Skip to main content

Showing 1–17 of 17 results for author: Voigt, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12844  [pdf, other

    cs.LG cs.AI

    Synergizing Foundation Models and Federated Learning: A Survey

    Authors: Shenghui Li, Fanghua Ye, Meng Fang, Jiaxu Zhao, Yun-Hin Chan, Edith C. -H. Ngai, Thiemo Voigt

    Abstract: The recent development of Foundation Models (FMs), represented by large language models, vision transformers, and multimodal models, has been making a significant impact on both academia and industry. Compared with small-scale models, FMs have a much stronger demand for high-volume data during the pre-training phase. Although general FMs can be pre-trained on data collected from open sources such… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  2. arXiv:2307.05206  [pdf, other

    cs.CR

    Application-aware Energy Attack Mitigation in the Battery-less Internet of Things

    Authors: Chetna Singhal, Thiemo Voigt, Luca Mottola

    Abstract: We study how to mitigate the effects of energy attacks in the batteryless Internet of Things (IoT). Battery-less IoT devices live and die with ambient energy, as they use energy harvesting to power their operation. They are employed in a multitude of applications, including safety-critical ones such as biomedical implants. Due to scarce energy intakes and limited energy buffers, their executions b… ▽ More

    Submitted 8 September, 2023; v1 submitted 11 July, 2023; originally announced July 2023.

  3. arXiv:2304.14213  [pdf, other

    cs.SE

    Timing Analysis of Embedded Software Updates

    Authors: Ahmed El Yaacoub, Luca Mottola, Thiemo Voigt, Philipp Rümmer

    Abstract: We present RETA (Relative Timing Analysis), a differential timing analysis technique to verify the impact of an update on the execution time of embedded software. Timing analysis is computationally expensive and labor intensive. Software updates render repeating the analysis from scratch a waste of resources and time, because their impact is inherently confined. To determine this boundary, in RETA… ▽ More

    Submitted 7 July, 2023; v1 submitted 27 April, 2023; originally announced April 2023.

  4. arXiv:2304.08224  [pdf, other

    cs.CR

    Uncharted Territory: Energy Attacks in the Battery-less Internet of Things

    Authors: Luca Mottola, Arslan Hameed, Thiemo Voigt

    Abstract: We study how ambient energy harvesting may be used as an attack vector in the battery-less Internet of Things (IoT). Battery-less IoT devices rely on ambient energy harvesting and are employed in a multitude of applications, including safety-critical ones such as biomedical implants. Due to scarce energy intakes and limited energy buffers, their executions become intermittent, alternating periods… ▽ More

    Submitted 17 July, 2023; v1 submitted 17 April, 2023; originally announced April 2023.

  5. An Experimental Study of Byzantine-Robust Aggregation Schemes in Federated Learning

    Authors: Shenghui Li, Edith C. -H. Ngai, Thiemo Voigt

    Abstract: Byzantine-robust federated learning aims at mitigating Byzantine failures during the federated training process, where malicious participants may upload arbitrary local updates to the central server to degrade the performance of the global model. In recent years, several robust aggregation schemes have been proposed to defend against malicious updates from Byzantine clients and improve the robustn… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

    Comments: This paper has been accepted for publication in IEEE Transactions on Big Data

  6. arXiv:2212.00824  [pdf, other

    cs.LG

    On-device Training: A First Overview on Existing Systems

    Authors: Shuai Zhu, Thiemo Voigt, JeongGil Ko, Fatemeh Rahimian

    Abstract: The recent breakthroughs in machine learning (ML) and deep learning (DL) have catalyzed the design and development of various intelligent systems over wide application domains. While most existing machine learning models require large memory and computing power, efforts have been made to deploy some models on resource-constrained devices as well. A majority of the early application systems focused… ▽ More

    Submitted 9 May, 2023; v1 submitted 1 December, 2022; originally announced December 2022.

