Skip to main content

Showing 1–7 of 7 results for author: Benslimane, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.05078  [pdf, other

    cs.IT

    Enhancing LEO Mega-Constellations with Inter-Satellite Links: Vision and Challenges

    Authors: Chenyu Wu, Shuai Han, Qian Chen, Yu Wang, Weixiao Meng, Abderrahim Benslimane

    Abstract: Low Earth orbit (LEO) satellites have been envisioned as a significant component of the sixth generation (6G) network architecture for achieving ubiquitous coverage and seamless access. However, the implementation of LEO satellites is largely restricted by the deployment of ground stations. Inter-satellite links (ISLs) have been regarded as a promising technique to fully exploit the potentials of… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: 7 pages, 4 figures

  2. arXiv:2301.08474  [pdf, other

    cs.GT

    Trade Privacy for Utility: A Learning-Based Privacy Pricing Game in Federated Learning

    Authors: Yuntao Wang, Zhou Su, Yanghe Pan, Abderrahim Benslimane, Yiliang Liu, Tom H. Luan, Ruidong Li

    Abstract: To prevent implicit privacy disclosure in sharing gradients among data owners (DOs) under federated learning (FL), differential privacy (DP) and its variants have become a common practice to offer formal privacy guarantees with low overheads. However, individual DOs generally tend to inject larger DP noises for stronger privacy provisions (which entails severe degradation of model utility), while… ▽ More

    Submitted 14 February, 2023; v1 submitted 20 January, 2023; originally announced January 2023.

    Comments: Accepted by IEEE ICC2023

  3. arXiv:2211.01772  [pdf, other

    eess.SY cs.GT

    Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach

    Authors: Yuntao Wang, Zhou Su, Abderrahim Benslimane, Qichao Xu, Minghui Dai, Ruidong Li

    Abstract: The proliferation of unmanned aerial vehicles (UAVs) opens up new opportunities for on-demand service provisioning anywhere and anytime, but also exposes UAVs to a variety of cyber threats. Low/medium interaction honeypots offer a promising lightweight defense for actively protecting mobile Internet of things, particularly UAV networks. While previous research has primarily focused on honeypot sys… ▽ More

    Submitted 29 August, 2023; v1 submitted 28 October, 2022; originally announced November 2022.

    Comments: Accepted Aug. 28, 2023 by IEEE Transactions on Information Forensics & Security. arXiv admin note: text overlap with arXiv:2209.13815

  4. arXiv:2209.13815  [pdf, other

    cs.GT

    A Learning-based Honeypot Game for Collaborative Defense in UAV Networks

    Authors: Yuntao Wang, Zhou Su, Abderrahim Benslimane, Qichao Xu, Minghui Dai, Ruidong Li

    Abstract: The proliferation of unmanned aerial vehicles (UAVs) opens up new opportunities for on-demand service provisioning anywhere and anytime, but it also exposes UAVs to various cyber threats. Low/medium-interaction honeypot is regarded as a promising lightweight defense to actively protect mobile Internet of things, especially UAV networks. Existing works primarily focused on honeypot design and attac… ▽ More

    Submitted 27 September, 2022; originally announced September 2022.

    Comments: Accepted by IEEE Globecom2022

  5. A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains

    Authors: Yuntao Wang, Haixia Peng, Zhou Su, Tom H Luan, Abderrahim Benslimane, Yuan Wu

    Abstract: Proof of work (PoW), as the representative consensus protocol for blockchain, consumes enormous amounts of computation and energy to determine bookkee** rights among miners but does not achieve any practical purposes. To address the drawback of PoW, we propose a novel energy-recycling consensus mechanism named platform-free proof of federated learning (PF-PoFL), which leverages the computing pow… ▽ More

    Submitted 29 October, 2022; v1 submitted 23 August, 2022; originally announced August 2022.

    Comments: Accepted by IEEE Journal on Selected Areas in Communications

  6. arXiv:2202.05667  [pdf, other

    cs.NI cs.AI

    A Multi-Domain VNE Algorithm based on Load Balancing in the IoT networks

    Authors: Peiying Zhang, Fanglin Liu, Chunxiao Jiang, Abderrahim Benslimane, Juan-Luis Gorricho, Joan Serrat-Fernacute

    Abstract: Virtual network embedding is one of the key problems of network virtualization. Since virtual network map** is an NP-hard problem, a lot of research has focused on the evolutionary algorithm's masterpiece genetic algorithm. However, the parameter setting in the traditional method is too dependent on experience, and its low flexibility makes it unable to adapt to increasingly complex network envi… ▽ More

    Submitted 6 February, 2022; originally announced February 2022.

  7. arXiv:2202.02452  [pdf, other

    cs.NI cs.AI

    Security-Aware Virtual Network Embedding Algorithm based on Reinforcement Learning

    Authors: Peiying Zhang, Chao Wang, Chunxiao Jiang, Abderrahim Benslimane

    Abstract: Virtual network embedding (VNE) algorithm is always the key problem in network virtualization (NV) technology. At present, the research in this field still has the following problems. The traditional way to solve VNE problem is to use heuristic algorithm. However, this method relies on manual embedding rules, which does not accord with the actual situation of VNE. In addition, as the use of intell… ▽ More

    Submitted 2 February, 2022; originally announced February 2022.