Works (22)

Updated: April 27th, 2024 05:00

2024 journal article

Efficient Content Delivery in User-Centric and Cache-Enabled Vehicular Edge Networks with Deadline-Constrained Heterogeneous Demands

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 73(1), 1129–1145.

By: M. Pervej n, R. Jin*, S. Lin n & H. Dai n

author keywords: Connected vehicle (CV); content caching; delay minimization; software-defined networking (SDN); user-centric networking; vehicular edge network (VEN)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: April 22, 2024

2023 journal article

On the Privacy Guarantees of Gossip Protocols in General Networks

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 10(6), 3114–3130.

By: R. Jin n, Y. Huang n, Z. Zhang & H. Dai n

author keywords: Protocols; Privacy; Differential privacy; Uncertainty; Monitoring; Wireless sensor networks; Social networking (online); Information processing; Prediction methods; Information spreading; gossip protocols; differential privacy; prediction uncertainty
TL;DR: The privacy guarantees of gossip protocols in general networks in terms of differential privacy and prediction uncertainty are studied, and it is found that source anonymity is closely related to some key network structure parameters in the general network setting. (via Semantic Scholar)
Source: Web Of Science
Added: November 27, 2023

2023 journal article

Resource Constrained Vehicular Edge Federated Learning With Highly Mobile Connected Vehicles

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 41(6), 1825–1844.

By: M. Pervej n, R. Jin* & H. Dai n

author keywords: Index Terms- Connected vehicle (CV); energy efficiency (EE); federated learning (FL); vehicular edge network (VEN)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: May 17, 2023

2022 journal article

Communication Efficient Federated Learning With Energy Awareness Over Wireless Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 21(7), 5204–5219.

By: R. Jin n, X. He* & H. Dai n

author keywords: Mobile handsets; Servers; Training; Performance evaluation; Energy consumption; Computational modeling; Wireless networks; Federated learning; wireless communications; communication efficiency; data heterogeneity
TL;DR: The idea of SignSGD in which only the signs of the gradients are exchanged is adopted, and two optimization problems are formulated and solved, which optimize the learning performance given the energy consumption requirement, and vice versa. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 29, 2022

2022 journal article

Communication-Efficient Federated Learning via Predictive Coding

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 16(3), 369–380.

By: K. Yue n, R. Jin n, C. Wong n & H. Dai n

author keywords: Predictive models; Servers; Collaborative work; Predictive coding; Entropy coding; Costs; Quantization (signal); Federated learning; distributed optimization; predictive coding
TL;DR: This paper proposes a predictive coding based compression scheme for federated learning that has shared prediction functions among all devices and allows each worker to transmit a compressed residual vector derived from the reference. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: May 31, 2022

2022 journal article

Delay-Optimal Coded Offloading for Distributed Edge Computing in Fading Environments

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 21(12), 10796–10808.

By: X. He*, T. Li*, R. Jin n & H. Dai n

author keywords: Mobile edge computing; coded computing; task offloading
TL;DR: Through in-depth analysis based on order statistics, it is found that the average processing delay of the offloaded tasks admits a favorable coding structure under arbitrary fading distribution, which allows us to efficiently solve the original problem using monotonic optimization. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: February 27, 2023

2022 journal article

Multi-Hop Task Offloading With On-the-Fly Computation for Multi-UAV Remote Edge Computing

IEEE TRANSACTIONS ON COMMUNICATIONS, 70(2), 1332–1344.

By: X. He*, R. Jin n & H. Dai n

author keywords: Task analysis; Edge computing; Servers; Resource management; Unmanned aerial vehicles; Computational modeling; Wireless communication; Edge computing; UAV; resource allocation; deployment
TL;DR: A multi-hop task offloading with on-the-fly computation scheme is proposed in this work to enable a more powerful multi-UAV remote edge computing network and two efficient algorithms are proposed to solve the corresponding joint resource allocation and deployment problem. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: March 7, 2022

2021 article

Joint Service Placement and Resource Allocation for Multi-UAV Collaborative Edge Computing

2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC).

By: X. He*, R. Jin n & H. Dai n

TL;DR: This work is among the first to consider the joint service placement and resource allocation problem for multi-UAV edge computing, and finds that this problem can be divided into two subproblems that are submodular and convex, respectively. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: November 1, 2021

2021 journal article

Minimizing the Age of Information in the Presence of Location Privacy-Aware Mobile Agents

IEEE TRANSACTIONS ON COMMUNICATIONS, 69(2), 1053–1067.

By: R. Jin n, X. He* & H. Dai n

author keywords: Mobile agents; Privacy; Sensors; Task analysis; Differential privacy; Information age; Base stations; Age of information; mobile crowd sensing; location privacy; differential privacy
TL;DR: A location privacy-aware payment mechanism, which can stimulate the mobile agents to report their locations with differential privacy levels desired by the BS, is proposed, and a cost-efficient mobile agent selection algorithm is proposed. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: March 29, 2021

2020 article

Differential Privacy and Prediction Uncertainty of Gossip Protocols in General Networks

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: Y. Huang n, R. Jin n & H. Dai n

TL;DR: Lower bounds of the differential privacy guarantees are derived for the gossip protocols in general networks in both synchronous and asynchronous settings and it is found that source anonymity is closely related to some key network structure parameters in the general network setting. (via Semantic Scholar)
Source: Web Of Science
Added: October 26, 2021

2020 article

Joint Power and Deployment Optimization for Multi-UAV Remote Edge Computing

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: X. He*, R. Jin n & H. Dai n

TL;DR: A more efficient algorithm that has a complexity only linear in the number of UAVs is developed by exploiting the special structure of this problem to overcome the challenge of finding the optimal UAV power allocation and deployment. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: October 26, 2021

2020 journal article

Peace: Privacy-Preserving and Cost-Efficient Task Offloading for Mobile-Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(3), 1814–1824.

