quynh, TTT, Nguyen, DN, Ha, NV, and Dutkiewicz, E
- Abstract
Federated Learning (FL) has recently become an effective approach for cyberattack detection systems, especially in Internet-of-Things (IoT) networks. By distributing the learning process across IoT gateways, FL can improve learning efficiency, reduce communication overheads and enhance privacy for cyberattack detection systems. However, one of the biggest challenges for deploying FL in IoT networks is the unavailability of labeled data and dissimilarity of data features for training. In this paper, we propose a novel collaborative learning framework that leverages Transfer Learning (TL) to overcome these challenges. Particularly, we develop a novel collaborative learning approach that enables a target network with unlabeled data to effectively and quickly learn “knowledge” from a source network that possesses abundant labeled data. It is important that the state-of-the-art studies require the participated datasets of networks to have the same features, thus limiting the efficiency, flexibility as well as scalability of intrusion detection systems. However, our proposed framework can address these problems by exchanging the learning “knowledge” among various deep learning models, even when their datasets have different features. Extensive experiments on recent real-world cybersecurity datasets show that the proposed framework can improve more than 40% as compared to the state-of-the-art deep learning based approaches.
- Published
- 2022
83. Selective Federated Learning for On-Road Services in Internet-of-Vehicles
- Author
-
Saputra, Y, Nguyen, D, Dinh, H, Dutkiewicz, E, Saputra, Y, Nguyen, D, Dinh, H, and Dutkiewicz, E
- Abstract
The Internet-of-Vehicles (IoV) can make driving safer and bring more services to smart vehicle (SV) users. Specif-ically, with IoV, the road service provider (RSP) can collaborate with SVs to provide high-accurate on-road information-based services by implementing federated learning (FL). Nonetheless, SVs' activities are very diverse in IoV networks, e.g., some SVs move frequently while other SVs are occasionally disconnected from the network. Consequently, obtaining information from all SVs for the learning process is costly and impractical. Furthermore, the quality-of-information (QoI) obtained by SVs also dramatically varies. That makes the learning process from all SVs simultaneously even worse when some SVs have low QoI. In this paper, we propose a novel selective FL approach for an IoV network to address these issues. Particularly, we first develop an SV selection method to determine a set of active SVs based on their location significance. In this case, we adopt a K-means algorithm to classify significant and insignificant areas where the SVs are located according to the areas' average annual daily flow of vehicles. From the set of SVs in the significant areas, we select the best SVs for the FL execution based on the SVs' QoI at each learning round. Through simulation results using a real-world on-road dataset, we observe that our proposed approach can converge to the FL results even with only 10% of active SVs in the network. Moreover, our results reveal that the RSP can optimize on-road services with faster convergence up to 63% compared with other baseline FL methods.
- Published
- 2022
84. Defeating Super-Reactive Jammers With Deception Strategy: Modeling, Signal Detection, and Performance Analysis
- Author
-
Van Huynh, N, Nguyen, DN, Hoang, DT, Vu, TX, Dutkiewicz, E, Chatzinotas, S, Van Huynh, N, Nguyen, DN, Hoang, DT, Vu, TX, Dutkiewicz, E, and Chatzinotas, S
- Abstract
This paper develops a novel framework to defeat a super-reactive jammer, one of the most difficult jamming attacks to deal with in practice. Specifically, the jammer has an unlimited power budget and is equipped with the self-interference suppression capability to simultaneously attack and listen to the transmitter’s activities. Consequently, dealing with super-reactive jammers is very challenging. Thus, we introduce a smart deception mechanism to attract the jammer to continuously attack the channel and then leverage jamming signals to transmit data based on the ambient backscatter communication technology. To detect the backscattered signals, the maximum likelihood detector can be adopted. However, this method is notorious for its high computational complexity and requires the model of the current propagation environment as well as channel state information. Hence, we propose a deep learning-based detector that can dynamically adapt to any channels and noise distributions. With a Long Short-Term Memory network, our detector can learn the received signals’ dependencies to achieve a performance close to that of the optimal maximum likelihood detector. Through simulation and theoretical results, we demonstrate that with our approaches, the more power the jammer uses to attack the channel, the better bit error rate performance the transmitter can achieve.
