Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks

Networking and Artificial Intelligence (AI) are two of the most transformative information technologies over the last few decades. Building upon the synergies of these two powerful technologies, we envision designing next generation of edge networks to be highly efficient, reliable, robust and secure. To this end, in this paper, we delve into interesting and fundamental research challenges and opportunities that span two major broad and symbiotic areas: AI for Networks and Networks for AI. The former deals with the development of new AI tools and techniques that can enable the next generation AI-assisted networks; while the latter focuses on developing networking techniques and tools that will facilitate the vision of distributed intelligence, resulting in a virtuous research cycle where advances in one will help accelerate advances in the other. A wide range of applications will be further discussed to illustrate the importance of the foundational advances developed in these two areas.

[1]  Lei Jiao,et al.  Power-of-2-arms for bandit learning with switching costs , 2022, MobiHoc.

[2]  Ameet S. Talwalkar,et al.  SONAR: Joint Architecture and System Optimization Search , 2022, ArXiv.

[3]  Gauri Joshi,et al.  FedVARP: Tackling the Variance Due to Partial Client Participation in Federated Learning , 2022, UAI.

[4]  Abhishek K. Gupta,et al.  Interference Constrained Beam Alignment for Time-Varying Channels via Kernelized Bandits , 2022, 2022 20th International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt).

[5]  Yingbin Liang,et al.  Provably Efficient Offline Reinforcement Learning with Trajectory-Wise Reward , 2022, ArXiv.

[6]  Ninghui Li,et al.  VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol , 2022, AsiaCCS.

[7]  Mingrui Liu,et al.  Will Bilevel Optimizers Benefit from Loops , 2022, NeurIPS.

[8]  A. Yener,et al.  Over-the-Air Federated Learning with Joint Adaptive Computation and Power Control , 2022, 2022 IEEE International Symposium on Information Theory (ISIT).

[9]  K. Chowdhury,et al.  FLASH: Federated Learning for Automated Selection of High-band mmWave Sectors , 2022, IEEE Conference on Computer Communications.

[10]  R. Nowak,et al.  GALAXY: Graph-based Active Learning at the Extreme , 2022, ICML.

[11]  Stratis Ioannidis,et al.  Experimental Design Networks: A Paradigm for Serving Heterogeneous Learners under Networking Constraints , 2022, IEEE INFOCOM 2022 - IEEE Conference on Computer Communications.

[12]  Stratis Ioannidis,et al.  Deep Learning on Multimodal Sensor Data at the Wireless Edge for Vehicular Network , 2022, IEEE Transactions on Vehicular Technology.

[13]  Stefano Basagni,et al.  ColO-RAN: Developing Machine Learning-Based xApps for Open RAN Closed-Loop Control on Programmable Experimental Platforms , 2021, IEEE Transactions on Mobile Computing.

[14]  Stratis Ioannidis,et al.  Online Caching Networks with Adversarial Guarantees , 2021, Proc. ACM Meas. Anal. Comput. Syst..

[15]  Elisa Bertino,et al.  Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices , 2021, CCS.

[16]  Chunyi Peng,et al.  Reconfiguring Cell Selection in 4G/5G Networks , 2021, 2021 IEEE 29th International Conference on Network Protocols (ICNP).

[17]  S. Basagni,et al.  Colosseum, the world's largest wireless network emulator , 2021, MobiCom.

[18]  Swanand Kadhe,et al.  Leveraging Spatial and Temporal Correlations in Sparsified Mean Estimation , 2021, NeurIPS.

[19]  Yingbin Liang,et al.  PER-ETD: A Polynomially Efficient Emphatic Temporal Difference Learning Method , 2021, ICLR.

[20]  Salam Akoum,et al.  Auto-Tuning for Cellular Scheduling Through Bandit-Learning and Low-Dimensional Clustering , 2021, IEEE/ACM Transactions on Networking.

[21]  Adam Wierman,et al.  Stability Constrained Reinforcement Learning for Real-Time Voltage Control , 2021, 2022 American Control Conference (ACC).

[22]  R. Srikant,et al.  Improved Algorithms for Misspecified Linear Markov Decision Processes , 2021, AISTATS.

[23]  Sewoong Oh,et al.  KO codes: inventing nonlinear encoding and decoding for reliable wireless communication via deep-learning , 2021, ICML.

[24]  Christos Thrampoulidis,et al.  Safe Reinforcement Learning with Linear Function Approximation , 2021, ICML.

[25]  Atilla Eryilmaz,et al.  A Lyapunov-Based Methodology for Constrained Optimization with Bandit Feedback , 2021, AAAI.

[26]  Stratis Ioannidis,et al.  Revisiting Hilbert-Schmidt Information Bottleneck for Adversarial Robustness , 2021, NeurIPS.

