no code implementations • 18 Feb 2022 • Zhilin Wang, Qin Hu, Ruinian Li, Minghui Xu, Zehui Xiong
Since each client has a limited amount of computing resources, the problem of allocating computing resources into training and mining needs to be carefully addressed.
no code implementations • 3 Jan 2022 • Zhe Zhang, Shiyao Ma, Zhaohui Yang, Zehui Xiong, Jiawen Kang, Yi Wu, Kejia Zhang, Dusit Niyato
This emerging technology relies on sharing ground truth labeled data between Unmanned Aerial Vehicle (UAV) swarms to train a high-quality automatic image recognition model.
no code implementations • 12 Aug 2021 • Mengmeng Tian, Yuxin Chen, YuAn Liu, Zehui Xiong, Cyril Leung, Chunyan Miao
It is challenging to design proper incentives for the FL clients due to the fact that the task is privately trained by the clients.
no code implementations • 2 Feb 2021 • Weiheng Jiang, Yu Zhang, Jun Zhao, Zehui Xiong, Zhiguo Ding
Cognitive radio (CR) is an effective solution to improve the spectral efficiency (SE) of wireless communications by allowing the secondary users (SUs) to share spectrum with primary users (PUs).
Information Theory Signal Processing Information Theory
no code implementations • 23 Dec 2020 • Helin Yang, Zehui Xiong, Jun Zhao, Dusit Niyato, Qingqing Wu, Massimo Tornatore, Stefano Secci
Aiming to enhance the communication performance against smart jammer, an optimization problem for jointly optimizing power allocation at the base station (BS) and reflecting beamforming at the IRS is formulated.
no code implementations • 18 Dec 2020 • Yulan Gao, Chao Yong, Zehui Xiong, Dusit Niyato, Yue Xiao, Jun Zhao
This paper investigates an intelligent reflecting surface (IRS) aided cooperative communication network, where the IRS exploits large reflecting elements to proactively steer the incident radio-frequency wave towards destination terminals (DTs).
no code implementations • 4 Dec 2020 • Yunhan Huang, Zehui Xiong, Quanyan Zhu
On the other hand, the interactions between the attacker and the defender in the physical layer significantly impact the observation and jamming strategies.
no code implementations • 28 Nov 2020 • Helin Yang, Jun Zhao, Zehui Xiong, Kwok-Yan Lam, Sumei Sun, Liang Xiao
However, due to the privacy concerns of devices and limited computation or communication resource of UAVs, it is impractical to send raw data of devices to UAV servers for model training.
no code implementations • 10 Aug 2020 • Jiawen Kang, Zehui Xiong, Chunxiao Jiang, Yi Liu, Song Guo, Yang Zhang, Dusit Niyato, Cyril Leung, Chunyan Miao
This framework can achieve scalable and flexible decentralized FEL by individually manage local model updates or model sharing records for performance isolation.
Cryptography and Security
no code implementations • 19 Jul 2020 • Yi Liu, Sahil Garg, Jiangtian Nie, Yang Zhang, Zehui Xiong, Jiawen Kang, M. Shamim Hossain
Third, to adapt the proposed framework to the timeliness of industrial anomaly detection, we propose a gradient compression mechanism based on Top-\textit{k} selection to improve communication efficiency.
no code implementations • 13 Jul 2020 • Jer Shyuan Ng, Wei Yang Bryan Lim, Hong-Ning Dai, Zehui Xiong, Jianqiang Huang, Dusit Niyato, Xian-Sheng Hua, Cyril Leung, Chunyan Miao
The simulation results show that the grand coalition, where all UAVs join a single coalition, is not always stable due to the profit-maximizing behavior of the UAVs.
Networking and Internet Architecture Signal Processing
no code implementations • 4 Jun 2020 • Yi Liu, Xingliang Yuan, Zehui Xiong, Jiawen Kang, Xiaofei Wang, Dusit Niyato
As the 5G communication networks are being widely deployed worldwide, both industry and academia have started to move beyond 5G and explore 6G communications.
no code implementations • 31 May 2020 • Wei Yang Bryan Lim, Jer Shyuan Ng, Zehui Xiong, Dusit Niyato, Cyril Leung, Chunyan Miao, Qiang Yang
In 5G and Beyond networks, Artificial Intelligence applications are expected to be increasingly ubiquitous.
no code implementations • 8 Apr 2020 • Wei Yang Bryan Lim, Jianqiang Huang, Zehui Xiong, Jiawen Kang, Dusit Niyato, Xian-Sheng Hua, Cyril Leung, Chunyan Miao
Coupled with the rise of Deep Learning, the wealth of data and enhanced computation capabilities of Internet of Vehicles (IoV) components enable effective Artificial Intelligence (AI) based models to be built.
Signal Processing Networking and Internet Architecture
no code implementations • 27 Feb 2020 • Helin Yang, Zehui Xiong, Jun Zhao, Dusit Niyato, Liang Xiao, Qingqing Wu
As the system is highly dynamic and complex, and it is challenging to address the non-convex optimization problem, a novel deep reinforcement learning (DRL)-based secure beamforming approach is firstly proposed to achieve the optimal beamforming policy against eavesdroppers in dynamic environments.
no code implementations • 7 Dec 2019 • Huimei Han, Jun Zhao, Zehui Xiong, Dusit Niyato, Wenchao Zhai, Marco Di Renzo, Quoc-Viet Pham, Weidang Lu
Our goalis to minimize the transmit power at the BS by jointly designing the transmit beamforming at the BSand the phase shifts of the passive elements at the RIS.
no code implementations • 14 Oct 2019 • Jiawen Kang, Zehui Xiong, Dusit Niyato, Yuze Zou, Yang Zhang, Mohsen Guizani
Based on this metric, a reliable worker selection scheme is proposed for federated learning tasks.
Cryptography and Security
no code implementations • 16 May 2019 • Jiawen Kang, Zehui Xiong, Dusit Niyato, Han Yu, Ying-Chang Liang, Dong In Kim
To strengthen data privacy and security, federated learning as an emerging machine learning technique is proposed to enable large-scale nodes, e. g., mobile devices, to distributedly train and globally share models without revealing their local data.
no code implementations • 7 May 2018 • Wenbo Wang, Dinh Thai Hoang, Peizhao Hu, Zehui Xiong, Dusit Niyato, Ping Wang, Yonggang Wen, Dong In Kim
This survey is motivated by the lack of a comprehensive literature review on the development of decentralized consensus mechanisms in blockchain networks.
Cryptography and Security
no code implementations • 8 Nov 2017 • Nguyen Cong Luong, Zehui Xiong, Ping Wang, Dusit Niyato
However, a mechanism needs to be designed for edge resource allocation to maximize the revenue for the Edge Computing Service Provider and to ensure incentive compatibility and individual rationality is still open.
Computer Science and Game Theory