IEEE Transactions on Network Science and Engineering | All Volumes | IEEE Xplore

Issue 3 • July-Sept.-2021

Loading...

Table of Contents

Publication Year: 2021,Page(s):C1 - C3

Table of Contents

The paper proposes a co-design framework for event-triggered stabilization control of a class of networked control systems (NCS) under unknown DoS attacks. To reduce the number of control inputs, a sampled-data dynamic event-triggering (S-DET) scheme is developed. Both the state measurements and monitoring of the S-DET are conducted periodically. The parameter design is based on the solution of li...Show More
In this paper, we propose a game-theoretic framework for improving the resilience of the consensus algorithm, under the $\mathcal {H}_2$ performance metric, in the presence of a strategic attacker. In this game, an attacker selects a subset of nodes in the network to inject attack signals. Its objective is to maximize the $\mathcal {H}_2$ norm of the system from the attack signal to the output of ...Show More
Advanced persistent threat (APT) as a generic highly sophisticated cyber attack poses a severe threat to organizational data security. Since the conventional detection and repair (DAR)-based APT defense mechanism has several conspicuous drawbacks, it is imperative to develop a more effective and efficient APT defense mechanism. Based on the data backup and recovery (DBAR) techniques developed in t...Show More
The privacy issue in data publication is critical and has been extensively studied. Correlation is unavoidable in data publication, which universally manifests intrinsic correlations owing to social, physical, behavioral, and genetic relationships. However, most of the existing works assume that private data is independent, i.e., the correlation among data is neglected. In this paper, we investiga...Show More
Large scale deep learning is trending recently, since people find that complicated networks can sometimes reach high accuracy on image recognition, natural language processing, etc. With the increasing complexity and batch size of deep neural networks, the training for such networks is more difficult because of the limited computational power and memory. Distributed machine learning or deep learni...Show More
With the widespread applications of Cyber-Physical Systems, the security problem of distributed state estimation has been exposed, and attracted considerable attentions. In this paper, we consider the issue of distributed secure state estimation under stochastic linear attacks. Inspired by the method applied in anomaly detection, we propose a K-L divergence detector to resist the hostile attacks t...Show More
Vehicular communication systems (VCS) are likely to play an increasingly important role in future smart city design, for example by improving road safety and traffic efficiency. However, there are underpinning security and privacy challenges, which may also result in under-utilization of vehicular data. In this paper, we introduce a new cryptographic primitive, namely: blockchain-based proxy re-en...Show More
The High Definition Multimedia Interface (HDMI) is the backbone and the de-facto standard for Audio/Video connections between video-enabled devices. Today, nearly ten billion HDMI devices are used to distribute A/V signals in homes, offices, concert halls, and sporting events. An important component in HDMI is the Consumer Electronics Control (CEC) protocol, which allows HDMI devices to share an H...Show More
The great development of smart networks enables Internet of Vehicles (IoV) as a promising paradigm to provide pervasive services, where privacy issues for location-based services (LBSs) have attracted considerable attention. In terms of location privacy, inspired by differential privacy, geo-indistinguishability (Geo-Ind) has recently become a prevalent privacy model for LBSs. Although Geo-Ind gua...Show More
Billions of sensors and devices are connecting to the Internet of Thing (IoT) and generating massive data which are benefit for smart network systems. However, low-cost, secure, and efficient data collection from billions of IoT devices in smart city is a huge challenge. Recruiting mobile vehicles (MVs) has been proved to be an effective data collection scheme. However, the previous approaches rar...Show More
Advanced Metering Infrastructure (AMI) is a critical and fundamental component of smart grids. Cyber security of AMI thus has direct implications to smart grid's secure and reliable operations. This paper establishes analytical models for studying AMI system's robustness with presence of Distributed Denial-of-Service (DDoS) attacks. This paper firstly proposes a state transition model for individu...Show More
In a smart advertising network (SAN), a broker builds user profiles from its wealth of user data, manages advertisements for retailers, and disseminates the advertisements through multiple channels. However, the broker sometimes provides insufficient transparency explanations of advertising activities, which may result in the increasing popularity of ad-blocking software and lower advertising inve...Show More
