2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)最新文献

筛选
英文 中文
Stochastic Analysis of UDNs With Resource Capacity and User Scheduling 具有资源容量和用户调度的udn随机分析
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902783
Yassine Hmamouche, M. Benjillali, S. Saoudi
{"title":"Stochastic Analysis of UDNs With Resource Capacity and User Scheduling","authors":"Yassine Hmamouche, M. Benjillali, S. Saoudi","doi":"10.1109/WCNCW.2019.8902783","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902783","url":null,"abstract":"In this paper, we investigate the impact of antenna elevation, resource capacity and user scheduling on the performance of ultra-dense networks (UDNs). Using tools from stochastic geometry (SG), we extend a recently introduced definition of coverage probability by inducing a generic thinning that can capture BSs with available resource capacity to transmit users data. Analytical results are then derived for the coverage probability and the average achievable rate, where we obtain closed-form expressions allowing to assess UDNs performance in a more tractable and meaningful fashion compared to the conventional definition of coverage probability. Moreover, we show that the average rate under the new definition requires only the computation of a two-fold numerical integral rather than a four-fold integral in the previous works, which is expected to significantly reduce computational complexity. Comparing the obtained results, we find that the impact of parameters, such as resource capacity, BS transmit power as well as the implementation complexity of scheduling schemes are irrelevant as network density increases, which suggests new insights into the role of these parameters in UDNs.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125285369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Malware Detection Based on System Calls Analysis and CNN Classification 基于系统调用分析和CNN分类的Android恶意软件检测
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902627
Abada Abderrahmane, Guettaf Adnane, Challal Yacine, Garri Khireddine
{"title":"Android Malware Detection Based on System Calls Analysis and CNN Classification","authors":"Abada Abderrahmane, Guettaf Adnane, Challal Yacine, Garri Khireddine","doi":"10.1109/WCNCW.2019.8902627","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902627","url":null,"abstract":"Android is the most used mobile operating system in the world with two billion monthly active users in May 2017 [1]. Provided by Google, to be used on a multitude of smartphones, tablets and other connected objects. It allows the installation of a variety of applications for messaging, calling, news or video games.This multitude of applications facilitate the user’s life and make the device a database rich in personal information such as phone number, emails, messages, confidential correspondence, etc., serving also as a good information repository for hackers. This gives rise to a wave of malignity, using suspicious applications, usually for profit (surcharged messages, sale of personal information or even tools of pressure and threat), or to satisfy personal desires (curiosity, vandalism …).Our solution proposes a behavioral dynamic analysis of the applications likely to be a source of malignancy. The application will be sent towards a distant server through a user-friendly and simple to use interface. It will be installed and executed with a simulation of a human use. After execution, system calls generated by the Linux kernel are collected, processed, and provided to the neural network model that will be used to predict whether the analyzed applications are malware or goodware. This model is built and refined using an APK database varied between goodware and malware.We used a neural network for automatic learning, and more precisely the Convolutional Neural Network (CNN). Our method uses matrix representation of collected system calls and input to the CNN model, a less expensive representation in memory space and therefore accelerate the process of learning.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Forecasting Spectrum Demand for UAVs Served by Dedicated Allocation in Cellular Networks 蜂窝网络中专用分配服务无人机频谱需求预测
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902713
R. Amorim, I. Kovács, J. Wigard, T. B. Sørensen, P. Mogensen
{"title":"Forecasting Spectrum Demand for UAVs Served by Dedicated Allocation in Cellular Networks","authors":"R. Amorim, I. Kovács, J. Wigard, T. B. Sørensen, P. Mogensen","doi":"10.1109/WCNCW.2019.8902713","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902713","url":null,"abstract":"In this paper, the usage of dedicated portions of cellular spectrum to provide the high-reliable Command and Control (C2) link for Unmanned Aerial Vehicles (UAVs) is evaluated. Simulations are performed using data settings of a real operating Long-Term Evolution (LTE) network in Denmark, in order to assess the reliability of the C2 link. Up to date databases of drone registrations and market projections are used to infer the drone densities and estimate the future traffic demand. Based on these estimations, network capacity results show that, deploying a sparse network with reservation of 1.4 MHz is sufficient for most cases according to current demands. In the next 20 years, the increase in demand can be followed by a continuous deployment of sites and an increase in the bandwidth up to 5 MHz. The paper also presents a discussion about which solutions can be used to further boost network capacity, and help to achieve high reliability even for the most stringent traffic demand cases.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128215067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Low complexity Detector for massive uplink random access with NOMA in IoT LPWA networks 物联网LPWA网络中基于NOMA的大规模上行随机接入的低复杂度检测器
