Search Results for author: Hans D. Schotten

Found 25 papers, 1 papers with code

Robust Federated Learning for Wireless Networks: A Demonstration with Channel Estimation

no code implementations3 Apr 2024 Zexin Fang, Bin Han, Hans D. Schotten

Federated learning (FL) offers a privacy-preserving collaborative approach for training models in wireless networks, with channel estimation emerging as a promising application.

Federated Learning Privacy Preserving

3D Cooperative Localization in UAV Systems: CRLB Analysis and Security Solutions

no code implementations15 Feb 2024 Zexin Fang, Bin Han, Hans D. Schotten

The MAGD adapts the gradient descent algorithm to handle the configuration changes in cooperative localization systems, ensuring accurate localization in dynamic scenarios.

Anomaly Detection

A Short Overview of 6G V2X Communication Standards

no code implementations28 Nov 2023 Donglin Wang, Yann Nana Nganso, Hans D. Schotten

We are on the verge of a new age of linked autonomous cars with unheard-of user experiences, dramatically improved air quality and road safety, extremely varied transportation settings, and a plethora of cutting-edge apps.

A Reliable and Resilient Framework for Multi-UAV Mutual Localization

no code implementations8 Sep 2023 Zexin Fang, Bin Han, Hans D. Schotten

This paper presents a robust and secure framework for achieving accurate and reliable mutual localization in multiple unmanned aerial vehicle (UAV) systems.

Evaluating the Impact of Numerology and Retransmission on 5G NR V2X Communication at A System-Level Simulation

no code implementations26 Jul 2023 Donglin Wang, Pranav Balasaheb Mohite, Qiuheng Zhou, Anjie Qiu, Hans D. Schotten

To meet the stringent reliability and latency requirements of C-V2X communication, we suggest and assess a retransmission scheme along with a scheme that incorporates varying resource allocations for retransmission in NR V2X communication.

A Secure and Robust Approach for Distance-Based Mutual Positioning of Unmanned Aerial Vehicles

no code implementations19 May 2023 Bin Han, Hans D. Schotten

Unmanned aerial vehicle (UAV) is becoming increasingly important in modern civilian and military applications.

Trust-Awareness to Secure Swarm Intelligence from Data Injection Attack

no code implementations27 Oct 2022 Bin Han, Dennis Krummacker, Qiuheng Zhou, Hans D. Schotten

Enabled by the emerging industrial agent (IA) technology, swarm intelligence (SI) is envisaged to play an important role in future industrial Internet of Things (IIoT) that is shaped by Sixth Generation (6G) mobile communications and digital twin (DT).

Modeling the System-Level Reliability towards a Convergence of Communication, Computing and Control

no code implementations23 Jun 2022 Bin Han, Hans D. Schotten

Enabled and driven by modern advances in wireless telecommunication and artificial intelligence, the convergence of communication, computing, and control is becoming inevitable in future industrial applications.

Signal Restoration and Channel Estimation for Channel Sounding with SDRs

no code implementations23 May 2022 Julian Ahrens, Lia Ahrens, Michael Zentarra, Hans D. Schotten

Based on these considerations, in this work, a practical algorithm is devised to compensate for the drawbacks of using SDRs for channel sounding encountered in a concrete setup.

Time Series Time Series Analysis

Massive Twinning to Enhance Emergent Intelligence

no code implementations20 Apr 2022 Siyu Yuan, Bin Han, Dennis Krummacker, Hans D. Schotten

As a complement to conventional AI solutions, emergent intelligence (EI) exhibits competitiveness in 6G IIoT scenario for its various outstanding features including robustness, protection to privacy, and scalability.

AI-Empowered VNF Migration as a Cost-Loss-Effective Solution for Network Resilience

no code implementations22 Jan 2021 Amina Lejla Ibrahimpasic, Bin Han, Hans D. Schotten

With a wide deployment of Multi-Access Edge Computing (MEC) in the Fifth Generation (5G) mobile networks, virtual network functions (VNF) can be flexibly migrated between difference locations, and therewith significantly enhances the network resilience to counter the degradation in quality of service (QoS) due to network function outages.