  7. arXiv:2206.05359  [pdf, other

    cs.CR cs.DC

    Blades: A Unified Benchmark Suite for Byzantine Attacks and Defenses in Federated Learning

    Authors: Shenghui Li, Edith Ngai, Fanghua Ye, Li Ju, Tianru Zhang, Thiemo Voigt

    Abstract: Federated learning (FL) facilitates distributed training across different IoT and edge devices, safeguarding the privacy of their data. The inherent distributed structure of FL introduces vulnerabilities, especially from adversarial devices aiming to skew local updates to their advantage. Despite the plethora of research focusing on Byzantine-resilient FL, the academic community has yet to establi… ▽ More

    Submitted 10 November, 2023; v1 submitted 10 June, 2022; originally announced June 2022.

  8. arXiv:2112.12985  [pdf, other

    cs.LG cs.AI cs.NI

    DeepGANTT: A Scalable Deep Learning Scheduler for Backscatter Networks

    Authors: Daniel F. Perez-Ramirez, Carlos Pérez-Penichet, Nicolas Tsiftes, Thiemo Voigt, Dejan Kostic, Magnus Boman

    Abstract: Novel backscatter communication techniques enable battery-free sensor tags to interoperate with unmodified standard IoT devices, extending a sensor network's capabilities in a scalable manner. Without requiring additional dedicated infrastructure, the battery-free tags harvest energy from the environment, while the IoT devices provide them with the unmodulated carrier they need to communicate. A s… ▽ More

    Submitted 5 April, 2023; v1 submitted 24 December, 2021; originally announced December 2021.

    Comments: 11 pages (excluding references). Submitted version that was accepted to IPSN 2023 (not the camera-ready version). Camera-ready version available here: https://doi.org/10.1145/3583120.3586957

  9. arXiv:2101.05880  [pdf, other

    cs.LG cs.AI

    Auto-weighted Robust Federated Learning with Corrupted Data Sources

    Authors: Shenghui Li, Edith Ngai, Fanghua Ye, Thiemo Voigt

    Abstract: Federated learning provides a communication-efficient and privacy-preserving training process by enabling learning statistical models with massive participants while kee** their data in local clients. However, standard federated learning techniques that naively minimize an average loss function are vulnerable to data corruptions from outliers, systematic mislabeling, or even adversaries. In addi… ▽ More

    Submitted 13 July, 2022; v1 submitted 14 January, 2021; originally announced January 2021.

    Journal ref: ACM Transactions on Intelligent Systems and Technology (TIST) 13,5 (2022), 1-20

  10. The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services

    Authors: Ahmed Mohamed Hussain, Gabriele Oligeri, Thiemo Voigt

    Abstract: We present a new machine learning-based attack that exploits network patterns to detect the presence of smart IoT devices and running services in the WiFi radio spectrum. We perform an extensive measurement campaign of data collection, and we build up a model describing the traffic patterns characterizing three popular IoT smart home devices, i.e., Google Nest Mini, Amazon Echo, and Amazon Echo Do… ▽ More

    Submitted 25 July, 2021; v1 submitted 16 September, 2020; originally announced September 2020.

    Comments: 15 pages, 7 figures. Accepted for the 9th International Symposium On Security And Privacy On Internet of Things (SPIoT), 2020

  11. arXiv:2001.04259  [pdf, other

    cs.NI cs.ET eess.SP

    TunnelScatter: Low Power Communication for Sensor Tags using Tunnel Diodes

    Authors: Ambuj Varshney, Andreas Soleiman, Thiemo Voigt

    Abstract: Due to extremely low power consumption, backscatter has become the transmission mechanism of choice for battery-free devices that operate on harvested energy. However, a limitation of recent backscatter systems is that the communication range scales with the strength of the ambient carrier signal(ACS). This means that to achieve a long range, a backscatter tag needs to reflect a strong ACS, which… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Comments: This paper was presented at ACM MobiCom 2019