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902806
Diane Duchemin, J. Gorce, C. Goursaud
{"title":"Low complexity Detector for massive uplink random access with NOMA in IoT LPWA networks","authors":"Diane Duchemin, J. Gorce, C. Goursaud","doi":"10.1109/WCNCW.2019.8902806","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902806","url":null,"abstract":"We focus on the random uplink transmissions of an unknown subset of nodes, disseminated in a cell. Under the constraints of massive Machine Type Communication (MTC) in cellular Low Power Wide Area Networks (LPWAN) and Ultra Reliable Low Latency Communications (URLLC), we assume a low coordination with the receiver and the usage of Gaussian coded Non Orthogonal Multiple Access (NOMA). We then target direct data transmission and thus propose a low complexity optimal-based detection of the active users: the It- MAP. This algorithm relies on the Maximum A Posteriori (MAP) detector and, similarly to Orthogonal Matching Pursuit (OMP)- like algorithms, proceeds by iteration to decrease its intrinsic complexity. We also show the gain of employing It-MAP rather than an OMP-based detection and the advantage of exploiting the possibility to tune the algorithm, in order to avoid either Missed Detection or False Alarm, depending on the wished trade-off between the reliability, the latency and the resource usage of the full transmission.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128389013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud & Edge Trusted Virtualized Infrastructure Manager (VIM) - Security and Trust in OpenStack 云&边缘可信虚拟化基础设施管理器(VIM) - OpenStack中的安全性和信任
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902624
Teodora Sechkova, Enrico Barberis, Michele Paolino
{"title":"Cloud & Edge Trusted Virtualized Infrastructure Manager (VIM) - Security and Trust in OpenStack","authors":"Teodora Sechkova, Enrico Barberis, Michele Paolino","doi":"10.1109/WCNCW.2019.8902624","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902624","url":null,"abstract":"The Fifth Generation (5G) mobile networks promise faster connectivity and futuristic applications and services. In order to meet the high expectations, 5G joins forces with virtualization technologies like Network Functions Virtualization (NFV) and adopts cloud-native solutions. At the same time, it relies on shifting the computation to the network edge for offloading computing power, local caching, minimized latency and flexibility in the deployment. However, the new opportunities unlock new security challenges. Man-in-the-middle, denial-of-service attacks and tampering are now becoming easier because of the scattered devices and their varying locations. Meanwhile, the dynamic nature of the cloud raises the need for on-time threats prevention.In this work, we propose a way to answer the new challenges by bringing trust into the virtualized edge infrastructure. We present our contributions to the development of security services for platform authentication and integrity, hosted inside a Trusted Execution Environment (TEE). We also evaluate the performance overhead of our work and suggest future improvements.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133106495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Joint Resource Allocation for Latency-Constrained Dynamic Computation Offloading with MEC 基于MEC的延迟约束动态计算卸载联合资源分配
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902904
M. Merluzzi, P. Lorenzo, S. Barbarossa, V. Frascolla
{"title":"Joint Resource Allocation for Latency-Constrained Dynamic Computation Offloading with MEC","authors":"M. Merluzzi, P. Lorenzo, S. Barbarossa, V. Frascolla","doi":"10.1109/WCNCW.2019.8902904","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902904","url":null,"abstract":"In this paper, we address the problem of dynamic computation offloading with Multi-Access Edge Computing (MEC), where new requests for computations are continuously generated at each user equipment (UE), and are handled through dynamic queue systems. Building on stochastic optimization tools, we provide a dynamic algorithm that jointly optimize radio (i.e., power, bandwidth) and computation (i.e., CPU cycles) resources, while guaranteeing a target performance in terms of average latency and out of service probability, i.e., the probability that the (sum of) computation queues exceeds a predefined value. The method requires the solution of a convex optimization problem at each time slot, and does not need any apriori knowledge of channel and task arrival distributions. Finally, numerical results corroborate the potential benefits of our strategy.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116477311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Joint Channel Selection and Power Control for NOMA: A Multi-Armed Bandit Approach 联合信道选择和功率控制:一种多臂强盗方法