[27]  Lei Ying,et al.  A Provably-Efficient Model-Free Algorithm for Constrained Markov Decision Processes , 2021, ArXiv.

[28]  Lei Jiao,et al.  Combining Regularization with Look-Ahead for Competitive Online Convex Optimization , 2021, IEEE INFOCOM 2021 - IEEE Conference on Computer Communications.

[29]  Shie Mannor,et al.  RL for Latent MDPs: Regret Guarantees and a Lower Bound , 2021, NeurIPS.

[30]  Haibo Yang,et al.  Achieving Linear Speedup with Partial Worker Participation in Non-IID Federated Learning , 2021, ICLR.

[31]  Kaiyi Ji,et al.  Bilevel Optimization: Convergence Analysis and Enhanced Design , 2020, ICML.

[32]  Yingbin Liang,et al.  Finite-Time Analysis for Double Q-learning , 2020, NeurIPS.

[33]  Sneha Kumar Kasera,et al.  POWDER: Platform for Open Wireless Data-driven Experimental Research , 2020, WiNTECH@MOBICOM.

[34]  Jorge Lobo,et al.  Polisma - A Framework for Learning Attribute-Based Access Control Policies , 2020, ESORICS.

[35]  J. Lee,et al.  Convergence of Meta-Learning with Task-Specific Adaptation over Partial Parameters , 2020, NeurIPS.

[36]  Shinjo Park,et al.  BaseSAFE: baseband sanitized fuzzing through emulation , 2020, WISEC.

[37]  Dipankar Raychaudhuri,et al.  Challenge: COSMOS: A city-scale programmable testbed for experimentation with advanced wireless , 2020, MobiCom.

[38]  Yingbin Liang,et al.  Improving Sample Complexity Bounds for (Natural) Actor-Critic Algorithms , 2020, NeurIPS.

[39]  Hao Liang,et al.  Overlap Local-SGD: An Algorithmic Approach to Hide Communication Delays in Distributed SGD , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[40]  A. Wierman,et al.  Scalable Reinforcement Learning for Multiagent Networked Systems , 2019, Oper. Res..

[41]  Ambuj Tewari,et al.  Sample Complexity of Reinforcement Learning using Linearly Combined Model Ensembles , 2019, AISTATS.

[42]  Yingbin Liang,et al.  Two Time-scale Off-Policy TD Learning: Non-asymptotic Analysis over Markovian Samples , 2019, NeurIPS.

[43]  Venkat Dasari,et al.  Secure Coded Cooperative Computation at the Heterogeneous Edge against Byzantine Attacks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[44]  Srinivasan Parthasarathy,et al.  Fast and Efficient Cross Band Channel Prediction Using Machine Learning , 2019, MobiCom.

[45]  Thorsten Holz,et al.  LTE security disabled: misconfiguration in commercial networks , 2019, WiSec.

[46]  Malhar Chaudhari,et al.  Fast and Efficient Distributed Matrix-vector Multiplication Using Rateless Fountain Codes , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[47]  Yongdae Kim,et al.  Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[48]  Shaofeng Zou,et al.  Finite-Sample Analysis for SARSA with Linear Function Approximation , 2019, NeurIPS.

[49]  Oded Nov,et al.  SONYC , 2019, Commun. ACM.

[50]  Ness B. Shroff,et al.  Age-optimal Sampling and Transmission Scheduling in Multi-Source Systems , 2018, MobiHoc.

[51]  Sreeram Kannan,et al.  LEARN Codes: Inventing Low-Latency Codes via Recurrent Neural Networks , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[52]  Úlfar Erlingsson,et al.  Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity , 2018, SODA.

[53]  Alexander A. Kist,et al.  Low Power Wide Area Networks: A Survey of Enabling Technologies, Applications and Interoperability Needs , 2018, IEEE Access.

[54]  Adam D. Smith,et al.  Distributed Differential Privacy via Shuffling , 2018, IACR Cryptol. ePrint Arch..

[55]  Sreeram Kannan,et al.  Deepcode: Feedback Codes via Deep Learning , 2018, IEEE Journal on Selected Areas in Information Theory.

[56]  Daniel L. K. Yamins,et al.  Flexible Neural Representation for Physics Prediction , 2018, NeurIPS.

[57]  Yisong Yue,et al.  Safe Exploration and Optimization of Constrained MDPs Using Gaussian Processes , 2018, AAAI.

[58]  Sonia Fahmy,et al.  Competitive Online Convex Optimization with Switching Costs and Ramp Constraints , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[59]  Parijat Dube,et al.  Slow and Stale Gradients Can Win the Race , 2018, IEEE Journal on Selected Areas in Information Theory.

[60]  Ness B. Shroff,et al.  Efficient Beam Alignment in Millimeter Wave Systems Using Contextual Bandits , 2017, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[61]  Fang Liu,et al.  A Change-Detection based Framework for Piecewise-stationary Multi-Armed Bandit Problem , 2017, AAAI.