- Published
- 2022
85. Dynamic Federated Learning-Based Economic Framework for Internet-of-Vehicles
- Author
-
Saputra, YM, Dinh, HT, Nguyen, D, Tran, L-N, Gong, S, Dutkiewicz, E, Saputra, YM, Dinh, HT, Nguyen, D, Tran, L-N, Gong, S, and Dutkiewicz, E
- Abstract
Federated learning (FL) can empower Internet-of-Vehicles (IoV) to help the vehicular service provider (VSP) improve the global model accuracy for road safety and better profits for both VSP and participating smart vehicles (SVs). Nonetheless, there exist major challenges when implementing FL in IoV including dynamic activities and diverse quality-of-information (QoI) from a large number of SVs, VSP's limited payment budget, and profit competition among SVs. In this paper, we propose a novel dynamic FL-based economic framework for an IoV network to address these challenges. Specifically, the VSP first implements an SV selection method to determine a set of the best SVs for the FL process according to the significance of their current locations and information at each learning round. Then, each selected SV can collect on-road information and offer a payment contract to the VSP based on its collected QoI. For that, we develop a multi-principal one-agent contract-based policy to maximize the profits of the VSP and learning SVs under the asymmetric information between them. Through experimental results using real-world on-road datasets, we show that our framework can converge 57% faster and obtain social welfare of the network up to 27.2 times compared with those of other baseline FL methods.
- Published
- 2022
86. Federated Learning Framework with Straggling Mitigation and Privacy-Awareness for AI-based Mobile Application Services
- Author
-
Saputra, YM, Nguyen, D, Dinh, HT, Pham, QV, Dutkiewicz, E, Hwang, WJ, Saputra, YM, Nguyen, D, Dinh, HT, Pham, QV, Dutkiewicz, E, and Hwang, WJ
- Abstract
This work proposes a novel framework to address straggling and privacy issues for federated learning (FL)-based mobile application services, considering limited computing/communications resources at mobile users (MUs)/mobile application provider (MAP), privacy cost, the rationality and incentive competition among MUs in contributing data to the MAP. Particularly, the MAP first determines a set of the best MUs for the FL process based on MUs' provided information/features. Then, each selected MU can encrypt part of local data and upload the encrypted data to the MAP for an encrypted training process, in addition to the local training process. For that, the selected MU can propose a contract to the MAP according to its expected local and encrypted data. To find optimal contracts that can maximize utilities while maintaining high learning quality of the system, we develop a multi-principal one-agent contract-based problem considering the MUs' privacy cost, the MAP's limited computing resources, and asymmetric information between the MAP and MUs. Experiments with a real-world dataset show that our framework can speed up training time up to 49% and improve prediction accuracy up to 4.6 times while enhancing network's social welfare up to 114% under the privacy cost consideration compared with those of baseline methods.
- Published
- 2022
87. Twin Variational Auto-Encoder for Representation Learning in IoT Intrusion Detection
- Author
-
Dinh, PV, Quang Uy, N, Nguyen, DN, Thai Hoang, D, Bao, SP, Dutkiewicz, E, Dinh, PV, Quang Uy, N, Nguyen, DN, Thai Hoang, D, Bao, SP, and Dutkiewicz, E
- Abstract
Intrusion detection systems (IDSs) play a pivotal role in defending IoT systems. However, developing a robust and efficient IDS is challenging due to the rapid and continuing evolving of various forms of cyber-attacks as well as a massive number of low-end IoT devices. In this paper, we introduce a novel deep learning architecture based on auto-encoders that allows to develop a robust intrusion detection system. Specifically, we propose a novel neural network architecture called Twin Variational Auto-Encoder (TVAE) for representation learning. TVAE includes a variational Auto-Encoder (VAE) and an Auto-Encoder (AE) that share a common stage where the decoder of the VAE is used as the encoder of the AE. The TVAE is trained in an unsupervised manner to effectively transform the original representation of data at the input of the VAE into a new representation at the output of the AE. In the new representation space, the difference between normal and attack data is more distinguishable. A variant of TVAE, namely Twin Sparse Variational Auto-Encoder (TSVAE) is also introduced by imposing a sparsity constraint on the representation units. The effectiveness of TVAE and TSVAE is evaluated using popular IDS and IoT botnet datasets. The simulation results show that the accuracy of TVAE and TSVAE can achieve the best results on six datasets, which is higher than those of state-of-the-art AE and VAE variants. We also investigate various characteristics of TVAE in the latent space as well as in the data extraction process. Besides applications on the IoT IDS, TVAE can also be applicable to all conventional network IDSs.
