Event Category: In-house Presentation

Reversing the Virtual Maze: An Overview of the Technical and Methodological Challenges for Metaverse App Analysis

The Metaverse is a virtual world that is becoming increasingly popular. Recent technological advances, such as head-mounted displays and novel...

Seguir leyendo arrow_right_alt

Location Data: Friend or Foe? An Investigation into the Reliability of Location Signals in Mobile Advertising

This paper investigates the accuracy and integrity of location data within the realm of Location-Based Mobile Marketing (LBMM). By analyzing...

Seguir leyendo arrow_right_alt

Metric meta-learning optimization towards Intent-Based Networking implementation

Zero-touch network management is essential for beyond 5G and 6G systems, requiring full automation through a closed loop of data...

Seguir leyendo arrow_right_alt

DEEXP: Revealing Model Vulnerabilities for Spatio-Temporal Mobile Traffic Forecasting with Explainable AI

The ability to perform mobile traffic forecasting effectively with Deep Neural Networks (DNN) is instrumental to optimise resource management in...

Seguir leyendo arrow_right_alt

Towards Ultra-Low Latency User-Plane Cyberattack Detection in SDN-based Smart Grids

Machine Learning (ML) models are widely used for cyberattack detection in Smart Grids (SG) based on Software-Defined Networks (SDN). However,...

Seguir leyendo arrow_right_alt

Jewel: Resource-Efficient Joint Packet and Flow Level Inference in Programmable Switches

Embedding machine learning (ML) models in programmable switches realizes the vision of high-throughput and low-latency inference at line rate. Recent...

Seguir leyendo arrow_right_alt

Optimizing Passive Metasurface for Low Earth Orbit Satellite Communication

Low Earth Orbit (LEO) satellite communication is crucial for wireless communication. While manufacturing and launching LEO satellites have become more...

Seguir leyendo arrow_right_alt

Det-RAN: Data-Driven Cross-Layer Attack Detection in 5G Open RANs

Fifth generation (5G) and beyond cellular networks are still vulnerable to security threats, primarily due to the lack of integrity...

Seguir leyendo arrow_right_alt

Transformer-Based Quantification of the Echo Chamber Effect in Online Communities

An Echo Chamber on social media refers to the environment where like-minded people hear the echo of each others’ voices,...

Seguir leyendo arrow_right_alt

Resilient AI/ML for Mobile Networking

The next sixth generation (6G) networks will bring a paradigm shift from “connected things” to “connected intelligence,” supporting even more...

Seguir leyendo arrow_right_alt

Comentarios recientes

    Archivos

    Categorías