  12. arXiv:1803.08583  [pdf, other

    cs.NI cs.ET

    Visible Light Communication for Wearable Computing

    Authors: Ambuj Varshney, Luca Mottola, Thiemo Voigt

    Abstract: Visible Light Communication (VLC) is emerging as a means to network computing devices that ameliorates many hurdles of radio-frequency (RF) communications, for example, the limited available spectrum. Enabling VLC in wearable computing, however, is challenging because mobility induces unpredictable drastic changes in light conditions, for example, due to reflective surfaces and obstacles casting s… ▽ More

    Submitted 22 March, 2018; originally announced March 2018.

  13. arXiv:1710.02324  [pdf, other

    cs.NI

    Five-Nines Reliable Downward Routing in RPL

    Authors: Simon Duquennoy, Joakim Eriksson, Thiemo Voigt

    Abstract: After a decade of research in low-power data collection, reaching arbitrary nodes has received comparatively little attention. The leading protocol for low-power IPv6 routing, RPL, is no exception, as it is often studied in multipoint-to-point scenarios. As a result, downward routing (from root to node) is still notoriously difficult, holding back the emergence of Internet of Things applications t… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

  14. arXiv:1611.00688  [pdf, other

    cs.NI

    Mitigating Inter-network Interference in LoRa Networks

    Authors: Thiemo Voigt, Martin Bor, Utz Roedig, Juan Alonso

    Abstract: Long Range (LoRa) is a popular technology used to construct Low-Power Wide-Area Network (LPWAN) networks. Given the popularity of LoRa it is likely that multiple independent LoRa networks are deployed in close proximity. In this situation, neighbouring networks interfere and methods have to be found to combat this interference. In this paper we investigate the use of directional antennae and the u… ▽ More

    Submitted 2 November, 2016; originally announced November 2016.

  15. arXiv:1611.00096  [pdf, other

    cs.NI

    LoRea: A Backscatter Architecture that Achieves a Long Communication Range

    Authors: Ambuj Varshney, Oliver Harms, Carlos Perez Penichet, Christian Rohner, Frederik Hermans, Thiemo Voigt

    Abstract: There is the long-standing assumption that radio communication in the range of hundreds of meters needs to consume mWs of power at the transmitting device. In this paper, we demonstrate that this is not necessarily the case for some devices equipped with backscatter radios. We present LoRea an architecture consisting of a tag, a reader and multiple carrier generators that overcomes the power, cost… ▽ More

    Submitted 16 November, 2017; v1 submitted 31 October, 2016; originally announced November 2016.

    Comments: Accepted and presented at ACM SenSys 2017, Delft, Netherlands

  16. arXiv:1402.2744  [pdf, other

    cs.OH

    dRTI: Directional Radio Tomographic Imaging

    Authors: Bo Wei, Ambuj Varshney, Wen Hu, Neal Patwari, Thiemo Voigt, Chun Tung Chou

    Abstract: Radio tomographic imaging (RTI) enables device free localisation of people and objects in many challenging environments and situations. Its basic principle is to detect the changes in the statistics of some radio quality measurements in order to infer the presence of people and objects in the radio path. However, the localisation accuracy of RTI suffers from complicated radio propagation behaviour… ▽ More

    Submitted 12 February, 2014; originally announced February 2014.

  17. arXiv:1202.4865  [pdf, ps, other

    cs.NI

    Jam-X: Wireless Agreement under Interference

    Authors: Carlo Alberto Boano, Kay Römer, Marco Antonio Zúñiga, Thiemo Voigt

    Abstract: Wireless low-power transceivers used in sensor networks such as IEEE 802.15.4 typically operate in unlicensed frequency bands that are subject to external interference from devices transmitting at much higher power. Communication protocols should therefore be designed to be robust against such interference. A critical building block of many protocols at all layers is agreement on a piece of inform… ▽ More

    Submitted 22 February, 2012; originally announced February 2012.

    ACM Class: C.2.1