Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks
暂无分享,去创建一个
A. Arora | S. Shakkottai | Gauri Joshi | Raef Bassily | S. Parthasarathy | Stratis Ioannidis | A. Eryilmaz | N. Shroff | M. Liu | Aryan Mokhtari | C. Caramanis | Yitao Liang | A. Yener | E. Bertino | K. Srinivasan | E. Ekici | K. Chowdhury | T. Melodia | Sewoong Oh | H. Seferoglu | Chunyi Peng | Sen Lin | Lei Ying | Jia Liu | Ameet Talwalkar | Zhiqiang Lin | Ming Shi | Nan Jiang | J. Kurose | Rob Nowak
[1] Lei Jiao,et al. Power-of-2-arms for bandit learning with switching costs , 2022, MobiHoc.
[2] Ameet S. Talwalkar,et al. SONAR: Joint Architecture and System Optimization Search , 2022, ArXiv.
[3] Gauri Joshi,et al. FedVARP: Tackling the Variance Due to Partial Client Participation in Federated Learning , 2022, UAI.
[4] Abhishek K. Gupta,et al. Interference Constrained Beam Alignment for Time-Varying Channels via Kernelized Bandits , 2022, 2022 20th International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt).
[5] Yingbin Liang,et al. Provably Efficient Offline Reinforcement Learning with Trajectory-Wise Reward , 2022, ArXiv.
[6] Ninghui Li,et al. VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol , 2022, AsiaCCS.
[7] Mingrui Liu,et al. Will Bilevel Optimizers Benefit from Loops , 2022, NeurIPS.
[8] A. Yener,et al. Over-the-Air Federated Learning with Joint Adaptive Computation and Power Control , 2022, 2022 IEEE International Symposium on Information Theory (ISIT).
[9] K. Chowdhury,et al. FLASH: Federated Learning for Automated Selection of High-band mmWave Sectors , 2022, IEEE Conference on Computer Communications.
[10] R. Nowak,et al. GALAXY: Graph-based Active Learning at the Extreme , 2022, ICML.
[11] Stratis Ioannidis,et al. Experimental Design Networks: A Paradigm for Serving Heterogeneous Learners under Networking Constraints , 2022, IEEE INFOCOM 2022 - IEEE Conference on Computer Communications.
[12] Stratis Ioannidis,et al. Deep Learning on Multimodal Sensor Data at the Wireless Edge for Vehicular Network , 2022, IEEE Transactions on Vehicular Technology.
[13] Stefano Basagni,et al. ColO-RAN: Developing Machine Learning-Based xApps for Open RAN Closed-Loop Control on Programmable Experimental Platforms , 2021, IEEE Transactions on Mobile Computing.
[14] Stratis Ioannidis,et al. Online Caching Networks with Adversarial Guarantees , 2021, Proc. ACM Meas. Anal. Comput. Syst..
[15] Elisa Bertino,et al. Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices , 2021, CCS.
[16] Chunyi Peng,et al. Reconfiguring Cell Selection in 4G/5G Networks , 2021, 2021 IEEE 29th International Conference on Network Protocols (ICNP).
[17] S. Basagni,et al. Colosseum, the world's largest wireless network emulator , 2021, MobiCom.
[18] Swanand Kadhe,et al. Leveraging Spatial and Temporal Correlations in Sparsified Mean Estimation , 2021, NeurIPS.
[19] Yingbin Liang,et al. PER-ETD: A Polynomially Efficient Emphatic Temporal Difference Learning Method , 2021, ICLR.
[20] Salam Akoum,et al. Auto-Tuning for Cellular Scheduling Through Bandit-Learning and Low-Dimensional Clustering , 2021, IEEE/ACM Transactions on Networking.
[21] Adam Wierman,et al. Stability Constrained Reinforcement Learning for Real-Time Voltage Control , 2021, 2022 American Control Conference (ACC).
[22] R. Srikant,et al. Improved Algorithms for Misspecified Linear Markov Decision Processes , 2021, AISTATS.
[23] Sewoong Oh,et al. KO codes: inventing nonlinear encoding and decoding for reliable wireless communication via deep-learning , 2021, ICML.
[24] Christos Thrampoulidis,et al. Safe Reinforcement Learning with Linear Function Approximation , 2021, ICML.
[25] Atilla Eryilmaz,et al. A Lyapunov-Based Methodology for Constrained Optimization with Bandit Feedback , 2021, AAAI.
[26] Stratis Ioannidis,et al. Revisiting Hilbert-Schmidt Information Bottleneck for Adversarial Robustness , 2021, NeurIPS.
[27] Lei Ying,et al. A Provably-Efficient Model-Free Algorithm for Constrained Markov Decision Processes , 2021, ArXiv.
