no code implementations • 3 Apr 2024 • Zexin Fang, Bin Han, Hans D. Schotten
Federated learning (FL) offers a privacy-preserving collaborative approach for training models in wireless networks, with channel estimation emerging as a promising application.
no code implementations • 15 Feb 2024 • Zexin Fang, Bin Han, Hans D. Schotten
The MAGD adapts the gradient descent algorithm to handle the configuration changes in cooperative localization systems, ensuring accurate localization in dynamic scenarios.
no code implementations • 28 Nov 2023 • Donglin Wang, Yann Nana Nganso, Hans D. Schotten
We are on the verge of a new age of linked autonomous cars with unheard-of user experiences, dramatically improved air quality and road safety, extremely varied transportation settings, and a plethora of cutting-edge apps.
no code implementations • 8 Sep 2023 • Zexin Fang, Bin Han, Hans D. Schotten
This paper presents a robust and secure framework for achieving accurate and reliable mutual localization in multiple unmanned aerial vehicle (UAV) systems.
no code implementations • 26 Jul 2023 • Donglin Wang, Pranav Balasaheb Mohite, Qiuheng Zhou, Anjie Qiu, Hans D. Schotten
To meet the stringent reliability and latency requirements of C-V2X communication, we suggest and assess a retransmission scheme along with a scheme that incorporates varying resource allocations for retransmission in NR V2X communication.
no code implementations • 19 May 2023 • Bin Han, Hans D. Schotten
Unmanned aerial vehicle (UAV) is becoming increasingly important in modern civilian and military applications.
no code implementations • 23 Feb 2023 • Alexandros Palaios, Christian L. Vielhaus, Daniel F. Külzer, Cara Watermann, Rodrigo Hernangomez, Sanket Partani, Philipp Geuer, Anton Krause, Raja Sattiraju, Martin Kasparick, Gerhard Fettweis, Frank H. P. Fitzek, Hans D. Schotten, Slawomir Stanczak
This proactive behavior of the network can be leveraged to sustain, for example, a specific quality of service requirement.
Explainable Artificial Intelligence (XAI) Feature Engineering
1 code implementation • 20 Dec 2022 • Rodrigo Hernangómez, Philipp Geuer, Alexandros Palaios, Daniel Schäufele, Cara Watermann, Khawla Taleb-Bouhemadi, Mohammad Parvini, Anton Krause, Sanket Partani, Christian Vielhaus, Martin Kasparick, Daniel F. Külzer, Friedrich Burmeister, Frank H. P. Fitzek, Hans D. Schotten, Gerhard Fettweis, Sławomir Stańczak
The evolution of wireless communications into 6G and beyond is expected to rely on new machine learning (ML)-based capabilities.
no code implementations • 27 Oct 2022 • Bin Han, Dennis Krummacker, Qiuheng Zhou, Hans D. Schotten
Enabled by the emerging industrial agent (IA) technology, swarm intelligence (SI) is envisaged to play an important role in future industrial Internet of Things (IIoT) that is shaped by Sixth Generation (6G) mobile communications and digital twin (DT).
no code implementations • 23 Jun 2022 • Bin Han, Hans D. Schotten
Enabled and driven by modern advances in wireless telecommunication and artificial intelligence, the convergence of communication, computing, and control is becoming inevitable in future industrial applications.
no code implementations • 23 May 2022 • Julian Ahrens, Lia Ahrens, Michael Zentarra, Hans D. Schotten
Based on these considerations, in this work, a practical algorithm is devised to compensate for the drawbacks of using SDRs for channel sounding encountered in a concrete setup.
no code implementations • 20 Apr 2022 • Siyu Yuan, Bin Han, Dennis Krummacker, Hans D. Schotten
As a complement to conventional AI solutions, emergent intelligence (EI) exhibits competitiveness in 6G IIoT scenario for its various outstanding features including robustness, protection to privacy, and scalability.