The peer-to-peer (P2P) network of blockchain used to transport its transactions and blocks has a high impact on the efficiency and security of the system. The P2P network topologies of popular blockchains such as Bitcoin and Ethereum, therefore, deserve our highest attention. The current Ethereum blockchain explorers (e.g., Etherscan) focus on the tracking of block and transaction records but omit...Show More
Blockchain technology has wide applications in the fields of finance, public welfare, and the Internet of Things. Owing to a blockchain's characteristics, which include decentralization, openness, autonomy, immutability, and anonymity, it is difficult to quickly reach a reliable consensus result among its nodes. This work proposes a performance-optimized consensus mechanism based on node classific...Show More
The group testing approach, which achieves significant cost reduction over the individual testing approach, has received a lot of interest lately for massive testing of COVID-19. Many studies simply assume samples mixed in a group are independent. However, this assumption may not be reasonable for a contagious disease like COVID-19. Specifically, people within a family tend to infect each other an...Show More
In this paper, a novel communication constraint is introduced for the synchronization problem of coupled agents over finite field networks. Given a network of interconnected agents, the state information of agents may contain multiple levels, therefore multiple communication channels between two connected agents are needed to transmit corresponding level information. Compared with existing results...Show More
In cloud data centers, the requirement for fine-grained policy leads to a large number of server rules. However, the servers cannot efficiently handle all of these rules due to limitations of the central processing unit (CPU) and memory resources. Thus, a rule partition and placement algorithms have been proposed to divide the original ruleset into several rule subsets and migrate some rule subset...Show More
Applications of Software-Defined Networking (SDN) to the Internet Routing hold great promises for supporting the ever-growing performance requirements of Internet applications. The inherent centralization of these SDN approaches on the Internet routing comes with the following concerns: 1) privacy, the operators are reluctant to share private routing information, 2) separation of responsibilities,...Show More
Deep convolutional neural networks have achieved great success in facial expression datasets both under laboratory conditions and in the wild. However, most of these related researches use general image classification networks (e.g., VGG, GoogLeNet) as backbones, which leads to inadaptability while applying to Facial Expression Recognition (FER) task, especially those in the wild. In the meantime,...Show More
Current networking protocols deem inefficient in accommodating the two key challenges of Unmanned Aerial Vehicle (UAV) networks, namely the network connectivity loss and energy limitations. One approach to solve these issues is using learning-based routing protocols to make close-to-optimal local decisions by the network nodes, and Q-routing is a bold example of such protocols. However, the perfor...Show More
The class of additive-increase/multiplicative-decrease (AIMD) algorithms constitutes a key mechanism for congestion control in modern communication networks, such as the current Internet. However, when wireless links are present, the algorithmic behavior of an AIMD algorithm is distorted. Spurious backoffs may be triggered due to packet reordering and non-congestive loss. Prior solutions are devel...Show More
The COVID-19 pandemic has brought a brand-new challenge to the design and management of the air transportation network (ATN). Many countries have partially or entirely shut down their international flights during this period to contain the spread of COVID-19. However, the changes in the international connectivity of different countries during this period varied greatly, as the ATNs of different co...Show More
Motivated by the ongoing pandemic COVID-19, we propose a closed-loop framework that combines inference from testing data, learning the parameters of the dynamics and optimal resource allocation for controlling the spread of the susceptible-infected-recovered (SIR) epidemic on networks. Our framework incorporates several key factors present in testing data, such as the fact that high risk individua...Show More

Contact Information

Editor-in-Chief
Dusit Niyato
Nanyang Technological University
Singapore
Singapore
dniyato@ntu.edu.sg

Contact Information

Editor-in-Chief
Dusit Niyato
Nanyang Technological University
Singapore
Singapore
dniyato@ntu.edu.sg