2019 IEEE Global Communications Conference (GLOBECOM)最新文献

筛选
英文 中文
Optimal Joint Antenna Selection and Power Adaptation for Underlay Spectrum Sharing 基于底层频谱共享的最优联合天线选择与功率自适应
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013314
Rimalapudi Sarvendranath, N. Mehta
{"title":"Optimal Joint Antenna Selection and Power Adaptation for Underlay Spectrum Sharing","authors":"Rimalapudi Sarvendranath, N. Mehta","doi":"10.1109/GLOBECOM38437.2019.9013314","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013314","url":null,"abstract":"Underlay spectrum sharing improves spectral utilization by allowing a secondary user to transmit concurrently with a primary user. However, the secondary user's performance is limited by the interference constraint that is imposed on it to protect the primary user. Transmit antenna selection overcomes this limitation with a hardware complexity comparable to a single-antenna system. We present a novel and optimal joint antenna selection and power adaptation rule for a secondary system that is subject to the practically motivated interference-outage constraint, which is more general than the widely studied peak interference constraint. The rule provably minimizes the average symbol error probability (SEP) of the secondary user. We show that it has a fundamentally different and novel structure compared to the ones studied in the literature. We present key geometric insights about its novel structure. We use these to propose a simpler, linearized, and near-optimal variant. Compared to the rules considered in the literature, the proposed rules reduce the average SEP by an order of magnitude.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"38 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85735148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge-Assisted Learning for Real-Time UAV Imagery via Predictive Offloading 基于预测卸载的实时无人机图像边缘辅助学习
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013352
Zhuosheng Zhang, L. Njilla, Shucheng Yu, Jiawei Yuan
{"title":"Edge-Assisted Learning for Real-Time UAV Imagery via Predictive Offloading","authors":"Zhuosheng Zhang, L. Njilla, Shucheng Yu, Jiawei Yuan","doi":"10.1109/GLOBECOM38437.2019.9013352","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013352","url":null,"abstract":"Real-time decision making with unmanned aerial vehicles (UAVs) imagery is desired in many applications. Deep learning (DL) is a promising enabler for such applications thanks to its recent advancements. However, direct execution of DL models on UAVs, especially small and micro ones, would not only introduce severe delay but also significantly shorten the flight time of UAVs due to the high energy consumption. Realtime transmission of UAV images to ground edge devices for deep analysis can mitigate the computational complexity but may introduce severe interference to ground devices, in addition unpredictable delays due to the dynamic network conditions. To minimize real-time image transmission, this paper designs a new offloading prediction algorithm which first estimates nearfuture need for DL of each UAV and transmit images only when necessary. Holistic resource allocation is made at the edge based on the offloading likelihood analysis of multiple UAVs as well as available resources. Experimental results on real UAV video clips show that our design can save 92% of the communication costs with less than 4% false positive rate.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"71 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85903464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent 电子病历的跨组织访问控制:可信、灵活、透明
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013842
Zhuo Ma, Meng-Di Zhao, Ximeng Liu, Chong Shen, Jianfeng Ma
{"title":"Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent","authors":"Zhuo Ma, Meng-Di Zhao, Ximeng Liu, Chong Shen, Jianfeng Ma","doi":"10.1109/GLOBECOM38437.2019.9013842","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013842","url":null,"abstract":"Nowadays, Electronic Medical Records (EHRs) are closely linked to people's social lives. In order to ensure the convenience of medical services, many related organizations need to share EHRs across organizations to exchange information. The existing private EHR shareable schemes still contain some security issues, e.g., unreliability of cloud service provider, complex key calculation and unreliable backward security. In this paper, we propose an attribute-based access control scheme based on the smart contract (ABAC-SC). By virtue of the blockchain technique, ABAC-SC can be directly embedded into the existing private EHRs shareable system to solve existing unsafe problems. Considering the storage constraints of the blockchain, a data processing solution is designed to reduce the storage requirements of the pre-data upload process. We simulate our ABAC-SC scheme in Ethereum's test network Rinkeby, and the experimental results show the feasibility of our solution.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"310 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76995686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Online Resource Allocation Using Congestion Game for 5G Virtual Network Services 基于拥塞游戏的5G虚拟网络业务分布式在线资源分配
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013245
Y. Bi, Monchai Bunyakitanon, N. Uniyal, A. Bravalheri, A. Muqaddas, R. Nejabati, D. Simeonidou
