This paper investigates the covert millimeter wave (mmWave) communication in the finite block-length regime, where spatially random wardens attempt to determine the presence of transmission. First, we derive a novel e...
详细信息
ISBN:
(纸本)9781538674628
This paper investigates the covert millimeter wave (mmWave) communication in the finite block-length regime, where spatially random wardens attempt to determine the presence of transmission. First, we derive a novel expression of covertness constraint by using the tools of stochastic geometry, based on which the expression of average effective covert throughput (AECT) is also presented. Then, considering the constraint of maximal available block-length, the optimization problem for maximizing the AECT is formulated, and the optimal transmit power and block-length are analytically determined. Our results show the superiority of our optimization in terms of AECT in contrast to the fixed block-length case, and the improvement is more significant when the density of wardens becomes large. Furthermore, the performance of covert mmWave communication can indeed be improved via increasing the number of antennas even there exist random distributed wardens.
MAESTRO-EP (Multi-Architecture Ensemble System for Temporal Reasoning and Outcome Prediction in Event Processing) is an innovative deep learning framework designed to model and predict outcomes in complex event-driven...
详细信息
Blood cancer is known as hematologic cancer, and leukemia is a type of blood cancer that infects the body's white blood cells and bone marrow, leading to a painful death. This paper introduces an automatic techniq...
详细信息
Relaxing the sequential specification of shared objects has been proposed as a promising approach to obtain implementations with better complexity. In this paper, we study the step complexity of relaxed variants of tw...
详细信息
ISBN:
(纸本)9781665445139
Relaxing the sequential specification of shared objects has been proposed as a promising approach to obtain implementations with better complexity. In this paper, we study the step complexity of relaxed variants of two common shared objects: max registers and counters. In particular, we consider the k-multiplicative-accurate max register and the k-multiplicative-accurate counter, where read operations are allowed to err by a multiplicative factor of k (for some k is an element of N). More accurately, reads are allowed to return an approximate value x of the maximum value v previously written to the max register, or of the number v of increments previously applied to the counter, respectively, such that v/k <= x <= v.k. We provide upper and lower bounds on the complexity of implementing these objects in a wait-free manner in the shared memory model.
Traditional graph-processing algorithms have been widely used in Graph Neural Networks (GNNs). This combination has shown state-of-the-art performance in many real-world network mining tasks. Current approaches to gra...
详细信息
The proceedings contain 146 papers. The topics discussed include: trajectory tracking controller design for percutaneous interventional procedures;Bregman divergence based approach for adaptive system identification a...
ISBN:
(纸本)9798350349207
The proceedings contain 146 papers. The topics discussed include: trajectory tracking controller design for percutaneous interventional procedures;Bregman divergence based approach for adaptive system identification and line enhancement;real-time hardware-in-loop testbed for power system analysis;regularized hybrid deep learning for DDoS attack prediction in software defined Internet of Things (SD-IoT);investigation of core loss in electric vehicle induction motor using finite element analysis for performance enhancement;fault-tolerant strategy for asymmetrical half-bridge converter in switched reluctance motor drives;protection coordination impact on reliability of distribution systems with distributed energy resources;and design and control of shunt active power filter for power quality improvements with PV array.
Significant performance improvements in bandwidth and latency make 5G a suitable candidate for a wide range of applications, particularly those requiring real-time communication, such as Industrial Control systems (IC...
详细信息
ISBN:
(纸本)9798350367959;9798350367942
Significant performance improvements in bandwidth and latency make 5G a suitable candidate for a wide range of applications, particularly those requiring real-time communication, such as Industrial Control systems (ICS) and autonomous vehicles. However, today's security, including modern cryptographic systems, is prone to different attacks caused by the high computational power of quantum computing, highlighting the need for integrating quantum-resistant security measures. To accommodate attacks targeted at 5G networks, there are efforts to move towards TLS-based security, which is the widely accepted standard across networks. However, integrating post-quantum algorithms must also be considered in such a transition. Thus, this paper is the first to perform the integration of Post-quantum TLS (PQ-TLS) protocols into 5G networks and offer a realistic performance evaluation. Our approach focuses on integrating PQ-TLS into the 5G control plane (CP) without requiring a major overhaul, thus ensuring communications' interoperability even with legacy components of 5G, which may not support TLS. Specifically, we have updated the registration and authentication protocols for both core network functions and user equipment (UE) by implementing a TLS tunneling approach through virtualization. We then evaluate the performance and feasibility of PQ-TLS in enhancing the security of 5G communications on an actual testbed. Our results demonstrate that while PQ algorithms introduce some overhead, they remain viable for 5G applications, particularly for protocols that can run on the core network.
Dynamic taint tracking is a powerful information flow analysis approach, which can be applied in many analysis scenarios, e.g., debugging, testing, and security vulnerability detection. Most dynamic taint tracking app...
详细信息
ISBN:
(数字)9781665416931
ISBN:
(纸本)9781665416931
Dynamic taint tracking is a powerful information flow analysis approach, which can be applied in many analysis scenarios, e.g., debugging, testing, and security vulnerability detection. Most dynamic taint tracking approaches are designed for standalone systems, and cannot support inter-node taint tracking in distributedsystems. Few inter-node taint tracking approaches are designed for specific distributedsystems, e.g., Apache Spark, and require specific modifications to different distributedsystems. In this paper, we present DisTA, a generic dynamic taint tracking tool for Java-based distributedsystems. By instrumenting common network communication modules in Java, DisTA can perform inter-node taint tracking for different distributedsystems with little manual efforts. We evaluate DisTA on five large-scale real-world distributedsystems, e.g., ZooKeeper and Yarn, and require only 10 LOC launch script modification on average. The experimental results show that DisTA can accurately track all inter-node taints with a relatively low overhead.
distributed photovoltaic grid integration brings many negative effects to the distribution network, and carrying out the research on its consumption capacity (CC) in the distribution network is the key to guarantee th...
详细信息
Tower cranes play a vital role in various industries due to their extensive workspace and high lifting capacity. However, their underactuated characteristics and complex nonlinear dynamics bring significant challenges...
详细信息
暂无评论