
-
Additive Link Metrics Identification: Proof of Selected Lemmas and Propositions
This is a technical report, containing all the lemma and proposition pro...
read it
-
Identification of Additive Link Metrics: Proof of Selected Theorems
This is a technical report, containing all the theorem proofs in the fol...
read it
-
Efficient Identification of Additive Link Metrics: Theorem Proof and Evaluations
This is a technical report, containing all the theorem proofs and additi...
read it
-
Partial Network Identifiability: Theorem Proof and Evaluation
This is a technical report, containing all the theorem proofs and additi...
read it
-
Link Identifiability with Two Monitors: Proof of Selected Theorems
This is a technical report, containing all the theorem proofs in paper "...
read it
-
Fundamental Theories in Node Failure Localization
This is a technical report, containing all the theorem proofs in paper "...
read it
-
Failure Localization Capability: Theorem Proof and Evaluation
This is a technical report, containing all the theorem proofs and additi...
read it
-
Node Failure Localization: Theorem Proof
This is a technical report, containing all the theorem proofs in paper "...
read it
-
Distributed Scheduling using Graph Neural Networks
A fundamental problem in the design of wireless networks is to efficient...
read it
-
Adaptive Contention Window Design using Deep Q-learning
We study the problem of adaptive contention window (CW) design for rando...
read it
-
Resource Allocation in One-dimensional Distributed Service Networks with Applications
We consider assignment policies that allocate resources to users, where ...
read it
-
On the Analysis of Spatially Constrained Power of Two Choice Policies
We consider a class of power of two choice based assignment policies for...
read it
-
You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning
As Deep Packet Inspection (DPI) middleboxes become increasingly popular,...
read it
-
Unsupervised Joint k-node Graph Representations with Compositional Energy-Based Models
Existing Graph Neural Network (GNN) methods that learn inductive unsuper...
read it
-
An Extension of Fano's Inequality for Characterizing Model Susceptibility to Membership Inference Attacks
Deep neural networks have been shown to be vulnerable to membership infe...
read it
-
Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
The emergence of Internet of Things (IoT) brings about new security chal...
read it
-
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency
There has been a recent surge in research on adversarial perturbations t...
read it
-
GraphCL: Contrastive Self-Supervised Learning of Graph Representations
We propose Graph Contrastive Learning (GraphCL), a general framework for...
read it
-
Topology Inference with Multivariate Cumulants: The Möbius Inference Algorithm
Many tasks regarding the monitoring, management, and design of communica...
read it
-
A Multifactorial Optimization Paradigm for Linkage Tree Genetic Algorithm
Linkage Tree Genetic Algorithm (LTGA) is an effective Evolutionary Algor...
read it
-
Resource Sharing in the Edge: A Distributed Bargaining-Theoretic Approach
The growing demand for edge computing resources, particularly due to inc...
read it
-
Let's Share: A Game-Theoretic Framework for Resource Sharing in Mobile Edge Clouds
Mobile edge computing seeks to provide resources to different delay-sens...
read it
-
SENSE: Semantically Enhanced Node Sequence Embedding
Effectively capturing graph node sequences in the form of vector embeddi...
read it
-
Quickest Detection of Growing Dynamic Anomalies in Networks
The problem of quickest growing dynamic anomaly detection in sensor netw...
read it
-
MACS: Deep Reinforcement Learning based SDN Controller Synchronization Policy Design
In distributed software-defined networks (SDN), multiple physical SDN co...
read it
-
A Game-Theoretic Framework for Resource Sharing in Clouds
Providing resources to different users or applications is fundamental to...
read it
-
Attribution-driven Causal Analysis for Detection of Adversarial Examples
Attribution methods have been developed to explain the decision of a mac...
read it
-
Resource Allocation in One-dimensional Distributed Service Networks
We consider assignment policies that allocate resources to users, where ...
read it
-
A queueing-theoretic model for resource allocation in one-dimensional distributed service network
We consider assignment policies that allocate resources to requesting us...
read it
-
A Game-Theoretic Approach to Multi-Objective Resource Sharing and Allocation in Mobile Edge Clouds
Mobile edge computing seeks to provide resources to different delay-sens...
read it
-
Adversarial Perturbations Against Real-Time Video Classification Systems
Recent research has demonstrated the brittleness of machine learning sys...
read it
-
Multi-Armed Bandits on Unit Interval Graphs
An online learning problem with side information on the similarity and d...
read it
-
Joint Data Compression and Caching: Approaching Optimality with Guarantees
We consider the problem of optimally compressing and caching data across...
read it
-
The Internet of Battle Things
The battlefield of the future will be densely populated by a variety of ...
read it
-
Optimal Energy Consumption with Communication, Computation, Caching and QoI-Guarantee
Energy efficiency is a fundamental requirement of modern data communicat...
read it
-
Optimal Energy Tradeoff among Communication, Computation and Caching with QoI-Guarantee
Many applications must ingest and analyze data that are continuously gen...
read it
-
Outlier Detection from Network Data with Subnetwork Interpretation
Detecting a small number of outliers from a set of data observations is ...
read it
-
Modeling Group Dynamics Using Probabilistic Tensor Decompositions
We propose a probabilistic modeling framework for learning the dynamic p...
read it
-
Crafting Adversarial Input Sequences for Recurrent Neural Networks
Machine learning models are frequently used to solve complex security pr...
read it
-
Extending Detection with Forensic Information
For over a quarter century, security-relevant detection has been driven ...
read it
-
Practical Black-Box Attacks against Machine Learning
Machine learning (ML) models, e.g., deep neural networks (DNNs), are vul...
read it
-
The Limitations of Deep Learning in Adversarial Settings
Deep learning takes advantage of large datasets and computationally effi...
read it
-
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
Deep learning algorithms have been shown to perform extremely well on ma...
read it