{"title":"Distributed Online Resource Allocation Using Congestion Game for 5G Virtual Network Services","authors":"Y. Bi, Monchai Bunyakitanon, N. Uniyal, A. Bravalheri, A. Muqaddas, R. Nejabati, D. Simeonidou","doi":"10.1109/GLOBECOM38437.2019.9013245","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013245","url":null,"abstract":"To meet the challenge of flexible and dynamic resource provisioning for massive and various network services, we investigate the network function virtualization-resource allocation problem in the 5G network. For the first time, this problem is modelled as the congestion game to capture the effects of resource congestion on packet processing latency, optical-to-electronic and electronic-to-optical conversion latency. All the network service requests received at the same time are players trying to minimise their own end-to-end latency and resource consumption cost. A distributed online algorithm is designed and simulation results show that it can achieve 100% service acceptance ratio while the baseline algorithm cannot. If lower weighted resource consumption cost is set for 1ms and 5ms services, more such services will be routed to edge nodes and network operators will earn more. An experiment for network services with different packet sizes is carried out, and results prove that the proposed algorithm converges to Nash Equilibrium in 40 seconds and the latency requirements are all satisfied if the packet size is small.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"47 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80989975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal QoS-Driven Power Allocation for Energy Harvesting Wireless Ad-Hoc Networks Using FBC 基于FBC的能量收集无线自组网qos驱动的最优功率分配
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013530
Xi Zhang, Jingqing Wang, H. Poor
{"title":"Optimal QoS-Driven Power Allocation for Energy Harvesting Wireless Ad-Hoc Networks Using FBC","authors":"Xi Zhang, Jingqing Wang, H. Poor","doi":"10.1109/GLOBECOM38437.2019.9013530","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013530","url":null,"abstract":"In the last few decades, the statistical delay- bounded quality-of-service (QoS) technique has been proposed and investigated to support the delay-bounded 5G multimedia wireless services In addition, the energy harvesting (EH) based systems, which enable the mobile devices to harvest energy from various external sources, have been designed to address the energy scarcity problem. Researchers have recently integrated EH based systems with short-packet communications for their potential benefits of small payloads and low latency to support reliable multimedia data transmissions. Under the short delay requirements for the low-latency 5G multimedia wireless services, it is not ideal to apply the traditional Shannon capacity for modeling the data rate under the error-rate bounded in the non- asymptotic regime. Accordingly, researchers have developed the finite wireless data transmission rate in the non-asymptotic regime. However, it is challenging to determine the convexity of the effective-capacity maximization problem subject to the statistical delay-bounded and error-rate bounded QoS constraints due to the complexity of analyzing the maximization problem in the non- asymptotic regime. To overcome these challenges, we design the EH based cross- layer optimization scheme in supporting the statistical delay-bounded and error-rate bounded QoS requirements in the finite blocklength regime in the following steps. First, we characterize the EH based system models under finite blocklength coding (FBC). Second, we derive and analyze the convexity of the /spl epsilon/-effective capacity maximization problem for our proposed EH scheme in the finite blocklength regime. Finally, we conduct several simulation evaluations which validate our proposed EH scheme under the statistical delaybounded and error-rate bounded QoS constraints in the finite blocklength regime.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"31 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79526591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Targeted Malicious Email Detection Using Hypervisor-Based Dynamic Analysis and Ensemble Learning 基于hypervisor的动态分析和集成学习的针对性恶意邮件检测
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9014069
Jian Zhang, Wenzhen Li, Liangyi Gong, Zhaojun Gu, Jeffrey Wu
{"title":"Targeted Malicious Email Detection Using Hypervisor-Based Dynamic Analysis and Ensemble Learning","authors":"Jian Zhang, Wenzhen Li, Liangyi Gong, Zhaojun Gu, Jeffrey Wu","doi":"10.1109/GLOBECOM38437.2019.9014069","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9014069","url":null,"abstract":"At present, email is still one of the most frequently used communication tools for organizations and individuals. With the leakage of personal privacy information, targeted malicious email (TME) is becoming a prominent targeted cyber attack vector in today's Internet. This type of attack often uses personal information, about an individual, group of individuals, or an organization, to make a TME more believable and personalized. TME is effective to penetrate email defense system because it is fundamentally difficult for traditional email security method to distinguish legitimate emails from malicious emails. And TMEs often contain malicious URLs or malicious attachments, which are extremely aggressive and destructive. In order to effectively deal with this new type of malicious email attack, this paper proposes a dynamic detection method for malicious email. We simulate the recipient opening the email in the virtual machine (VM), accessing the URL and activating the attachment. And we use the virtual machine introspection (VMI) and memory forensics analysis (MFA) technology to obtain the dynamic features of the email by the out-of-VM. Then we use AdaBoostM1 ensemble learning method and Voting combination strategy to combine three base classifiers such as BayesNet, SMO and J48 to build a powerful classification model for detecting TME attacks. The AdaBoostM1 classifier achieved the high detection rates, with an AUC of 0.997, true positive rate (TPR) of 0.997, and false positive rate (FPR) of 0.015. In addition, our proposed detection method is superior to the 56 anti-virus engines on VirusTotal and most of the existing research works.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"7 8 Suppl 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85457748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multipath Routing, Spectrum and Core Allocation in Protected SDM Elastic Optical Networks 受保护SDM弹性光网络中的多径路由、频谱和核心分配
