Event Category: In-house Presentation

Sustainable Provision of URLLC Services for V2N: Analysis and Optimal Configuration

The rising popularity of Vehicle-to-Network (V2N) applications is driven by the Ultra-Reliable Low-Latency Communications (URLLC) service offered by 5G. The...

Read more arrow_right_alt

Reversing the Virtual Maze: An Overview of the Technical and Methodological Challenges for Metaverse App Analysis

The Metaverse is a virtual world that is becoming increasingly popular. Recent technological advances, such as head-mounted displays and novel...

Read more arrow_right_alt

Location Data: Friend or Foe? An Investigation into the Reliability of Location Signals in Mobile Advertising

This paper investigates the accuracy and integrity of location data within the realm of Location-Based Mobile Marketing (LBMM). By analyzing...

Read more arrow_right_alt

Metric meta-learning optimization towards Intent-Based Networking implementation

Zero-touch network management is essential for beyond 5G and 6G systems, requiring full automation through a closed loop of data...

Read more arrow_right_alt

DEEXP: Revealing Model Vulnerabilities for Spatio-Temporal Mobile Traffic Forecasting with Explainable AI

The ability to perform mobile traffic forecasting effectively with Deep Neural Networks (DNN) is instrumental to optimise resource management in...

Read more arrow_right_alt

Towards Ultra-Low Latency User-Plane Cyberattack Detection in SDN-based Smart Grids

Machine Learning (ML) models are widely used for cyberattack detection in Smart Grids (SG) based on Software-Defined Networks (SDN). However,...

Read more arrow_right_alt

Jewel: Resource-Efficient Joint Packet and Flow Level Inference in Programmable Switches

Embedding machine learning (ML) models in programmable switches realizes the vision of high-throughput and low-latency inference at line rate. Recent...

Read more arrow_right_alt

Optimizing Passive Metasurface for Low Earth Orbit Satellite Communication

Low Earth Orbit (LEO) satellite communication is crucial for wireless communication. While manufacturing and launching LEO satellites have become more...

Read more arrow_right_alt

Det-RAN: Data-Driven Cross-Layer Attack Detection in 5G Open RANs

Fifth generation (5G) and beyond cellular networks are still vulnerable to security threats, primarily due to the lack of integrity...

Read more arrow_right_alt

Transformer-Based Quantification of the Echo Chamber Effect in Online Communities

An Echo Chamber on social media refers to the environment where like-minded people hear the echo of each others’ voices,...

Read more arrow_right_alt

Archives

Categories