[28] Lei Jiao,et al. Combining Regularization with Look-Ahead for Competitive Online Convex Optimization , 2021, IEEE INFOCOM 2021 - IEEE Conference on Computer Communications.
[29] Shie Mannor,et al. RL for Latent MDPs: Regret Guarantees and a Lower Bound , 2021, NeurIPS.
[30] Haibo Yang,et al. Achieving Linear Speedup with Partial Worker Participation in Non-IID Federated Learning , 2021, ICLR.
[31] Kaiyi Ji,et al. Bilevel Optimization: Convergence Analysis and Enhanced Design , 2020, ICML.
[32] Yingbin Liang,et al. Finite-Time Analysis for Double Q-learning , 2020, NeurIPS.
[33] Sneha Kumar Kasera,et al. POWDER: Platform for Open Wireless Data-driven Experimental Research , 2020, WiNTECH@MOBICOM.
[34] Jorge Lobo,et al. Polisma - A Framework for Learning Attribute-Based Access Control Policies , 2020, ESORICS.
[35] J. Lee,et al. Convergence of Meta-Learning with Task-Specific Adaptation over Partial Parameters , 2020, NeurIPS.
[36] Shinjo Park,et al. BaseSAFE: baseband sanitized fuzzing through emulation , 2020, WISEC.
[37] Dipankar Raychaudhuri,et al. Challenge: COSMOS: A city-scale programmable testbed for experimentation with advanced wireless , 2020, MobiCom.
[38] Yingbin Liang,et al. Improving Sample Complexity Bounds for (Natural) Actor-Critic Algorithms , 2020, NeurIPS.
[39] Hao Liang,et al. Overlap Local-SGD: An Algorithmic Approach to Hide Communication Delays in Distributed SGD , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[40] A. Wierman,et al. Scalable Reinforcement Learning for Multiagent Networked Systems , 2019, Oper. Res..
[41] Ambuj Tewari,et al. Sample Complexity of Reinforcement Learning using Linearly Combined Model Ensembles , 2019, AISTATS.
[42] Yingbin Liang,et al. Two Time-scale Off-Policy TD Learning: Non-asymptotic Analysis over Markovian Samples , 2019, NeurIPS.
[43] Venkat Dasari,et al. Secure Coded Cooperative Computation at the Heterogeneous Edge against Byzantine Attacks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[44] Srinivasan Parthasarathy,et al. Fast and Efficient Cross Band Channel Prediction Using Machine Learning , 2019, MobiCom.
[45] Thorsten Holz,et al. LTE security disabled: misconfiguration in commercial networks , 2019, WiSec.
[46] Malhar Chaudhari,et al. Fast and Efficient Distributed Matrix-vector Multiplication Using Rateless Fountain Codes , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[47] Yongdae Kim,et al. Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[48] Shaofeng Zou,et al. Finite-Sample Analysis for SARSA with Linear Function Approximation , 2019, NeurIPS.
[49] Oded Nov,et al. SONYC , 2019, Commun. ACM.
[50] Ness B. Shroff,et al. Age-optimal Sampling and Transmission Scheduling in Multi-Source Systems , 2018, MobiHoc.
[51] Sreeram Kannan,et al. LEARN Codes: Inventing Low-Latency Codes via Recurrent Neural Networks , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[52] Úlfar Erlingsson,et al. Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity , 2018, SODA.
[53] Alexander A. Kist,et al. Low Power Wide Area Networks: A Survey of Enabling Technologies, Applications and Interoperability Needs , 2018, IEEE Access.
[54] Adam D. Smith,et al. Distributed Differential Privacy via Shuffling , 2018, IACR Cryptol. ePrint Arch..
[55] Sreeram Kannan,et al. Deepcode: Feedback Codes via Deep Learning , 2018, IEEE Journal on Selected Areas in Information Theory.
[56] Daniel L. K. Yamins,et al. Flexible Neural Representation for Physics Prediction , 2018, NeurIPS.
[57] Yisong Yue,et al. Safe Exploration and Optimization of Constrained MDPs Using Gaussian Processes , 2018, AAAI.
[58] Sonia Fahmy,et al. Competitive Online Convex Optimization with Switching Costs and Ramp Constraints , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[59] Parijat Dube,et al. Slow and Stale Gradients Can Win the Race , 2018, IEEE Journal on Selected Areas in Information Theory.
[60] Ness B. Shroff,et al. Efficient Beam Alignment in Millimeter Wave Systems Using Contextual Bandits , 2017, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[61] Fang Liu,et al. A Change-Detection based Framework for Piecewise-stationary Multi-Armed Bandit Problem , 2017, AAAI.