- Published
- 2022
88. Social distancing and related technologies: fundamental background
- Author
-
Nguyen, CT, Hoang, DT, Nguyen, DN, Dutkiewicz, E, Nguyen, CT, Hoang, DT, Nguyen, DN, and Dutkiewicz, E
- Published
- 2022
89. Transfer Learning for Wireless Networks: A Comprehensive Survey
- Author
-
Nguyen, CT, Van Huynh, N, Chu, NH, Saputra, YM, Hoang, DT, Nguyen, DN, Pham, QV, Niyato, D, Dutkiewicz, E, Hwang, WJ, Nguyen, CT, Van Huynh, N, Chu, NH, Saputra, YM, Hoang, DT, Nguyen, DN, Pham, QV, Niyato, D, Dutkiewicz, E, and Hwang, WJ
- Abstract
With outstanding features, machine learning (ML) has become the backbone of numerous applications in wireless networks. However, the conventional ML approaches face many challenges in practical implementation, such as the lack of labeled data, the constantly changing wireless environments, the long training process, and the limited capacity of wireless devices. These challenges, if not addressed, can impede the effectiveness and applicability of ML in wireless networks. To address these problems, transfer learning (TL) has recently emerged to be a promising solution. The core idea of TL is to leverage and synthesize distilled knowledge from similar tasks and valuable experiences accumulated from the past to facilitate the learning of new problems. By doing so, TL techniques can reduce the dependence on labeled data, improve the learning speed, and enhance the ML methods' robustness to different wireless environments. This article aims to provide a comprehensive survey on the applications of TL in wireless networks. Particularly, we first provide an overview of TL, including formal definitions, classification, and various types of TL techniques. We then discuss diverse TL approaches proposed to address emerging issues in wireless networks. The issues include spectrum management, signal recognition, security, caching, localization, and human activity recognition, which are all important to next-generation networks, such as 5G and beyond. Finally, we highlight important challenges, open issues, and future research directions of TL in future wireless networks.
- Published
- 2022
90. Joint Speed Control and Energy Replenishment Optimization for UAV-assisted IoT Data Collection with Deep Reinforcement Transfer Learning
- Author
-
Chu, NH, Hoang, DT, Nguyen, DN, Van Huynh, N, Dutkiewicz, E, Chu, NH, Hoang, DT, Nguyen, DN, Van Huynh, N, and Dutkiewicz, E
- Abstract
Unmanned aerial vehicle (UAV)-assisted data collection has been emerging as a prominent application due to its flexibility, mobility, and low operational cost. However, under the dynamic and uncertainty of IoT data collection and energy replenishment processes, optimizing the performance for UAV collectors is a very challenging task. Thus, this paper introduces a novel framework that jointly optimizes the flying speed and energy replenishment for each UAV to significantly improve the overall system performance (e.g., data collection and energy usage efficiency). Specifically, we first develop a Markov decision process to help the UAV automatically and dynamically make optimal decisions under the dynamics and uncertainties of the environment. Although traditional reinforcement learning algorithms such as Q-learning and deep Q-learning can help the UAV to obtain the optimal policy, they often take a long time to converge and require high computational complexity. Therefore, it is impractical to deploy these conventional methods on UAVs with limited computing capacity and energy resource. To that end, we develop advanced transfer learning techniques that allow UAVs to “share” and “transfer” learning knowledge, thereby reducing the learning time as well as significantly improving learning quality. Extensive simulations demonstrate that our proposed solution can improve the average data collection performance of the system up to 200% and reduce the convergence time up to 50% compared with those of conventional methods.
- Published
- 2022
91. Relay-Aided Multi-User OFDM Relying on Joint Wireless Power Transfer and Self-Interference Recycling
- Author
-
Nasir, A. A., primary, Tuan, H. D., additional, Dutkiewicz, E., additional, Poor, H. V., additional, and Hanzo, L., additional
- Published
- 2022
- Full Text
- View/download PDF
92. Regularized Zero-Forcing Aided Hybrid Beamforming for Millimeter-Wave Multi-user MIMO Systems
- Author
-
Yu, H., primary, Tuan, H. D., additional, Dutkiewicz, E., additional, Poor, H. V., additional, and Hanzo, L., additional
- Published
- 2022
- Full Text
- View/download PDF
93. Performance Analysis of Uplink NOMA Systems with Hardware Impairments and Delay Constraints over Composite Fading Channels
- Author
-
Le, NP, Tran, LC, Huang, X, Choi, J, Dutkiewicz, E, Phung, SL, and Bouzerdoum, A
- Subjects
08 Information and Computing Sciences, 09 Engineering, 10 Technology ,Automobile Design & Engineering ,Computer Science::Information Theory - Abstract
In this paper, we propose a mixture gamma distribution based analytical framework for NOMA wireless systems over composite fading channels. We analyze the outage probability (OP), delay-limited throughput (TP) and effective capacity (EC) in uplink NOMA with imperfect successive interference cancellation (SIC) due to the presence of residual hardware impairments and delay constraints. A mixture gamma distribution is used to approximate the probability density functions of fading channels. Based on this, we obtain closed-form expressions in terms of Meijer-G functions for the OP, the TP and the EC. We also perform asymptotic analysis of these metrics to characterize system behaviors at the high signal-to-noise ratio regime. Moreover, upper-bounds for the EC is derived. Efficacy of NOMA over orthogonal multiple access is analytically examined. Unlike the existing works, our analytical expressions hold for NOMA systems with an arbitrary number of users per cluster over a wide range of channel models, including lognormal-Nakagami-m, KG, η-μ, Nakagami-q (Hoyt), κ-μ, Nakagami-n (Rician), Nakagami-m, and Rayleigh fading channels. This unified analysis facilitates evaluations of impacts of the residual interference, the power allocation among users, the delay quality-of-service exponent as well as the shadowing and small-scale fading parameters on the performance metrics. Simulation results are provided to validate theoretical analysis.
