Muhammad Fawad Khan, Haoran Mei, Shahnila Rahim, Limei Peng, P. Ho
{"title":"Multi-RIS Deployment for High Data-Rate Communications","authors":"Muhammad Fawad Khan, Haoran Mei, Shahnila Rahim, Limei Peng, P. Ho","doi":"10.1109/NaNA56854.2022.00076","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00076","url":null,"abstract":"This paper proposes using multiple reconfigurable intelligent surfaces (RISs) in SISO communications, considering that RISs can flexibly extend the wireless communication range. In a given area with multiple RISs, we propose an algorithm to select the optimal locations from a set of candidate points to deploy the RISs, aiming to maximize the achievable data rate. We investigate the impact of single-hop and multi-hops communication on the achievable data rate for the proposed algorithm and the results show that the deployment height and number of communication hops significantly affect the achievable data rate.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117168335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yifan Li, Chunjie Cao, Hong Zhang, Xiuhua Wen, Yang Sun, Keqi Zhan
{"title":"Feature Extraction and Identification of Specific Radiation Sources Based on Axial Integral Bispectrum and Deep Residual Shrinkage Network","authors":"Yifan Li, Chunjie Cao, Hong Zhang, Xiuhua Wen, Yang Sun, Keqi Zhan","doi":"10.1109/NaNA56854.2022.00010","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00010","url":null,"abstract":"In the existing research on the identification of specific radiation sources, some noise inevitably occurs when classifying samples, which affects the extraction of Radio frequency fingerprint (RFF) with unique native properties, thus reducing the classification accuracy. In this paper, a feature extraction and identification method for specific radiation sources based on the integration of axial integral bispectrum features and deep residual shrinkage networks(DRSN) is proposed. First, the axial integral bispectrum is used to extract the signal features, and then the signal is denoised by soft thresholding in the deep residual shrinkage network, and the threshold is automatically set according to the situation of each sample using the attention mechanism. The experimental results show that the new method can effectively improve the classification accuracy under low signal-to-noise ratio, and in the case of low signal-to-noise ratio, the maximum distance of 62ft can achieve 98.5% classification and recognition accuracy.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123037187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ke Zhao, Mian Muaz Razaq, Kaixin Li, Limei Peng, P. Ho
{"title":"3D Deployment of UAVs for Communications under Multiple Eavesdroppers","authors":"Ke Zhao, Mian Muaz Razaq, Kaixin Li, Limei Peng, P. Ho","doi":"10.1109/NaNA56854.2022.00081","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00081","url":null,"abstract":"This paper proposes to use UAVs with adjustable beamforming as mobile base stations and studies to deploy them in a 3D manner to ensure secure communications in the presence of eavesdroppers. We aim to deploy the UAVs with appropriate beamforming in the optimal positions to maximize the signal strength of normal users while jamming the eavesdroppers by minimizing their received signal strength. Specifically, the objective is to maximize the total number of successfully served APs and jammed eavesdroppers. To achieve the goals, we propose a genetic algorithm (GA) by adjusting the $mathbf{3D}$ positions and beamwidths of UAV s. Simulation results show that the signal-to-interference-noise-ratio (SINR) threshold significantly affects the overall performance, and the proposed GA outperforms the existing differential evolution algorithm (DE).","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121238547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Partial Computation Offloading and Resource Allocation via Deep Deterministic Policy Gradient","authors":"Yingxin Shan, Peng Liao, Zhuo Wang, Lin An","doi":"10.1109/NaNA56854.2022.00070","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00070","url":null,"abstract":"Recent years have seen an explosive growth of mobile Internet applications, with a plethora of computation-intensive and latency-sensitive services running on the Internet of Things (IoT), posing a great challenge to its limited network resources. Computation offloading technology, as a hot direction in the field of mobile edge computing (MEC), can provide a reliable means to achieve efficient computation migration strate-gies. In this paper, we focus on optimizing the task offloading and resource allocation problem in the MEC system by a deep deterministic policy gradient (DDPG). For our simulated deployment of a single MEC server and multi-user scenario, we design a task cache queue for each terminal user and define the allocation ratio vectors of task offloading and resource allocation. By minimizing the weighted sum of the total time latency and the energy consumption, an optimal solution can be achieved via the DDPG. Experimental results show that the proposed scheme performs better in reducing total system overhead than the baselines.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116105533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Du, Yang Kai, Zhentao Huang, Lin Jiang, Huang Lei, Haixia Yu
{"title":"Research on Intrusion Detection Algorithm Based on Optimized CNN-LSTM","authors":"J. Du, Yang Kai, Zhentao Huang, Lin Jiang, Huang Lei, Haixia Yu","doi":"10.1109/NaNA56854.2022.00024","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00024","url":null,"abstract":"With the development of computer network technology, network security has become more and more important, and intrusion detection has become an important means of network attack detection. In recent years, machine learning has played an irreplaceable role in many fields. In order to improve the accuracy of intrusion detection, many machine learning algorithms have been applied in intrusion detection models. Through the learning of training samples in KDDCUP99 intrusion data, this paper uses the relevant theory of neural network to construct an intrusion detection classification model based on optimized convolutional neural network and long short-term memory network, which is used to distinguish between normal state and various intrusion states. Convolutional neural networks, deep neural networks and traditional decision tree algorithms are compared in details in terms of accuracy and loss. The experimental results show that the prediction accuracy of the algorithm proposed in this paper is 0.972, and the test loss is 0.045, which effectively improves the classification accuracy of intrusion detection. Finally, the future development direction and prospects of the algorithm are prospected to further improve the security of computer networks.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"603 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116350726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Yu, Shuai Gao, Ningchun Liu, Hongchao Wang, Wei Su