[62]  Ness B. Shroff,et al.  BiPass: Enabling End-to-End Full Duplex , 2017, MobiCom.

[63]  Fang Liu,et al.  Reward Maximization Under Uncertainty: Leveraging Side-Observations on Networks , 2017, J. Mach. Learn. Res..

[64]  Songwu Lu,et al.  New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks , 2016, CCS.

[65]  Matthias Troyer,et al.  Solving the quantum many-body problem with artificial neural networks , 2016, Science.

[66]  Sanjay Shakkottai,et al.  Regret of Queueing Bandits , 2016, NIPS.

[67]  Julian N. Marewski,et al.  What can the brain teach us about building artificial intelligence? , 2016, Behavioral and Brain Sciences.

[68]  Pierre Baldi,et al.  Parameterized neural networks for high-energy physics , 2016, The European Physical Journal C.

[69]  Paris Smaragdis,et al.  Bitwise Neural Networks , 2016, ArXiv.

[70]  Roy D. Yates,et al.  Update or wait: How to keep your data fresh , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[71]  Xinbing Wang,et al.  Insecurity of Voice Solution VoLTE in LTE Mobile Networks , 2015, CCS.

[72]  Antonio Liotta,et al.  Towards ABAC Policy Mining from Logs with Deep Learning , 2015 .

[73]  Haipeng Luo,et al.  Fast Convergence of Regularized Learning in Games , 2015, NIPS.

[74]  Srinivasan Parthasarathy,et al.  Automatic Selection of Sparse Matrix Representation on GPUs , 2015, ICS.

[75]  Raef Bassily,et al.  Local, Private, Efficient Protocols for Succinct Histograms , 2015, STOC.

[76]  Eric Medvet,et al.  Evolutionary Inference of Attribute-Based Access Control Policies , 2015, EMO.

[77]  Martha White,et al.  An Emphatic Approach to the Problem of Off-policy Temporal-Difference Learning , 2015, J. Mach. Learn. Res..

[78]  Srinivasan Parthasarathy,et al.  Fast Sparse Matrix-Vector Multiplication on GPUs for Graph Applications , 2014, SC14: International Conference for High Performance Computing, Networking, Storage and Analysis.

[79]  Bo Chen,et al.  In-band wireless cut-through: is it possible? , 2014, HotWireless@MobiCom.

[80]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[81]  Martin J. Wainwright,et al.  Local privacy and statistical minimax rates , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[82]  Luiz André Barroso,et al.  The tail at scale , 2013, CACM.

[83]  Songwu Lu,et al.  Mobile data charging: new attacks and countermeasures , 2012, CCS.

[84]  Mingyan Liu,et al.  Online learning in decentralized multi-user spectrum access with synchronized explorations , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[85]  M. Liu,et al.  Performance and Convergence of Multi-user Online Learning , 2011, International ICST Conference on Game Theory for Networks.

[86]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[87]  Hema Raghavan,et al.  Active Learning with Feedback on Features and Instances , 2006, J. Mach. Learn. Res..

[88]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[89]  A. Glavieux,et al.  Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1 , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.

[90]  Tom M. Mitchell,et al.  Explanation-Based Generalization: A Unifying View , 1986, Machine Learning.

[91]  Stratis Ioannidis,et al.  Multi-Modality Sensing and Data Fusion for Multi-Vehicle Detection , 2023, IEEE Transactions on Multimedia.

[92]  Mohit Kumar Jangid,et al.  Towards a TEE-based V2V Protocol for Connected and Autonomous Vehicles , 2022, Proceedings Fourth International Workshop on Automotive and Autonomous Vehicle Security.

[93]  Hairi,et al.  Finite-Time Convergence and Sample Complexity of Multi-Agent Actor-Critic Reinforcement Learning with Average Reward , 2022, ICLR.

[94]  Lei Ying,et al.  Triple-Q: A Model-Free Algorithm for Constrained Reinforcement Learning with Sublinear Regret and Zero Constraint Violation , 2022, AISTATS.

[95]  Joshua B. Tenenbaum,et al.  End-to-End Differentiable Physics for Learning and Control , 2018, NeurIPS.

[96]  Elisa Bertino,et al.  LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE , 2018, NDSS.

[97]  Sonia Fahmy,et al.  ENVI: Elastic resource flexing for Network function Virtualization , 2017, HotCloud.

[98]  Yonggang Wen,et al.  “ A Survey of Software Defined Networking , 2020 .

[99]  Elmar Schoch,et al.  A Generic Public Key Infrastructure for Securing Car-to-X Communication , 2011 .

[100]  Elisa Bertino,et al.  Access Control for Databases: Concepts and Systems , 2011, Found. Trends Databases.

[101]  R. Gallager,et al.  Low-Density Parity-Check Codes , 1963 .