By: X. He*, R. Jin n & H. Dai n

author keywords: Mobile-edge computing; privacy; task offloading; Lyapunov optimization
TL;DR: A novel privacy-preserving and cost-efficient (PEACE) task offloading scheme that can preserve user privacy while still ensure the best possible user experience is developed in this work based on the generic Lyapunov optimization framework. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: April 14, 2020

2020 journal article

Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(6), 4054–4066.

By: X. He*, R. Jin n & H. Dai n

author keywords: Servers; Jamming; Security; Mobile handsets; Wireless communication; Task analysis; Interference cancellation; Mobile-edge computing; secure offloading; physical-layer
TL;DR: A novel physical-layer assisted secure offloading scheme is proposed in this work, in which the edge server proactively broadcasts jamming signals to impede eavesdropping and leverages full-duplex communication technique to effectively suppress the self-interference. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: July 13, 2020

2019 journal article

Camouflaging Mobile Primary Users in Database-Driven Cognitive Radio Networks

IEEE WIRELESS COMMUNICATIONS LETTERS, 8(1), 21–24.

By: X. He*, R. Jin n & H. Dai n

author keywords: Location privacy; cognitive radio; database-driven; mobile
TL;DR: A novel scheme that can camouflage mobile PUs through generating low-cost fake trajectories in the database is developed, and its effectiveness is validated by numerical results. (via Semantic Scholar)
Source: Web Of Science
Added: March 11, 2019

2019 journal article

Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT

IEEE INTERNET OF THINGS JOURNAL, 6(3), 4547–4555.

By: X. He*, R. Jin n & H. Dai n

author keywords: Deep learning; Internet-of-Things (IoT); mobile-edge computing (MEC); post-decision state (PDS); privacy
TL;DR: In this paper, a new privacy vulnerability caused by the wireless offloading feature of MEC-enabled IoT is identified and an effective privacy-aware offloading scheme is developed based on a newly proposed deep post-decision state (PDS)-learning algorithm. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: July 15, 2019

2019 journal article

On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 14(12), 3273–3286.

By: R. Jin n, X. He* & H. Dai n

author keywords: Quantitative information flow; game theory; collaborative security; privacy
TL;DR: The interplay between the attacker and the collaborative entities is formulated as Quantitative Information Flow (QIF) games, in which the QIF theory is adapted to measure the collaboration gain and the privacy loss of the entities in the information sharing process. (via Semantic Scholar)
Source: Web Of Science
Added: September 16, 2019

2018 journal article

Collaborative IDS Configuration: A Two-Layer Game-Theoretic Approach

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 4(4), 803–815.

By: R. Jin n, X. He* & H. Dai n

author keywords: Collaborative intrusion detection systems; game theory; Nash-Q learning
TL;DR: A centralized Vickrey–Clarke–Groves auction based collaboration scheme and a distributed game-theoretic incentive mechanism are proposed and the effectiveness of the proposed schemes is validated through both analysis and numerical experiments. (via Semantic Scholar)
Source: Web Of Science
Added: January 14, 2019

2018 journal article

Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 13(6), 1524–1534.

By: X. He*, R. Jin n & H. Dai n

author keywords: Location privacy; privacy metric; location-based service (LBS); spatial diversity; optimal stopping
TL;DR: New ambient environment-dependent location privacy metrics are proposed in this paper, together with a stochastic model that can capture their spatial variations along the user’s route that allows mobile users to fully leverage the spatial diversity and achieve a substantially better performance. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2017 conference paper

Foresighted deception in dynamic security games

2017 ieee international conference on communications (icc).

By: X. He*, M. Islam*, R. Jin n & H. Dai n

TL;DR: A stochastic deception game (SDG) framework is developed in this work to enable the defender to conduct foresighted deception in unknown dynamic environments and to improve security performance. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2017 conference paper

Privacy-aware offloading in mobile-edge computing

Globecom 2017 - 2017 ieee global communications conference.

By: X. He, J. Liu*, R. Jin* & H. Dai*

TL;DR: A constrained Markov decision process (CMDP) based privacy-aware task offloading scheduling algorithm is proposed, which allows the mobile device to achieve the best possible delay and energy consumption performance while maintain a pre-specified level of privacy. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2017 article

Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach

2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), pp. 72–83.

By: R. Jin n, X. He*, H. Dai n, R. Dutta n & P. Ning*

author keywords: collaborative security; game theory; privacy
TL;DR: A repeated two-layer single-leader multi-follower game is proposed and the expected behaviors of both the attacker and the security entities are derived and the utility-privacy tradeoff curve is obtained. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 conference paper

Collaborative IDS configuration: A two-layer game-theoretical approach

2016 ieee global communications conference (globecom).

By: R. Jin n, X. He n & H. Dai n

TL;DR: Simulation results show that the proposed algorithm can provide an effective collaborative configuration scheme, leading to significant detection performance gain, and the conditions under which there is a guaranteed improvement in expected system performance have been derived. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.