{"title":"A Cache-enabled NDN Forwarding Plane based on Programmable Switches","authors":"Lei Yu, Shuai Gao, Ningchun Liu, Hongchao Wang, Wei Su","doi":"10.1109/NaNA56854.2022.00033","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00033","url":null,"abstract":"Named Data Networking (NDN) is a promising network architecture proposed to realize efficient information distribution. Unlike TCP/IP, NDN uses content names to forward packets. As a result, the deployment of NDN on current network equipment faces challenges. Meanwhile, the rapid development of the programmable data plane makes it possible to implement NDN with Programmable Data Plane (PDP) switches. In this paper, we propose a cache-enabled NDN forwarding plane using P4 in which massive caching and file transfers are well supported. A dedicated process is designed to take over the cache and communicate with the P4 switch process. Hash indexes are used in PIT and CS to improve query speed. In addition, we improve the NDN multicast pipeline design to support efficient and reliable file transfer services. Experimental results show that our NDN switch can achieve considerable throughput improvement.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130839436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy-Preserving Gait Recognition Scheme Under Homomorphic Encryption","authors":"Leyu Lin, Bo Tian, Yue Zhao, Yiru Niu","doi":"10.1109/NaNA56854.2022.00075","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00075","url":null,"abstract":"In recent years, machine learning and deep neural networks have achieved remarkable results and have been widely used in different domains. Affected by COVID-19, the potential of gait feature recognition in biometric authentication has gradually emerged. However, machine learning algorithms are generally demanded in terms of computing power, sometimes need the support of cloud service providers, and require raw data, which is often sensitive, most privacy-preserving approaches only encrypted the trained model, and the data collected from users are unprotected. We propose a scheme for running deep neural networks on encrypted data using homomorphic encryption to address these issues.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yichuan Wang, Yanhua Feng, Yanning Du, X. Hei, Yuying Tian, Xiangjie Cui
{"title":"Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration","authors":"Yichuan Wang, Yanhua Feng, Yanning Du, X. Hei, Yuying Tian, Xiangjie Cui","doi":"10.1109/NaNA56854.2022.00055","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00055","url":null,"abstract":"In recent years, dynamic loading technologies of Android applications have emerged in an endless stream. At present, the existing Android application loading method is to load the entire Android Dalvik Executable (DEX) file for cloud-end collaboration, and there is a problem of finer-grained loading optimization in the loading process. Based on the analysis of Android DEX file in this paper, a formal model of each class is established by using the analysis result of this file, analyzes the user's behavior, and tries to ensure that the class to be used in high probability is loaded into memory first, and a block-streaming service loading optimization model of Android DEX file is put forward. The validity of the model is verified by quantitative analysis of Android DEX file. Trying to load the whole Dalvik Executable file and the classes needed by the application separately, recording and comparing the storage space and loading time overhead. In order to avoid the uncertain factors of the network environment, the above files have been tested and recorded several times. The result shows that the time and storage space for loading the whole DEX file are far greater than the sum of the classes required by the application. With this model, the fine-grained formal analysis of Android DEX file can be performed, which is of great significance for exploring the loading method of application block flow service.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115748061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kaixin Li, Ke Zhao, Muhammad Fawad Khan, P. Ho, Limei Peng
{"title":"UAV-mounted Intelligent Reflecting Surface (IRS) MISO Communications","authors":"Kaixin Li, Ke Zhao, Muhammad Fawad Khan, P. Ho, Limei Peng","doi":"10.1109/NaNA56854.2022.00019","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00019","url":null,"abstract":"This paper proposes using the unmanned aerial vehicle (UAV)-mounted intelligent reflecting surface (IRS) as a flying relay to enable the communication between the base station (BS) and suburb access points (APs). Since the UAV flight endurance is mainly affected by the weight of the IRS mounted on it, it is significant to reduce the IRS weight by minimizing the number of its reflecting elements. Regarding this, we propose an Optimized Phase Shift (OPS) algorithm to adjust the phase shift of the IRS reflecting elements, aiming to minimize the number of IRS reflecting elements required to successfully serve the APs while satisfying the signal-to-noise ratio (SNR) requirement.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125065847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel Capacity Analysis for Diffusive Molecular Communication with a Partly Covered Comprehensive Reactive Receiver","authors":"Junning Zhu, Xuening Liao, Zhenqiang Wu","doi":"10.1109/NaNA56854.2022.00015","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00015","url":null,"abstract":"Molecular communication (MC) is a technology that utilizes microscopic particles such as molecules to communicate at the microscopic scale in living organisms. The nanomachine receiver as a critical part of MC has been extensively investigated. However, existing analyses of nanomachine receivers rarely consider the effects of various chemical reactions. In the few papers that considered the effect of chemical reaction on the channel, the effect of receptor coverage on the receiver surface was also not considered. To fill this gap, this paper studies the variation of channel capacity with coverage rate when the surface of the nanomachine receiver is partially covered with the receptors. This paper derived numerical results of channel capacity under the scenarios above and carried out the numerical simulations. The simulation results show that the channel capacity increases with the increase of coverage, which can guide the design of high-performance nanomachines.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127426574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}