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902878
Mohamed-Ali Adjif, Oussama Habachi, J. Cances
{"title":"Joint Channel Selection and Power Control for NOMA: A Multi-Armed Bandit Approach","authors":"Mohamed-Ali Adjif, Oussama Habachi, J. Cances","doi":"10.1109/WCNCW.2019.8902878","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902878","url":null,"abstract":"The scarcity of the resources and the steady increasing number of connected devices have spotlighted Non-Orthogonal Multiple Access (NOMA) techniques in order to enable a massive connectivity, where the receiver use Successive Interference Cancellation (SIC) in order to separate multiple users’ signal. In this paper, we focus on the uplink transmission in power domain NOMA. We investigate the joint resource allocation and power control problem, and we propose a solution based on Multi-Armed Bandit (MAB). Furthermore, we investigate the exploration-exploitation tradeoff in the proposed reinforcement learning to allow users to choose the appropriate resource block and power level in a distributed manner. The resulting scheme yields better performance compared to the NM-ALOHA and shows an improvement in terms of throughput efficiency.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133758139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Spectrum Sensing for Modulated Radio Signals Using Deep Temporal Convolutional Networks 基于深度时间卷积网络的调制无线电信号频谱感知
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902689
A. Ghasemi, Chaitanya Parekh, P. Guinand
{"title":"Spectrum Sensing for Modulated Radio Signals Using Deep Temporal Convolutional Networks","authors":"A. Ghasemi, Chaitanya Parekh, P. Guinand","doi":"10.1109/WCNCW.2019.8902689","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902689","url":null,"abstract":"Detecting the presence of radio signals in noise has been a decades-long problem in the signal processing domain. More recently, there has been a resurgence of interest in detecting signals with relatively low signal-to-noise ratio in the context of cognitive radios and spectrum sharing. A majority of existing algorithms rely on detection criteria which are carefully-crafted by domain experts to exploit specific features of the target signal. Motivated by the ability of deep neural networks to learn useful representations directly from raw data, in this work we use a deep temporal convolutional network for detection of signals, under multi-path fading and noise, directly from raw complex baseband samples with no other pre-processing or feature engineering.Our results indicate that the proposed deep learning approach outperforms a popular eigenvalue-based method without requiring any expert feature engineering. We further show that the performance is robust to new signal types not used during the training of the neural network.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125147107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quality-of-Service Constrained User and Antenna Selection in Downlink Massive-MIMO Systems 下行链路大规模mimo系统中服务质量约束的用户和天线选择
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902647
J. Akhtar, K. Rajawat
{"title":"Quality-of-Service Constrained User and Antenna Selection in Downlink Massive-MIMO Systems","authors":"J. Akhtar, K. Rajawat","doi":"10.1109/WCNCW.2019.8902647","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902647","url":null,"abstract":"This paper considers a maximum-ratio transmitter (MRT) based-downlink transmission in a multi-user massive-MIMO system under the small-scale fading. The base-station is cost-constrained and can therefore afford only a limited number of RF chains. Likewise, the users have strict quality of service constraints (QoS) and therefore not all users can be served within the specified power budget. Specifically, such problems are combinatorial in nature and so an optimal solution can be obtained by running an exhaustive search over all possible set of antenna and user pairs that meet the QoS and simultaneously achieves the best rate. However, implementing the exhaustive search method is not viable for all practical applications due to the large size and consequently the intractable computational costs involved. Thus, a low complexity based joint antenna and user selection problem is formulated and solved using convex relaxation. Different from the existing techniques that rely on greedy approaches, the proposed algorithm yields near-optimal sum-rates and can be readily applied to very large systems. Detailed simulation results are presented to corroborate the near-optimality of the proposed scheme.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124621269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WCNCW 2019 Organizing Committee WCNCW 2019组委会
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/wcncw.2019.8902897
{"title":"WCNCW 2019 Organizing Committee","authors":"","doi":"10.1109/wcncw.2019.8902897","DOIUrl":"https://doi.org/10.1109/wcncw.2019.8902897","url":null,"abstract":"","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122557762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信