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013523
Helder Oliveira, N. Fonseca
{"title":"Multipath Routing, Spectrum and Core Allocation in Protected SDM Elastic Optical Networks","authors":"Helder Oliveira, N. Fonseca","doi":"10.1109/GLOBECOM38437.2019.9013523","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013523","url":null,"abstract":"The adoption ofSpace division multiplexing (SDM) in elastic optical networks brings new challenges for spectrum allocation. This paper proposes an algorithm for routing, spectrum and core allocation based on single/multipath routing for providing path protection. The proposed solution has the advantage of using small contiguous bands divided into several paths to provide the request protected bandwidth, allowing the increase in the number of requests accepted. Results show that the proposed algorithm can decrease the blocking ratio by three orders of magnitude when compared with other existing algorithms.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"235 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85499126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Comprehensive View of Wireless Link Energy Efficiency 无线链路能源效率的综合观点
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9014174
E. McCune
{"title":"A Comprehensive View of Wireless Link Energy Efficiency","authors":"E. McCune","doi":"10.1109/GLOBECOM38437.2019.9014174","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9014174","url":null,"abstract":"Energy efficiency of wireless links is very important in modern communication systems. A survey of papers evaluating energy efficiency however shows that evaluation approaches are not consistent, resulting in calculations that are not comparable with each other. Indeed, even the units of the various energy efficiency evaluations are not identical. To address this problem a new model is developed here that takes into account the many dependencies among multiple wireless link parameters important to evaluating energy efficiency of the link. The unit of bits per joule is adopted for this new model. This new model is evaluated for five deployed wireless links that have very different parameters and operating objectives. The need to establish standardized cases to allow direct comparisons is identified and discussed.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"39 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86031808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy-Saving Predictive Video Streaming with Deep Reinforcement Learning 基于深度强化学习的节能预测视频流
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013784
Dong Liu, Jianyu Zhao, Chenyang Yang
{"title":"Energy-Saving Predictive Video Streaming with Deep Reinforcement Learning","authors":"Dong Liu, Jianyu Zhao, Chenyang Yang","doi":"10.1109/GLOBECOM38437.2019.9013784","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013784","url":null,"abstract":"In this paper, we propose a policy to optimize predictive power allocation for video streaming over mobile networks with deep reinforcement learning. The objective is to minimize the average energy consumption for video transmission under the quality of service constraint that avoids video stalling. To handle the continuous state and action spaces, we resort to deep deterministic policy gradient to solve the formulated problem. In contrast to previous predictive resource policies for video streaming, the proposed policy operates in an on- line and end-to-end manner. By judiciously designing action and state, the policy can exploit future information without explicit prediction. Simulation results show that the proposed policy can converge closely to the optimal policy with perfect prediction of future large-scale channel gains and outperforms the prediction-based optimal policy when prediction errors exist.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77760660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Collaborative Computation Offloading at UAV-Enhanced Edge 无人机增强边缘的协同计算卸载
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013956
Jingyu Xiong, Hongzhi Guo, Jiajia Liu, N. Kato, Yanning Zhang
{"title":"Collaborative Computation Offloading at UAV-Enhanced Edge","authors":"Jingyu Xiong, Hongzhi Guo, Jiajia Liu, N. Kato, Yanning Zhang","doi":"10.1109/GLOBECOM38437.2019.9013956","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013956","url":null,"abstract":"In conventional terrestrial cellular networks, mobile devices at the cell edge often suffer from poor channel conditions, and thus unmanned aerial vehicles (UAVs) are introduced in recent years to improve the reliability of communication links. However, with the rapid development of Internet of Things (IoT) technology, the emerging IoT applications have blooming demands for high computation capacity from the resource-constrained IoT mobile devices (IMDs), motivated by which, mobile edge computing has been envisioned as an appealing solution to the resource bottleneck problem of IMDs. In order to cope with poor communication performance and high computation demands of cell-edge IMDs, we in this paper leverage UAV-aided edge computing to collaboratively assist computation offloading, taking account of the limited battery life of both IMDs and the UAV. We investigate a joint optimization problem of collaborative computation offloading, bandwidth portion, bit allocation, and UAV trajectory design, aiming to minimize the weighted energy consumption of IMDs and the UAV. Extensive numerical results validate the necessity of introducing UAV-aided edge computing to cellular networks, and the advantages of our proposed scheme on energy savings.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72862528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信