Zobrazeno 1 - 10
of 1 133
pro vyhledávání: '"Nguyen, Diep"'
We investigate an internet-of-things system where energy-harvesting devices send status updates to a common receiver using the irregular repetition slotted ALOHA (IRSA) protocol. Energy shortages in these devices can cause transmission failures that
Externí odkaz:
http://arxiv.org/abs/2411.01446
Autor:
Van Huynh, Nguyen, Zhang, Bolun, Tran, Dinh-Hieu, Hoang, Dinh Thai, Nguyen, Diep N., Zheng, Gan, Niyato, Dusit, Pham, Quoc-Viet
Spectrum access is an essential problem in device-to-device (D2D) communications. However, with the recent growth in the number of mobile devices, the wireless spectrum is becoming scarce, resulting in low spectral efficiency for D2D communications.
Externí odkaz:
http://arxiv.org/abs/2410.17971
This paper introduces a novel lossless compression method for compressing geometric attributes of point cloud data with bits-back coding. Our method specializes in using a deep learning-based probabilistic model to estimate the Shannon's entropy of t
Externí odkaz:
http://arxiv.org/abs/2410.18115
The ability to estimate 3D movements of users over edge computing-enabled networks, such as 5G/6G networks, is a key enabler for the new era of extended reality (XR) and Metaverse applications. Recent advancements in deep learning have shown advantag
Externí odkaz:
http://arxiv.org/abs/2409.00087
This paper aims to propose a novel framework to address the data privacy issue for Federated Learning (FL)-based Intrusion Detection Systems (IDSs) in Internet-of-Vehicles(IoVs) with limited computational resources. In particular, in conventional FL
Externí odkaz:
http://arxiv.org/abs/2407.18503
Autor:
Khoa, Tran Viet, Son, Do Hai, Hoang, Dinh Thai, Trung, Nguyen Linh, Quynh, Tran Thi Thuy, Nguyen, Diep N., Ha, Nguyen Viet, Dutkiewicz, Eryk
With the ever-increasing popularity of blockchain applications, securing blockchain networks plays a critical role in these cyber systems. In this paper, we first study cyberattacks (e.g., flooding of transactions, brute pass) in blockchain networks
Externí odkaz:
http://arxiv.org/abs/2407.04011
Autor:
Luong, Tinh Son, Le, Thanh-Thien, Doan, Thang Viet, Van, Linh Ngo, Nguyen, Thien Huu, Nguyen, Diep Thi-Ngoc
Existing toxic detection models face significant limitations, such as lack of transparency, customization, and reproducibility. These challenges stem from the closed-source nature of their training data and the paucity of explanations for their evalu
Externí odkaz:
http://arxiv.org/abs/2406.14835
Publikováno v:
Proceedings of the CHI Conference on Human Factors in Computing Systems 2024
Generative Artificial Intelligence (AI) is integrated into everyday technology, including news, education, and social media. AI has further pervaded private conversations as conversational partners, auto-completion, and response suggestions. As socia
Externí odkaz:
http://arxiv.org/abs/2405.02711
The End-to-end (E2E) learning-based approach has great potential to reshape the existing communication systems by replacing the transceivers with deep neural networks. To this end, the E2E learning approach needs to assume the availability of prior c
Externí odkaz:
http://arxiv.org/abs/2404.06257
Autor:
Dinh, Phai Vu, Nguyen, Diep N., Hoang, Dinh Thai, Nguyen, Quang Uy, Dutkiewicz, Eryk, Bao, Son Pham
While intrusion detection systems (IDSs) benefit from the diversity and generalization of IoT data features, the data diversity (e.g., the heterogeneity and high dimensions of data) also makes it difficult to train effective machine learning models i
Externí odkaz:
http://arxiv.org/abs/2403.15511