- Published
- 2021
94. Time Scheduling and Energy Trading for Heterogeneous Wireless-Powered and Backscattering-based IoT Networks
- Author
-
Nguyen, N-T, Nguyen, DN, Hoang, DT, Huynh, NV, Nguyen, N-H, Nguyen, Q-T, and Dutkiewicz, E
- Subjects
0805 Distributed Computing, 0906 Electrical and Electronic Engineering, 1005 Communications Technologies ,Networking & Telecommunications - Abstract
This article studies the strategic interactions between an IoT service provider (IoTSP) which consists of heterogeneous IoT devices and its energy service provider (ESP). To that end, we propose an economic framework using the Stackelberg game to maximize the network throughput and energy efficiency of both the IoTSP and ESP. To obtain the Stackelberg equilibrium (SE), we apply a backward induction technique which first derives a closed-form solution for the ESP (follower). Then, to tackle the non-convex optimization problem for the IoTSP (leader), we leverage the block coordinate descent and convex-concave procedure techniques to design two partitioning schemes (i.e., partial adjustment (PA) and joint adjustment (JA)) to find the optimal energy price and service time that constitute local SEs. Numerical results reveal that by jointly optimizing the energy trading and time allocation for IoT devices, one can achieve significant improvements in terms of the IoTSP's profit compared with those of conventional transmission methods (up to 38.7 folds). Different tradeoffs between the ESP's and IoTSP's profits and complexities of the PA/JA schemes can also be numerically tuned. Simulations also show that the obtained local SEs approach the optimal social welfare when the benefit per transmitted bit exceeds a given threshold.
- Published
- 2021
95. Energy-Harvesting Aided Unmanned Aerial Vehicles for Reliable Ground User Localization Under Lognormal-Nakagami-m Fading Channels
- Author
-
Le, NP, Tran, LC, Huang, X, Dutkiewicz, E, Ritz, C, Phung, SL, Bouzerdoum, A, Franklin, D, and Hanzo, L
- Subjects
08 Information and Computing Sciences, 09 Engineering, 10 Technology ,Automobile Design & Engineering - Published
- 2021
96. Transfer Learning for Future Wireless Networks: A Comprehensive Survey
- Author
-
Nguyen, CT, Van Huynh, N, Chu, NH, Saputra, YM, Hoang, DT, Nguyen, DN, Pham, Q-V, Niyato, D, Dutkiewicz, E, Hwang, W-J, Nguyen, CT, Van Huynh, N, Chu, NH, Saputra, YM, Hoang, DT, Nguyen, DN, Pham, Q-V, Niyato, D, Dutkiewicz, E, and Hwang, W-J
- Published
- 2021
97. Secure Swarm UAV-assisted Communications with Cooperative Friendly Jamming
- Author
-
Dang-Ngoc, H, Nguyen, DN, Ho-Van, K, Hoang, DT, Dutkiewicz, E, Pham, Q-V, Hwang, W-J, Dang-Ngoc, H, Nguyen, DN, Ho-Van, K, Hoang, DT, Dutkiewicz, E, Pham, Q-V, and Hwang, W-J
- Published
- 2021
98. Federated Learning Framework with Straggling Mitigation and Privacy-Awareness for AI-based Mobile Application Services
- Author
-
Saputra, YM, Nguyen, DN, Hoang, DT, Pham, Q-V, Dutkiewicz, E, Hwang, W-J, Saputra, YM, Nguyen, DN, Hoang, DT, Pham, Q-V, Dutkiewicz, E, and Hwang, W-J
- Published
- 2021
99. Jointly Optimize Coding and Node Selection for Distributed Computing over Wireless Edge Networks
- Author
-
Nguyen, CT, Nguyen, DN, Hoang, DT, Pham, H-A, Dutkiewicz, E, Nguyen, CT, Nguyen, DN, Hoang, DT, Pham, H-A, and Dutkiewicz, E
- Published
- 2021
100. Joint Coding and Scheduling Optimization for Distributed Learning over Wireless Edge Networks
- Author
-
Van Huynh, N, Hoang, DT, Nguyen, DN, Dutkiewicz, E, Van Huynh, N, Hoang, DT, Nguyen, DN, and Dutkiewicz, E
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.