Edge-computing

An Abstracted Survey on 6G: Drivers, Requirements, Efforts, and Enablers

no code implementations4 Jan 2021 Bin Han, Wei Jiang, Mohammad Asif Habibi, Hans D. Schotten

As of today, 5G mobile systems have been already widely rolled out, it is the right time for academia and industry to explore the next generation mobile communication system beyond 5G.

Networking and Internet Architecture

ARENA: A Data-driven Radio Access Networks Analysis of Football Events

no code implementations19 Oct 2020 Lanfranco Zanzi, Vincenzo Sciancalepore, Andres Garcia-Saavedra, Xavier Costa-Perez, Georgios Agapiou, Hans D. Schotten

Mass events represent one of the most challenging scenarios for mobile networks because, although their date and time are usually known in advance, the actual demand for resources is difficult to predict due to its dependency on many different factors.

LACO: A Latency-Driven Network Slicing Orchestration in Beyond-5G Networks

no code implementations7 Sep 2020 Lanfranco Zanzi, Vincenzo Sciancalepore, Andres Garcia-Saavedra, Hans D. Schotten, Xavier Costa-Perez

Network Slicing is expected to become a game changer in the upcoming 5G networks and beyond, enlarging the telecom business ecosystem through still-unexplored vertical industry profits.

Platoon--assisted Vehicular Cloud in VANET: Vision and Challenges

no code implementations25 Aug 2020 Meysam Nasimi, Mohammad Asif Habibi, Hans D. Schotten

Based on these facts, the authors of this paper presented a visionary concept -- "platoon-assisted vehicular cloud" -- that exploits underutilized resources in platoons to augment vehicular cloud aiming to provide cost-effective and on-demand computing resources.

Autonomous Vehicles

Machine Learning for Network Slicing Resource Management: A Comprehensive Survey

no code implementations22 Jan 2020 Bin Han, Hans D. Schotten

The emerging technology of multi-tenancy network slicing is considered as an essential feature of 5G cellular networks.

BIG-bench Machine Learning Management

Supervised Learning for Physical Layer based Message Authentication in URLLC scenarios

no code implementations13 Sep 2019 Andreas Weinand, Raja Sattiraju, Michael Karrenbauer, Hans D. Schotten

PHYSEC based message authentication can, as an alternative to conventional security schemes, be applied within \gls{urllc} scenarios in order to meet the requirement of secure user data transmissions in the sense of authenticity and integrity.

A Machine Learning Method for Prediction of Multipath Channels

no code implementations10 Sep 2019 Julian Ahrens, Lia Ahrens, Hans D. Schotten

In this paper, a machine learning method for predicting the evolution of a mobile communication channel based on a specific type of convolutional neural network is developed and evaluated in a simulated multipath transmission scenario.

BIG-bench Machine Learning

A Machine-Learning Phase Classification Scheme for Anomaly Detection in Signals with Periodic Characteristics

no code implementations29 Nov 2018 Lia Ahrens, Julian Ahrens, Hans D. Schotten

In this paper we propose a novel machine-learning method for anomaly detection applicable to data with periodic characteristics where randomly varying period lengths are explicitly allowed.

Anomaly Detection BIG-bench Machine Learning +4

An AI-driven Malfunction Detection Concept for NFV Instances in 5G

no code implementations16 Apr 2018 Julian Ahrens, Mathias Strufe, Lia Ahrens, Hans D. Schotten

Efficient network management is one of the key challenges of the constantly growing and increasingly complex wide area networks (WAN).

Management

Slice as an Evolutionary Service: Genetic Optimization for Inter-Slice Resource Management in 5G Networks

no code implementations13 Feb 2018 Bin Han, Lianghai Ji, Hans D. Schotten

In the context of Fifth Generation (5G) mobile networks, the concept of "Slice as a Service" (SlaaS) promotes mobile network operators to flexibly share infrastructures with mobile service providers and stakeholders.

Management

Application of Machine Learning for Channel based Message Authentication in Mission Critical Machine Type Communication

no code implementations14 Nov 2017 Andreas Weinand, Michael Karrenbauer, Raja Sattiraju, Hans D. Schotten

Beside unfulfilled reliability requirements, the availability of a system can further be reduced, if it is under attack in the sense of violation of information security goals such as data authenticity or integrity.

Networking and Internet Architecture Signal Processing

Cannot find the paper you are looking for? You can Submit a new open access paper.