no code implementations • 12 Nov 2021 • Donglin Wang, Qiuheng Zhou, Sanket Partani, Anjie Qiu, Hans D. Schotten
Nowadays mobile communication is growing fast in the 5G communication industry.
no code implementations • 22 Jan 2021 • Amina Lejla Ibrahimpasic, Bin Han, Hans D. Schotten
With a wide deployment of Multi-Access Edge Computing (MEC) in the Fifth Generation (5G) mobile networks, virtual network functions (VNF) can be flexibly migrated between difference locations, and therewith significantly enhances the network resilience to counter the degradation in quality of service (QoS) due to network function outages.
no code implementations • 4 Jan 2021 • Bin Han, Wei Jiang, Mohammad Asif Habibi, Hans D. Schotten
As of today, 5G mobile systems have been already widely rolled out, it is the right time for academia and industry to explore the next generation mobile communication system beyond 5G.
Networking and Internet Architecture
no code implementations • 19 Oct 2020 • Lanfranco Zanzi, Vincenzo Sciancalepore, Andres Garcia-Saavedra, Xavier Costa-Perez, Georgios Agapiou, Hans D. Schotten
Mass events represent one of the most challenging scenarios for mobile networks because, although their date and time are usually known in advance, the actual demand for resources is difficult to predict due to its dependency on many different factors.
no code implementations • 7 Sep 2020 • Lanfranco Zanzi, Vincenzo Sciancalepore, Andres Garcia-Saavedra, Hans D. Schotten, Xavier Costa-Perez
Network Slicing is expected to become a game changer in the upcoming 5G networks and beyond, enlarging the telecom business ecosystem through still-unexplored vertical industry profits.
no code implementations • 25 Aug 2020 • Meysam Nasimi, Mohammad Asif Habibi, Hans D. Schotten
Based on these facts, the authors of this paper presented a visionary concept -- "platoon-assisted vehicular cloud" -- that exploits underutilized resources in platoons to augment vehicular cloud aiming to provide cost-effective and on-demand computing resources.
no code implementations • 22 Jan 2020 • Bin Han, Hans D. Schotten
The emerging technology of multi-tenancy network slicing is considered as an essential feature of 5G cellular networks.
no code implementations • 13 Sep 2019 • Andreas Weinand, Raja Sattiraju, Michael Karrenbauer, Hans D. Schotten
PHYSEC based message authentication can, as an alternative to conventional security schemes, be applied within \gls{urllc} scenarios in order to meet the requirement of secure user data transmissions in the sense of authenticity and integrity.
no code implementations • 10 Sep 2019 • Julian Ahrens, Lia Ahrens, Hans D. Schotten
In this paper, a machine learning method for predicting the evolution of a mobile communication channel based on a specific type of convolutional neural network is developed and evaluated in a simulated multipath transmission scenario.
no code implementations • 29 Nov 2018 • Lia Ahrens, Julian Ahrens, Hans D. Schotten
In this paper we propose a novel machine-learning method for anomaly detection applicable to data with periodic characteristics where randomly varying period lengths are explicitly allowed.
no code implementations • 16 Apr 2018 • Julian Ahrens, Mathias Strufe, Lia Ahrens, Hans D. Schotten
Efficient network management is one of the key challenges of the constantly growing and increasingly complex wide area networks (WAN).
no code implementations • 13 Feb 2018 • Bin Han, Lianghai Ji, Hans D. Schotten
In the context of Fifth Generation (5G) mobile networks, the concept of "Slice as a Service" (SlaaS) promotes mobile network operators to flexibly share infrastructures with mobile service providers and stakeholders.
no code implementations • 14 Nov 2017 • Andreas Weinand, Michael Karrenbauer, Raja Sattiraju, Hans D. Schotten
Beside unfulfilled reliability requirements, the availability of a system can further be reduced, if it is under attack in the sense of violation of information security goals such as data authenticity or integrity.
Networking and Internet Architecture Signal Processing