Deep reinforcement learning-based task offloading in satellite-terrestrial edge computing networks
…, T Li, J Sun, J Liang, H Zhang, L Geng… - 2021 IEEE Wireless …, 2021 - ieeexplore.ieee.org
In remote regions (eg, mountain and desert), cellular networks are usually sparsely deployed
or unavailable. With the appearance of new applications (eg, industrial automation and …
or unavailable. With the appearance of new applications (eg, industrial automation and …
Multi-head attention based popularity prediction caching in social content-centric networking with mobile edge computing
…, H Liu, H Ping, T Li, H Zhang, L Geng… - IEEE …, 2020 - ieeexplore.ieee.org
With the rapid growth of social network traffic, the design of an efficient caching strategy is
crucial in the social content-centric network (SocialCCN). In order to design a more …
crucial in the social content-centric network (SocialCCN). In order to design a more …
Esmo: Joint frame scheduling and model caching for edge video analytics
…, Y Liu, X Zhang, D Zhu, Z Guo, L Geng - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the advancements in Machine Learning (ML) and edge computing, increasing efforts
have been devoted to edge video analytics. However, most of the existing works fail to …
have been devoted to edge video analytics. However, most of the existing works fail to …
Speed-aware and customized task offloading and resource allocation in mobile edge computing
…, H Tian, Y Yang, Y Liu, H Liu, L Geng… - IEEE …, 2021 - ieeexplore.ieee.org
Recently, the task offloading and resource allocation (TORA) issues in mobile edge computing
system have attracted much attention. However, the impact of different movement speeds …
system have attracted much attention. However, the impact of different movement speeds …
Manticore: An unsupervised intrusion detection system based on contrastive learning in 5g networks
L Yuan, J Sun, S Zhuang, Y Liu, L Geng… - ICASSP 2024-2024 …, 2024 - ieeexplore.ieee.org
The increasing complexity and openness of 5G networks naturally enlarge the attack surface
and introduce new vulnerabilities, thereby posing challenges to the performance of existing …
and introduce new vulnerabilities, thereby posing challenges to the performance of existing …
Privacy-aware online task offloading for mobile-edge computing
T Li, H Liu, J Liang, H Zhang, L Geng, Y Liu - International Conference on …, 2020 - Springer
Mobile-edge computing (MEC) has great advantages in reducing latency and energy
consumption, where mobile devices (MDs) can offload their computation-demanding and latency-…
consumption, where mobile devices (MDs) can offload their computation-demanding and latency-…
iswift: Fast and accurate impact identification for large-scale cdns
One key challenge to maintain a large-scale Content Delivery Network (CDN) is to minimize
the service downtime when severe system problems happen (eg, hardware failures). In this …
the service downtime when severe system problems happen (eg, hardware failures). In this …
Fast and accurate root cause analysis based on signalling messages for 5g networks
…, J Sun, J Fu, L Yuan, S Zhuang, L Geng… - ICASSP 2024-2024 …, 2024 - ieeexplore.ieee.org
The ever-increasing complexity and scale of 5G communication networks pose huge
challenges to network operations. Root cause analysis is considered as a promising method for …
challenges to network operations. Root cause analysis is considered as a promising method for …
Hot-Swap MarkBoard: An Efficient Black-box Watermarking Approach for Large-scale Model Distribution
Recently, Deep Learning (DL) models have been increasingly deployed on end-user devices
as On-Device AI, offering improved efficiency and privacy. However, this deployment trend …
as On-Device AI, offering improved efficiency and privacy. However, this deployment trend …
Defense against advanced persistent threats: Optimal network security hardening using multi-stage maze network game
H Zhang, H Liu, J Liang, T Li, L Geng… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Advanced Persistent Threat (APT) is a stealthy, continuous and sophisticated method of
network attacks, which can cause serious privacy leakage and millions of dollars losses. In this …
network attacks, which can cause serious privacy leakage and millions of dollars losses. In this …