Search Results for author: Georg Carle

Found 7 papers, 0 papers with code

Fast and Scalable Network Slicing by Integrating Deep Learning with Lagrangian Methods

no code implementations22 Jan 2024 Tianlun Hu, Qi Liao, Qiang Liu, Antonio Massaro, Georg Carle

Based on the proposed framework, we design a new neural-assisted algorithm to allocate radio resources to slices to maximize the network utility under inter-slice resource constraints.

Advancing Federated Learning in 6G: A Trusted Architecture with Graph-based Analysis

no code implementations11 Sep 2023 Wenxuan Ye, Chendi Qian, Xueli An, Xueqiang Yan, Georg Carle

Second, given the distributed nature and graph structure between clients and nodes in the pre-processing layer, GNN is leveraged to identify abnormal local models, enhancing system security.

Federated Learning Management

Inter-Cell Network Slicing With Transfer Learning Empowered Multi-Agent Deep Reinforcement Learning

no code implementations20 Jun 2023 Tianlun Hu, Qi Liao, Qiang Liu, Georg Carle

Network slicing enables operators to efficiently support diverse applications on a common physical infrastructure.

Transfer Learning

Network Slicing via Transfer Learning aided Distributed Deep Reinforcement Learning

no code implementations9 Jan 2023 Tianlun Hu, Qi Liao, Qiang Liu, Georg Carle

In this paper, we propose a novel transfer learning (TL) aided multi-agent deep reinforcement learning (MADRL) approach with inter-agent similarity analysis for inter-cell inter-slice resource partitioning.

Management reinforcement-learning +2

Decorrelating Adversarial Nets for Clustering Mobile Network Data

no code implementations11 Mar 2021 Marton Kajo, Janik Schnellbach, Stephen S. Mwanje, Georg Carle

Deep learning will play a crucial role in enabling cognitive automation for the mobile networks of the future.

Clustering Deep Clustering

Neural Network-based Quantization for Network Automation

no code implementations4 Mar 2021 Marton Kajo, Stephen S. Mwanje, Benedek Schultz, Georg Carle

Deep Learning methods have been adopted in mobile networks, especially for network management automation where they provide means for advanced machine cognition.

Anomaly Detection Management +1

Cannot find the paper you are looking for? You can Submit a new open access paper.