Incentive mechanisms for federated learning: From economic and game theoretic perspective

X Tu, K Zhu, NC Luong, D Niyato… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Federated learning (FL) becomes popular and has shown great potentials in training large-
scale machine learning (ML) models without exposing the owners' raw data. In FL, the data …

From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

A Nisioti, A Mylonas, PD Yoo… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …

Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges

N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …

Wireless network slicing: Generalized kelly mechanism-based resource allocation

YK Tun, NH Tran, DT Ngo, SR Pandey… - IEEE Journal on …, 2019 - ieeexplore.ieee.org
Wireless network slicing (ie, network virtualization) is one of the potential technologies for
addressing the issue of rapidly growing demand in mobile data services related to 5G …

Applications of economic and pricing models for resource management in 5G wireless networks: A survey

NC Luong, P Wang, D Niyato, YC Liang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper presents a comprehensive literature review on applications of economic and
pricing theory for resource management in the evolving fifth generation (5G) wireless …

Survey of public safety communications: User-side and network-side solutions and future directions

W Yu, H Xu, J Nguyen, E Blasch, A Hematian… - Ieee …, 2018 - ieeexplore.ieee.org
To prevent economic losses, maintain social order, and protect the well-being of the
populace during public safety and crisis recovery scenarios, such as man-made and natural …

Trusted UAV network coverage using blockchain, machine learning, and auction mechanisms

AS Khan, G Chen, Y Rahulamathavan, G Zheng… - IEEE …, 2020 - ieeexplore.ieee.org
The UAV is emerging as one of the greatest technology developments for rapid network
coverage provisioning at affordable cost. The aim of this paper is to outsource network …

An intelligence-driven security-aware defense mechanism for advanced persistent threats

Y Li, W Dai, J Bai, X Gan, J Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Combined with many different attack forms, advanced persistent threats (APTs) are
becoming a major threat to cyber security. Existing security protection works typically either …

Network utility maximization based on an incentive mechanism for truthful reporting of local information

J Gao, L Zhao, X Shen - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
Classic network utility maximization (NUM) problems are usually solved assuming all
information is available, implying that information not locally available is always truthfully …

SE-Loc: security-enhanced indoor localization with semi-supervised deep learning

Q Ye, X Fan, H Bie, D Puthal, T Wu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Wireless indoor localization has become unavoidable for industrial indoor location-based
services. Given the ubiquitous deployment of wireless access points (APs), Wi-Fi …