Load imbalance can lead to the emergence of stragglers, i.e., join instances that significantly lag behind others in processing data streams. Currently, state-of-the-art solutions are capable of balancing the load bet...
详细信息
This paper proposes an unsupervised deep-learning (DL) approach by integrating Transformer and Kolmogorov-Arnold networks (KAN) termed KANsformer to realize scalable beamforming for mobile communication systems. Speci...
详细信息
The rapid development of the low-altitude economy (LAE) has significantly increased the utilization of autonomous aerial vehicles (AAVs) in various applications, necessitating efficient and secure communication method...
详细信息
The rapid development of the low-altitude economy (LAE) has significantly increased the utilization of autonomous aerial vehicles (AAVs) in various applications, necessitating efficient and secure communication methods among AAV swarms. In this work, we aim to introduce distributed collaborative beamforming (DCB) into AAV swarms and handle the eavesdropper collusion by controlling the corresponding signal distributions. Specifically, we consider a two-way DCB-enabled aerial communication between two AAV swarms and construct these swarms as two AAV virtual antenna arrays. Then, we minimize the two-way known secrecy capacity and maximum sidelobe level to avoid information leakage from the known and unknown eavesdroppers, respectively. Simultaneously, we also minimize the energy consumption of AAVs when constructing virtual antenna arrays. Due to the conflicting relationships between secure performance and energy efficiency, we consider these objectives by formulating a multi-objective optimization problem, which is NP-hard and with a large number of decision variables. Accordingly, we design a novel generative swarm intelligence (GenSI) framework to solve the problem with less overhead, which contains a conditional variational autoencoder (CVAE)-based generative method and a proposed powerful swarm intelligence algorithm. In this framework, CVAE can collect expert solutions obtained by the swarm intelligence algorithm in other environment states to explore characteristics and patterns, thereby directly generating high-quality initial solutions in new environment factors for the swarm intelligence algorithm to search solution space efficiently. Simulation results show that the proposed swarm intelligence algorithm outperforms other state-of-the-art baseline algorithms, and the GenSI can achieve similar optimization results by using far fewer iterations than the ordinary swarm intelligence algorithm. Experimental tests demonstrate that introducing the CVAE mechanism ach
In this paper, we introduce a novel uplink semantic relay (SemRelay)-aided wireless communication system, catering to multiple users by leveraging a shared probability graph between the SemRelay and the base station (...
详细信息
ISBN:
(数字)9781728190549
ISBN:
(纸本)9781728190556
In this paper, we introduce a novel uplink semantic relay (SemRelay)-aided wireless communication system, catering to multiple users by leveraging a shared probability graph between the SemRelay and the base station (BS). In this system, users transmit text information to the SemRelay through conventional bit transmission, and the SemRelay compresses this information using a knowledge based characterized by probability graph before transmitting it to the BS through semantic communication. Then, the BS recovers the information based on the shared probability graph. While the semantic information compression incurs computational resource consumption, it significantly reduces communication resource usage. This paper addresses the challenge of minimizing overall system latency through jointly optimizing communication and computation re-source allocation, considering limited wireless resources and the system's energy budget. To address this problem, we introduce an efficient iterative algorithm, which employs block coordinate descent for communication resource allocation and exhaustive searching for determining the optimal data compression scheme. In particular, both power allocation subproblem and bandwidth allocation subproblem are proved to be convex. The complexity analysis of the proposed algorithm are also provided. Numerical results validate the effectiveness of the proposed algorithm and the superior performance of semantic communication compared to the conventional bit transmission.
Mobile Edge computing (MEC) offers low-latency and high-bandwidth support for Internet-of-Vehicles (IoV) applications. However, due to high vehicle mobility and finite communication coverage of base stations, it is ha...
详细信息
One of the innovations brought by Mirai and its derived malware is the adoption of self-contained loaders for infecting IoT devices and recruiting them in botnets. Functionally decoupled from other botnet components a...
One of the innovations brought by Mirai and its derived malware is the adoption of self-contained loaders for infecting IoT devices and recruiting them in botnets. Functionally decoupled from other botnet components and not embedded in the payload, loaders cannot be analysed using conventional approaches that rely on honeypots for capturing samples. Different approaches are necessary for studying the loaders evolution and defining a genealogy. To address the insufficient knowledge about loaders' lineage in existing studies, in this paper, we propose a semantic-aware method to measure, categorize, and compare different loader servers, with the goal of highlighting their evolution, independent from the payload evolution. Leveraging behavior-based metrics, we cluster the discovered loaders and define eight families to determine the genealogy and draw a homology map. Our study shows that the source code of Mirai is evolving and spawning new botnets with new capabilities, both on the client side and the server side. In turn, shedding light on the infection loaders can help the cybersecurity community to improve detection and prevention tools.
The lightweight block cipher PRESENT was presented at the International Conference on Cryptographic Hardware and Embedded Systems (CHES) in 2007, and it has become a standard of ISO/IEC-29192-2 for lightweight cryptos...
详细信息
The lightweight block cipher PRESENT was presented at the International Conference on Cryptographic Hardware and Embedded Systems (CHES) in 2007, and it has become a standard of ISO/IEC-29192-2 for lightweight cryptosystems since 2012. Within the environment of the Internet of Things, this cipher is applicable to Radio Frequency Identification, network sensors, and smart cards. Its secret key can be either 80 or 128 bits long, while the block is 128 bits long. Since the publication of the PRESENT, numerous forms of cryptanalysis have been developed in order to evaluate its level of security. Some examples of these attacks include the differential attack, the linear attack, the integral attack, the algebraic attack, the fault attack, the side-cube attack, and the Biclique attack. All of these cryptanalyses are on the basis of the assumption that an attack using a chosen plaintext or an attack using a known plaintext would occur. In order to carry out a chosen-plaintext attack, an attacker must have the ciphertexts along with the plaintexts that go along with them, whereas a known-plaintext attack requires a significant quantity of plaintexts and ciphertexts. The ciphertext-only attack is distinct from the chosen-plaintext attack and the known-plaintext attack, which require the ciphertext only in order to be successful. In this sense, the ciphertext-only attack is relevant in a range of scenarios. There is no research that has been released yet regarding PRESENT'S resilience to the ciphertext-only attack. This study presents a novel meet-in-the-middle statistical fault analysis using the approach of statistical analysis and meet-in-the-middle attack of PRESENT. This analysis is able to decrypt the 80-bit and 128-bit secret keys of PRESENT with a series of new distinguishers that include the Pearson correlation coefficient-Hamming weight, the Kullback Leibler divergence- Hamming weight, and the Jaccard similarity coefficient-Hamming weight-maximum likelihood estimatio
Space-air-ground integrated networks (SAGINs) are emerging as a pivotal element in the evolution of future wireless networks. Despite their potential, the joint design of communication and computation within SAGINs re...
详细信息
Semantic Communication (SemCom) is a promising new paradigm for next-generation communication systems, emphasizing the transmission of core information, particularly in environments characterized by uncertainty, noise...
详细信息
The Integrated Sensing and Communications (ISAC) paradigm is anticipated to be a cornerstone of the upcoming 6G networks. In order to optimize the use of wireless resources, 6G ISAC systems need to harness the communi...
详细信息
暂无评论