Deep learning in mobile and wireless networking: A survey

C Zhang, P Patras, H Haddadi - IEEE Communications surveys …, 2019 - ieeexplore.ieee.org
The rapid uptake of mobile devices and the rising popularity of mobile applications and
services pose unprecedented demands on mobile and wireless networking infrastructure …

Smartphone app usage analysis: datasets, methods, and applications

T Li, T Xia, H Wang, Z Tu, S Tarkoma… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
As smartphones have become indispensable personal devices, the number of smartphone
users has increased dramatically over the last decade. These personal devices, which are …

[HTML][HTML] A survey on deploying mobile deep learning applications: A systemic and technical perspective

Y Wang, J Wang, W Zhang, Y Zhan, S Guo… - Digital Communications …, 2022 - Elsevier
With the rapid development of mobile devices and deep learning, mobile smart applications
using deep learning technology have sprung up. It satisfies multiple needs of users, network …

Towards privacy-preserving speech data publishing

J Qian, F Han, J Hou, C Zhang… - IEEE INFOCOM 2018 …, 2018 - ieeexplore.ieee.org
Privacy-preserving data publishing has been a heated research topic in the last decade.
Numerous ingenious attacks on users' privacy and defensive measures have been …

Spot: Structure patching and overlap tweaking for effective pipelining in privacy-preserving mlaas with tiny clients

X Xu, Q Zhang, R Ning, C Xin… - 2024 IEEE 44th …, 2024 - ieeexplore.ieee.org
Machine Learning as a Service (MLaaS) has paved the way for numerous applications for
resource-limited clients, such as IoT/mobile users. However, it raises a great challenge for …

App trajectory recognition over encrypted internet traffic based on deep neural network

D Li, W Li, X Wang, CT Nguyen, S Lu - Computer Networks, 2020 - Elsevier
Despite the increasing popularity of mobile applications and the widespread adoption of
encryption techniques, mobile devices are still susceptible to security and privacy risks. In …

[HTML][HTML] Unveiling Smart Contracts Vulnerabilities: Toward Profiling Smart Contracts Vulnerabilities using Enhanced Genetic Algorithm and Generating Benchmark …

S HajiHosseinKhani, AH Lashkari, AM Oskui - Blockchain: Research and …, 2024 - Elsevier
With the advent of blockchain networks, there has been a transition from traditional contracts
to Smart Contracts (SCs), which are crucial for maintaining trust within these networks …

[HTML][HTML] Unveiling vulnerable smart contracts: Toward profiling vulnerable smart contracts using genetic algorithm and generating benchmark dataset

S HajiHosseinKhani, AH Lashkari, AM Oskui - Blockchain: Research and …, 2024 - Elsevier
Smart contracts (SCs) are crucial in maintaining trust within blockchain networks. However,
existing methods for analyzing SC vulnerabilities often lack accuracy and effectiveness …

Learning Program Representations with a Tree-Structured Transformer

W Wang, K Zhang, G Li, S Liu, A Li… - … on Software Analysis …, 2023 - ieeexplore.ieee.org
Learning vector representations for programs is a critical step in applying deep learning
techniques for program understanding tasks. Various neural network models are proposed …

Activetracker: Uncovering the trajectory of app activities over encrypted internet traffic streams

D Li, W Li, X Wang, CT Nguyen… - 2019 16th Annual IEEE …, 2019 - ieeexplore.ieee.org
Despite the increasing popularity of mobile applications and the widespread adoption of
encryption techniques, mobile devices are still susceptible to security and privacy risks. In …