[62] Ness B. Shroff,et al. BiPass: Enabling End-to-End Full Duplex , 2017, MobiCom.
[63] Fang Liu,et al. Reward Maximization Under Uncertainty: Leveraging Side-Observations on Networks , 2017, J. Mach. Learn. Res..
[64] Songwu Lu,et al. New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks , 2016, CCS.
[65] Matthias Troyer,et al. Solving the quantum many-body problem with artificial neural networks , 2016, Science.
[66] Sanjay Shakkottai,et al. Regret of Queueing Bandits , 2016, NIPS.
[67] Julian N. Marewski,et al. What can the brain teach us about building artificial intelligence? , 2016, Behavioral and Brain Sciences.
[68] Pierre Baldi,et al. Parameterized neural networks for high-energy physics , 2016, The European Physical Journal C.
[69] Paris Smaragdis,et al. Bitwise Neural Networks , 2016, ArXiv.
[70] Roy D. Yates,et al. Update or wait: How to keep your data fresh , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[71] Xinbing Wang,et al. Insecurity of Voice Solution VoLTE in LTE Mobile Networks , 2015, CCS.
[72] Antonio Liotta,et al. Towards ABAC Policy Mining from Logs with Deep Learning , 2015 .
[73] Haipeng Luo,et al. Fast Convergence of Regularized Learning in Games , 2015, NIPS.
[74] Srinivasan Parthasarathy,et al. Automatic Selection of Sparse Matrix Representation on GPUs , 2015, ICS.
[75] Raef Bassily,et al. Local, Private, Efficient Protocols for Succinct Histograms , 2015, STOC.
[76] Eric Medvet,et al. Evolutionary Inference of Attribute-Based Access Control Policies , 2015, EMO.
[77] Martha White,et al. An Emphatic Approach to the Problem of Off-policy Temporal-Difference Learning , 2015, J. Mach. Learn. Res..
[78] Srinivasan Parthasarathy,et al. Fast Sparse Matrix-Vector Multiplication on GPUs for Graph Applications , 2014, SC14: International Conference for High Performance Computing, Networking, Storage and Analysis.
[79] Bo Chen,et al. In-band wireless cut-through: is it possible? , 2014, HotWireless@MobiCom.
[80] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[81] Martin J. Wainwright,et al. Local privacy and statistical minimax rates , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[82] Luiz André Barroso,et al. The tail at scale , 2013, CACM.
[83] Songwu Lu,et al. Mobile data charging: new attacks and countermeasures , 2012, CCS.
[84] Mingyan Liu,et al. Online learning in decentralized multi-user spectrum access with synchronized explorations , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[85] M. Liu,et al. Performance and Convergence of Multi-user Online Learning , 2011, International ICST Conference on Game Theory for Networks.
[86] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[87] Hema Raghavan,et al. Active Learning with Feedback on Features and Instances , 2006, J. Mach. Learn. Res..
[88] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[89] A. Glavieux,et al. Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1 , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.
[90] Tom M. Mitchell,et al. Explanation-Based Generalization: A Unifying View , 1986, Machine Learning.
[91] Stratis Ioannidis,et al. Multi-Modality Sensing and Data Fusion for Multi-Vehicle Detection , 2023, IEEE Transactions on Multimedia.
[92] Mohit Kumar Jangid,et al. Towards a TEE-based V2V Protocol for Connected and Autonomous Vehicles , 2022, Proceedings Fourth International Workshop on Automotive and Autonomous Vehicle Security.
[93] Hairi,et al. Finite-Time Convergence and Sample Complexity of Multi-Agent Actor-Critic Reinforcement Learning with Average Reward , 2022, ICLR.
[94] Lei Ying,et al. Triple-Q: A Model-Free Algorithm for Constrained Reinforcement Learning with Sublinear Regret and Zero Constraint Violation , 2022, AISTATS.
[95] Joshua B. Tenenbaum,et al. End-to-End Differentiable Physics for Learning and Control , 2018, NeurIPS.
[96] Elisa Bertino,et al. LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE , 2018, NDSS.
[97] Sonia Fahmy,et al. ENVI: Elastic resource flexing for Network function Virtualization , 2017, HotCloud.
[98] Yonggang Wen,et al. “ A Survey of Software Defined Networking , 2020 .
[99] Elmar Schoch,et al. A Generic Public Key Infrastructure for Securing Car-to-X Communication , 2011 .
[100] Elisa Bertino,et al. Access Control for Databases: Concepts and Systems , 2011, Found. Trends Databases.
[101] R. Gallager,et al. Low-Density Parity-Check Codes , 1963 .